The Pirate Post ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

📅 Gli eventi della settimana

2° Meeting nazionale TWC Italia

🕒 13 giugno, 00:00 - 14 giugno, 00:00
📍 Casale Falchetti, Roma, Lazio
🔗 mobilizon.it/events/1f53f993-b…


2° Meeting nazionale TWC Italia
Inizia: Sabato Giugno 13, 2026 @ 12:00 AM GMT+02:00 (Europe/Rome)
Finisce: Domenica Giugno 14, 2026 @ 12:00 AM GMT+02:00 (Europe/Rome)

Incontriamoci. Confrontiamoci. Organizziamoci.

🌍 LSA100Celle - Roma

📍13 e 14 giugno ci vediamo a #Roma per il secondo Meeting nazionale di Tech Workers Coalition Italia. Un'occasione per discutere delle criticità del settore tech italiano e globale e mettere in rete le pratiche di mobilitazione.Un grande log out nazionale per costruire l'alternativa possibile nei nostri luoghi di lavoro. Non lasciamoci deformare dalla tecnologia.

Sostieni il meeting su OpenCollective e segui tutti gli aggiornamenti sul programma sul nostro sito.


The Pirate Post reshared this.

The Pirate Post ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

📰 "Selon Noyb, #LinkedIn invoque des préoccupations liées à la protection des données pour ne pas donner suite aux demandes d’accès. Mais dans le même temps, l’entreprise demande aux utilisateurs de souscrire à son abonnement payant #Premium."

Lire plus: lesoir.be/744747/article/2026-…

Questa voce è stata modificata (1 ora fa)

reshared this

The Pirate Post ha ricondiviso questo.

Aufnahmen von Pornodarsteller*innen liefern die Vorlage für sexualisierte Deepfakes. Aber die Öffentlichkeit sieht sie nicht als Opfer, kritisiert Ana Ornelas von der European Sex Workers’ Rights Alliance. Ein Interview über gestohlene Nacktaufnahmen, patriarchale Gewalt und Kontrollverlust.

netzpolitik.org/2026/gemeinsam…

The Pirate Post ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

InstallFix: Hackers Use Fake Claude AI Installer Pages and Google Ads to Deploy RedLine Stealer Malware
#CyberSecurity
securebulletin.com/installfix-…
The Pirate Post ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

CallPhantom: 28 Fake Android Apps with 7.3 Million Downloads Sold Fabricated Call History Data on Google Play
#CyberSecurity
securebulletin.com/callphantom…
The Pirate Post ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Five Critical Redis Vulnerabilities Enable Remote Code Execution Across All Editions — Patch Now
#CyberSecurity
securebulletin.com/five-critic…
The Pirate Post ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

WatchGuard Agent Vulnerabilities Allow Attackers to Escalate to Full SYSTEM Privileges on Windows
#CyberSecurity
securebulletin.com/watchguard-…
The Pirate Post ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Silver Fox lancia ABCDoor: spear phishing con loader Rust personalizzato contro India e Russia, nuova backdoor Python in campo
#CyberSecurity
insicurezzadigitale.com/silver…


Silver Fox lancia ABCDoor: spear phishing con loader Rust personalizzato contro India e Russia, nuova backdoor Python in campo


Tra dicembre 2025 e febbraio 2026, il gruppo APT di matrice cinese noto come Silver Fox ha lanciato due ondate coordinate di spear phishing contro organizzazioni in India e Russia, sfruttando esche a tema fiscale costruite ad hoc per ciascun paese. Il vettore tecnico è un loader Rust modificato — una versione bespoke del framework open source RustSL — che distribuisce ValleyRAT (aka Winos 4.0) insieme a una backdoor Python finora inedito, denominato ABCDoor. La ricerca è stata pubblicata da Kaspersky Securelist e ripresa da The Hacker News il 4 maggio 2026. Più di 1.600 email di phishing sono state registrate tra inizio gennaio e inizio febbraio, con organizzazioni impattate nei settori industriale, consulenza, retail e trasporti.

Il profilo di Silver Fox: doppio binario tra cybercrime e spionaggio


Silver Fox è un gruppo APT cinese attivo almeno dal 2024, documentato inizialmente per campagne contro obiettivi in Cina, poi espanso verso Taiwan, Giappone, India e Russia. Secondo l’analisi di S2W, il gruppo ha sviluppato un «dual-track operational model» che conduce simultaneamente attività opportunistiche su larga scala — tipiche del cybercrime finanziario — e operazioni di spionaggio più mirate. L’adozione di lure personalizzate per ciascun paese bersaglio, con riferimenti puntuali ai sistemi fiscali locali, indica un livello di intelligence preliminare coerente con un’operazione state-sponsored o comunque sostenuta da risorse significative.

La catena d’attacco: phishing, RustSL, ValleyRAT, ABCDoor

Fase 1 — Delivery via phishing fiscale


Le email di phishing impersonano comunicazioni ufficiali dell’Income Tax Department of India (dicembre 2025) e successivamente dell’equivalente russo (gennaio 2026). Il messaggio contiene un PDF allegato con due link cliccabili che reindirizzano al download di un archivio ZIP o RAR ospitato su abc.haijing88[.]com. All’interno dell’archivio si trova un eseguibile che si maschera da PDF. In alcune varianti della campagna di dicembre, il codice malevolo è stato incorporato direttamente nell’allegato email, saltando il redirect esterno.

Fase 2 — RustSL loader: geofencing e anti-analysis


L’eseguibile è una versione modificata di RustSL, un framework open source per shellcode loader e bypass degli antivirus scritto in Rust. Silver Fox ha personalizzato il codice sorgente pubblicamente disponibile su GitHub, aggiungendo funzionalità non presenti nell’originale:

  • Geofencing per paese: la versione originale di RustSL supporta solo la Cina come paese bersaglio; la variante Silver Fox estende la lista a India, Indonesia, Sud Africa, Russia e Cambogia (con versioni successive che aggiungono il Giappone). Il loader verifica la geolocalizzazione prima di procedere, abortendo l’esecuzione in caso di mismatch.
  • Rilevamento di VM e sandbox: controlli ambientali standard per ostacolare l’analisi dinamica in ambienti di ricerca.
  • Phantom Persistence: una variante del loader utilizza una tecnica di persistenza documentata per la prima volta nel giugno 2025 come «Phantom Persistence». Il meccanismo intercetta il segnale di shutdown del sistema, blocca la normale sequenza di spegnimento e forza un riavvio simulando un aggiornamento applicativo. Al successivo avvio dell’OS, il loader viene eseguito automaticamente.


# Infrastruttura C2 identificata
abc.haijing88[.]com          — hosting archivi payload
login-module.dll_bin         — componente core C2 di ValleyRAT
# Country list RustSL personalizzato (pre-19 gennaio 2026)
IN, ID, ZA, RU, KH
# Versioni successive aggiungono:
JP

Fase 3 — ValleyRAT (Winos 4.0)


Il payload crittografato scompattato da RustSL è ValleyRAT, noto anche come Winos 4.0, un framework malware modulare già utilizzato da Silver Fox in campagne precedenti. Il componente core, denominato login-module.dll_bin, gestisce le comunicazioni C2, l’esecuzione di comandi remoti e il recupero ed esecuzione di moduli aggiuntivi. È su questo layer modulare che viene distribuito ABCDoor.

Fase 4 — ABCDoor: la nuova backdoor Python


ABCDoor è una backdoor Python finora inedita, presente nell’arsenale di Silver Fox dal 19 dicembre 2024 e utilizzato in attacchi a partire da febbraio-marzo 2025. Viene distribuita come modulo personalizzato di ValleyRAT, dopo un secondo controllo di geofencing che filtra ulteriormente il target. Le capacità operative documentate da Kaspersky includono:

  • Persistenza e aggiornamento/rimozione autonomo del backdoor
  • Cattura di screenshot
  • Controllo remoto di mouse e tastiera
  • Operazioni sul file system (lettura, scrittura, esecuzione)
  • Gestione dei processi di sistema
  • Esfiltrazione del contenuto degli appunti (clipboard)
  • Comunicazione C2 via HTTPS con server esterno

In varianti più recenti, osservate a partire da novembre 2025, ABCDoor viene distribuito anche tramite un loader JavaScript distribuito all’interno di archivi SFX (self-extracting) contenuti in ZIP allegati a email di phishing — un vettore alternativo che non richiede RustSL come intermediario.

Distribuzione geografica e settori impattati


Il maggior numero di attacchi è stato rilevato in India, Russia e Indonesia, seguiti da Sud Africa e Giappone. I settori più colpiti nelle ondate di gennaio-febbraio 2026 sono stati industriale, consulenza, retail e trasporti. La scelta di bersagliare contemporaneamente India e Russia — paesi con rapporti complessi con la Cina sia a livello diplomatico che commerciale — suggerisce un obiettivo di intelligence economica e politica piuttosto che un’operazione puramente finanziaria.

Connessione con campagne precedenti


Silver Fox aveva già utilizzato ValleyRAT in campagne precedenti, tipicamente contro obiettivi in Asia orientale. L’introduzione di RustSL come loader — con personalizzazioni sofisticate del codice sorgente open source — e la comparsa di ABCDoor come modulo aggiuntivo indicano un’evoluzione significativa delle capacità tecniche del gruppo. La tecnica di Phantom Persistence, che sfrutta il meccanismo di Windows per gli aggiornamenti che richiedono riavvio, è particolarmente interessante per la sua capacità di sopravvivere ai controlli di startup standard.

IoC e indicatori di compromissione

# Dominio C2 principale
abc.haijing88[.]com
# File chiave da monitorare
login-module.dll_bin        — componente core ValleyRAT C2
RustSL variants             — loader con geofencing integrato
# Pattern comportamentali (Phantom Persistence)
- Intercettazione segnale WM_QUERYENDSESSION/WM_ENDSESSION
- Registrazione come "pending file rename operation" al riavvio
- Esecuzione al boot mascherata da aggiornamento applicativo
# Vettore email
- Mittente che impersona Income Tax Department (India) o equivalente russo
- Allegato PDF con link a haijing88[.]com
- Archivio ZIP/RAR con eseguibile che simula PDF

Due righe per i difensori


  • Bloccare il dominio abc.haijing88[.]com nei proxy web e nei firewall di uscita.
  • Monitorare il comportamento di shutdown: processi che intercettano WM_QUERYENDSESSION o modificano PendingFileRenameOperations nel registry durante lo shutdown sono indicatori forti di Phantom Persistence.
  • Email gateway: filtrare allegati PDF con link a domini registrati di recente e archivi SFX annidati in ZIP. Le esche fiscali sono stagionali ma prevedibili.
  • EDR con visibilità sulle tecniche LotL: ABCDoor usa funzioni di sistema standard per operazioni di file system e controllo remoto; rilevarlo richiede behavioral analytics e non solo firma.
  • Sandboxing con geolocalizzazione autentica: il geofencing di RustSL aborta in ambienti non corrispondenti ai paesi target. Sandbox configurate con IP di geolocalizzazione neutri potrebbero non triggerare il payload. Usare VPN con IP indiano, russo o indonesiano per l’analisi dinamica.

La campagna Silver Fox conferma una tendenza in atto: i gruppi APT cinesi stanno diversificando geograficamente i propri bersagli ben oltre i tradizionali obiettivi in Asia orientale, e stanno investendo nello sviluppo di tooling personalizzato — loader Rust bespoke, backdoor Python inediti, tecniche di persistenza innovative — che rende inefficaci le soluzioni di detection basate esclusivamente su signature statiche.


The Pirate Post ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

⚖️ "[…] #Linkedin gibt #DSGVO-Anfragen zu persönlichen Daten nur an User:innen mit kostenpflichtigen Premium-Abos weiter. Noyb habe deshalb im Namen eines Nutzers Beschwerde bei der österreichischen Datenschutzbehörde eingebracht […]"

📰 Erfahre mehr: derstandard.at/story/300000031…

Questa voce è stata modificata (3 ore fa)

reshared this

The Pirate Post ha ricondiviso questo.

Lehrvideos über Gefahren im Straßenverkehr sind genauso notwendig wie der Versuch, immer sicherere Autos zu bauen. Digitale Risiken sind im Vergleich dazu noch mal besonders, denn sie haben eine weitere Risikokomponente. Verknüpft damit ist eine gesamtgesellschaftliche Aufgabe, schreibt unsere Kolumnistin @bkastl.

netzpolitik.org/2026/fremde-au…

The Pirate Post ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

AI Supply Chain Attack: 575+ Malicious Skills on Hugging Face and ClawHub Deliver Trojans, Cryptominers, and AMOS Stealer
#CyberSecurity
securebulletin.com/ai-supply-c…
The Pirate Post ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

ZiChatBot: OceanLotus APT Uses Zulip Chat APIs as Covert Command and Control in PyPI Supply Chain Attack
#CyberSecurity
securebulletin.com/zichatbot-o…
The Pirate Post ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

NVIDIA GeForce NOW Data Breach at GFN.AM: Personal Data of Users Exposed in 54-Day Unauthorized Access Incident
#CyberSecurity
securebulletin.com/nvidia-gefo…
The Pirate Post ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Critical Next.js and React Server Components Vulnerabilities: SSRF, DoS, and Middleware Bypass Patched
#CyberSecurity
securebulletin.com/critical-ne…
The Pirate Post ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Salt Typhoon nella PA italiana: Sistemi Informativi di IBM violata per due settimane, il cyberspionaggio cinese entra nella supply chain dello Stato
#CyberSecurity
insicurezzadigitale.com/salt-t…


Salt Typhoon nella PA italiana: Sistemi Informativi di IBM violata per due settimane, il cyberspionaggio cinese entra nella supply chain dello Stato


Nelle prime ore del 3 maggio 2026, la notizia di un’intrusione ai danni di Sistemi Informativi — la società romana controllata al 100% da IBM Italia — ha attraversato le redazioni in modo fulmineo. Dietro all’attacco, secondo le ricostruzioni convergenti di più fonti e con la pista ancora aperta per le autorità inquirenti, ci sarebbe probabilmente, voce poi smentita, Salt Typhoon: il gruppo APT riconducibile all’apparato di sicurezza della Repubblica Popolare Cinese, già responsabile della violazione di nove operatori telecom statunitensi tra cui AT&T e Verizon. Questa volta, però, il bersaglio non è un’infrastruttura straniera: è il cuore tecnologico della Pubblica Amministrazione italiana. Doveroso ricordare che al momento, per quanto comunicato dall’azienda e per la posizione di IBM, l’attacco ha avuto successo per Sistemi Informativi SRL, senza colpire la supply chain sensibile e strategica che adesso andremo ad analizzare. Questo significa che i sistemi IBM al di fuori di Sistemi Informativi restano non coinvolti. Ma vediamo di che perimetro stiamo parlando.

Chi è Sistemi Informativi e perché è un bersaglio critico


Fondata nel 1979 e con sede a Roma, Sistemi Informativi opera come system integrator nei segmenti più sensibili della trasformazione digitale italiana. Tra i suoi committenti figurano INPS, INAIL, diversi ministeri, banche, operatori delle telecomunicazioni, aziende del comparto energetico e numerosi soggetti impegnati nelle iniziative del Piano Nazionale di Ripresa e Resilienza, dalla sanità digitale al cloud nazionale. Con circa 800 dipendenti, la società rappresenta uno snodo critico: compromettere un solo integrator di questa portata significa, in linea di principio, ottenere visibilità su contratti pubblici, credenziali di accesso, dati di milioni di cittadini, configurazioni di rete e dipendenze applicative di enti distanti per missione e per settore.

È esattamente il tipo di superficie d’attacco che le campagne di cyberspionaggio statale ricercano da anni. Non il rumore dell’esfiltrazione massiva, ma la visibilità silenziosa su un ecosistema intero.

La timeline dell’incidente


L’intrusione sarebbe avvenuta circa due settimane prima della sua scoperta e rivelazione pubblica, fissando l’inizio della compromissione intorno alla metà di aprile 2026. Una finestra temporale coerente con il modus operandi di Salt Typhoon, che predilige la persistenza silenziosa e l’esfiltrazione progressiva dei dati all’azione rumorosa e distruttiva tipica del ransomware.

  • 3 maggio 2026: la testata Repubblica.it pubblica l’anticipazione dell’attacco. Il sito ufficiale di Sistemi Informativi risulta irraggiungibile.
  • Sera del 3 maggio: IBM diffonde un comunicato ufficiale confermando l’intrusione, l’attivazione dei protocolli di incident response e il coinvolgimento di specialisti interni ed esterni. I sistemi sono stati stabilizzati, i servizi ripristinati.
  • 3-4 maggio: il Ministro per la Pubblica Amministrazione Paolo Zangrillo dichiara che «tutti gli attori istituzionali competenti stanno portando avanti le procedure previste dalla normativa» e che ACN ha avviato ogni azione necessaria per definire origine e impatto dell’attacco.
  • 5-6 maggio 2026: la Procura Antiterrorismo di Roma, coordinata dal procuratore Francesco Lo Voi, apre un fascicolo ipotizzando il reato di accesso abusivo a sistema informatico.
  • 6 maggio: IBM fornisce un comunicato aggiuntivo precisando: «Ad oggi, non riteniamo che questa attività sia attribuibile a Salt Typhoon». La pista resta però aperta per gli investigatori.


Il profilo di Salt Typhoon: alias, TTP e campagne note


Salt Typhoon — tracciato anche come OPERATOR PANDA, RedMike, UNC5807, GhostEmperor, Earth Estries (Trend Micro), UNC2286 (Mandiant) e FamousSparrow (ESET) — è un cluster di attività malevole documentato nel joint advisory AA25-239A pubblicato dalla CISA il 27 agosto 2025, sottoscritto da NSA, FBI, Department of Defense Cyber Crime Center e partner internazionali tra cui l’Italia. L’advisory riconduce il cluster a tre aziende tecnologiche cinesi ritenute fornitrici del Ministero per la Sicurezza dello Stato e dell’Esercito Popolare di Liberazione: Sichuan Juxinhe Network Technology, Beijing Huanyu Tianqiong Information Technology e Sichuan Zhixin Ruijie Network Technology.

L’attribuzione formale data l’inizio delle operazioni almeno al 2021, mentre le prime ricostruzioni dell’industria ne collocano l’attività già al 2019. I settori bersaglio privilegiati sono le telecomunicazioni, la pubblica amministrazione, i trasporti, il comparto alberghiero e la difesa. La logica operativa è quella della raccolta di intelligence di lungo periodo, non dell’estorsione finanziaria: non distruggere, ma sapere, e sapere a lungo.

Vettori d’attacco e strumenti


Il joint advisory CISA chiarisce un aspetto tecnico rilevante: Salt Typhoon non utilizza in modo sistematico falle zero-day, ma sfrutta vulnerabilità CVE pubblicamente note e già corrette dai vendor, in danno di organizzazioni che non hanno applicato gli aggiornamenti. Tra le vulnerabilità prioritariamente sfruttate:

CVE-2024-21887 / CVE-2023-46805 — Ivanti Connect Secure e Policy Secure
CVE-2024-3400              — Palo Alto Networks PAN-OS GlobalProtect
CVE-2023-20198 / CVE-2023-20273 — Cisco IOS XE
CVE-2018-0171              — Cisco IOS e IOS XE

Sul versante del payload, il gruppo ricorre a utility come JumbledPath, capace di catturare il traffico di rete su dispositivi Cisco compromessi attraverso catene di jump host, e impiega tecniche Living off the Land (LotL) in cui l’attività malevola si confonde con il traffico legittimo prodotto da strumenti già presenti sul target. In Europa, Darktrace ha documentato nell’ottobre 2025 un’intrusione contro un grande operatore telecom europeo ottenuta sfruttando CVE su Citrix NetScaler Gateway, con movimento laterale verso host Citrix VDA, mascheramento tramite SoftEther VPN e installazione del backdoor SNAPPYBEE via DLL sideloading.

Supply chain della PA: il vero punto debole strutturale


L’episodio italiano si inserisce in un pattern consolidato. Negli ultimi due anni, gli attori statali ostili hanno spostato il fuoco dai bersagli finali ai loro fornitori tecnologici. Compromettere un fornitore unico che funge da snodo per decine di clienti istituzionali è un investimento offensivo di altissima resa. La PA italiana è esposta a una concentrazione di rischio strutturale: il numero ridotto di system integrator in grado di gestire progetti di scala nazionale crea un punto di accumulo della fiducia che, se compromesso, propaga la violazione attraverso l’intera filiera senza ulteriori intrusioni dirette.

I contratti pubblici raramente prevedono requisiti di sicurezza commisurati al ruolo strategico del fornitore: clausole di security by design, audit indipendenti, threat hunting continuo, segmentazione di rete tra ambienti di clienti diversi, gestione strutturata delle identità privilegiate. Il caso Sistemi Informativi imporrà, con ogni probabilità, una revisione profonda di queste pratiche per i fornitori di soggetti essenziali e importanti ai sensi della NIS2.

NIS2 e D.Lgs. 138/2024: il primo banco di prova reale


L’incidente cade nel primo quadrimestre di piena operatività del nuovo regime di notifica degli incidenti significativi introdotto dalla NIS2, recepita con il D.Lgs. 138/2024 e pienamente vigente dal 1° gennaio 2026. I soggetti essenziali e importanti devono trasmettere al CSIRT Italia una pre-notifica entro 24 ore dall’evidenza dell’incidente, una notifica completa entro 72 ore e una relazione finale entro un mese. Il caso Sistemi Informativi è il primo banco di prova di rilievo nazionale per l’intero sistema: come vengono gestiti gli adempimenti, con quale coordinamento tra ACN, Garante e operatori, con quali tempi e con quale trasparenza diventerà un precedente operativo per il sistema.

Salt, Volt, Flax: la pressione cinese sull’Europa è sistemica


L’incidente non è un episodio isolato: è il segmento europeo di una pressione sistemica articolata su più fronti. Salt Typhoon si concentra sull’intercettazione delle comunicazioni e sulla raccolta di intelligence presso carrier e fornitori IT. Volt Typhoon mira a posizionare implant nelle infrastrutture critiche civili statunitensi in una logica di prepositioning per scenari di crisi. Flax Typhoon, sanzionato dall’OFAC, costruisce botnet di dispositivi compromessi utilizzabili a copertura di ulteriori operazioni. La sovrapposizione delle tre campagne disegna un’architettura di pressione nella quale spionaggio, sabotaggio potenziale e infrastruttura offensiva convivono e si rafforzano reciprocamente.

Indicazioni pratiche per i difensori


  • Patch management aggressivo sui perimeter device: le CVE sfruttate da Salt Typhoon sono note e corrette. La finestra di esposizione si chiude solo applicando gli aggiornamenti. Priorità assoluta a Ivanti, Palo Alto PAN-OS, Cisco IOS XE.
  • Network segmentation e Zero Trust: in ambienti multi-cliente come quelli degli integrator, la segmentazione rigida tra tenant è l’unico modo per contenere il movimento laterale post-compromissione.
  • Threat hunting sulle appliance perimetrali: rilevare JumbledPath e tecniche LotL richiede visibilità sul traffico di rete a livello di dispositivo, non solo sugli endpoint. NetFlow, logging di sistema e behavioral analytics sono prerequisiti.
  • Revisione dei contratti con fornitori strategici: includere requisiti minimi di sicurezza, diritto di audit e obblighi di incident notification con tempistiche allineate alla NIS2.
  • Condivisione di threat intelligence con CSIRT Italia: segnalare tempestivamente IoC e pattern d’attacco contribuisce alla difesa collettiva del sistema-Paese.

L’attacco di Salt Typhoon a IBM Italia non si misura soltanto dalla quantità di dati eventualmente esfiltrati, che resta a oggi non quantificabile. Il suo significato è strategico: conferma che la frontiera dell’attacco si è spostata sui fornitori unici di servizi pubblici, che i vettori d’ingresso più produttivi restano le appliance perimetrali con CVE pubblicate ma non corrette, e che la persistenza silenziosa — non il ransomware — è la firma delle operazioni che contano davvero.


Important Links in the Lead-Up to Our 2026 Pirate National Conference


May 9

We are now four weeks out from our June 6th-7th conference in Boston, MA. With our 2026 Pirate National Conference: […] Hoist the Colours and Spill the Tea (20 Years a Pirate!) quickly approaching, we wanted to point you in the direction of some links.

The first link is for the conference itself. If you’re looking to sign up and attend in Boston, head over to this link and register today!

If you cannot make it in person: no problem. Every year, we have an online attendance option for those that cannot physically be in Boston.

Second, we have our candidate nomination form. Think you know someone who can help the United States Pirate Party going into the midterms? The Pirate National Committee board will be electing a new slate of candidates during this year’s conference.

People are allowed to self-nominate, and it’s advised you mention as much when you submit the form, but note that nominating someone ≠ they are a nominee. Individuals will still be asked to accept or decline their nominations.

That link is here.

The second link will close within the next two weeks, so get those nominations in while you can!


uspirates.org/important-links-…

The Pirate Post ha ricondiviso questo.

Lesetipp fürs Wochenende: Ich habe Prof. Barbara Brandl zur sozialen Frage bei Digitalen Zahlungen interviewt.

Die Soziologin erklärt, welche Schichten die Kosten von Kreditkarten tragen und was wir vom Beispiel des brasilianischen Systems PIX für den Digitalen Euro lernen sollten.

Jetzt lesen bei @netzpolitik_feed

netzpolitik.org/2026/digitales…

The Pirate Post ha ricondiviso questo.

netzpolitik.org im Fit-Check: Nach mehr als neun Jahren im immer gleichen Outfit hat unsere Seite einen neuen Look. Warum musste das sein und was hat’s an Nerven gekostet? Darüber sprechen wir in der neuen Folge unseres Podcasts.

netzpolitik.org/2026/307-off-t…

The Pirate Post ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

💸 #LinkedIn suit les visites sur les pages de profil. Mais pour savoir qui a consulté son profil, il faut payer. Nous avons donc déposé une plainte contre l'entreprise et proposons qu'une amende lui soit infligée.

👉 Pour en lire plus: france24.com/fr/info-en-contin…

Questa voce è stata modificata (3 ore fa)

reshared this

The Pirate Post ha ricondiviso questo.

Auch wir haben nach einem Jahr schwarz-roter Bundesregierung Bilanz gezogen. Und was sollen wir sagen: Mit Blick auf Überwachung und Grundrechteabbau hat sie leider geliefert. Was wir in Zeiten multipler Dauerkrisen stattdessen bräuchten? Ein anderes Sicherheitsverständnis.

Unser Wochenrückblick:
netzpolitik.org/2026/kw-19-die…

The Pirate Post ha ricondiviso questo.

"Il più grande disastro nella storia della privacy dei dati degli studenti": l'attacco hacker a Canvas mostra il pericolo della tecnologia educativa centralizzata.


Giovedì pomeriggio, milioni di studenti di migliaia di università e scuole primarie e secondarie si sono visti bloccare l'accesso a Canvas, un software didattico onnicomprensivo che è diventato di fatto il fulcro di molti corsi. ShinyHunters, un gruppo di hacker specializzato in ransomware, ha violato i sistemi informatici della società madre di Canvas e, a quanto pare, ha rubato "miliardi" di messaggi e avuto accesso ai dati di oltre 275 milioni di persone . Il gruppo ha inoltre bloccato l'accesso a Canvas per gli studenti.

404media.co/the-biggest-studen…

@informatica

@scuola


'The Biggest Student Data Privacy Disaster in History': Canvas Hack Shows the Danger of Centralized EdTech


Thursday afternoon, millions of students at thousands of universities and K-12 schools were locked out of Canvas, a piece of catch-all education technology software that has become the de facto core of many classes. ShinyHunters, a ransomware group, hacked Canvas’s parent company and apparently stole “billions” of messages and accessed more than 275 million individuals’ data, according to the hacking group. The group also locked students out of Canvas.

Later Thursday, Instructure, which makes Canvas, was able to mostly put Canvas back online; it is not clear if the company paid a ransom or not. The breach demonstrates the danger in centralizing the educational and personal data of millions of students in a single service. Canvas is essentially a portal where teachers post assignments and lectures, have discussion boards, and students can message with each other and their teachers and connect with other pieces of education tech software.

Instructure noted on an incident update page that the stolen data includes “certain personal information of users at affected organizations. That includes names, email addresses, student ID numbers, and messages among Canvas users.” Instructure also noted that it was breached twice—once on April 29 and again on Thursday.

Soon after the hack, I called up Ian Linkletter, a digital librarian specializing in emerging education tech, to talk about the implications of the breach. Linkletter has worked in education tech for 20 years and over the last few years has become known for exposing privacy concerns in Proctorio, a remote test proctoring software that rose to prominence during the early days of the COVID-19 pandemic. Linkletter was sued by Proctorio but eventually the case was dropped.

Linkletter told me the Canvas hack is “the biggest student data privacy disaster in history” in part because of its scale and the sensitive nature of what was stolen. This is my conversation with Linkletter, which has been lightly condensed.

404 Media: What do we know about the hack so far?
Linkletter:
At about 1:20 PM [Pacific, Thursday], people started posting screenshots to Reddit of this breach message that they got. Some institutions were cautioning people to change their passwords if they were logged in, right now it just seems like people are in panic mode, some senior administration at schools are in meetings talking about whether they need to cancel finals next week. It’s just the implications are on everything because schools are reliant on this learning management system for everything—communications, grading, finals, everything.

In your email to me, you said you've worked in EdTech for 20 years and you said this is the biggest student data privacy disaster in history. I'm curious what sort of made you frame it that way.
I supported Blackboard [a similar piece of tech] way back in the day and I supported Canvas from about 2017 to 2022 when I worked at the University of British Columbia. And what I was there for when we switched to Canvas in 2017 was the shift from like these scrappy little self-hosted learning management system apps that would be on Canadian servers to this centralized, all eggs-in-one basket faith in a U.S. tech company. This idea that our data would be just as safe with them as it was when we had it. And because this move to the cloud happened so suddenly about 10 years ago, all of a sudden data got centralized. The only way that I can think of that this type of hack where everything went down, where so much was stolen would be if Instructure had access to everybody's data, which doesn't seem necessary. For it to be just so widespread across every customer is something that, like, [we’ve] never seen before.

Because the contents of messages got leaked, it’s really easy for phishing attacks to get customized. Like, Canvas got hacked [...] and continuing our conversation type of thing, you can get some really personal information from people. And that's also new.

I can also imagine messages between students and teachers to be pretty sensitive.
I supported instructors that used Canvas. And so I would hear these stories like, and they're on like the professor’s subreddit and stuff too, like students are telling you that people died [to explain absences]. There's personal circumstances, medical circumstances, accessibility accommodations, disputes, sexual assault allegations, like all sorts of stuff would be getting reported to the instructor using Canvas. If that information is out across hundreds of millions of people, there's a lot of harm that's going to happen.

What will you be kind of monitoring as this plays out?
My biggest concern right now is monitoring the institutional response. I feel very strongly that students should have been warned about this like days ago. And it just took this second hack where students got something in their face notifying them that really made schools respond. So I believe that students need to be warned or else they're going to get harmed. And the longer schools wait to tell students about what’s going on, even the little that they know, the more stress and chaos and potential risk to student privacy and safety is at stake.


Exposing Paramount’s press freedom sellout


The media in this post is not displayed to visitors. To view it, please log in.

Dear Friend of Press Freedom:

Billionaires have been hard at work trading away your right to get the news without government interference, but we’re working just as hard to fight back. Read on for the latest press freedom news and how you can join us in standing up for press freedom.

Exposing Paramount’s press freedom sellout


Between the gutting of CBS News and reports of promises to remake CNN to appease the president, it’s clear that Paramount Skydance CEO David Ellison and his father and financial backer, Larry Ellison, see press freedom as just another bargaining chip.

The public deserves to know if the Ellisons are trading editorial independence for regulatory favors. That’s why Freedom of the Press Foundation (FPF) and Reporters Without Borders filed a demand for records from Paramount Skydance, seeking to uncover the details of its dealings with the Trump administration as it tries to acquire Warner Bros. Discovery, and in its past acquisition of Paramount.

And as Seth Stern, chief of advocacy at FPF, explains, “If the Ellisons can’t stand up to their friends in the administration and defend the First Amendment, they should stay away from the news business.”


Investigating leaks, Kash Patel demands higher proof


FBI Director Kash Patel denies he’s been drunk on the job, but he’s certainly drunk on power.

The FBI has reportedly opened an investigation into Atlantic magazine journalist Sarah Fitzpatrick’s reporting on Patel’s alleged unexplained absences and drinking habits at the bureau. Patel is also reported to have ordered scores of staffers to be polygraphed as part of a panic-fueled leak hunt.

This is the second time in recent weeks we’ve learned that the FBI has baselessly investigated constitutionally protected, highly newsworthy reporting that was unfavorable to its director. The bureau’s actions “show complete disregard for the First Amendment and for the FBI’s supposed mission of stopping crime, not serving as PIs for its leadership on the taxpayer dime,” said FPF’s Stern.


Financial censorship of SPLC could impact the press next


Rainey Reitman, the president of FPF’s board, wrote for The Intercept about how financial institutions’ decision to cut off funds to the Southern Poverty Law Center after its widely criticized indictment could foreshadow attacks on others the administration dislikes, including the press.

“Given the Trump administration’s open hostility to journalism and its novel legal tactics to attack the press, it’s entirely possible that the next target of financial censorship could be a news outlet,” wrote Reitman, who recently released a book on financial censorship,“Transaction Denied: Big Finance’s Power to Punish Speech.”


Take action to modernize U.S. Virgin Islands public records laws


The U.S. Virgin Islands is the site of news of both local and national importance, from military facilities to “Epstein Island.” But the U.S. territory’s public records and open meetings laws are badly outdated.

Thankfully, investigative journalist and U.S. Virgin Islands native Shirley L. Smith is helping to spearhead a campaign to modernize the transparency laws. Use our action center to tell local lawmakers to move quickly to improve transparency and accountability in the U.S. Virgin Islands.


Join us to hear tips from former FOIA officials on how to still get public records


Former federal Freedom of Information Act officials will join FPF Daniel Ellsberg Chair on Government Secrecy Lauren Harper for a live webinar on Friday, May 15, at 2 p.m. ET to give practical advice for journalists on how to win documents from agencies and explain what to do when an agency prioritizes political interests over transparency.

Submit your questions ahead of time by emailing membership@freedom.press, and don’t forget to register to watch the webinar on May 15.


Silenced by the SEC


This week, legendary First Amendment lawyer Floyd Abrams and other experts joined FPF to talk about the dangers of Securities and Exchange Commission’s “gag rule,” which prohibits individuals who settle with the agency from disputing its allegations publicly. We discussed how the rule threatens First Amendment interests far beyond the financial sector, how such an unconstitutional prior restraint can persist for decades, and ongoing litigation seeking to strike down the rule.


What we're reading


Donald Trump is trying to change the rules about keeping records

National Public Radio
We need a court to affirm that presidential records are public property and categorically reject the radical idea that they’re personal property, FPF’s Harper explained on “1A.”


U.S. revokes visas of board members at Costa Rica’s top watchdog newspaper

The New York Times
The Trump administration is taking its weaponization of immigration laws against journalists worldwide, but it won’t stop there. If it could, it would exile any reporter who dares to investigate the president and his allies, no matter where they’re from.


Exclusive: Inmates describe being punished for speaking out about Ghislaine Maxwell

CNN
It’s great to see reporting on retaliation against incarcerated whistleblowers and news sources. But this kind of retaliation is certainly not limited to those who participate in reporting about Jeffrey Epstein’s accomplices — it should be covered regularly.


World’s most powerful are suing media outlets before stories are even published, says editor

The Guardian
Strong anti-SLAPP legislation in every state and at the federal level would go a long way in assuring news outlets that they can publish the truth without being bankrupted by frivolous lawsuits.


NYS agencies failing to make FOIL easier for public

Reinvent Albany
It’s absurd that in 2026, New York state agencies may still require public records appeals to be done via snail mail. FPF and other groups are urging state lawmakers to pass a new bill that would require agencies to accept electronic appeals.


A secret ICE directive is testing one of Florida’s strongest traditions: Open government

Florida Trib
“The fact the [ICE partnership] program is inherently tied to local communities and local policing, and ICE is giving local law enforcement a gag order, is a slap in the face of taxpayers and the public at large,” explained FPF’s Harper.


Media Matters secures complete and total victory against Federal Trade Commission

Media Matters for America
Further proof that going on offense against the Trump administration’s censorial bullying works. Take these clowns to court — they lose regularly!

Correction: An earlier version of the newsletter item discussing financial censorship referred incorrectly to the name of the Southern Poverty Law Center. The error has been corrected.

Flyer for FPF event with former FOIA officials


freedom.press/issues/exposing-…

The Pirate Post ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

CQRS senza MediatR: implementare Command e Query handler in .NET con il DI container
#tech
spcnet.it/cqrs-senza-mediatr-i…
@informatica


CQRS senza MediatR: implementare Command e Query handler in .NET con il DI container


Per anni, aprire un nuovo progetto .NET significava quasi automaticamente aggiungere una dipendenza: dotnet add package MediatR. La libreria di Jimmy Bogard è diventata così sinonimo di CQRS nell’ecosistema .NET che molti sviluppatori faticavano a distinguere il pattern dall’implementazione.

Poi MediatR è passato a una licenza commerciale. Ogni team che aveva costruito la propria architettura intorno ad essa si è trovato a fare la stessa domanda: abbiamo davvero bisogno di questa libreria?

Questo articolo non è una critica a MediatR né al suo autore — la libreria ha plasmato il modo in cui una generazione di sviluppatori .NET pensa agli handler, alle pipeline e alla separazione delle responsabilità. Il cambio di licenza è semplicemente un’opportunità per guardare cosa c’è sotto, e rendersi conto di quanto poco richieda realmente una libreria esterna.

Cos’è davvero CQRS


Command Query Responsibility Segregation ha due componenti fondamentali:

  • Commands: modificano lo stato. Hanno effetti collaterali. Possono restituire un risultato, ma il loro scopo primario è modificare il sistema.
  • Queries: leggono lo stato. Non hanno effetti collaterali. Restituiscono dati e nient’altro.

È tutto qui. Il dispatcher, gli handler, i pipeline behavior sono dettagli implementativi. Nessuno di essi richiede una libreria. Il DI container di .NET ha già tutto il necessario per implementare CQRS in modo pulito e testabile.

L’astrazione minima


Si parte con due famiglie di interfacce: una per i command, una per le query.

// Interfacce marker — esistono solo per il sistema di tipi
public interface ICommand { }
public interface ICommand<TResult> { }
public interface IQuery<TResult> { }

// Handler
public interface ICommandHandler<TCommand>
    where TCommand : ICommand
{
    Task HandleAsync(TCommand command, CancellationToken ct = default);
}

public interface ICommandHandler<TCommand, TResult>
    where TCommand : ICommand<TResult>
{
    Task<TResult> HandleAsync(TCommand command, CancellationToken ct = default);
}

public interface IQueryHandler<TQuery, TResult>
    where TQuery : IQuery<TResult>
{
    Task<TResult> HandleAsync(TQuery query, CancellationToken ct = default);
}


Cinque interfacce. Zero dipendenze esterne. Il compilatore verifica la relazione tra command, query e i relativi handler. Le interfacce marker ICommand e IQuery non sono decorazione: sono il contratto che rende sicuro il tipo nel dispatcher e nelle scansioni dell’assembly.

Un command e un handler concreti

public record CreateOrder(string CustomerEmail, List<OrderLine> Lines) 
    : ICommand<OrderId>;

public class CreateOrderHandler : ICommandHandler<CreateOrder, OrderId>
{
    private readonly IOrderRepository _orders;
    private readonly IEventBus _events;

    public CreateOrderHandler(IOrderRepository orders, IEventBus events)
    {
        _orders = orders;
        _events = events;
    }

    public async Task<OrderId> HandleAsync(CreateOrder command, CancellationToken ct = default)
    {
        var order = Order.Create(command.CustomerEmail, command.Lines);
        await _orders.SaveAsync(order, ct);
        await _events.PublishAsync(new OrderCreated(order.Id), ct);
        return order.Id;
    }
}


E una query:
public record GetOrderById(Guid OrderId) : IQuery<OrderDto?>;

public class GetOrderByIdHandler : IQueryHandler<GetOrderById, OrderDto?>
{
    private readonly IOrderReadModel _reads;

    public GetOrderByIdHandler(IOrderReadModel reads) => _reads = reads;

    public Task<OrderDto?> HandleAsync(GetOrderById query, CancellationToken ct = default)
        => _reads.GetByIdAsync(query.OrderId, ct);
}


Il Dispatcher


Il dispatcher risolve l’handler corretto per un dato command o query e lo invoca. Esiste affinché i chiamanti non debbano iniettare ogni handler individualmente: iniettano un unico dispatcher e inviano messaggi attraverso di esso.

public interface ICommandDispatcher
{
    Task SendAsync(ICommand command, CancellationToken ct = default);
    Task<TResult> SendAsync<TResult>(ICommand<TResult> command, CancellationToken ct = default);
}

public class CommandDispatcher : ICommandDispatcher
{
    private readonly IServiceProvider _provider;

    public CommandDispatcher(IServiceProvider provider) => _provider = provider;

    public Task SendAsync(ICommand command, CancellationToken ct = default)
    {
        var handlerType = typeof(ICommandHandler<>).MakeGenericType(command.GetType());
        dynamic handler = _provider.GetRequiredService(handlerType);
        return handler.HandleAsync((dynamic)command, ct);
    }

    public Task<TResult> SendAsync<TResult>(ICommand<TResult> command, CancellationToken ct = default)
    {
        var handlerType = typeof(ICommandHandler<,>)
            .MakeGenericType(command.GetType(), typeof(TResult));
        dynamic handler = _provider.GetRequiredService(handlerType);
        return handler.HandleAsync((dynamic)command, ct);
    }
}


Registrazione nel DI container


La registrazione automatica di tutti gli handler si fa con Scrutor (o manualmente per progetti piccoli):

services.AddScoped<ICommandDispatcher, CommandDispatcher>();
services.AddScoped<IQueryDispatcher, QueryDispatcher>();

// Con Scrutor: scansione automatica degli handler
services.Scan(scan => scan
    .FromAssemblyOf<CreateOrderHandler>()
    .AddClasses(c => c.AssignableTo(typeof(ICommandHandler<>)))
        .AsImplementedInterfaces()
        .WithScopedLifetime()
    .AddClasses(c => c.AssignableTo(typeof(ICommandHandler<,>)))
        .AsImplementedInterfaces()
        .WithScopedLifetime()
    .AddClasses(c => c.AssignableTo(typeof(IQueryHandler<,>)))
        .AsImplementedInterfaces()
        .WithScopedLifetime());


Pipeline behavior senza magia


Uno degli aspetti più apprezzati di MediatR è la pipeline dei behavior: logging, validazione, transazioni. Si replicano con il pattern Decorator, che il DI container di .NET supporta nativamente.

public class LoggingCommandHandlerDecorator<TCommand, TResult>
    : ICommandHandler<TCommand, TResult>
    where TCommand : ICommand<TResult>
{
    private readonly ICommandHandler<TCommand, TResult> _inner;
    private readonly ILogger _logger;

    public LoggingCommandHandlerDecorator(
        ICommandHandler<TCommand, TResult> inner,
        ILogger<LoggingCommandHandlerDecorator<TCommand, TResult>> logger)
    {
        _inner = inner;
        _logger = logger;
    }

    public async Task<TResult> HandleAsync(TCommand command, CancellationToken ct = default)
    {
        _logger.LogInformation("Executing {CommandType}", typeof(TCommand).Name);
        var result = await _inner.HandleAsync(command, ct);
        _logger.LogInformation("Completed {CommandType}", typeof(TCommand).Name);
        return result;
    }
}


Uso diretto nelle Minimal API


In contesti semplici o con Minimal API, il dispatcher può essere saltato del tutto: si inietta l’handler direttamente nell’endpoint.

app.MapPost("/orders", async (
    CreateOrder command,
    ICommandHandler<CreateOrder, OrderId> handler,
    CancellationToken ct) =>
{
    var id = await handler.HandleAsync(command, ct);
    return Results.Created($"/orders/{id}", id);
});


Questa scelta rende esplicita la dipendenza e semplifica i test dell’endpoint.

Errori comuni da evitare


CQRS non significa due database. Il pattern separa le responsabilità concettuali, non impone necessariamente read model separati o database distinti. Partire con un unico database va benissimo.

I command non contengono logica di business. Sono semplici DTO. La logica vive negli handler e nel domain model.

Gli handler non chiamano altri handler. Se un handler ha bisogno dei servizi di un altro, si estrae la logica comune in un servizio di dominio condiviso.

I command non sono DTO di input dell’API. Separare i modelli di input HTTP dai command protegge il core applicativo dai cambiamenti del contratto HTTP.

Quando MediatR ha ancora senso


Se il progetto usa già MediatR con licenza valida, non c’è fretta di migrare. Se si ha un’applicazione molto grande con decine di behavior cross-cutting complessi, MediatR offre un ecosistema di plugin testato. Per nuovi progetti o migrazioni obbligate, l’implementazione hand-rolled è spesso più semplice da capire e mantenere.

Conclusione


CQRS è un pattern di separazione concettuale, non una libreria. Il DI container di .NET fornisce tutto il necessario per implementarlo in modo pulito, testabile e privo di dipendenze esterne non necessarie. Il cambio di licenza di MediatR è stata l’occasione per molti team di riscoprire quanto poco codice ci voglia per ottenere gli stessi benefici architetturali.

Fonte: CQRS Without MediatR: Hand-Rolled Command and Query Handlers in .NET — Adrian Bailador


The Pirate Post ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

UAT-8302: China-Nexus APT Uses Custom Malware and Open-Source Tools to Steal Data From Government Agencies
#CyberSecurity
securebulletin.com/uat-8302-ch…
The Pirate Post ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Cyberspionaggio iranian-nexus contro l’Oman: 12 ministeri colpiti, 26.000 record esfiltrati, server C2 lasciato aperto negli Emirati
#CyberSecurity
insicurezzadigitale.com/cybers…


Cyberspionaggio iranian-nexus contro l’Oman: 12 ministeri colpiti, 26.000 record esfiltrati, server C2 lasciato aperto negli Emirati


Un server di staging lasciato in bella vista su internet ha permesso ai ricercatori di Hunt.io di ricostruire un’intera operazione di cyberspionaggio contro il governo dell’Oman. Dietro l’attacco si intravede la firma di un attore con nexus iraniano: 12 ministeri colpiti, oltre 26.000 record di cittadini esfiltrati, e un arsenale di strumenti personalizzati che punta direttamente al Ministero della Giustizia di Muscat.

Il server lasciato aperto: come è stata scoperta l’operazione


La maggior parte degli operatori offensivi ha cura di mantenere il proprio server di staging fuori dalla visibilità pubblica. Questo no. Il server all’indirizzo 172.86.76[.]127, un VPS RouterHosting con sede negli Emirati Arabi Uniti, è stato individuato dagli scanner AttackCapture di Hunt.io l’8 aprile 2026 sulla porta 8000, con una seconda directory esposta sulla porta 8002 catturata il 10 aprile. L’open directory conteneva in chiaro toolkit d’attacco, codice C2, session log, e dati esfiltrati — un errore operativo che ha aperto una finestra eccezionale sull’intera campagna.

L’IP risolve in un unico dominio: dubai-10.vaermb[.]com, registrato in maggio 2025 tramite NameSilo. Il pattern di naming suggerisce l’esistenza di infrastruttura aggiuntiva — un cluster denominato dubai-# sullo stesso ASN che ospita media iraniani della diaspora contraffatti e diversi domini .ir, fornendo un utile contesto geopolitico sull’operatore.

I bersagli: dodici entità governative omanite


La prima directory (porta 8000) rivelava la fase di ricognizione e initial access, con tentativi contro almeno quattro entità governative omanite. La seconda directory (porta 8002), con 211 file e 17 sottodirectory per un totale di 110 MB, rappresentava l’ambiente operativo del C2 — strutturato, organizzato per funzione, con cartelle dedicate per ogni obiettivo.

L’analisi degli script Python nella cartella /scripts/gov.om/ ha permesso di mappare i target all’interno dell’ecosistema governativo omanita:

  • Ministero della Giustizia e degli Affari Legali (mjla.gov.om) — Target primario, con webshell deployata su mersaltest.mjla.gov[.]om
  • Royal Oman Police — Portal eVisa (evisa.rop.gov.om): brute force su credenziali
  • Royal Fleet of Oman — Server mail (mail.rfo.gov.om): sfruttamento ProxyShell
  • Tax Authority of Oman — Server mail (email.taxoman.gov.om): sfruttamento ProxyShell
  • State Audit Institution — Piattaforma formativa SAILMS: brute force
  • Ulteriori ministeri inclusi: Autorità per l’Aviazione Civile, Ufficio del Pubblico Ministero, Ministero delle Finanze


La catena di attacco: webshell, ProxyShell e SQL escalation


L’accesso iniziale al Ministero della Giustizia è avvenuto con ogni probabilità sfruttando CVE-2025-32372, una vulnerabilità SSRF in DotNetNuke (DNN) nelle versioni precedenti alla 9.13.8 — il CMS su cui girano i portali ministeriali omaniti. Gli undici script Python dedicati al MJLA referenziano tutti in modo hardcoded la webshell health_check_t.aspx tramite il percorso /Portals/0/, la directory di storage predefinita di DNN.

La seconda webshell recuperata direttamente dal server C2, denominata hc2.aspx, è un classico web shell ASP.NET che accetta comandi tramite il parametro c ed esegue tramite cmd.exe, restituendo l’output come testo plain. In assenza di parametri, esegue automaticamente whoami /all && hostname && ipconfig — restituendo identità, hostname e configurazione di rete.

Contro i server Microsoft Exchange della Royal Fleet e della Tax Authority, gli operatori hanno utilizzato la catena ProxyShell (CVE-2021-34473, CVE-2021-34523, CVE-2021-31207). Per il pivot e l’escalation all’interno della rete MJLA, gli script evidenziano l’uso di tecniche di privilege escalation su SQL Server e di un payload a esecuzione riflessa (reflective execution variant).

Il README.txt trovato sul server C2 — denominato “VPS C2 – 172.86.76[.]127” — conteneva porte listener, template per reverse shell, comandi di esfiltrazione e path SCP che puntavano a /opt/c2/loot/. Questo documento suggerisce che il server UAE fosse solo uno dei nodi di un’infrastruttura più ampia non ancora identificata.

I dati esfiltrati: giustizia, identità e segreti di Stato


L’entità dell’esfiltrazione è significativa sia quantitativamente che qualitativamente. Dal Ministero della Giustizia sono stati estratti:

  • Oltre 26.000 record utente dall’applicazione DotNetNuke del MJLA, inclusi indirizzi email del personale e credenziali
  • Dati di casi giudiziari attivi e storici
  • Decisioni di commissioni governative e dati di certificazione di esperti
  • Hive del registro Windows (SAM e SYSTEM) — che contengono gli hash delle password di sistema, utilizzabili per ulteriori movimenti laterali

I session log presenti sul server C2 confermano sessioni operative attive fino al 10 aprile 2026, dimostrando che la compromissione era ancora in corso al momento della scoperta da parte di Hunt.io.

L’attribuzione: il nexus iraniano e la continuità delle operazioni


Hunt.io non attribuisce esplicitamente la campagna a un gruppo specifico, ma i marker sono coerenti con attori Iranian-nexus. Nel 2025, un gruppo allineato all’Iran e collegato al Ministero dell’Intelligence e della Sicurezza (MOIS) aveva compromesso una mailbox del Ministero degli Affari Esteri omanita a Parigi, utilizzandola come launchpad per inviare email di spear phishing ad ambasciate e organizzazioni internazionali nel mondo. La campagna attuale inverte il vettore: questa volta l’Oman non è la piattaforma di lancio, ma il bersaglio diretto, con focus specifico su dati giudiziari, sistemi di immigrazione e identità dei cittadini.

L’infrastruttura adiacente sullo stesso ASN — che ospita media iraniani della diaspora contraffatti e domini .ir — aggiunge contesto alla collocazione geopolitica dell’operatore. Il pattern di targeting (sistemi giudiziari, forze dell’ordine, finanze pubbliche) è coerente con le priorità di intelligence degli apparati statali iraniani nei confronti dei paesi del Golfo.

Due righe per i difensori


Il caso dell’Oman illustra due lezioni critiche per i team di difesa. Prima di tutto, la gestione dell’infrastruttura di staging è essa stessa una superficie di attacco: server di C2 male configurati possono esporre l’intera operazione e fornire preziosi indicatori ai difensori. In secondo luogo, la longevità delle vulnerabilità come ProxyShell — pubblicamente nota dal 2021 — dimostra che molte organizzazioni governative non dispongono di processi di patching adeguati per i sistemi esposti a internet.

Per le organizzazioni che operano in settori sensibili nei paesi del Golfo o che collaborano con entità governative omanite, si raccomanda di verificare immediatamente le versioni di DotNetNuke deployate, controllare la presenza di webshell nei path /Portals/0/ dei CMS DNN, e monitorare la comunicazione verso l’IP 172.86.76[.]127 e il dominio dubai-10.vaermb[.]com.

Indicatori di Compromissione (IoC)

# Iranian-Nexus Oman Government Intrusion - IoC
## Infrastructure
IP: 172.86.76[.]127 (RouterHosting VPS, UAE)
Domain: dubai-10.vaermb[.]com (registrato 2025-05-04, NameSilo)
Cluster: dubai-[N].vaermb[.]com (additional nodes suspected)
C2 path: /opt/c2/loot/
## Targets Compromised
mersaltest.mjla.gov[.]om (primary C2 access point, Ministry of Justice)
evisa.rop.gov[.]om (Royal Oman Police)
mail.rfo.gov[.]om (Royal Fleet of Oman)
email.taxoman.gov[.]om (Tax Authority of Oman)
sailms.gov[.]om (State Audit Institution)
## Webshells
health_check_t.aspx (deployed on MJLA DNN portal, /Portals/0/)
hc2.aspx (recovered from C2 server)
## C2 Files
c2_fixed.py
c2_fixed_v2.py
README.txt (infrastructure reference document)
proxyshell_01.sh
evisa_cookies.txt
## Vulnerabilities Exploited
CVE-2025-32372 - DotNetNuke SSRF (versions before 9.13.8)
CVE-2021-34473 - ProxyShell (Microsoft Exchange)
CVE-2021-34523 - ProxyShell (Microsoft Exchange)
CVE-2021-31207 - ProxyShell (Microsoft Exchange)
## Tunneling Tool
Chisel (encrypted tunnel through firewalls, components in /payloads)
## MITRE ATT&CK TTPs
T1190 - Exploit Public-Facing Application (DNN SSRF, ProxyShell)
T1505.003 - Web Shell
T1003.002 - OS Credential Dumping: SAM (registry hives SAM+SYSTEM)
T1059 - Command Scripting (Python scripts, cmd.exe via webshell)
T1083 - File and Directory Discovery
T1119 - Automated Collection
T1020 - Automated Exfiltration
## Last Active Session
April 10, 2026 (C2 log timestamps)

Finally: ABC is fighting back against FCC censorship


FOR IMMEDIATE RELEASE:

Washington, D.C., May 8, 2026 — ABC is accusing the Federal Communications Commission of violating the First Amendment and chilling press freedom, in a regulatory filing in its dispute with the FCC over whether “The View” is a bona fide news program exempt from the agency’s equal time requirement.

The following can be attributed to Freedom of the Press Foundation Chief of Advocacy Seth Stern:

“We commend ABC for standing up for itself and the First Amendment. The legal theories the FCC asserts against broadcast licensees are frivolous and unconstitutional, and FCC Chair Brendan Carr knows it, but he hopes broadcast licensees will nonetheless self-censor rather than pick a fight.

“It’s about time news outlets start telling Carr and his Donald Trump lapel pin to kick rocks. Otherwise, he’ll continue manufacturing bogus pretexts to harass and jawbone licensees that air content his boss doesn’t like. News outlets should be emboldened after seeing The New York Times, Media Matters, The Washington Post, and others go on offense against the administration in court and win. Carr won’t stop until a judge forces him to, and hopefully ABC plans to make that happen, both here and in Carr’s equally ridiculous retaliatory license renewal proceeding in response to comedian Jimmy Kimmel’s jokes.”

Please contact us if you would like further comment.


freedom.press/issues/fpf-comme…

The Pirate Post ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Do you remember the surprise announcement of a new social network in Davos this past January? Something that promised to be the "first" European social network?

Its name is #WSocial and it's a fork of #Bluesky. Its founders have ties with European politicians - but there is no official involvement by the EU.

You wouldn't know any of this from media reports because they all rehashed their talking points. So I wrote a post about it, dispelling some myths:

blog.elenarossini.com/w-social…

#OpenWashing


W Social uncovered: the reality behind the hype


In January my corner of the social web was abuzz with the surprising announcement at Davos of a new social network: W Social, which aspires to be an alternative to X, based in Europe, with "identity verification to fight disinformation." Its goal? To foster social sovereignty for European citizens, away from the control and influence of U.S. tech behemoths.

There was a lot of ambiguity surrounding the announcement with implications that this may be an initiative driven by European politicians. Was the European Commission involved? Would governments be funding a new social platform for European citizens that required ID verification? It was hard to tell.

Meanwhile, many European newspapers, blogs, radio and TV stations covered this announcement extensively, with great enthusiasm - day after day for what seemed like a full week. Most of the reporting seemed to be a simple rehashing of a press release.

It took me about 5 minutes of research to start uncovering some really surprising elements. The contrast between the media hype and the reality was so jarring, that I decided to start collecting evidence and share what I found in a blog post.

With my article today I aim to share the reality behind the hype, doing the work that journalists should have done at the beginning.

⚠️
Disclaimer:

This article represents my personal opinions, commentary, and conclusions formed through independent research using publicly available sources. Any characterizations, interpretations, or inferences are presented as opinion, not as statements of objective fact. Readers are encouraged to review the referenced materials and draw their own conclusions.

Why should YOU care?


World events from the past two years have pushed a lot of European leaders to start reassessing Europe's dependence on American tech infrastructure.

European politicians and policy experts have started holding meetings to discuss "Trusted European Platforms (TEPs) to strengthen Europe’s strategic autonomy." W Social is being mentioned in these discussions:

Sovereign Democracy & Trusted European Platforms: starting!
Sovereign Democracy & Trusted European Platforms: starting!
Stars4MediaStars4Media Project


I understand that doing due diligence requires time and technical expertise.

I would like to collect in this post all the evidence I found of why I personally don't think W Social is a solution for Europe’s digital sovereignty.

If anything, we should exercise critical thinking, follow the money and analyze who has control over social media platforms. It is no coincidence that tech oligarchs in the U.S. have been on a media purchasing spree, scooping up newspapers, TV stations and social media networks - especially in the past 4 years. Controlling the flow of information is a potent thing - and we should be very careful of whom we give that power to.

A word from the author


Before we get started, why should you listen to me?

Well, I have been very active on decentralized social networks for four years now, championing these online spaces over centralized offerings by Big Tech platforms.

I have been invited to speak about my views and experiences at Journées du Logiciel Libre in Lyon, PublicSpaces in Amsterdam, Berlin Fediverse Day, Social Media Strategies in Bologna and this past month I gave a talk at the Ministry of Culture in Paris and delivered the opening keynote at 2MR in Hamburg.
a photo of me on stage at Social Media Strategies in Bologna, Italy - next to Niccolò Venerandi and morloi
In addition to my advocacy, I have been self-hosting my own social media platforms (GoToSocial, PeerTube and Pixelfed instances) and I’ve set up essential services like NextCloud… purposefully using domain name registrars, web and VPS hosting companies based in Europe.

The topics of open social networks, FOSS alternatives to Big Tech platforms and European cloud infrastructure are my bread and butter.

I have been alarmed by the hype around the launch of W Social and all the inaccuracies in news reports. Thus my speaking up.

Issue no.1: How W Social ignored existing European initiatives


People in my circles discussed the announcement of W Social with disbelief and a touch of anger. At launch, the official website of W Social showcased a world map, with icons of American tech platforms (Bluesky, Facebook, Instagram, LinkedIn, Reddit, Snapchat, TikTok US, Whatsapp, X and YouTube) superimposed over the map of the United States; then over Russia you can see the logos of OK and Vkontakte, over China there is QQ, TikTok, WeChat and Weibo, and over India there is ShareChat. A circle is drawn around Europe... but there are no icons inside. The message: W Social is here to fill that void and provide a European social network.
a world map, with icons of American tech platforms (Bluesky, Facebook, Instagram, LinkedIn, Reddit, Snapchat, TikTok US, Whatsapp, X and YouTube) superimposed over the map of the United States; then over Russia you can see the logos of OK and Vkontakte, over China there is QQ, TikTok, WeChat and Weibo, and over India there is ShareChat. A circle is drawn around Europe... but there are no icons inside.a screenshot of the initial landing page for W Social on January 21st 2026
This provoked the ire of many of my friends and fellow Fediverse netizens - because decentralized social media platforms like Mastodon and PeerTube originated in Europe; the Fediverse has over 12 million users. Omitting this felt like a strange choice. Even the European Commission has an active Mastodon account: on their own server, with over 154,000 followers!

European Commission (@EUCommission@ec.social-network.europa.eu)
3.58K Posts, 10 Following, 154K Followers · News and information from the European Commission. A project to foster our presence in the fediverse and support our commitment to European social media platforms based on open source technology. 🇪🇺 Official Mastodon account as verified by the official EU domain in our server’s address (
https://europa.eu).
European Commission on Mastodon


While most people focused their frustration on that omission, I thought of something else entirely: for months I had been hearing about the development of Eurosky, based on Bluesky's ATproto.

A mission statement, from Eurosky's website (a note: I grabbed this text in January and the page has since changed. But you can see the original courtesy of the Internet Archive):

Eurosky is building the future of social media - open, pluralistic, and made in Europe. We believe social media should serve our economies and societies, not monopolies. Eurosky is a public-interest infrastructure project that puts control in the hands of users, businesses, and European society. By combining European cloud infrastructure with open standards and democratic governance, we’re creating a new ecosystem where innovation thrives, moderation is transparent, and no single company or country can dictate the rules.


a screenshot of Eurosky's website from late January 2026. there is an announcement bar at the top saying that eurosky.social accounts would be launching in January 2026... and below text that says: "the next era of social media: built and run in Europe, ruled by our laws."a screenshot of Eurosky's website from late January 2026
By reading articles about W Social, you could easily think journalists were discussing Eurosky. The two platforms are so eerily similar in their stated goals, that when I heard that a new European social platform was launching to rival X, when I read it was called "W Social" my first thought was that Eurosky must have rebranded and changed its name. After all, it was supposed to launch in January 2026 and the announcement of W Social was made in Davos on January 20th 2026.

Oh no. They are two completely different initiatives.

Here is what Robin Berjon - one of the architects of Eurosky - had to say about W Social:
a screenshot of a Bluesky post by Robin Berjon in response to the map on W Social's homepage. Berjon's message reads: "It's also *deliberately* disingenuous because we did explain AT and Eurosky at great length to their primary funder. If I were launching a social media about truth and verification I'd, like, try not to lie but that's just me. Anyway, some of us have work to do."a screenshot of a post by Robin Berjon of Eurosky
While the two initiatives share similar goals, their execution could not be more different.

Eurosky has been slowly and carefully planned out, online and behind the scenes. Its website is sleek and professional, with extensive information explaining what the project is about, team bios, a timeline of objectives. When French and German political leaders met in Berlin in November 2025 at the Summit on European Digital Sovereignty to discuss European tech sovereignty plans, Eurosky team members organized their own conference in Berlin as a "side event", in order to show policy makers what they were working on. This is a very well prepared team of experts.

By contrast, if you visited the website of W Social on its launch day, all you had was a rudimentary landing page with a map of Europe and the invitation to enter an invite code. Any 14-year-old with an hour to spare and a free Canva account could have designed something more professional looking.

Now the page has been updated with a slightly sleeker design for its landing page but it is still lacking any content (as of May 7th, 2026):
the landing page of W social on May 7, 2026. It has a large W social logo, the tagline "trust your feed" and some text below over a dark blue background faintly showing a world mapthe landing page of W social on May 7, 2026
W Social's announcement at Davos felt very rushed, with minimal preparation just to get the word out there about their plans and get a leg up in the news cycle about European platforms as alternatives to Big Tech offerings from Silicon Valley.

With work on Eurosky being well under way (they eventually opened migrations to their server from Bluesky in February), I kept wondering: "Why? What is the point of W Social, another European fork of Bluesky?" And then everything clicked: maybe W Social is banking on mandatory age verification for European users in order to use social media. This could be their "leg up" over Eurosky: the need for an official government ID to open an account and use it.

Issue no.2: W Social's bungled attempt to conceal they are using Bluesky's AT Protocol


How will W Social work? Which technology will it employ to power its revolutionary European social network?

You would think journalists would ask these questions.

Sadly, that wasn't the case.

Online sleuths discovered the page stage.wsocial.eu that revealed WSocial is none other than a fork of Bluesky, thus based on ATProto.

Developers typically test out platforms on a staging website before launching or going in production... the staging page for W Social was exactly like the Bluesky login page. If you clicked on the "x" to close that preview window, you would see a Bluesky feed:


screenshots putting the landing page of Bluesky and the staging page for W Social side by side...
a screenshot of W social's early feed from the staging page. basically a Bluesky feed
That page was active for a few days: if you shared a link to it from Signal for example - like I did - you would see a preview card with the Bluesky logo. So much for calling out Bluesky and conflating it with other Big Tech offerings by Meta and ByteDance.
a screenshot showing the link to stage.wsocial.eu that I shared in a message on Signal. a preview card appears with the Bluesky logo
Additional proof: the URL dev-pds.wsocial.eu which showed the ATproto logo and stated "this is an AT Protocol Personal Data Server" (the two URLs have since been migrated):
a screenshot showing a browser window visiting the address dev-pds.wsocial.eu and showing the atproto logo and the message "This is an AT Protocol Personal Data Server with links to the code on GitHub
This Scooby-Doo unmasking meme shared by DoktorZjivago on Mastodon is a perfect illustration for this:
the screenshot of a toot by DoktorZjivago on Mastodon showing the Scooby-Doo reveal: someone with a mask has the W social logo on their face... when the mask is taken off you can see a Bluesky logo underneath
I'm guessing that after catching some flack online – regarding their high aspirations of having a European tech stack but picking the American Bluesky and their protocol – someone in charge of W Social commanded that their staging website scrap all evidence of ATproto.

So the stage.wsocial.eu webpage a few days after the official announcement looked like this:
a screenshot showing the new stage.wsocial.eu webpage, with a simple login window that asks for a username and password

Issue no.3: W Social's cavalier attitude towards online security


Did you notice anything wrong in the previous screenshot?

Well, the operation scrapping of all Bluesky branding resulted in the loss of the page's SSL certificate.

This is a LOGIN page into their system.

Why is it bad? Well, when you type a password into a webpage that doesn't have a working SSL certificate, the connection between your browser and the website is unencrypted. That means the password travels as plain text across the Internet.

Did I mention that W Social's value proposition is verified identity and they will require a government ID to create an account? They are asking for your most sensitive data... and yet have a cavalier attitude towards security.

On announcement week, Tom Casavant shared these messages on Bluesky about W Social and its dev-pds.wsocial.eu page (I'm sharing this with Tom's permission):
A screenshot of an exchange on Bluesky between Tom Casavant and another user. Tom: Got access to something I very much probably definitely shouldn't have access to via one of those links on accident User: sounds fun. Tom: I figured I had already said too much and didn't want to say anything else before I was able to contact them and get it fixed haha. Their Kubernetes management software had Github SSO, but didn't lock it down to a single github org, so I had access to everything.
How bad is this?

Potentially catastrophic if the wrong person could so easily gain access into their system.

Am I theorizing about things that may never happen? Sure. But we should all be very careful about the organizations we trust with our most sensitive data. A few months ago a Discord data breach exposed the government IDs of 70,000 users:

Discord Data Breach - 1.5 TB of Data and 2 Million Government ID Photos Extorted
Discord has confirmed a significant data breach that exposed sensitive user information after an attacker compromised a third-party customer service provider.
CybersecurityNewsGuru Baran


Now, I have heard through the grapevines (and read confirmation in the press - more on this later) that W Social hired a team of software engineers and now have more than 20 employees, so I think they are taking things more seriously. Still, their early blunders were really shocking to me.

Issue no.4: the founders or: who are we trusting with our communications?


W Social is being built by a Swedish company called W Social AB, which is a subsidiary of We Don't Have Time, a climate-focused media platform. The W Social project is led by Anna Zeiter, a Swiss privacy expert who previously served as Chief Privacy Officer at eBay for more than a decade; she holds a PhD in law from the University of Hamburg. Not the typical background for a tech founder.
a screenshot showing Anna Zeiter's profile photo on Bluesky: a middle-aged white blonde woman wearing a white turtleneck. Her username is @anna.wsocial.eu. She has 367 followers and describes herself as CEO of W, Board Member, Professor, Sailor, Skier, Flutist and Abstract Artista screenshot of Anna Zeiter's profile as it appears on Bluesky
According to an article on Impact Loop, W Social received 2.5 million Euros in funding and has a team of 25 people. Its board of advisors includes very powerful, well-connected people in the world of business and politics, including Cristina Caffarra (chair of EuroStack), Elizabeth Denham (former UK Information Commissioner), Sandrine Dixson-Declève (Honorary President of the Club of Rome), Yariv Adan (former Head of AI at Google), Pär Nuder (former Swedish Minister of Finance), Marc Placzek (former CPO at PayPal) and Philipp Rösler (former German vice-chancellor).

At Davos, Zeiter was interviewed during a We Don't Have Time segment and had a chance to talk about her intentions for the platform - the video was posted on X, but I am using the alternate site nitter.net to display it (so you won't need an X account to see it):
a screenshot of a post on X (shown on Nitter) about Zeiter's interview
Direct link: nitter.net/WeDontHaveTime/stat…

Zeiter said:

Everything is data-driven. Ten years ago we said 'data is the new oil', right now we say 'high quality data is the new oil.' And this is what we are seeing, that competitors in the U.S. and China are using a lot of personal data to analyze, to target... and also sometimes to manipulate users. We want to be different in that respect. Of course, we want to respect GDPR and other European laws because we are run, built and governed in Europe and we would also like to give back to the users. We like to give for example, the face identification process, we want to make sure that users can govern their own data and also their own algorithms, so that users can really choose: "do I want to stay in my filter bubble?" or "do I want to see a little bit more of what is going on in society?" or "do I want to have the full spectrum?"


This is their pitch: a social media platform with a pick-your-own algorithm, that requires government ID to sign up.

What I take issue with here is the sentence "we are run, built and governed in Europe." Why hide that they are using the ATproto infrastructure to operate? Theirs is not a novel, completely original, built from the ground up platform. It is based on Bluesky's ATproto. And yet, this protocol has never been mentioned in any interviews.

Software engineer Maho Pacheco theorized:

I have strong suspicions about why W selected ATproto instead of Activity Pub. Basically there is more power in the biggest actors, a more "centralized" control, to ban/shadow-ban/censure and pull the plug. In other words it is more impactful when Bluesky sidebanned someone or some community than if mastodon.social would do it. The firehose/relay is a the biggest point of control. So in my opinion it is more interesting for investors to create a platform that can be controlled, even if it is just to introduce ads or control the discourse. Technically is because setting-up/supporting/maintaining the firehose/relay layer is very expensive. Every single message would flow through there; creating the biggest firehose in Europe is such a power. So, it is easier to be controlled, and very unlikely to be replicated by other entities.


Issue no. 5: lack of transparency


Following their surprise announcement at Davos, there were dozens of news reports in newspapers, radio shows and TV news shows about this "new European network that will replace X" - with strong implications that it may be an official initiative by the European Union.
a screenshot showing articles about W Social on Google News
This went on for TEN DAYS - with zero fact checking by media organizations or corrections by the W Social founders.

The first news organization to fact check and debunk the myth of official involvement by the European Union was Euronews. In a segment for The Cube (which you could watch here), journalist James Thomas said:

Claims are spreading online like wildfire that the European Union is setting up its own social media platform to rival X. These posts have spread primarily on X itself, with thousands of views and say that taxpayers money will be used to set up W as an alternative to Elon Musk's platform. Some posts describe it as a state-run censorship platform that has receive funding from the European executive, but these claims are misleading. A European Commission spokesperson told The Cube that the EU is not launching, funding or operating any social media platform. There is no European-backed projected called "W".


This came ten days too late, with dozens of news reports legitimizing W as an official European alternative to X.

Let's do some role-playing here: if I were to launch a privately funded project that received extensive media coverage in newspapers, on the radio and TV, but with reports wrongly claiming that the government was behind it... well, the first thing I would do would be to contact journalists to rectify the mistake. I may even put text on my website to correct the assumptions.

W did not do that. I will always remember their silence on this.

I am not sure I can fully trust an initiative that lacked clarity and honesty on two crucial points:

  • hiding that they are a fork of Bluesky;
  • not correcting wrong claims about their origins, letting people believe that they are part of a European Union initiative - whereas in reality they are a private venture, funded by private investors.

And then there is the thorny issue of their required ID verification, the erosion of privacy and the end of internet anonymity. Em wrote an excellent article pointing out the problems with age verification laws for social media users - it is a must read and covers many of the reasons why government IDs to use social media is a very bad idea:

Age Verification Wants Your Face, and Your Privacy
Age verification laws forcing platforms to restrict access to content online have been multiplying in recent years. The problem is, implementing such measure necessarily requires identifying each user accessing this content, one way or another. This is bad news for your privacy.
Privacy GuidesEm


The Electronic Frontier Foundation also has a superb piece about this topic:

10 (Not So) Hidden Dangers of Age Verification
It’s nearly the end of 2025, and half of the US and the UK now require you to upload your ID or scan your face to watch “sexual content.” A handful of states and Australia now have various requirements to verify your age before you can create a social media account.Age-verification laws may sound…
Electronic Frontier FoundationRindala Alajaji

Final Thoughts


I have a lot more to say about this but I realize that in this post-literate era I have already written a very long post that will take time to read and fully digest. I will stop here - for now. W Social is set to launch tomorrow May 9th on Europe Day. As it happened when it was first announced in January, it is likely to receive a lot of uncritical, superficial press coverage. Please exercise critical thinking and try to look at the reality behind its hype. And if you are not familiar with open social networks, please take a look at a better option: the Fediverse.

Thanks for being here,

Elena
a hand-written note by me that reads: "written by a human" followed by a drawn heart


💓 Did you enjoy this post? Share it with a friend!
👫 Follow me on Mastodon. All my other links are available here: elena.social
💌 If you'd like to say hi, my contact information is here
✏️ If this post resonated with you, leave a comment!


in reply to Elena Rossini ⁂

I really appreciate that you also take a look at Eurosky. I think that the people from Eurosky are doing it right. Although I had preferred if the Fediverse was in the focus, I do understand their decision to have chosen the Atmosphere instead. I would love to have not only European PDS and European relay servers but also an European AppView.
in reply to Elena Rossini ⁂

Some relevant updates.

Between March 26 and 29, we had the AtmosphereConf in Vancouver. People from W Social and Eurosky were there, and they even did presentations.
I feel like W Social relationship with Atproto devs is more amicable now, compared to their first impression, which wasn't that good.
During the conference, Eurosky announced they will take the infrastructure path, not building a social media themselves, but instead offering the infrastructure for European builders (for both atproto and activity pub btw).

Eurosky presentation: atmosphereconf.org/event/ja4oo…

W Social lightning talk: atmosphereconf.org/event/000WS…

Both links have video recording available bellow the description.

The Pirate Post ha ricondiviso questo.

Chiamatelo Dooh Nibor. Il sistema del welfare keniano gestito da una intelligenza artificiale che premia I ricchi e penalizza i pezzenti

Un'indagine condotta da Lighthouse Reports svela come un algoritmo introdotto dal governo keniota stia causando un sistematico sovrapprezzo per l'assistenza sanitaria a danno dei cittadini kenioti a basso reddito

sha.africauncensored.online/

@aitech

in reply to informapirata ⁂

onestamente non ho capito cosa abbia il sistema di "intelligenza artificiale". Sembra che l'effetto delle varie variabili sia deterministico (sbagliato, ma deterministico).
Dunque non è AI "stocastica", che è quella di cui tutti parlano oggi.
La politica si nasconde dietro modelli imperfetti da sempre (i calcoli dei contributi previdenziali, dell'età pensionabile etc...)... Ma non li abbiamo mai chiamati AI.

Intelligenza Artificiale reshared this.

The Pirate Post ha ricondiviso questo.

Der Messenger Signal reagiert auf die umfangreiche Phishing-Kampagne mit Änderungen in der App. Derweil wird die Dimension der Attacke deutlicher: Schon im Januar waren fast 14.000 Accounts gezielt angeschrieben worden.

netzpolitik.org/2026/attacke-a…

in reply to netzpolitik.org

Yeah, noch mehr Warnhinweise, noch mehr Klicks. 🥳

Das wird uns retten. Nicht. Ich nehme da nur als Referenz meine Banking-App, bei der ich bei jeder Aktion meine pin neu eintippen darf. Die Meldungen dazu lese ich schon lange nicht mehr. Und das macht es Dritten auch leichter, diepin mitzulesen, wenn die 5x eingegeben wird.

Ich sagte schon in den frühen 2000ern: Wer keine Ahnung von Computern hat, sollte damit nicht umgehen. Inzwischen sehe ich das in vielen Bereichen ähnlich: wer nicht Auto fahren kann, sollte es nicht tun - statt dass alle anderen unter der Unfähigkeit weniger Personen leiden müssen.

Gilt mMn auch für Managementsysteme in Unternehmen (27001, 9001, ...).

Wir sind da gesamtgesellschaftlich irgendwo falsch abgebogen.

1/2

Should Digital Safety Be A Matter of Design Or Left to Settings?


The media in this post is not displayed to visitors. To view it, please log in.


A client tries to take a screenshot of a banking app but gets stopped by a security warning. This feature is meant to keep sensitive financial information safe.

On the other hand, social media platforms like Instagram and Facebook are built for sharing and connecting. Unless users set up privacy filters themselves, these platforms often allow wide access to user data. This makes users more vulnerable to cyber threats.

What do these two situations have in common? Both are using more artificial intelligence, but they still work very differently. The main difference might be about intent, responsibility, or control.

If technology can strongly protect users in one area, why does it seem so open in another?

A key question is whether artificial intelligence can be built with strong ethical limits that protect user data from the start, rather than adding them later.

Is security truly built into systems, or quietly shifted onto users?


Today, the gap between technology and users has narrowed significantly. Thanks to artificial intelligence, digital tools are easier to use, and convenience is now expected.

But as things get more convenient, systems also become more complicated. This added complexity brings more security concerns. Security is often promoted as a feature, set up, and managed, but it is not always guaranteed. Tools like privacy settings, consent forms, and reporting options help protect users, but only if people know how to use them.

This leads to another question: are users truly protected by design, or are they just expected to protect themselves?

Can AI be trained at the design level itself?


As security worries grow, artificial intelligence is playing a bigger role in defending against cyber threats. Verification and compliance processes are changing quickly. Many modern systems now use AI to spot unusual activity, find suspicious behavior, and automate protection.

Research on Ethics-by-Design shows that values such as privacy, accountability, and fairness can be built into AI systems during development rather than added later.

Similarly, the field of AI alignment focuses on training systems to adhere to standards. In the same way, AI alignment is about training systems to follow human values and avoid causing harm. But research shows that these systems still struggle to fully understand complex human intentions. It continues to rest primarily with users. Systems may verify user identity, but they do not consistently account for user or third-party intent. While it may be argued that exploration entails consequences, it is necessary to consider whether such consequences should be severe enough to cause lasting harm to the user experience.

This raises a deeper question: can artificial intelligence be designed from the start to detect and address harmful or illegal intent or predict possible misuse? Can the focus of security measures be shifted towards the perpetrators’ perspective to prevent mishaps, rather than just protecting victims after the act?

This is not just a theoretical issue. Studies on AI misuse show that people can get around safeguards by using carefully worded prompts that hide harmful intentions. Large studies of real-world prompts show how easily these protections can be bypassed.

This highlights a big problem: while today’s AI systems are good at spotting patterns, they are much less reliable at understanding intent, especially when it is hidden or subtle.

Work has already been initiated to tackle these challenges. One growing area in AI safety is ‘red teaming,’ where systems are tested against simulated attackers before release to identify weaknesses.

This shows a move toward proactive design, where risks are anticipated and planned for rather than fixed after the fact. Methods like modular oversight aim to keep AI systems ethical throughout their whole life, not just treat safety as an afterthought.

These discussions are no longer limited to research labs or cybersecurity circles. They are increasingly becoming part of broader public and policy conversations around digital freedom, governance, and accountability.

One such platform is the upcoming Think Twice Conference, which will bring together policymakers, technologists, researchers, and civil society voices to examine the relationship between artificial intelligence, governance, and digital rights. The conference itself revolves around questions that closely mirror the concerns raised here: how can AI strengthen governance while protecting digital freedom, and how can digital freedom shape the governance of AI?

In many ways, the growing relevance of such forums reflects a broader reality: the conversation around AI safety is no longer just about innovation, but about the kind of digital society we are collectively designing.

Still, most systems today operate reactively, as seen in cybersecurity. They respond to misuse or breaches rather than preventing them before they occur.

For instance, the recent debate over age-verification laws clearly reflects this tension. Governments and digital platforms are increasingly exploring AI-backed age estimation and biometric verification systems to prevent minors from accessing harmful online spaces. Supporters believe that such systems represent a proactive step toward digital safety. Critics, however, argue that these measures would normalize surveillance, expand data collection, and create new privacy risks.

This debate highlights another underlying layer of the issue: can systems designed to prevent harm do so without compromising the very freedoms and privacy they are meant to protect?

Most modern systems focus on helping victims. They protect data after it has been exposed, fix problems after misuse occurs, and add filters only after harm has occurred. Hence, the loop of damage and repair continues.

Since misuse is not just possible but often expected, we need to ask whether systems should continue to be designed this way.

Until we solve this, ethical artificial intelligence might be judged more by the threats it misses than by the ones it stops. At this point, the idea may seem hypothetical or even unreasonable. But the history of innovation has repeatedly shown that solutions often emerge from perspectives, questions, and ideas that once seemed far-fetched. After all, isn’t that how progress begins?”

********************************************************************************************

When you come to think of it…


We are perhaps at a juncture where conversations about AI ethics, transparency, fairness, governance, AI regulation, and digital freedom matter more than ever.

As mentioned before, spaces such as the upcoming Think Twice Conference seek to bring these questions into public dialogue, bringing together diverse ideas to debate how digital systems should evolve in the years ahead.

If these questions resonate with you, perhaps it is worth saving the date or even contributing your own perspective to the discussion.

More information about the conference and speaker submissions can be found here:

Think Twice Conference – Call for Speakers


europeanpirates.eu/should-digi…

The Pirate Post ha ricondiviso questo.

Ich freu mich ja immer sehr, wenn ich Menschen kennenlerne, die gegen die KI-Überwachungspläne in der aktuellen Polizeigesetzwelle aufbegehren. Los ging es mit @ThuerPAG_stoppen , inzwischen habe ich einige gefunden, die in ihren Bundesländern – und zum Teil auch deutschlandweit – gegen die Dystopie agitieren, die da auf uns zurollt. Guckt doch mal rein, ob in eurer Nähe was dabei ist. Und falls was fehlt oder ihr selbst irgendwie aktiv werdet, sagt gern Bescheid!
netzpolitik.org/2026/widerstan…
The Pirate Post ha ricondiviso questo.

Verhaltensscanner, Gesichtserkennung, Datenanalyse: Immer mehr Bundesländer rüsten mit KI-Überwachung auf. Bislang lief das weitgehend geräuschlos. Jetzt regt sich Widerstand. netzpolitik.org/2026/widerstan…