Informa Pirata ha ricondiviso questo.

Sto scrivendo un paper per uno speech presso le Nazioni Unite, per l'AI for Good Global Summit.

"Training Humanity Against Digital Deception: Using AI to Neutralize Phishing Before It Reaches People"

Alla domanda: "Have supporting data?"
Sono tentata di rispondere: "Hold my beer"

Ma non so se potrebbe essere presa nel modo giusto - perché c' un solo modo in cui la si può prendere =)

reshared this

Informa Pirata ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

The media in this post is not displayed to visitors. To view it, please go to the original post.

13-03-2026 – In tendenza su poliversity.it
@fediverso@citiverse.it
poliverso.org/display/a88f9d2f…

13-03-2026 – In tendenza su poliversity.itEcco le tendenze di oggi 13 marzo 2026 su Poliversity informapirata.it/2026/03/13/13…


13-03-2026 – In tendenza su poliversity.it

Ecco le tendenze di oggi 13 marzo 2026 su Poliversity
informapirata.it/2026/03/13/13…


Informa Pirata ha ricondiviso questo.

La Commissione europea valuta la possibilità di introdurre un limite ai design che creano dipendenza.

Il dibattito su un possibile divieto dei social media è una preoccupazione anche per la Commissione europea nella sua bozza di legge sull'equità digitale (Digital Fairness Act). L'obiettivo è quello di garantire una maggiore protezione a tutti, senza escludere i minori. Questo è quanto ha spiegato uno degli ideatori della legge durante una tavola rotonda.

netzpolitik.org/2026/digital-f…

@informatica

Informa Pirata ha ricondiviso questo.

Mini Multi-Arcade Game Cabinets with an ESP32 and Galagino


The media in this post is not displayed to visitors. To view it, please log in.

Most people love arcade games, but putting a full-sized arcade cabinet in the living room can lead to certain unpleasant complications. Ergo the market for fun-sized cabinets has exploded alongside the availability of cheap SBCs and MCUs that can run classical arcade titles. Microcontrollers like the ESP32 with its dual 240 MHz cores can run circles around the CPU grunt of 1980s arcade hardware. Cue [Till Harbaum]’s Galagino ESP32-based arcade emulator project, that recently saw some community versions and cabinet takes.

There was a port to the PlatformIO framework by [speckhoiler] which also added a few more arcade titles and repurposed the enclosure of an off-the-shelf ‘My Arcade’ by stuffing in an ESP32-based ‘Cheap Yellow Display‘ (CYD) board instead. These boards include the ESP32 module, a touch display, micro SD card slot, sound output, and more; making it an interesting all-in-one solution for this purpose.

Most recently [Davide Gatti] and friends ported the Galagino software to the Arduino platform and added a 3D printed enclosure, though you will still need to source a stack of parts which are listed in the bill of materials. What you do get is a top display that displays the current game title in addition to the display of the usual CYD core, along with an enclosure that can be printed both in single- or multi-color.

There’s also a build video that [Davide Gatti] made, but it’s only in Italian, so a bit of a crash course in this language may be required for some finer details.

youtube.com/embed/Nz3LRrY3Ukw?…

Thanks to [ZT] for the tip.


hackaday.com/2026/03/11/mini-m…

reshared this

Informa Pirata ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Una donna Bisessuale spesso viene esclusa sia dalle comunità etero che omosessuali. Può sviluppare una bifobia specifica. E come al solito i problemi medici peculiari sono pressoché ignorati dai medici di medicina generale. Trova un medic* che ti ascolti e non ti giudichi per poter confidare senza stigma la tua vita sessuale ed i problemi legati al minority stress.
Informa Pirata ha ricondiviso questo.

Ogni promessa è debito!

Si può sparire totalmente dall'Internet?
No. Almeno non esattamente come pensiamo.

Ma limitare le tracce è cosa buona e giusta.

#SocialDebug ogni giovedì 🦄

open.substack.com/pub/signorin…

Informa Pirata ha ricondiviso questo.

🚨 #Africa Sorveglianza di massa invasiva guidata dall'AI viola le libertà
Tutto il continente ha speso più di 2 miliardi di dollari in tecnologie cinesi di tracciamento che non sono "necessarie o proporzionate".
La Nigeria ha speso di più in infrastrutture, investendo 470 milioni di dollari in 10.000 telecamere intelligenti entro l'anno scorso. L'Egitto ne ha installate 6.000, mentre Algeria e Uganda ne hanno circa 5.000 ciascuna.
theguardian.com/global-develop…
cc: @quinta @informapirata

reshared this

Votazione storica su #chatcontrol al Parlamento europeo: gli eurodeputati votano per porre fine alla scansione di massa non mirata delle chat private


The media in this post is not displayed to visitors. To view it, please log in.

In una svolta sensazionale nella lotta contro il Chat Control, la maggioranza del Parlamento europeo ha votato oggi per porre fine alla scansione di massa non mirata delle comunicazioni private. Così facendo, il Parlamento ha fermamente respinto le pratiche di sorveglianza incostituzionali e soggette a errori degli ultimi anni. Ora aumenta la pressione sui governi dell'UE affinché rispettino il voto dei deputati e pongano fine una volta per tutte alla sorveglianza di massa non mirata in Europa.


informapirata.it/2026/03/11/vo…


Votazione storica su #chatcontrol al Parlamento europeo: gli eurodeputati votano per porre fine alla scansione di massa non mirata delle chat private

In una svolta sensazionale nella lotta contro il Chat Control, la maggioranza del Parlamento europeo ha votato oggi per porre fine alla scansione di massa non mirata delle comunicazioni private. Così facendo, il Parlamento ha fermamente respinto le pratiche di sorveglianza incostituzionali e soggette a errori degli ultimi anni. Ora aumenta la pressione sui governi dell’UE affinché rispettino il voto dei deputati e pongano fine una volta per tutte alla sorveglianza di massa non mirata in Europa.
informapirata.it/2026/03/11/vo…


reshared this

Gruppi di pressione finanziati dall’estero provenienti da paesi extra-UE stanno promuovendo #ChatControl con propaganda fuorviante


The media in this post is not displayed to visitors. To view it, please log in.

Alcune lobby finanziate dall'estero, provenienti da paesi extra-UE, stanno promuovendo #ChatControl con propaganda fuorviante. Vogliono #PassTheLaw per scansionare le tue chat, ma chi sono e chi li paga? Smascheriamo la rete dei promotori della sorveglianza!


informapirata.it/2026/03/10/gr…


Gruppi di pressione finanziati dall’estero provenienti da paesi extra-UE stanno promuovendo #ChatControl con propaganda fuorviante

Alcune lobby finanziate dall’estero, provenienti da paesi extra-UE, stanno promuovendo #ChatControl con propaganda fuorviante. Vogliono #PassTheLaw per scansionare le tue chat, ma chi sono e chi li paga? Smascheriamo la rete dei promotori della sorveglianza!
informapirata.it/2026/03/10/gr…


reshared this

Historic Chat Control Vote in the EU Parliament: MEPs Vote to End Untargeted Mass Scanning of Private Chats


In a sensational turn of events in the fight against Chat Control, a majority in the European Parliament voted today to end the untargeted mass scanning of private communications. In doing so, the Parliament firmly rejected the error-prone and unconstitutional surveillance practices of recent years. Pressure is now mounting on EU governments to respect the MEPs’ vote and bury untargeted mass surveillance in Europe once and for all.

Amendment 5, tabled by Pirate Party MEP Markéta Gregorová (Greens/EFA group) and adopted by a narrow margin, demands that any scanning of private communications must be strictly limited to individual users or groups of users suspected by a competent judicial authority of being linked to child sexual abuse. This aligns with the European Parliament’s 2023 mandate on the permanent Chat Control regulation (CSAR).

Based on today’s mandate, trilogue negotiations between the EU Parliament, the European Commission, and the Council of the EU are set to begin as early as tomorrow. Negotiations are taking place under extreme time pressure, as the current interim regulation authorizing Chat Control expires on April 6. The EU Commission and the vast majority of the EU Council—except for Italy—have so far categorically rejected any restrictions on untargeted mass scanning.

Digital freedom fighter Patrick Breyer (Pirate Party) commented on the historic vote:

“Today is a sensational victory for the countless citizens who made calls and sent emails to save their digital privacy of correspondence. Digital privacy is alive! Just as with our physical mail, the warrantless screening of our digital communications must remain taboo. EU governments must finally realize that true child protection requires secure apps (‘Security by Design’), the removal of illegal material at the source, and targeted investigations against suspects with a judicial warrant—not overreaching, pointless mass surveillance.”

The Hard Facts: Why Chat Control has failed spectacularly

The push by EU governments to make “Chat Control 1.0” a permanent fixture is legally and ethically negligent. The track record of the previous “voluntary” Chat Control—which the Parliament now intends to replace with targeted investigations—is disastrous. The EU Commission’s own evaluation report reads like an admission of bankruptcy, revealing a highly dysfunctional surveillance model:

  • Data Giant Monopoly: Around 99% of all chat reports sent to police in Europe come from a single US corporation: Meta. US tech giants are acting as private auxiliary police forces—without any effective European oversight.
  • Massive Police Overload due to Junk Data: Algorithms are blind to context and intent. The German Federal Criminal Police Office (BKA) reports that, out of roughly 300,000 chats reported annually in the EU, an unbelievable 48% of the disclosed chats are false positives and criminally irrelevant. This flood of junk data ties up resources desperately needed for targeted, undercover investigations against actual abuse networks.
  • Criminalization of Minors: In Germany, 40% of investigations already target minors who thoughtlessly share images (e.g., consensual sexting), rather than organized predators.
  • An Obsolete Model due to Encryption: Perpetrators can easily migrate to encrypted messengers where Chat Control does not take place. Because providers are increasingly adopting end-to-end encryption for private messages, the number of chats reported to the police has already dropped by 50% since 2022. Instead of investing in targeted investigative work, the EU Council is clinging to a dying surveillance model.
  • Reversal of the Burden of Proof: According to the Commission’s report, there is no measurable link between the mass surveillance of private messages and actual convictions. Yet, the Commission and the Council are demanding the extension of a measure whose effectiveness they cannot prove, while providers admit to error rates of up to 20%.
  • Failure to Protect Children: Mass scanning for already known images does not stop ongoing, live abuse and does not rescue children currently in active danger.

The Myth of the “Legal Vacuum” and the Exposed Lobbying Machine

In the run-up to the vote, MEPs were heavily pressured by the tech industry (DOT Europe) and certain child rights organizations (ECLAG) with joint warnings of an impending “legal vacuum.”

This narrative is false. Letting untargeted Chat Control expire does not leave the police “blind.” Scanning public posts and hosted files, as well as user-based reporting, remain fully permitted without restriction. Furthermore, the massive and highly questionable lobbying efforts have been exposed: The push for Chat Control is heavily driven by foreign-funded lobby groups and tech vendors. The US-based organization Thorn, which literally sells the exact scanning software in question, spends hundreds of thousands of euros lobbying in Brussels. The tech industry has officially lobbied side-by-side with NGOs for a law that ensures their profits and data access, rather than protecting children.

Patrick Breyer concludes:

“The industry and foreign-funded lobby groups tried until the very last minute to panic the Parliament. But flooding our police with false positives from mass surveillance does not save a single child from abuse. Today’s vote is a clear stop sign for this surveillance obsession. The negotiators cannot ignore this mandate in tomorrow’s trilogue negotiations. The untargeted scanning of our private messages must finally become a thing of the past.”

Consolidated version of the regulation reflecting the amendments adopted today in the EU Parliament, inserted with track changes


patrick-breyer.de/en/historic-…

reshared this

Upcoming Vote on Chat Control: New S&D, EPP, and Renew Deal is Worse Than Rejected Draft Report – AI Text Scanning and Mass Surveillance Set to Continue


The media in this post is not displayed to visitors. To view it, please log in.

Today at 12:30, the European Parliament will vote on whether to extend the so-called “Chat Control 1.0” (Interim Regulation) until August 2027. While a rejection of this mass surveillance is being proposed by the competent LIBE committee, a last-minute compromise negotiated by S&D, EPP, and Renew threatens to escalate the situation. Not only does it cement warrantless mass scanning, but it introduces highly experimental AI to scan private chat texts and unknown visuals.

The “Compromise” is an Escalation
While the previously rejected draft report at least excluded the most unreliable technologies, the new S&D, EPP, and Renew proposal is significantly worse.

It proposes that for accounts reported by users or “trusted flaggers”, where the report indicates a reasonable suspicion of CSAM, automated algorithms will be allowed to evaluate unknown visuals in private messages and even written chat texts. These secret algorithms are highly experimental, notoriously error-prone, and their deployment leaves massive democratic and legal questions completely unanswered:

  • Big Tech as Judges: There is no requirement for a judge or even a human to authorize the scanning or assess if there is “reasonable suspicion.” Algorithms and private tech companies will decide who gets monitored.
  • Abuse and Lack of Limits: What protects citizens from abusive user flags? For how long will a flagged account be monitored?Infinitely it seems.
  • Undefined “Flaggers”: The text relies on vague terms like “trusted flaggers” or “organisations acting in the public interest” without defining who assigns this status or outlining sanctions for misuse.
  • Technical Nonsense: The proposal claims text can be scanned “without deducing the substance” of it—which is technically impossible and logically absurd.
  • No Redress: There is no requirement to notify users ex-post if their private chats were wrongly scanned, leaving no room for legal redress.

Mass Scanning To Be Legalised
The new deal also preserves the main target of civil society’s criticism: It continues to permit the warrantless, indiscriminate mass screening of every citizen’s private messages for “known material” (hash scanning).

While proponents dismiss this as a mere extension of the “voluntary” status quo, these “voluntary” scans threaten to become the de facto standard for all providers, or even a mandatory “risk mitigation” requirement under the Chat Control 2.0 (CSAR) regulation that is being negotiated as well.

Why mass hash-scanning remains completely unreliable and dangerous:

  • Context & Intent Blindness: Algorithms are blind to context. What is illegal in the US (the source of most hash databases) is not automatically illegal in the EU. Furthermore, machines cannot read intent: Consensual teenage sexting or an unsolicited meme shared in a group chat triggers automatic police reports of all members of the chat group.
  • Criminalization of Minors: Already today, 40% of all investigations in Germany target minors sharing images among themselves, not organized predator rings.
  • Police Overload: The German Federal Criminal Police Office (BKA) reports that nearly half of all flagged chats via US-based NCMEC are criminally irrelevant. Drowning investigators in a flood of junk data ties up resources desperately needed for targeted, undercover investigations against actual abusers.
  • Failure to Protect: Searching only for already known images does not stop ongoing, live abuse, nor does it rescue children currently in active danger.

The “Legal Vacuum” Myth and the Lobbying Machine
In the last 24 hours, MEPs have been sent letters from the tech industry (DOT Europe) and certain child rights organizations (ECLAG) warning of a “legal uncertainty” if the proposal fails.

This narrative is false. Letting the Chat Control 1.0 regulation expire does not leave police “blind.” Providers can still scan public posts, hosted files, and rely on user reports. End-to-end encryption is becoming the industry standard anyway, rendering these scans technically obsolete.

Furthermore, the lobbying effort itself is highly questionable. The push for Chat Control is heavily driven by foreign-funded lobby groups and tech vendors. For example, the US-based organization Thorn—which sells the very scanning technology being proposed—spends hundreds of thousands of euros lobbying in Brussels. The tech industry and commercial vendors are officially lobbying side-by-side with NGOs, pushing for a law that guarantees their profits and data access, not child safety.

Statement by Patrick Breyer (Pirate Party):

“We are being sold a Trojan horse. The alleged ‘compromise’ by S&D, EPP, and Renew legalises the failed, indiscriminate mass surveillance of our private images and even escalates it: Allowing unaccountable AI algorithms to read our chat texts based on vague ‘flags’ without judicial oversight is a nightmare.

The industry and foreign-funded lobbyists are trying to panic the Parliament with the myth of a ‘legal vacuum’. But flooding our police with false positives from mass surveillance does not save a single child—it only protects the profits of the tech companies selling the surveillance software. Real child protection requires secure apps (‘Security by Design’), mandatory takedowns, and targeted investigations against suspects with a judicial warrant. I urge all MEPs: Vote down the extension, and vote against any compromise that indiscriminately scans our private messages.

Citizens can contact their representatives via: fightchatcontrol.eu

Consolidated version of the proposed regulation with the S&D, EPP and Renew compromise amendments marked as track changes


patrick-breyer.de/en/upcoming-…


🇪🇺 1/7 🌍 Foreign-funded lobby groups from outside the EU are pushing #ChatControl with misleading propaganda. They want to #PassTheLaw to scan your chats, but who are they and who's paying them? Let's expose the network.
Thread 👇

reshared this

Informa Pirata ha ricondiviso questo.

In Italia si sta così bene che 85 mila cervelli vogliono fuggire a Bruxelles, e sono la metà di tutti quelli europei.

euractiv.com/news/national-bre…

Informa Pirata ha ricondiviso questo.

“D’istruzione pubblica”, il nuovo film-documentario che racconta lo smantellamento della scuola pubblica: mercoledì 18 Marzo incontro con il pubblico dopo la proiezione delle 18.40 al Cinema Aquila


[em][strong][url=https://cinemaaquila.it/evento/incontro-per-distruzione-pubblica/]“D’istruzione pubblica”, il nuovo film-documentario di Mirko Melchiorre e Federico Greco che racconta lo smantellamento della scuola pubblica, torna a grande richiesta nella sala cara al quartiere Pigneto. Mercoledì 18 alla proiezione delle 18.40 saranno infatti presenti Marina Boscaino (docente e giornalista), Renata Puleo (dirigente scolastico in quiescenza) e Luca Malgioglio (docente). [...][/url][/strong][/em]
Informa Pirata ha ricondiviso questo.

Gli strumenti di verifica dell’età online si diffondono negli Stati Uniti per la sicurezza dei bambini, ma il vero obiettivo sono gli adulti

- Le nuove leggi statunitensi ideate per la sicurezza dei minori online stanno costringendo milioni di americani adulti a sottoporsi a controlli obbligatori per la verifica dell’età, che spesso utilizzano la tecnologia dell’intelligenza artificiale, e stanno creando notevoli grattacapi alle aziende di social media che cercano di trovare un equilibrio tra conformità legale e privacy per gli utenti.
- Circa la metà degli stati degli Stati Uniti ha promulgato o sta promuovendo leggi che impongono alle piattaforme, tra cui siti di contenuti per adulti, servizi di gioco online e app di social media, di bloccare gli utenti minorenni.
- Grandi volumi di dati sensibili sull’identità possono diventare bersagli per le richieste del governo e degli hacker. Ma a un livello più profondo, la sorveglianza colpisce le fondamenta di un Internet libero e aperto, affermano i sostenitori delle libertà civili, e la scorsa settimana una sentenza del tribunale della Virginia, citando il Primo Emendamento, ha confermato la decisione.

cnbc.com/2026/03/08/social-med…

@Privacy Pride

Informa Pirata ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Votazione storica su #chatcontrol al Parlamento europeo: gli eurodeputati votano per porre fine alla scansione di massa non mirata delle chat private

In una svolta sensazionale nella lotta contro il Chat Control, la maggioranza del Parlamento europeo ha votato oggi per porre fine alla scansione di massa non mirata delle comunicazioni private. Così facendo, il Parlamento ha fermamente respinto le pratiche di sorveglianza incostituzionali e soggette a errori degli ultimi anni. Ora aumenta la pressione sui governi dell’UE affinché rispettino il voto dei deputati e pongano fine una volta per tutte alla sorveglianza di massa non mirata in Europa.
informapirata.it/2026/03/11/vo…

Informa Pirata ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Votazione storica su chatcontrol al Parlamento europeo: gli eurodeputati votano per porre fine alla scansione di massa non mirata delle chat private

In una svolta sensazionale nella lotta contro il Chat Control, la maggioranza del Parlamento europeo ha votato oggi per porre fine alla scansione di massa non mirata delle comunicazioni private.

informapirata.it/2026/03/11/vo…

Grazie a @echo_pbreyer per tutta l'energia spesa per questa battaglia

@pirati


Votazione storica su #chatcontrol al Parlamento europeo: gli eurodeputati votano per porre fine alla scansione di massa non mirata delle chat private

In una svolta sensazionale nella lotta contro il Chat Control, la maggioranza del Parlamento europeo ha votato oggi per porre fine alla scansione di massa non mirata delle comunicazioni private. Così facendo, il Parlamento ha fermamente respinto le pratiche di sorveglianza incostituzionali e soggette a errori degli ultimi anni. Ora aumenta la pressione sui governi dell’UE affinché rispettino il voto dei deputati e pongano fine una volta per tutte alla sorveglianza di massa non mirata in Europa.
informapirata.it/2026/03/11/vo…


Informa Pirata ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please log in.

Formazione obbligatoria sulla sicurezza (scuola), unica possibilità gratuita iscrivendosi a servizio esterno con cessione dei dati personali: aiuto!

EDIT: correggo le diciture delle prime frasi perché ho appurato che il corso posso farlo liberamente anche da privato (perciò la scuola non mi impone né obbliga a usare la piattaforma che propone), anche se ovviamente in questo caso sarà a spese mie e dovrò pensare io a cercare il corso ecc.
Segnalo i cambiamenti con il grassetto corsivo.
Resta comunque valido il punto centrale del topic: credo che la scuola abbia fatto una pessima proposta, tra quelle disponibili sul mercato, perché invia i dati raccolti a troppe piattaforme internazionali con sedi fuori dall'Italia e dalla UE (Stati Uniti, Malta).

@Etica Digitale (Feddit)

La mia scuola mi propone di registrarmi alla piattaforma Docendo Academy per conseguire l'attestazione obbligatoria per la sicurezza sul lavoro, ma questo comporta l'acquisizione di dati sensibili da parte di Amazon, Google, Microsoft e altri.

Ho deciso di rifiutare la proposta della scuola e provvederò in proprio e a mie spese all'adempimento dell'obbligo di legge.

Sto preparando un'email per spiegare al mio DS come, pur desiderando partecipare al corso, non sia stato messo nelle condizioni di farlo utilizzando la possibilità gratuita offerta dalla scuola senza rinunciare a parte dei miei diritti in fatto di privacy e protezione dell'identità digitale.

Ho infatti ricevuto (come tutti i miei colleghi) l'email che trovate nella prima immagine, direttamente dalla Docendo Academy a cui la scuola ha passato il mio indirizzo istituzionale (MS365). Pare che questo possano farlo senza il mio consenso perché si tratta dell'adempimento di un obbligo di legge, perciò non voglio contestare questo punto.

La registrazione sulla piattaforma prevede però l'inserimento di dati sensibili, di cui alle successive immagini (le successive alle prime 4 sono nei commenti per permettere agli utenti mastodon di visualizzarle tutte).

Poiché un collega mi aveva segnalato il problema, sono arrivato all'ultimo passaggio dopo aver inserito dati falsi per prova (compreso un codice fiscale non valido e un indirizzo/CAP inesistenti, dati che il sistema non ha minimamente verificato in questa fase) e ho trovato la pagina relativa al consenso, che obbliga al trattamento dei dati da parte di AWS/Amazon.

Ho aperto il link relativo alla privacy policy (gestito da Iubenda) e ho trovato i dettagli, tra i quali spiccano le raccolte di dati per profilazione (senza possibilità di opt-out) da parte di: Google (cloud, pubblicità, statistica e altro), Meta (pubblicità, statistica), Amazon (hosting), HubSpot (database utenti), X (pubblicità), LinkedIn (pubblicità) ecc...

Per molti di questi servizi di terze parti non è neanche ben chiaro quali dati siano trattati, perché si rimanda alle privacy policy dei singoli enti (lunghissime, in inglese) e perché a volte comprendono l'utilizzo di script di tracciamento non meglio specificati.

Chiedo l'aiuto del Fediverso perché a me la cosa sembra grave (non alla maggioranza dei miei colleghi naturalmente, che si è registrata immediatamente con grande naturalezza).

Vorrei se possibile che mi aiutaste a definire bene perché la cosa è grave: "lesione della privacy" è troppo generico e debole (socialmente) in questo periodo storico. Vorrei trovare qualche definizione ben fatta di etica digitale, buone pratiche, cattive pratiche, identità digitale ecc... Possibilmente vorrei citare qualche articolo specifico sulle implicazioni delle società qui citate in gravi "nefandezze" a livello mondiale, dalla sorveglianza di massa al coinvolgimento nelle guerre in corso. Insomma, materiale e idee, ad integrare le ricerche che ovviamente sto facendo io...

Grazie a tutti, vi prego di boostare e diffondere il più possibile e vi terrò aggiornati!
🙏

#privacy #pubblicaamministrazione #Scuola #Sicurezza #formazione #eticadigitale #identitadigitali

@Scuola - Gruppo Forum

in reply to PiadaMakkine

@PiadaMakkine Beh il corso sulla sicurezza è obbligatorio. Un collega ha provato a protestare per lo stesso motivo e gli è stato risposto che l'unica alternativa è farselo per conto proprio e a spese proprie, e io sono disposto a farlo. Però voglio cercare di sensibilizzare sia la dirigenza, sia i colleghi sul fatto che la scelta dell'erogatore di servizi andrebbe fatta con maggiore attenzione anche a questo aspetto, e non solo selezionando la proposta più economica...

reshared this

Informa Pirata ha ricondiviso questo.

Nuovo post: Didacta 2026 - giorno 1

dropseaofulaula.blogspot.com/2…

Informa Pirata ha ricondiviso questo.

🔴 Sul filo conduttore della guerra cognitiva e come ricerca personale, oggi ho cercato di analizzare il linguaggio come creatore di realtà.
Le parole creano il senso o è il senso che spinge per trovare le parole?
#SpuntiDiRiflessione #CognitiveWar
cc: @informapirata
tommasin.org/blog/2026-03-11/i…
Questa voce è stata modificata (1 mese fa)

Informa Pirata reshared this.

Informa Pirata ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Da Flock a ICE, ecco un'analisi di come vieni osservato

Per comprendere meglio cosa stiamo osservando esattamente in questo inferno di sorveglianza distopica, Jason Koebler e Joseph Cox di 404 Media si sono uniti a r/technology di Reddit per una sessione di Ask Me Anything.

404media.co/flock-ice-surveill…

@privacypride


From Flock to ICE, Here’s a Breakdown of How You’re Being Watched


It’s nearly impossible not to be watched these days. It can start right at home with your neighbors and their Ring cameras—a company that sold fear to the American public and is now integrating AI to turn entire neighborhoods into networked, automated surveillance systems.

Head out a bit further and you’ll likely be confronted by Flock’s network of cameras that not only track license plates, but also track people’s movements with detailed precision. And as the Trump administration raids cities across the U.S. for undocumented immigrants, tech giants like Palantir are powering tools for ICE, including one called ELITE that helps the agency pick which neighborhoods to raid.

To better understand what exactly we’re looking at in this dystopian hellscape, 404 Media’s Jason Koebler and Joseph Cox joined r/technology for an AMA.

Understandably, people are worried about violations of their privacy by companies and the government. And many wonder, is there any way to go back once we’ve released all this AI-powered, surveillance tech?

Questions and answers have been edited for clarity.

Q: How do you think we can as a society deescalate tools designed to spy on citizens? I feel like once the police state bottle is open it’s near impossible to put it back in?

JASON:This is something I grapple with a lot. For whatever reason, my reporting has gravitated to state and local surveillance tools owned by police. This is not uniformly true, but what I've seen based on watching zillions of city council meetings and reading thousands of pages of emails and public records is that police, in general, love new toys and love new gadgets. The strategy is very often ‘get the surveillance tech first and ask questions later.’ A lot of city councils are not very sophisticated about the risks of surveillance technology and a lot of them feel a lot of pressure to keep their city safe or whatever, and so they defer to the police and give them money for whatever they ask for. There are also tons of grants and pilot programs in which police can obtain technology for cheap or free, and so the posture cities take is often ‘why not try it?’ Police love telling each other about the new capabilities and tools that they've acquired, so this tech can spread from city to city very quickly.

All of this can be pretty demoralizing but something that we've seen is that when you shine even a tiny bit of light on the ways these systems work, how they can and are often abused, people learn a lot about the intricacies of them very quickly. At this point, I am getting emails and messages multiple times a week from people in a new city or town that has either decided not to buy Flock or has decided to stop working with Flock, and usually our reporting is cited in some way. The issue is that it's not just Flock, there's all sorts of surveillance tools and new companies are popping up all the time. So it does feel like it's hard to put the genie back in the bottle, but I do think that, overall, the public discussion on surveillance and privacy is getting a lot more sophisticated, and that gives me optimism.

Q: Given the breadth of these surveillance technologies, is there any hope or possibility of opting out or avoiding being “seen”? Do we accept surveillance and aggregated data about ourselves and our behavior as an inevitability?

JOSEPH: I don't think privacy is dead. I don't think people need to give up and say fine, take my data. There are concrete things people can do. But they do introduce friction. The trade off with security is efficiency. The more efficient, the less secure you might be. The more secure, the less efficient. An extreme example would be not owning a mobile phone. Well, you're immune to producing any mobile phone telecom data because you don't own one. But that's gonna be a massive pain.

Concrete things people can do:

  • Explore legislation that will let you demand a company deletes your data. Google a template of the language to send, it's pretty easy
  • Maybe delete your AdID in your phone, or change it. Here's how on Android. This is the digital glue advertisers, and parties that buy that data, use to stick together your device and its usage.
  • Use a different email for each service. This is too much work to make constant new addresses (unless you just use one junk one). I like Apple's iCloud Hide My Email feature which gives you (they say) an unlimited number of emails to generate. Then if a website is hacked or your data sold, it is not necessarily clear that the data belongs to you. Obviously it depends on the service but I use that every day.


playlist.megaphone.fm?p=TBIEA2…
Q: Are new phones being built with spyware technology and how will we know? Will Independent Media be able to continue reporting if all of our technology blocks the truth from ever reaching the masses?

JOSEPH: Supply chain attacks are what really scare me. You have a device you trust, or a piece of software you download from a legitimate source, and even then someone has snuck in some malware. The biggest one right now which was reported just recently is the Notepad++ case.

That said, we haven't seen much widespread reporting about it happening to new phones (beyond there being annoying sketchy apps, that does happen). I'd flag that the Bloomberg piece claiming the Apple supply chain was somehow compromised was widely debunked by the infosec community.

Q: What can you infer from the info you learned to explain why some ICE agents just pull cars on the street to arrest people instead of going after them from their home?

JOSEPH: I think there are a few things going on. Some parts of DHS want there to be targeted raids, against specific people, specific addresses. Others (Bovino) want a more blanket, indiscriminate approach. I'd point to this really good reporting in The Atlantic about that tension inside the agency.

But other than that, data can only go so far. Data by itself can't make these agents fulfill their arbitrary and extreme quotas of how many people to detain. At some point, the mass deportation effort becomes distinctly low tech. It's almostttt like the XKCD comic about password security and wrench attacks. It basically boils down to grabbing who they can or feel they can.

Q: Do you ever hear from workers at Palantir (or other similar companies) about what things are like there?

JOSEPH: I won't talk about sources specifically, but a couple of things: some people inside Palantir are clearly motivated enough by what the company is doing with ICE to then leak details of that work to journalists. That started with this piece, Leaked: Palantir’s Plan to Help ICE Deport People. That was a pretty unusual leak in that it contained both Slack messages and an internal Palantir wiki in which company leadership explained and justified its work with ICE.

Leaked: Palantir’s Plan to Help ICE Deport People
Internal Palantir Slack chats and message boards obtained by 404 Media show the contracting giant is helping find the location of people flagged for deportation, that Palantir is now a “more mature partner to ICE,” and how Palantir is addressing employee concerns with discussion groups on ethics.
404 MediaJoseph Cox


Broadly, I think a lot of people inside tech companies (both social media giants and surveillance companies) are often conflicted about their work. Some leave. Some put it out of mind and stay. Some leak.

Q: Do we know what information was handed over to Palantir from DOGE? I don’t think the majority of Americans understand just how dangerous this company is right now.

JOSEPH: I think we are still learning the specifics of that. When we reported on the ELITE the Palantir-made tool ICE is using, the user guide said the tool included data from the Department of Health and Human Services. Now, I don't think the list in the user guide is exhaustive by any stretch. It says ELITE integrates new data sources.

What new data sources has ICE gotten recently? IRS. CMS. Medical insurance databases. I'm not saying that data is being fed into ELITE. I don't know that and can't report it. But I absolutely think it's possible and would make sense.

Q: Are public record requests Flock's Achilles heel?

JASON: I think you've hit on something here—the business model of not just Flock but of a lot of surveillance companies is to go city by city pitching and selling their tech to local police officers. Because of the hollowing out of local news over the last 20 years, there have been fewer journalists paying attention to city council meetings, and a lot of this tech is acquired directly by police through discretionary budgets. So for years, surveillance companies have been able to essentially go to a couple small police departments, demo their tech, get a contract. Then, through police listservs and conferences and email chains, the police start to talk about their new toys with other districts, and companies can quickly go from having just a few contracts to having dozens, hundreds, or thousands of contracts. That is more or less what's happened with Flock—a lot of officers within the police departments that were early adopters of the tech have actually been hired by the company to be lobbyists and salespeople. I've focused a lot of my reporting over the years on this dynamic and how this usually goes.

But what has happened, as you've noted, is that because these surveillance companies are working with so many police departments and cities, they are subject to public records from all of them. When a company sells only to the federal government, they may be able to be very careful about what they say, what they put in writing, how they pitch their product etc. But when a company is hyperfocused on growth at the local level, they have to explain how their tech works over and over again, and highlight different features and capabilities. They create a lot of public records doing this, and journalists and concerned citizens have noticed this and have been vigilant about requesting documents that their tax dollars are paying for. So yes, this is how we're learning a lot about Flock, and it's also how governments that may not have known about abuses or how pervasive this tech is are learning about Flock too.

So my very long answer to your question is not that public records requests are Flock's achilles heel—I think Flock's design, business model, and approach to surveillance are its achilles heel, but that the way it operates its company across tons of cities leaves it more vulnerable than it would have expected to the transparency we all deserve, and it cannot plausibly fight against the release of public documents in thousands and thousands of cities at once.

Police Unmask Millions of Surveillance Targets Because of Flock Redaction Error
Flock is going after a website called HaveIBeenFlocked.com that has collated public records files released by police.
404 MediaJason Koebler


Q: Our local PD has stated that they have control over their Flock data. To me this implies that other Flock users can’t search the ALPR data from our city. Can you talk about what in particular Flock users can search for?

JOSEPH: Yeah, the ownership of Flock data is interesting. Flock says the police own it. Police say and believe that too. I think that is correct... mostly. Until our reporting (and maybe still now) many police forces seem to fundamentally misunderstand the Flock product, especially the nationwide network. When we contacted police departments when we were verifying that local cops were doing lookups for ICE, some of them had no idea what we were talking about. We had to explain how the system worked. Then many police departments realized what was happening and changed their access policies. So, police departments do own the footage (unless it's in Washington where a court has said actually it's a public record). But they might not realize who they are accidentally giving access to their cameras to.

Q: What is the state of the Fourth Amendment in the courts (and Supreme Court clarification) regarding Flock type surveillance currently?

JASON: There are a few lawsuits. One in San Jose. There was one in Norfolk, Virginia which just got decided in the city's favor (Flock's favor). It's being appealed.

The general argument is that you don't have an expectation of privacy in public and that you can take pictures of anything from public roads (basically). Another argument is that license plates are government data, roads are funded by taxpayers and are therefore public, so no problem here. What our law hasn't grappled with is the fact that all of these are networked together and automated, so it's a little different, in my opinion, from having one discrete camera that takes one discrete picture and then has to be accessed by a human. Instead you have thousands of networked cameras building a comprehensive database over time. I feel like that's functionally something different but our laws have not evolved to deal with this yet.

Q: Have we seen any of this technology spread (or attempt to spread) beyond the US, perhaps to other governments?

JOSEPH: Yep, absolutely. The UK has a robust facial recognition program, scanning people in public constantly, for example.

I would say it is often the other way around: technology is made or used overseas then it comes to the U.S. Cobwebs, which makes the Webloc location data tool ICE has bought access to, is from Israel (they're now part of an American company called Penlink). Paragon, the spyware that ICE bought, is also from Israel.

Q: Regarding the story posted on 404 Media about Apple’s Lockdown mode, is this the first time (publicly perhaps) the government has had issues accessing a phone with that mode enabled?

JOSEPH: I believe this is the first time we've seen the government admit it cannot access an iPhone running Lockdown Mode. Maybe it is in other court documents, but I don't think it's been reported.

FBI Couldn’t Get into WaPo Reporter’s iPhone Because It Had Lockdown Mode Enabled
Lockdown Mode is a sometimes overlooked feature of Apple devices that broadly make them harder to hack. A court record indicates the feature might be effective at stopping third parties unlocking someone’s device. At least for now.
404 MediaJoseph Cox


I don't think Apple will make changes based on this. That's for a few reasons:

  • Apple has continued to make changes that thwart mobile forensics tools, like the silent reboot we revealed
  • Frankly I don't think this case is high profile enough to cause that kind of response. San Bernardino was a freak, horrible event. An actual terrorist attack. That is part of why the DOJ came down so hard
  • It went against their long standing ideas of just making their product more secure

Now, Cook has obviously gotten more close to President Trump. It is embarrassing. Giving him a gold statue, or whatever. But that's different from undermining their users' security (pushing the product into China and making concessions there, that's another story).

Q: What surveillance tools do you anticipate seeing develop and integrate further into American society in the next three years without legislative oversight?

JASON: I hate that this is my answer but I think that there's going to be a lot, and I am pretty concerned at what I've seen. Here we go:

  • Police departments are obsessed with Drone as First Responder programs (called DFR), which are basically little autonomous drones that fly out to the location of a 911 call as the call is happening. Some reporting has shown that this ends up with lots of people getting drones sent at them when they're mowing the lawn too loudly or something. This is being integrated with ALPR cameras and other AI tools. Not into it.
  • I think real time facial recognition and AI cameras that are networked together is the next big thing. New Orleans is already doing this through a quasi public “charity,” which I'm writing about for next week. We've also written about a company called Fusus which is quite concerning.
  • We've seen some early AI persona bots being used by police to infiltrate social media groups. I think these are very goofy but also cops seem generally obsessed with cramming AI and facial recognition into everything they can and I think we're about to see an explosion in this space.

Q: Outside of 404 Media, what books or resources do you recommend to folks looking to learn more about surveillance in America or globally?

JOSEPH: I definitely recommend Means of Control, Byron Tau's book. He was the first journalist to report that government agencies (including ICE and CBP) were buying smartphone location data from data brokers. It's a great book to give you a true idea of the scale of the interaction between private industry and the government. This is much more important than, say, any links between, for example, Facebook and the government. Here they just literally buy the data.

For families, I think Flock is a good one. Everyone understands what it is like to drive around and how they sometimes go places they might not want others to know for personal privacy reasons. Well, are you okay with authorities being able to query that without a warrant? And are you okay with law enforcement in, say, a town in Texas being able to then look up the movements of people across the country? I think it's a pretty good tangible example that doesn't require a lot of tech stuff.

JASON: I'll add to this briefly. This is not an exhaustive list, but off the top of my head:

Zack Whitaker's This Week in Security newsletter is really good.

Our old colleague and friend Lorenzo Franceschi-Bicchierai at TechCrunch does really great work. Groups like the EFF, ACLU, Electronic Privacy Information Center, and Center for Democracy and Technology all focus on different things but are often surfacing interesting surveillance-related cases and can be helpful in terms of understanding some of the legal issues around surveillance. Lucy Parsons Lab does amazing work. The Institute of Justice is a libertarian group that always finds very interesting privacy and surveillance cases.

With Ring, American Consumers Built a Surveillance Dragnet
Ring’s ‘Search Party’ is dystopian surveillance accelerationism.
404 MediaJason Koebler


Another one I feel people understand immediately is Ring cameras. So many people have them, and I think a lot of people like them. But I have found Ring cameras as a useful intro point just because they are so popular. Should we be filming our neighbors at all times? Putting it on Nextdoor and social media sites? Connecting it to local police? What about the entire neighborhood's cameras? Should it go to ICE, etc? I think that unfortunately a lot of people will say ‘I want to protect my house and my family,’ but I do find it's usually possible to have a nuanced talk about Ring cameras, at least in my personal life, and that often opens people's eyes to other, similar systems.


reshared this

Informa Pirata ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Crimini notturni e illuminazione artificiale

@astronomia

Fra i temi proposti e affrontati al primo convegno nazionale sull’inquinamento luminoso, che si è tenuto a Roma a fine febbraio, c’è anche la relazione fra sicurezza e illuminazione notturna di strade e città. Ne parliamo in questa intervista a uno dei relatori del convegno, Luca Invernizzi, autore di una monografia sul rapporto fra criminalità e

Informa Pirata ha ricondiviso questo.

Senigallia piange Luca Conti: blogger e consigliere comunale, aveva 50 anni
vivere.me/gBdb-m

reshared this

Informa Pirata ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Piano d'azione per l'intelligenza artificiale nel Regno Unito: vaporware, crypto bros e niente intelligenza artificiale


Se vuoi conoscere le ultime notizie rilevanti del mondo della #IntelligenzaArtificiale puoi seguir il gruppo @aitech


Il Regno Unito ha annunciato il suo Piano d'azione per le opportunità dell'IA a gennaio 2025. Questo trasformerà il Regno Unito in un Paese orientato all'IA! Un salto nel futuro!

Il piano si basava su due rapporti del Tony Blair Institute del 2024, contenenti molti dettagli apparentemente concreti sul panorama industriale del Regno Unito, ma che in realtà i ricercatori avevano scritto chiedendo a ChatGPT. Se ne vantavano nei rapporti. Chiedere a veri esperti avrebbe richiesto troppo tempo.

Il Regno Unito ha preso questi numeri inventati e li ha utilizzati!

Il Guardian ha analizzato attentamente come questo stupido piano di intelligenza artificiale del Regno Unito sia basato su quelli che il titolo definisce cortesemente “investimenti fantasma”: [ Guardian ]

il denaro non è necessariamente reale, i data center potrebbero non essere nuovi, i posti di lavoro non sono stati ancora contabilizzati e il sito del supercomputer a 12 miglia a nord di Londra è ancora un cantiere di impalcature.


Il Dipartimento per la scienza, l'innovazione e la tecnologia ha ammesso al Guardian che:

Non esisteva alcun contratto per un investimento da 1,9 miliardi di sterline (2,5 miliardi di dollari), nonostante un comunicato stampa dichiarasse che ne era stato firmato uno. In un altro, si affermava che "non stava svolgendo un ruolo attivo nella verifica di tali impegni".


La parte del piano di intelligenza artificiale relativa ai data center dipende da due aziende: Nscale (Regno Unito) e CoreWeave (Stati Uniti). Entrambe erano ex miner di criptovalute, che hanno fatto una... svolta verso l'intelligenza artificiale!

continua qui:
pivot-to-ai.com/2026/03/10/uk-…

Grazie a @davidgerard per la segnalazione


UK AI Action Plan: vaporware, crypto bros, no AI

♫ we told you so ♫

youtube.com/watch?v=nB415dkRsY… - video
pivottoai.libsyn.com/20260310-… - podcast

time: 5 min 51 sec

pivot-to-ai.com/2026/03/10/uk-… - blog post


Gli aggressori hanno trasformato la compromissione della supply chain nx npm in un accesso completo all'amministrazione AWS in meno di 72 ore.

Google afferma che UNC6426 ha rubato il token GitHub di uno sviluppatore tramite QUIETVAULT, ha abusato di OIDC Trust da GitHub ad AWS, ha creato un nuovo ruolo di amministratore, quindi ha avuto accesso ai dati S3 e ha distrutto i sistemi di produzione.

thehackernews.com/2026/03/unc6…

@Informatica (Italy e non Italy)

reshared this

Informa Pirata ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

📢 Cerchi un generatore di QRcode open source, non tracciante e completamente libero?

Boost Media APS ha creato Frog:
💚 condividi i tuoi link con qrcode
💚 inserisci loghi all'interno dei qrcode
💚 l'applicazione non richiede alcuna registrazione
💚 l'applicazione non ha alcun tracciante
💚 è integrata in tutte le release di Ufficio Zero.

Insieme continuiamo ad offrire servizi a costo zero, etici e liberi.

frog.boostmedia.it/

@lealternative@feddit.it

#frog #qrcode #ufficiozero #ufficiozerolinuxos #opensource #freesoftware

Informa Pirata ha ricondiviso questo.

Muppet, Trump, AI

Sensitive content

Informa Pirata ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

L'eID Wallet non merita ancora la tua piena fiducia

Nonostante la sua imminente implementazione, il nuovo portafoglio elettronico dell'UE non è ancora idoneo a tutelare i diritti dei suoi utenti. @edri e 9 ONG sollecitano la @EUCommission a modificare le bozze per garantire che gli utenti non possano essere tracciati, né costretti a condividere dati sensibili né a fornire la propria identità legale laddove ciò non sia richiesto dalla legge.

edri.org/our-work/the-eid-wall…

@privacypride

in reply to informapirata ⁂

Direi piuttosto che "l'eID Wallet non merita la tua fiducia", tout court. Per due motivi:
1) diventa un singolo punto di rottura. Il furto del telefono diventa (potenzialmente?) una tragedia.
2) ti obbligano ad usare dispositivi che non puoi controllare veramente. Con Android ed iPhone siamo alla mercé di aziende non europee; schiacciano un bottone e l'intera Europa rimane fregata. Niente documenti, niente autenticazioni. Niente.
@edri @EUCommission @privacypride

Privacy Pride reshared this.

Informa Pirata ha ricondiviso questo.

@informapirata@mastodon.uno
Ciao pirata, mi aiuti a fare girare questo link?

keepandroidopen.org/it/

reshared this

Informa Pirata ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Come si diceva tempo addietro, ad Amazon hanno scoperto problemi da "erroneous software code deployment". Quello AI, per intenderci. Motivo per cui ora servirà un supervisore

Amazon holds engineering meeting following AI-related outages ft.com/content/7cab4ec7-4712-4…

Informa Pirata ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

📢 Ufficio Zero supera i 2 Milioni di download 🥳

Se questo è stato possibile lo si deve:
❤️ ai nostri utenti
❤️ ai nostri sponsor
❤️ ai nostri partner
❤️ a tutti gli attivisti

che si prodigano per diffondere il verbo e continuare a preferire Ufficio Zero, riponendo la propria fiducia nel progetto.

A tutti loro un Grazie di vero ❤️

@gnulinuxitalia

ufficiozero.org/index.php?alia…

#ufficiozero #opensource

Questa voce è stata modificata (1 mese fa)
Informa Pirata ha ricondiviso questo.

Questa storia non la conoscevo proprio!
Originaria della vecchia Contarina, che ora è Porto Viro 💖

@rovigo

I dimenticati dell’arte. La storia della Baronessa volante Maria Antonietta Avanzo
artribune.com/professioni-e-pr…

#Rovigo #MariaAntoniettaAvanzo #portoviro

Questa voce è stata modificata (2 mesi fa)

reshared this

Informa Pirata ha ricondiviso questo.

Ciao fediverso! Purtroppo ho recentemente perso il lavoro, e sono urgentemente alla ricerca di un nuovo impiego come sviluppatore web / tecnico DevOps / sistemista. Sono aperto a collaborazioni di ogni tipo.

Il mio CV completo è qui: gabriele.lucci.xyz/resume

#fediHire #getfedihired #help

Questa voce è stata modificata (1 mese fa)
Informa Pirata ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

@milano

D'accordo, è un cartello provvisorio e prima o poi lo toglieranno. Ma perché il povero Giuseppe Salvatore Pianell è diventato Piannel?

Informa Pirata ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Gruppi di pressione finanziati dall’estero provenienti da paesi extra-UE stanno promuovendo #ChatControl con propaganda fuorviante

Alcune lobby finanziate dall’estero, provenienti da paesi extra-UE, stanno promuovendo #ChatControl con propaganda fuorviante. Vogliono #PassTheLaw per scansionare le tue chat, ma chi sono e chi li paga? Smascheriamo la rete dei promotori della sorveglianza!
informapirata.it/2026/03/10/gr…

Informa Pirata ha ricondiviso questo.

Linux in Italiano Scopri le Distribuzioni Facili!


The media in this post is not displayed to visitors. To view it, please go to the original post.

Linux in Italiano Scopri le Distribuzioni Facili!
Questa voce è stata modificata (1 mese fa)

reshared this

Informa Pirata ha ricondiviso questo.

Smascheriamo la rete dei promotori di chatcontrol!

Alcune lobby finanziate dall'estero, provenienti da paesi extra-UE, stanno promuovendo #ChatControl con propaganda fuorviante. Vogliono #PassTheLaw per scansionare le tue chat: chi sono e chi le paga?

Il thread di @echo_pbreyer

informapirata.it/2026/03/10/gr…

@eticadigitale