Salta al contenuto principale



Building a Hydraulic Gear Pump Isn’t So Easy



The gear pump prototype in action. (Credit: Artisan Makes, YouTube)The gear pump prototype in action. (Credit: Artisan Makes, YouTube)
Hydraulic gear pumps are deceptively simple: just two gears rotating together, forcing the hydraulic oil from one side to the other where the teeth don’t meet, and thus providing the ability to pressurize said oil to make hydraulic cylinders, final drives, etc. do their thing. As with most machining projects like this, the devil is absolutely in the details, particularly in the tolerances. This is the crash course that the [Artisan Makes] channel on YouTube is currently going through.

In this part one of a series on a DIY gear pump, scrap aluminium is used for the housing, along with 1045 medium carbon steel for the gears and W1A high carbon steel for bearings and other wear surfaces. Since at least one of the gears needs to be driven, a lip seal rated for 10 bar is used to provide a path for the shaft. As noted in the video, this is supposed to be a learning experience, ergo it’s a simplified design that merely targets being functional as a gear pump.

With the basic design figured out, the parts were created on the lathe and mill, followed by assembly. Most of the controversy is about the tolerances within the housing, as any leakage will reduce the efficiency. This means the spacing between the gears and housing, space between the gears and bearings, as well as that provided by the gasket that seals the housing base and top. This is where the comment section somewhat explodes with criticism and advice.

As can be seen in the demonstration with a better gasket, there is absolutely flow when driven at 1200 RPM, but also clearly severe leakage as evidenced by said flow not moving quite as fast as it should. We’re looking forward to the next part, in which addressing these tolerances is tackled, with hopefully a much more performant gear pump resulting.

youtube.com/embed/SIeOhI7Qng8?…


hackaday.com/2025/10/27/buildi…




Ora andiamo oltre le invasioni russe, praticamente ora ci dobbiamo proteggere dalle future invasioni degli UFO. Grande la Bomber Pfizer, sempre sul pezzo, sempre sfornando minchiate...



Nuovo calendario elettronico

firenze.linux.it/2025/10/nuovo…

Segnalato dal LUG di Firenze e pubblicato sulla comunità Lemmy @GNU/Linux Italia
#Firenze
Prendendo spunto dall’agenda in formato iCalendar (ICS) del GOLEM, il Firenze Linux User Group si è dotato di un nuovo calendario firenze.linux.it/flug.ics

GNU/Linux Italia reshared this.



Ora 185 paesi possono commerciare utilizzando il sistema di pagamento cinese sostenuto dai BRICS, aggirando SWIFT, eludendo le sanzioni e prosciugando le riserve di dollari.

Se non vi sembra il suono dei tamburi funebri dell'egemonia finanziaria occidentale... non state prestando attenzione.

La rivoluzione globale dei pagamenti guidata dai BRICS ha silenziosamente aggirato l'ordine finanziario occidentale e non ha avuto bisogno di un missile, di un carro armato o di un vertice del G7. Solo yuan. Infrastrutture. E 20 anni di pazienza strategica.

Al centro di questo cambiamento tettonico monetario c'è il CIPS, il Sistema di Pagamenti Interbancari Transfrontalieri della Cina, che ora facilita le transazioni in 185 paesi. E mentre gli esperti occidentali lo deridono dietro occhiali color dollaro, la realtà è questa:

CIPS ha già elaborato transazioni per un valore di 52 trilioni di yen (7 trilioni di dollari), superando SWIFT in diversi corridoi strategici.

Il 95% degli scambi commerciali tra Russia e Cina avviene ormai in valute locali.

Oltre 40 nazioni, molte delle quali nel Sud del mondo, stanno già saldando debiti e flussi di materie prime tramite il CIPS, completamente al di fuori della rete di sorveglianza finanziaria occidentale.

Ma cerchiamo di capire cosa significa realmente:

Non si tratta solo dei BRICS.
Si tratta di decolonizzare il sistema monetario.

La maggioranza globale, un tempo costretta a inginocchiarsi davanti all'altare del dollaro statunitense, ora sta abbozzando progetti per un mondo post-dollaro. In silenzio. Sistematicamente. E senza bisogno delle manette del FMI.

E l'Occidente?
Ancora impegnato a congratularsi con se stesso per aver trasformato SWIFT in un'arma, una mossa così arrogante da aver costretto alla nascita del suo sostituto.
Hanno trasformato i sistemi di pagamento globali in un'arma... e ora sono scioccati dal fatto che il mondo stia costruendo treni blindati.

Nel frattempo, gli alleati di Washington, aggrappati al cadavere in decomposizione dell'Impero, vengono superati in astuzia. Mentre dibattono sui pronomi di genere e sull'inflazione delle esportazioni, il resto del mondo si assicura energia, cibo e commercio, nelle proprie valute.

Non c'è bisogno di immaginare come si presenta un sistema finanziario multipolare.

Stai vivendo la sua genesi.

di THE ISLANDER

Fonte: https://x.com/IslanderWORLD/status/1982179730624299082



Trump come effetto di un “sistema” che esige nuove autocrazie?


@Giornalismo e disordine informativo
articolo21.org/2025/10/trump-c…
Molti osservatori oggi si chiedono se i movimenti che si ritrovano, ad esempio, nello slogan “MAGA”, e altri che vengono semplificativamente catalogati come “woke” rappresentino reali



Dopo le perle di Fassino e Renzi, abbiamo trovato un altro veggente...


The Supercon 2025 Badge is Built to be Customized


For anyone who’s joined us for previous years, you’ll know that badge hacking and modification are core to the Hackaday Supercon experience. While you’re of course free to leave the badge completely stock, we encourage attendees to tear it apart, learn how it works, and (hopefully) rebuild it into something unique. There are even prizes for the best hacks.

As such, every decision about the badge’s hardware and software is made with hackability in mind. It’s why we always try to add an expansion port to the badge and, in recent years, have leaned into MicroPython to make it easier for attendees to modify the code.

But one thing that’s been largely missing in previous badges is aesthetic customization. Sure, you could strip out the firmware and write something entirely new, or hang some oddball peripheral off the side of the thing, but ultimately it still looked like the badge we gave you at the door. That’s because, at the end of the day, the badges are just PCBs. Short of designing your own enclosure (which has certainly been done), every badge looks the same. That is, until now.

This year’s badge is unique among Supercon badges because it isn’t just a PCB. It’s actually a stack-up of two PCBs! That might not sound like much of a distinction, but in this case, the front board has no electrical function — its only purpose is to hold the keyboard membrane against the dome switches on the rear PCB. The only reason we made it out of a PCB in the first place is that it was convenient and cheap at the scale we needed. But if those weren’t concerns, it could just as easily have been 3D-printed or cut out with a laser or a CNC router.

While the necessities of running two hacker cons on opposite sides of the planet within a couple of months of each other meant we needed to think at scale, attendees are free to do whatever they want between now and when they get their badges on Friday. Want to carve a front panel out of aluminum on your CNC? Awesome. Perhaps laser-cut some thin plywood and give it a nice stain for that old-school look? We love it. Want to see what that fancy multi-material 3D printer you’ve got is capable of? So do we.
Hailing frequencies open, Captain.

Some Assembly Required


Want to make the 2025 Hackaday Supercon badge your own? Just head over to the “hardware/mechanicals_and_models” directory in the badge’s GitHub repository and you’ll find STEP, DXF, and SVG versions of the front panel. We’re eager to see some wild and wonderful front panels, but there are a few things to keep in mind:

  • Spacing between the rear and front boards should be approximately 2 mm.
  • The area around the keyboard should be roughly PCB thickness (~1.7 mm) for optimal typing.
  • You’ll need to provide hardware (M3 nuts/bolts work well) to attach the front panel to the badge.

If you’ve got other questions or need some assistance, leave a comment below or check in on the #badge-hacking channel in the Hackaday Discord server. See you at Supercon!


hackaday.com/2025/10/27/the-su…




israhelli killers stay unpunished


an article by Gideon Levy:
haaretz.com/israel-news/twilig…

see also:
mizanonline.ir/en/news/2933/on…

AI "abstract":

A 9-year-old Palestinian boy named Mohammad al-Hallaq was killed on October 16, 2025, in the village of al-Rihiya in the occupied West Bank, according to a report by Haaretz journalist Gideon Levy.
The incident occurred during an Israeli military raid when soldiers fired shots into the air, causing panic among children playing in a schoolyard. Mohammad, who stood still by a wall believing the situation was safe, was shot in the right thigh by an Israeli soldier; the bullet exited through his left side, destroying major blood vessels and internal organs.
He collapsed and died shortly after being rushed to the hospital, despite medical efforts to save him.
Eyewitnesses reported that the soldier who shot Mohammad raised his hands in celebration, with fellow soldiers joining in cheers, and that Israeli forces fired tear gas at local residents attempting to assist the child before leaving the scene.
The Israeli military stated that the incident was "clear" and that the Military Prosecutor’s Unit was reviewing it, but Haaretz reported that no formal investigation had been conducted.
The Israeli internal security service, Shin Bet, reportedly warned the family against holding demonstrations during the funeral.
Gideon Levy, who reported on the case, questioned the lack of accountability and highlighted the broader pattern of violence against Palestinian children in the occupied West Bank.
The article also references a separate incident in February 2025 where Palestinian detainees released from Israeli prisons were forced to wear white T-shirts with a blue Star of David and the message "we will not forget nor forgive," which Levy criticized as a form of forced political messaging.

reshared this



Dividiamodi una pizza....


La mia opinione su splittypie

Hai organicato un viaggio con degli amici, ecco lo strumento giusto:
NESSUNA ISCRIZIONE;
Funziona ovunque Accessibile su qualsiasi dispositivo con un browser web
Per condividere basta passare un link a un amico, il gioco è fatto.

🌖 per me è uno strumento indispensabile per molte occasioni.

Si esiste anche spliit, graficamente più accattivante, ma l'ho trovato un po' più complicato, splittypie è semplice e veloce.

🐁 Un Mugnaio reshared this.



The general who advised Netflix’s nuclear Armageddon movie doesn’t believe in abolishing nuclear weapons.#News #nuclear


'House of Dynamite' Is About the Zoom Call that Ends the World


This post contains spoilers for the Netflix film ‘House of Dynamite.’

Netflix’s new Kathryn Bigelow-directed nuclear war thriller wants audiences to ask themselves the question: what would you do if you had 15 minutes to decide whether or not to end the world?

House of Dynamite is about a nuclear missile hitting the United States as viewed from the conference call where America’s power players gather to decide how to retaliate. The decision window is short, just 15 minutes. In the film that’s all the time the President has to assess the threat, pick targets, and decide if the US should also launch its nuclear weapons. It’s about how much time they’d have in real life too.
playlist.megaphone.fm?p=TBIEA2…
In House of Dynamite, America’s early warning systems detect the launch of a nuclear-armed intercontinental ballistic missile (ICBM) somewhere in the Pacific Ocean. The final target is Chicago and when it lands more than 20 million people will die in a flash. Facing the destruction of a major American city, the President must decide what—if any—action to take in response.

The US has hundreds of nuclear missiles ready to go and plans to strike targets across Russia, China, and North Korea. But there’s a catch. In the film, America didn’t see who fired the nuke and no one is taking credit. It’s impossible to know who to strike and in what proportion. What’s a president to do?

House of Dynamite tells the story of this 15 minute Zoom call—from detection of the launch to its terminal arrival in Chicago—three different times. There’s dozens of folks on the call, from deputy advisors to the Secretary of Defense to the President himself, and each run through of the events gives the audience a bigger peak at how the whole machine operates, culminating, in the end, with the President’s view.

Many of the most effective and frightening films about nukes—Threads and The Day After—focus on the lives of the humans living in the blast zone. They’re about the crumbling of society in a wasteland, beholden to the decisions of absent political powers so distant that they often never appear on screen. House of Dynamite is about those powerful people caught in the absurd game of nuclear war, forced to make decisions with limited information and enormous consequences.

In both the movie and real life, America has ground-based interceptors stationed in California and Alaska that are meant to knock a nuke out of the sky should one ever get close. The early film follows missileers in Alaska as they launch the interceptor only to have it fail. It’s a horrifying and very real possibility. The truth of interceptors is that we don’t have many of them, the window to hit a fast moving ICBM is narrow, and in tests they only work about half the time.

“So it’s a fucking coin toss? That’s what $50 billion buys us?” Secretary of Defense Reid Baker, played by Jarred Harris, says in the film. This detail caught the eye of the Trump White House, which plans to spend around $200 billion on a space based version of the same tech.

Bloomberg reported on an internal Pentagon memo that directed officials to debunk House of Dynamite’s claims about missile defense. The Missile Defense Agency told Bloomberg that interceptors “have displayed a 100% accuracy rate in testing for more than a decade.” The Pentagon separately told Bloomberg that it wasn’t consulted on the film at all.

Director Bigelow worked closely with the CIA to make Zero Dark Thirty, but has tussled with the Pentagon before. The DoD didn’t like The Hurt Locker and pulled out of the project after showing some initial support. Bigelow has said in interviews that she wanted House of Dynamite to be an independent project.

Despite that independence, House of Dynamite nails the details of nuclear war in 2025. The acronyms, equipment, and procedures are all frighteningly close to reality and Bigelow did have help on set from retired US Army lieutenant general and former US Strategic Command (STRATCOM) Chief of Staff Dan Karbler.

Karbler is a career missile guy and as the chief of staff of STRATCOM he oversaw America’s nuclear weapons. He told 404 Media that he landed the gig by scaring the hell out of Bigelow and her staff on, appropriately, a Zoom call.

Bigelow wanted to meet Karbler and they set up a big conference call on Zoom. He joined the call but kept his camera off. As people filtered in, Karbler listened and waited. “Here’s how it kind of went down,” Karbler told 404 Media. “There’s a little break in the conversation so I click on my microphone, still leaving the camera off, and I just said: ‘This is the DDO [deputy director of operations] convening a National Event Conference. Classification of this conference TOP SECRET. TK [Talent Keyhole] SI: US STRATCOM, US INDOPACOM, US Northern Command, SecDef Cables, military system to the secretary.”

“SecDef Cables, please bring the secretary of defense in the conference. Mr. Secretary, this is the DDO. Because of the time constraints of this missile attack, recommend we transition immediately from a national event conference to a nuclear decision conference, and we bring the President into the conference. PEOC [Presidential Emergency Operations Center], please bring the President into the conference.”

“And I stopped there and I clicked on my camera and I said, ‘ladies and gentleman, that’s how the worst day in American history will begin. I hope your script does it some justice,’” Karbler said. The theatrics worked and, according to Karbler, he sat next to Bigelow every day on set and helped shape the movie.

House of Dynamite begins and ends with ambiguity. We never learn who fired the nuclear weapon at Chicago. The last few minutes of the film focus on the President looking through retaliation plans. He’s in a helicopter, moments from the nuke hitting Chicago, and looking through plans that would condemn millions of people on the planet to fast and slow deaths. The film ends as he wallows in this decision, we never learn what he chooses.

Karbler said it was intentional. “The ending was ambiguous so the audience would leave with questions,” he said. “The easy out would have been: ‘Well, let’s just have a nuclear detonation over Chicago.’ That’s the easy out. Leaving it like it is, you risk pissing off the audience, frankly, because they want a resolution of some sort, but they don’t get that resolution. So instead they’re going to have to be able to have a discussion.”

In my house, at least, the gambit worked. During the credits my wife and I talked about whether or not we’d launch the nukes ourselves (We’d both hold off) and I explained the unpleasant realities of ground based interceptors.

Karbler, too, said he wouldn’t have launched the nukes. It’s just one nuke, after all. It’s millions of people, sure, but if America launches its nukes in retaliation then there’s a good chance Russia, China, and everyone else might do the same. “Because of the potential of a response provoking a much, much broader response, and something that would not be proportional,” Karbler said. “Don’t get me wrong, 20 million people, an entire city, a nuclear attack that hit us, but if we respond back, then you’re going to get into im-proportionality calculus.”

Despite the horrors present on screen in House of Dynamite, Karbler isn’t a nuclear abolitionist. “The genie is out of the bottle, you’re not going to put it back in there,” he said. “So what do we do to ensure our best defense? It seems counterintuitive, you know, the best defense is gonna be a good offense. You’ve gotta be able to have a response back against the adversary.”

Basically, Karbler says we should do what we’re doing now: build a bunch more nukes and make sure your enemies know you’re willing to use them. “Classic deterrence has three parts: impose unacceptable costs on the adversary. Deny the adversary any benefit of attack, read that as our ability to defend ourselves, missile defense, but also have the credible messaging behind it,” he said.

These are weapons that have the power to end the world, weapons we make and pray we never use. But we do keep making them. Almost all the old nuclear treaties between Russia and America are gone. The US is spending trillions to replace old ICBM silos and make new nuclear weapons. After decades of maintaining a relatively small nuclear force, China is building up its own stockpiles.

Trump has promised a Golden Dome to keep America safe from nukes and on Sunday Putin claimed Russia had successfully tested a brand new nuclear-powered cruise missile. The people who track existential threats believe we’re closer to nukes ending the world than at any other time in history.




‏Rapporto Umanitario sulla Situazione nella Striscia di Gaza

‏Le organizzazioni internazionali e delle Nazioni Unite confermano che gli aiuti umanitari che entrano nella Striscia di Gaza sono del tutto insufficienti a soddisfare i bisogni fondamentali della popolazione, in un contesto di grave deterioramento delle condizioni di vita e sanitarie.

‏Nonostante le affermazioni israeliane secondo cui gli aiuti entrerebbero regolarmente e che le notizie sulla fame siano esagerate, i rapporti sul campo e le dichiarazioni dell’ONU, dell’UNICEF e di altre organizzazioni umanitarie dimostrano il contrario.

‏L’UNICEF segnala che la situazione a Gaza è estremamente drammatica: centinaia di camion di aiuti restano in attesa ai valichi, e quelli che riescono ad entrare sono pochi e non bastano a coprire i bisogni essenziali. Il sistema sanitario è al collasso, con ospedali distrutti e una grave carenza di medicinali e attrezzature.

‏Circa 650.000 studenti non possono tornare a scuola a causa della distruzione della maggior parte degli edifici scolastici e universitari, con la conseguente interruzione totale del processo educativo.

‏Secondo gli accordi umanitari firmati a Sharm El-Sheikh, sotto la mediazione dell’ex presidente americano Donald Trump e con la partecipazione di Egitto, Qatar, Turchia e altri paesi, è previsto l’ingresso urgente e regolare degli aiuti, ma la loro applicazione rimane molto limitata.

‏La Striscia di Gaza ha oggi bisogno di oltre 300.000 tende per ospitare le famiglie sfollate e di almeno 600 camion di aiuti al giorno carichi di farina, acqua e beni alimentari di prima necessità per combattere la fame.

‏In questo contesto, l’Associazione di Solidarietà con il Popolo Palestinese in Italia continua i suoi progetti umanitari per fornire cibo, acqua e pane agli sfollati, soprattutto con l’arrivo dell’inverno e il peggioramento delle condizioni di vita.

‏Facciamo quindi appello a tutte le persone di buona volontà a contribuire e sostenere i progetti umanitari per alleviare le sofferenze del popolo palestinese a Gaza.

26 ottobre 2025

Associazione dei Palestinesi in Italia (API)



A 3D Printed 16mm Movie Camera


The basic principles of a motion picture film camera should be well understood by most readers — after all, it’s been well over a hundred years since the Lumière brothers wowed 19th century Paris with their first films. But making one yourself is another matter entirely, as they are surprisingly complex and high-precision devices. This hasn’t stopped [Henry Kidman] from giving it a go though, and what makes his camera more remarkable is that it’s 3D printed.

The problem facing a 16mm movie camera designer lies in precisely advancing the film by one frame at the correct rate while filming, something done in the past with a small metal claw that grabs each successive sprocket. His design eschews that for a sprocket driven by a stepper motor from an Arduino. His rotary shutter is driven by another stepper motor, and he has the basis of a good camera.

The tests show promise, but he encounters a stability problem, because as it turns out, it’s difficult to print a 16mm sprocket in plastic without it warping. He solves this by aligning frames in post-processing. After fixing a range of small problems though, he has a camera that delivers a very good picture quality, and that makes us envious.

Sadly, those of us who ply our film-hacking craft in 8mm don’t have the luxury of enough space for a sprocket to replace the claw.

youtube.com/embed/ZAtYJYfV2nA?…


hackaday.com/2025/10/27/a-3d-p…




Gaetano Martino liberale europeo

@Politica interna, europea e internazionale

25 novembre 2025, ore 18:00 – Fondazione Luigi Einaudi, Via della conciliazione,10 – Roma Interverranno Emma Galli, Direttrice comitato scientifico della fondazione luigi einaudi Renata Gravina, Ricercatrice fondazione luigi einaudi
L'articolo Gaetano Martino liberale fondazioneluigieinaudi.it/gaet…



Gaetano Martino un messinese Presidente del Parlamento Europeo

@Politica interna, europea e internazionale

31 Ottobre 2025, ore 11:00 – Villa Piccolo, Capo D’orlando (Me) Interverranno Giuseppe Benedetto, Presidente Fondazione Luigi Einaudi Andrea Pruiti Ciarello, Presidente Della Fondazione Famiglia Piccolo Di Calanovella
L'articolo Gaetano Martino un messinese Presidente del



Starmer da Erdoğan, verso l’accordo sugli Eurofighter per la Turchia

@Notizie dall'Italia e dal mondo

Durante la visita ufficiale ad Ankara, il premier britannico Keir Starmer e il presidente turco Recep Tayyip Erdoğan hanno discusso in modo avanzato della vendita di circa quaranta caccia Eurofighter Typhoon alla Turchia. Nel corso dell’incontro il dossier ha guadagnato velocità e




La Facoltà di Teologia della Pontificia Università Gregoriana – in collaborazione con il Centro internazionale degli Amici di Newman, il “De Nicola Center for Ethics and Culture” (University of Notre Dame) e il National Institute of Newman Studies – …



“Oggi siamo diventati esperti di dettagli infinitesimali di realtà, ma siamo incapaci di avere di nuovo una visione d’insieme, una visione che tenga insieme le cose attraverso un significato più grande e più profondo”.



Exploding The Mystical Craftsman Myth


As a Hackaday writer, I see a lot of web pages, social media posts, videos, and other tips as part of my feed. The best ones I try to bring you here, assuming of course that one of my ever-vigilant colleagues hasn’t beaten me to it. Along the way I see the tropes of changing content creator fashion; those ridiculous pea-sized hand held microphones, or how all of a sudden everything has to be found in the woods. Some of them make me laugh, but there’s one I see a lot which has made me increasingly annoyed over the years. I’m talking of course about the craftsman myth.

No. The Last True Nuts And Bolts Are Not Being Made In Japan


If you don’t recognise the craftsman myth immediately, I’m sure you’ll be familiar with it even if you don’t realise it yet. It goes something like this: somewhere in Japan (or somewhere else perceived as old-timey in online audience terms like Appalachia, but it’s usually Japan), there’s a bloke in a tin shed who makes nuts and bolts.

But he’s not just any bloke in a tin shed who makes nuts and bolts, he’s a special master craftsman who makes nuts and bolts like no other. He’s about 120 years old and the last of a long line of nut and bolt makers entrusted with the secrets of nut and bolt making, father to son, since the 8th century. His tools are also mystical, passed down through the generations since they were forged by other mystical craftsmen centuries ago, and his forge is like no other, its hand-cranked bellows bring to life a fire using only the finest cedar driftwood charcoal. The charcoal is also made by a 120 year old master charcoal maker Japanese bloke whose line stretches back to the n’th century, yadda yadda. And when Takahashi-san finally shuffles off this mortal coil, that’s it for nuts and bolts, because the other nuts and bolts simply can’t compare to these special ones.
An Indian craftsman hand-shaping a cricket bat.Something that’s genuinely in decline where this is being written, this craftsman is making a cricket bat in India. Amit.kapil, CC BY-SA 4.0.
Purple prose aside, this type of media annoys me, because while Takahashi-san and his brother craftsmen in Appalachia and anywhere else in the world possess amazing skills and should without question be celebrated, the videos are not about that. Instead they’re using them as a cipher for pushing the line that The World Ain’t What It Used To Be, and along the way they spread the myth that either there are no blokes in tin sheds left wherever you live, or if there are, their skills are of no significance. Perhaps the saddest part of the whole thing is that there are truly disappearing crafts which should be highlighted, but they probably don’t generate half the YouTube clicks so we don’t see much of them.

Celebrate your Local Craftsmen


My dad was a craftsman in a tin shed, just like the ones in the videos but in central southern England. Partly as a result of this I have known and dealt with a lot of blokes in tin sheds throughout my lifetime, and I am certain I would feel right at home standing in that Japanese one.

Part of coming to terms with the disturbed legacy of my own dysfunctional family has come in evaluating what from them I recognise as part of me and what I don’t, and it’s in my dad’s workshop that I realise what made me. Like all of us, he instinctively made things, usually with great success but let’s face it, like all of us too, sometimes where just buying the damn thing would have made more sense. He had truly elite skills in his craft that I will never equal, just as in my line I have mastered construction techniques which weren’t even conceived when he took his apprenticeship.

But here’s the point, my dad was not unique, and all the other blokes in tin sheds were not necessarily the same age as he was. Indeed one of the loose community of blacksmiths around where I grew up was someone who was in another year at the same school as me when I was a teenager. Even the crafts weren’t all of the mystical tools variety, I am immediately thinking of the tin shed full of CNC machine tools, or the bloke running an injection moulding operation. Believe me, both of those last two are invaluable craftsmen to know when you need their services, but they don’t fit the myth, do they? They’re not exotic.

So by all means watch those YouTube videos showing faraway folks in tin sheds and their craft, you’ll see some amazing work. But please don’t buy the mystique, or the premise that they automatically represent a disappearing world. Your part of the world will have blokes in tin sheds doing things just as impressive and useful, whether they be hand-forging steel on the anvil or working it using cutting-edge technology, and we should be seeking them out rather than lamenting a probably made-up tale from the other side of the world.

Early 20th century Japanese craftsman: Elstner Hilton, CC BY 2.0 .


hackaday.com/2025/10/27/explod…



“Quando l’essere umano è incapace di vedere aldilà di sé, della propria esperienza, delle proprie idee e convinzioni, dei propri schemi, allora rimane imprigionato, rimane schiavo, incapace di maturare un giudizio proprio”.


avete presente la famosa valigetta "atomica"? la valigetta che controlla le atomiche di una nazione? solitamente si ritiene che chi controlla quella valigetta controlla l'arsenale ed ha il massimo potere. sappiamo che gli arsenali atomici si basano su isotopi radioattivi, instabili per definizione. dopotutto è l'instabilità che permette il funzionamento come ordigno. sappiamo che la manutenzione ai tempi dell'urss delle atomiche russe è sempre stato affare ucraino. sappiamo anche che anche dopo la dissoluzione dell'URSS l'ucraina ha continuato a collaborare con la russia, a titolo di servizio, visto che poiché a nessuno interessano incidenti atomici, nell'interesse del mondo l'arsenale russo doveva essere comunque mantenuto. sappiamo che a partire dall'invasione della crimea questa collaborazione è improvvisamente cessata. e da allora l'arsenale atomico è progressivamente diventato sempre più teorico e meno concreto. quindi questi proclami di putin sui super missili atomici cosa ci dicono? 1) che putin sente il bisogno di smentire i dubbi sull'arsenale atomico russo. e se sente il bisogno di farlo può anche significare che qualche dubbio lo abbia lui stesso. 2) magari ha bisogno di un vero arsenale atomico, e mari le nuove bombe sono semplicemente quelle di un reale arsenale atomico a tecnologia russa e non ucraina a pieno controllo russo. per adesso probabilmente in numero limitato. quindi il conteggio delle testate atomiche russe dovrebbe ripartire da zero? forse. anche se sarebbe rischioso partire da questo presupposto.
in reply to simona

Dubito che non abbiano provveduto a un'alternativa. Anche se fosse, glie ne basterebbero una dozzina di funzionanti per causare una catastrofe planetaria.
Certo è curioso che debba mettere in mostra un missile che non cambiarebbe minimamente le sorti di un conflitto nucleare.
Questa voce è stata modificata (3 ore fa)


Whisper 2FA: il nuovo kit di phishing che ruba le credenziali di Microsoft 365


Secondo una nuova ricerca di Barracuda Networks, un nuovo kit particolarmente insidioso e persistente di Phishing-as-a-Service (PhaaS) sta rubando credenziali e token di autenticazione agli utenti di Microsoft 365. Gli esperti di Barracuda stanno monitorando questa nuova minaccia da luglio 2025 e l’hanno denominata Whisper 2FA.

I ricercatori nell’ultimo mese, hanno rilevato quasi un milione di attacchi Whisper 2FA rivolti agli account all’interno di diverse campagne di phishing su larga scala: una cifra che rende Whisper il terzo kit di PhaaS più diffuso dopo Tycoon ed EvilProxy.

L’analisi tecnica di Barracuda dimostra che la funzionalità di Whisper 2FA è sia avanzata sia adattabile. Le sue caratteristiche innovative includono loop continui per rubare i token di autenticazione, diversi livelli di camuffamento e tattiche ingegnose per ostacolare l’analisi del codice malevolo e dei dati rubati. Una minaccia concreta per le organizzazioni che si sta evolvendo rapidamente.

Stando a quanto emerso, le caratteristiche principali di Whisper 2FA comprendono:

  • Loop di furto delle credenziali. Whisper 2FA può ripetere continuamente il processo di furto delle credenziali di un account finché gli aggressori non sono certi di aver ottenuto un token di autenticazione a più fattori (MFA) funzionante. Per i difensori, ciò significa che nemmeno i codici scaduti o errati riescono a fermare l’attacco, poiché il kit di phishing continua a richiedere alla vittima di reinserire i propri dati e ricevere un nuovo codice fino a quando gli aggressori non ne ottengono uno funzionante. Inoltre, Whisper 2FA è stato progettato per adattarsi a qualsiasi metodo MFA utilizzato.
  • Tattiche complesse per eludere il rilevamento e l’analisi. Queste includono più livelli di offuscamento, come la codifica e la crittografia del codice di attacco, l’impostazione di trappole per gli strumenti di analisi e il blocco delle scorciatoie da tastiera comunemente utilizzate per l’ispezione. Ciò rende difficile per gli addetti alla sicurezza e gli strumenti di difesa analizzare l’attività di Whisper 2FA e rilevare automaticamente azioni sospette e dannose.
  • Una tattica di phishing versatile. Il form di phishing di Whisper 2FA invia tutti i dati inseriti dalla vittima ai cyber criminali, indipendentemente dal pulsante premuto dall’utente. I dati rubati vengono rapidamente manipolati e crittografati, rendendo difficile per chiunque monitori la rete rendersi immediatamente conto che i dati di accesso sono stati sottratti.

Il kit di phishing Whisper 2FA sta progredendo rapidamente sia in termini di complessità tecnica sia di strategie anti-rilevamento. L’analisi di Barracuda evidenzia come le prime varianti del kit presentassero commenti testuali aggiunti dagli sviluppatori, alcuni livelli di offuscamento e tecniche anti-analisi che si concentravano principalmente sulla disabilitazione del menu contestuale (tasto destro del mouse), utilizzato nell’ispezione del codice.

Al contrario, le varianti più recenti del kit individuate da Barracuda sono prive di commenti, l’offuscamento è diventato più denso e stratificato e sono state aggiunte nuove protezioni per rendere più difficile ai difensori analizzare o manomettere il sistema. Tra queste figurano trucchi per rilevare e bloccare gli strumenti di debugging, disabilitare le scorciatoie utilizzate dagli sviluppatori e mandare in tilt gli strumenti di ispezione. Inoltre, questa variante consente di convalidare i token di autenticazione in tempo reale attraverso il sistema di comando e controllo degli aggressori.

“Le caratteristiche e le funzionalità di Whisper 2FA dimostrano come i kit di phishing si siano evoluti da semplici strumenti per il furto di credenziali a sofisticate piattaforme di attacco”, afferma Saravanan Mohankumar, Manager, Threat Analysis team di Barracuda. “Combinando l’intercettazione dell’autenticazione multifattoriale in tempo reale, più livelli di offuscamento e tecniche anti-analisi, Whisper 2FA ostacola ulteriormente gli utenti e i team di sicurezza nel rilevamento delle frodi. Per rimanere protette, le organizzazioni devono superare le difese statiche e adottare strategie multilivello: formazione degli utenti, MFA resistente al phishing, monitoraggio continuo e condivisione delle informazioni sulle minacce”.

L’analisi di Whisper 2FA di Barracuda mostra alcune somiglianze con Salty 2FA, un nuovo PhaaS incentrato sul furto delle credenziali M365 segnalato di recente da AnyRun, ma anche notevoli differenze rispetto a rivali più vecchi e affermati come Evil Proxy, tra cui un sistema di furto delle credenziali semplificato e più difficile da rilevare.

Le nuove tecniche di offuscamento dei link malevoli di Tycoon


In un altro report recente, Barracuda ha anche portato alla luce nuove tecniche usate dal kit di Phishing-as-a-Service Tycoon per nascondere link malevoli nelle e-mail. In particolare, queste strategie sono pensate per offuscare, confondere e alterare la struttura dei link o degli URL e ingannare così i sistemi di rilevamento automatico assicurandosi che i link non vengano bloccati. Di seguito, alcuni esempi:

  • Inserire una serie di spazi invisibili nel link dannoso, digitando ripetutamente il codice ” ” nella sua barra degli indirizzi;
  • Aggiungere al link caratteri insoliti, come un simbolo “Unicode” che assomiglia a un punto ma non lo è;
  • Inserire un indirizzo e-mail nascosto o un codice speciale alla fine del link;
  • Elaborare un URL solo parzialmente ipertestuale o contenente elementi non validi, come due “https” o l’assenza di “//”, per nascondere la destinazione reale del link, assicurandosi che la parte attiva sembri innocua;
  • Utilizzare il simbolo “@” nell’indirizzo del link. Infatti, tutto ciò che precede “@” viene trattato dai browser come “informazione utente”, quindi gli aggressori inseriscono in questa sezione un testo che appare affidabile e attendibile, come ad esempio “office365”. La destinazione effettiva del link si trova invece dopo il simbolo “@”;
  • Utilizzare link web con simboli anomali, come barre rovesciate “” o il simbolo del dollaro “$”, che normalmente non vengono usati negli URL. Questi caratteri possono alterare il modo in cui gli strumenti di sicurezza leggono l’indirizzo, aiutando un link malevolo a sfuggire ai sistemi di rilevamento automatico;
  • Creare un URL in cui la prima parte è innocua e ipertestuale, mentre la seconda parte, quella dannosa, appare come un semplice testo. Ma, poiché la parte dannosa non è collegata a nulla, non viene letta correttamente dagli strumenti di sicurezza.

L'articolo Whisper 2FA: il nuovo kit di phishing che ruba le credenziali di Microsoft 365 proviene da Red Hot Cyber.



Il Papa ha firmato oggi pomeriggio, nella basilica di San Pietro, la lettera apostolica "Disegnare mappe di speranza", in occasione del 60° anniversario della dichiarazione conciliare "Nostra Aetate", che ricorrerà domani.


In Argentina Trump fa la differenza


@Giornalismo e disordine informativo
articolo21.org/2025/10/in-arge…
Con tutte le sue particolarità, storiche e geografiche, l’Argentina è purtuttavia parte del sistema politico-culturale dell’Occidente. E ne condivide la crisi epocale che lo sconvolge. E’ ben noto, certo! Ma non è inutile rammentarlo. A maggior ragione al lettore



Tutti i (megalomani) piani di Altman per OpenAI

L'articolo proviene da #StartMag e viene ricondiviso sulla comunità Lemmy @Informatica (Italy e non Italy 😁)
OpenAI punta a espandere il business con accordi governativi, nuovi servizi video e di shopping e investimenti record in potenza di calcolo per sostenere un piano da oltre mille miliardi di dollari. L'articolo del Financial Times estratto



Essere antifascisti è un dovere. Oggi, ancora di più


@Giornalismo e disordine informativo
articolo21.org/2025/10/essere-…
L’aggressione a Alessandro Sahebi, avvenuta a Roma davanti alla compagna e al figlio di sei mesi, non è solo un episodio di cronaca ma un segnale profondo del punto in cui siamo arrivati come Paese. Tre uomini che



Gli Usa mandano la superportaerei Ford al largo del Venezuela. Che sta succedendo

@Notizie dall'Italia e dal mondo

C’è sempre più metallo nelle acque dei Caraibi, ed è destinato ad aumentare. Nella giornata di venerdì, il segretario alla Difesa Usa, Pete Hegseth, ha ordinato il rischieramento della superportaerei Gerald R. Ford dall’Adriatico verso le acque antistanti il Venezuela. Nel frattempo,




Compliance Checker: come funziona il tool europeo per valutare la conformità all’AI Act


@Informatica (Italy e non Italy 😁)
Il Compliance Checker dell’AI Act, presentato dalla Commissione UE, è uno strumento online pensato per aiutare imprese e professionisti a orientarsi tra obblighi e regole introdotte dalla normativa europea. Ecco come funziona
L'articolo



Imbavagliata anche la pagina facebook di Articolo 21. Perché?


@Giornalismo e disordine informativo
articolo21.org/2025/10/imbavag…
Da qualche settimana Facebook ha deciso di imbavagliare anche la pagina di Articolo 21. Ci hanno recapitato un avviso che avremmo violato i loro codici e che ci avrebbero considerato “sito non




Court records show Homeland Security Investigations (HSI), a part of ICE, and the FBI obtained Con Edison user data. The utility provider refuses to say whether law enforcement needs a warrant to access its data.#ICE #News


Con Edison Refuses to Say How ICE Gets Its Customers’ Data


Con Edison, the energy company that serves New York City, refuses to say whether ICE or other federal agencies require a search warrant or court order to access its customers’ sensitive data. Con Edison’s refusal to answer questions comes after 404 Media reviewed court records showing Homeland Security Investigations (HSI), a division of ICE, has previously obtained such data, and the FBI performing what the records call ‘searches’ of Con Edison data.

The records and Con Edison’s stonewalling raise questions about how exactly law enforcement agencies are able to access the utility provider’s user data, whether that access is limited in any way, and whether ICE still has access during its ongoing mass deportation effort.

“​​We don’t comment to either confirm or deny compliance with law enforcement investigations,” Anne Marie, media relations manager for Con Edison, told 404 Media after being shown a section of the court records.

In September, 404 Media emailed Con Edison’s press department to ask if law enforcement officers have to submit a search warrant or court order to search Con Edison data. A few days later, Marie provided the comment neither confirming nor denying any details of the company’s data sharing practice.

💡
Do you know anything else about how ICE is accessing or using data? I would love to hear from you. Using a non-work device, you can message me securely on Signal at joseph.404 or send me an email at joseph@404media.co.

404 Media then sent several follow-up inquiries, including whether ICE requires a warrant or other legal mechanism to obtain user data. Con Edison did not respond to any of those follow-ups.

Con Edison’s user data is especially sensitive, and likely valuable to authorities, because in many cases it will directly link a specific person to a particular address. If someone is paying for electricity for a home they own or rent, they most likely do it under their real name.

Federal agencies have repeatedly turned to Con Edison data as part of criminal investigations, according to court records. In one case, the FBI previously said it believed a specific person occupied an apartment after performing a “search” of Con Edison records and finding a Con Edison account in that person’s name. Another case shows the FBI obtaining a Con Edison user’s email address after finding it linked to a utilities account. A third case says “a search of records maintained by Con Edison, a public utilities provider to the greater New York City area” revealed that a specific person was receiving utilities at a target address. Several other cases contain similar language.
playlist.megaphone.fm?p=TBIEA2…
Court records also show HSI has accessed Con Edison data as part of criminal investigations. One shows HSI getting data from Con Edison that reveals the name associated with a particular Con Edison account and address. Another says “there was no indication in the records from Con Edison that the SUBJECT PREMISES is divided into multiple units.” A third shows that HSI “confirmed with Con Edison” who was a customer at an address at a particular point in time.

Ordinarily HSI is focused on criminal investigations into child abuse, money laundering, cybercrime, and other types of criminal networks. But in the second Trump administration’s mass deportation effort, the distinction between HSI and ICE is largely meaningless. HSI has reassigned at least 6,198 agents, or nearly 90 percent, and 12,353 personnel overall to assist the deportation arm of ICE, according to data published by the Cato Institute in September. HSI also performs worksite enforcement.

The court records don’t describe how the investigators obtained the Con Edison data exactly, whether they obtained a search warrant or court order, or elaborate on how some officials were able to “search” Con Edison records.

Usually companies and organizations readily acknowledge how and when law enforcement can access customer data. This is for the benefit of users, who can then better understand what legal mechanisms protect their data, but also for law enforcement officials themselves, so they know what information they need to provide during an investigation. Broadly, companies might require a law enforcement official to obtain a search warrant or send a subpoena before they provide the requested user data, based on its sensitivity.


#News #ice


La programmazione della Biblioteca nazionale centrale di Firenze per il 2026


Il 27 ottobre alle ore 15.00, presso la Sala Galileo della Biblioteca, la Direttrice, dott.ssa Elisabetta Sciarra, ha presentato le principali linee programmatiche dell’Istituto per il 2026, in relazione agli obiettivi e ai compiti dell’amministrazione.

Sono stati illustrati i maggiori programmi di spesa in termini di esecuzione di lavori e acquisizione di servizi, nonché le attività e gli eventi previsti, con particolare riferimento alle risorse economiche, umane e strumentali impiegate.

Relazione programmatica 2026

Strategie per affrontare le sfide finanziarie e promuovere l’accesso alla cultura (ppt)

L'articolo La programmazione della Biblioteca nazionale centrale di Firenze per il 2026 proviene da Biblioteca nazionale centrale di Firenze.



Connector-Free Zone: PCB Edge as USB-C Interfaces


PCB Edge USB-C

Sometimes when you’re making a PCB that you plan on programming over USB, but you only plan on plugging in a couple of times, it would be nice to make that connection without another BOM item. Over on GitHub [AnasMalas] has released a PCB edge USB-C connection symbol/footprint to do just that!

This isn’t the first PCB edge USB-C connector we’ve seen, but this one has some nice features. It’s available in both KiCad and EasyEDA formats, allowing you to easily add it into your preferred ECAD software. As well as supporting multiple software packages, there are two versions included: a 10-pin and 14-pin version. The 10-pin version has, on each side, 2 USB voltage pins, 2 ground pins, and a CC1 or CC2 pin on its respective side; this version is ideal if you’re looking to just supply power via the connector. The 14-pin version has all the pins of the 10-pin version with the addition of four data-positive and data-negative pins needed to relay information to the board, ideal if you’re planning on programming a microcontroller with this connection.

One important note is that, while most PCBs default to 1.6 mm thickness, if you use this connector you’ll need to drop that down to ~0.8 mm to properly interface with a common USB cable. [AnasMalas] also suggests using ENIG board finish to preserve the connectors on your USB cable.

For such a small and common connector, USB-C holds a ton of potential. Be sure to check out our series all about USB-C for more details.

Thanks to [Ben] for the tip.


hackaday.com/2025/10/27/connec…