Salta al contenuto principale





The main use of Sora appears to generate brainrot of major beloved copyrighted characters, to say nothing of the millions of articles, images, and videos OpenAI has scraped.#OpenAI #Sora2 #Sora


OpenAI’s Sora 2 Copyright Infringement Machine Features Nazi SpongeBobs and Criminal Pikachus


Within moments of opening OpenAI’s new AI slop app Sora, I am watching Pikachu steal Poké Balls from a CVS. Then I am watching SpongeBob-as-Hitler give a speech about the “scourge of fish ruining Bikini Bottom.” Then I am watching a title screen for a Nintendo 64 game called “Mario’s Schizophrenia.” I swipe and I swipe and I swipe. Video after video shows Pikachu and South Park’s Cartman doing ASMR; a pixel-perfect scene from the Simpsons that doesn’t actually exist; a fake version of Star Wars, Jurassic Park, or La La Land; Rick and Morty in Minecraft; Rick and Morty in Breath of the Wild; Rick and Morty talking about Sora; Toad from the Mario universe deadlifting; Michael Jackson dancing in a room that seems vaguely Russian; Charizard signing the Declaration of Independence, and Mario and Goku shaking hands. You get the picture.


0:00
/1:33

Sora 2 is the new video generation app/TikTok clone from OpenAI. As AI video generators go, it is immediately impressive in that it is slightly better than the video generators that came before it, just as every AI generator has been slightly better than the one that preceded it. From the get go, the app lets you insert yourself into its AI creations by saying three numbers and filming a short video of yourself looking at the camera, looking left, looking right, looking up, and looking down. It is, as Garbage Day just described it, a “slightly better looking AI slop feed,” which I think is basically correct. Whenever a new tool like this launches, the thing that journalists and users do is probe the guardrails, which is how you get viral images of SpongeBob doing 9/11.


0:00
/1:23

The difference with Sora 2, I think, is that OpenAI, like X’s Grok, has completely given up any pretense that this is anything other than a machine that is trained on other people’s work that it did not pay for, and that can easily recreate that work. I recall a time when Nintendo and the Pokémon Company sued a broke fan for throwing an “unofficial Pokémon” party with free entry at a bar in Seattle, then demanded that fan pay them $5,400 for the poster he used to advertise it. This was the poster:

With the release of Sora 2 it is maddening to remember all of the completely insane copyright lawsuits I’ve written about over the years—some successful, some thrown out, some settled—in which powerful companies like Nintendo, Disney, and Viacom sued powerless people who were often their own fans for minor infractions or use of copyrighted characters that would almost certainly be fair use.


0:00
/1:35

No real consequences of any sort have thus far come for OpenAI, and the company now seems completely disinterested in pretending that it did not train its tools on endless reams of copyrighted material. It is also, of course, tacitly encouraging people to pollute both its app and the broader internet with slop. Nintendo and Disney do not really seem to care that it is now easier than ever to make Elsa and Pikachu have sex or whatever, and that much of our social media ecosystem is now filled with things of that nature. Instagram, YouTube, and to a slightly lesser extent TikTok are already filled with AI slop of anything you could possibly imagine.And now OpenAI has cut out the extra step that required people to download and reupload their videos to social media and has launched its own slop feed, which is, at least for me, only slightly different than what I see daily on my Instagram feed.

The main immediate use of Sora so far appears to be to allow people to generate brainrot of major beloved copyrighted characters, to say nothing of the millions of articles, blogs, books, images, videos, photos, and pieces of art that OpenAI has scraped from people far less powerful than, say, Nintendo. As a reward for this wide scale theft, OpenAI gets a $500 billion valuation. And we get a tool that makes it even easier to flood the internet with slightly better looking bullshit at the low, low cost of nearly all of the intellectual property ever created by our species, the general concept of the nature of truth, the devaluation of art through an endless flooding of the zone, and the knock-on environmental, energy, and negative labor costs of this entire endeavor.


AI Channel reshared this.




Arriva MatrixPDF: bastano pochi click e il phishing è servito!


È stato scoperto un nuovo toolkit di phishing, MatrixPDF, che consente agli aggressori di trasformare normali file PDF in esche interattive che aggirano la sicurezza della posta elettronica e reindirizzano le vittime a siti Web che rubano credenziali o scaricano malware.

I ricercatori di Varonis, che hanno scoperto lo strumento, sottolineano che MatrixPDF viene pubblicizzato come un simulatore di phishing e una soluzione per specialisti di black team. Tuttavia, sottolineano che è stato individuato per la prima volta su forum di hacker.

MatrixPDF: è uno strumento avanzato per la creazione di PDF di phishing realistici, progettato per i team di black team e per la formazione sulla sicurezza informatica”, si legge nell’annuncio. “Con l’importazione di PDF tramite trascinamento della selezione, l’anteprima in tempo reale e le sovrapposizioni personalizzabili, MatrixPDF consente di creare scenari di phishing di livello professionale. Funzionalità di sicurezza integrate come la sfocatura dei contenuti, i reindirizzamenti sicuri, la crittografia dei metadati e il bypass di Gmail garantiscono affidabilità e distribuzione in ambienti di test.”

Il toolkit è disponibile con diversi piani tariffari, che vanno da $ 400 al mese a $ 1.500 all’anno.

I ricercatori spiegano che il builder MatrixPDF consente agli aggressori di caricare un file PDF legittimo e poi di aggiungervi funzionalità dannose, come l’offuscamento del contenuto, falsi prompt “Documento protetto” e sovrapposizioni cliccabili che puntano a un URL esterno con il payload.

Inoltre, MatrixPDF consente azioni JavaScript, che vengono attivate quando un utente apre un documento o clicca su un pulsante. In questo caso, il codice JavaScript tenta di aprire un sito web o di eseguire altre azioni dannose.

La funzione di sfocatura crea file PDF il cui contenuto appare protetto, sfocato e contiene un pulsante “Apri documento protetto“. Cliccando su questo pulsante si apre un sito web che può essere utilizzato per rubare credenziali o distribuire malware.

Un test condotto da specialisti ha dimostrato che i PDF dannosi creati utilizzando MatrixPDF possono essere inviati a una casella di posta Gmail e che l’email riesce a bypassare i filtri anti-phishing. Questo perché questi file non contengono file binari dannosi, ma solo link esterni.

Un altro test condotto dai ricercatori dimostra come la semplice apertura di un PDF dannoso provochi l’apertura di un sito web esterno. Questa funzionalità è più limitata, poiché i moderni visualizzatori di PDF avvisano l’utente che il file sta tentando di connettersi a un sito remoto.

Gli esperti di Varonis ci ricordano che i file PDF restano uno strumento popolare per gli attacchi di phishing perché sono ampiamente distribuiti e le piattaforme di posta elettronica possono visualizzarli senza preavviso.

L'articolo Arriva MatrixPDF: bastano pochi click e il phishing è servito! proviene da il blog della sicurezza informatica.



Segger’s Awkward USB-C Issue With the J-Link Compact Debugger


Theoretically USB-C is a pretty nifty connector, but the reality is that it mostly provides many exciting new ways to make your device not work as expected. With the gory details covered by [Alvaro], the latest to join the party is Segger, with its J-Link BASE Compact MCU debugger displaying the same behavior which we saw back when the Raspberry Pi 4 was released in 2019. Back then so-called e-marked USB-C cables failed to power the SBC, much like how this particular J-Link unit refuses to power up when connected using one of those special USB-C cables.

We covered the issue in great detail back then, discussing how the CC1 and CC1 connections need to be wired up correctly with appropriate resistors in order for the USB-C supply – like a host PC – to provide power to the device. As [Alvaro] discovered through some investigation, this unit made basically the same mistake as the RPi 4B SBC before the corrected design. This involves wiring CC1 and CC2 together and as a result seeing the same <1 kOhm resistance on the active CC line, meaning that to the host device you just hooked up a USB-C audio dongle, which obviously shouldn’t be supplied with power.

Although it’s not easy to tell when this particular J-Link device was produced, the PCB notes its revision as v12.1, so presumably it’s not the first rodeo for this general design, and the product page already shows a different label than for the device that [Alvaro] has. It’s possible that it originally was sloppily converted from a previous micro-USB-powered design where CC lines do not exist and things Just Work™, but it’s still a pretty major oversight from what should be a reputable brand selling a device that costs €400 + VAT, rather than a reputable brand selling a <$100 SBC.

For any in the audience who have one of these USB-C-powered debuggers, does yours work with e-marked cables, and what is the revision and/or purchase date?


hackaday.com/2025/10/01/segger…



Flotilla: blocco navale e diritto internazionale
di Massimo Mazzucco

youtube.com/watch?v=6dyFyLb9cd…



#USA, l'ascia dello #shutdown


altrenotizie.org/primo-piano/1…