Salta al contenuto principale

Cybersecurity & cyberwarfare ha ricondiviso questo.


X ha introdotto nuove restrizioni che, in alcune località, impediscono di generare, con il chatbot di intelligenza artificiale Grok, immagini sessualizzate di persone reali a loro insaputa.
wired.com/story/elon-musks-gro…

L'app autonoma di Grok continua, tuttavia, a permettere la rimozione digitale degli indumenti.
washingtonpost.com/technology/…


Cybersecurity & cyberwarfare ha ricondiviso questo.


Scoperto VoidLink: il “super malware” per Linux che prende di mira cloud e container

📌 Link all'articolo : redhotcyber.com/post/scoperto-…

#redhotcyber #news #cybersecurity #hacking #malware #linux #sicurezzainformatica #voidlink

reshared this


Cybersecurity & cyberwarfare ha ricondiviso questo.


Addio a Windows Server 2008! Microsoft termina definitivamente il supporto

📌 Link all'articolo : redhotcyber.com/post/addio-a-w…

#redhotcyber #news #windowsserver2008 #supportoterminato #microsoft #windowsvista



Is the Theory of Special Relativity Wrong?


A red-and-blue image of a nebula is shown, shaped somewhat like an eye, with a plume of gas emitting from the center.

There’s an adage coined by [Ian Betteridge] that any headline ending in a question mark can be answered by the word “No”. However, Lorentz invariance – the theory that the same rules of physics apply in the same way in all frames of reference, and an essential component of special relativity – has been questioned for some time by researchers trying to unify general relativity and quantum field theory into a theory of quantum gravity. Many theories of quantum gravity break Lorentz invariance by giving photons with different energy levels very slightly different speeds of light – a prediction which now looks less likely since researchers recently analyzed gamma ray data from pulsed astronomical sources, and found no evidence of speed variation (open-access paper).

The researchers specifically looked for the invariance violations predicted by the Standard-Model Extension (SME), an effective field theory that unifies special relativity with the Standard Model. The variations in light speed which it predicts are too small to measure directly, so instead, the researchers analyzed gamma ray flare data collected from pulsars, active galactic nuclei, and gamma-ray bursts (only sources that emitted gamma rays in simultaneous pulses could be used). Over such great distances as these photons had traveled, even slight differences in speed between photons with different energy levels should have added up to a detectable delay between photons, but none was found.

This work doesn’t disprove the SME, but it does place stricter bounds on the Lorentz invariance violations it allows, about one and a half orders of magnitude stricter than those previously found. This study also provides a method for new experimental data to be more easily integrated into the SME. Fair warning to anyone reading the paper: the authors call their work “straightforward,” from which we can only conclude that the word takes on a new meaning after a few years studying mathematics.

If you want to catch up on relativity and Lorentz invariance, check out this quick refresher, or this somewhat mind-bending explanation. For an amateur, it’s easier to prove general relativity than special relativity.


Top image: Crab Pulsar, one of the gamma ray sources analysed. (Credit: J. Hester et al., NASA/HST/ASU/J)


hackaday.com/2026/01/15/is-the…



Project Fail: Cracking a Laptop BIOS Password Using AI


Whenever you buy used computers there is a risk that they come with unpleasant surprises that are not of the insect variant. From Apple hardware that is iCloud-locked with the original owner MIA to PCs that have BIOS passwords, some of these are more severe than others. In the case of BIOS passwords, these tend to be more of an annoyance that’s easily fixed by clearing the CMOS memory, but this isn’t always the case as [Casey Bralla] found with a former student-issued HP ProBook laptop purchased off Facebook Marketplace.

Maybe it’s because HP figured that locking down access to the BIOS is essential on systems that find their way into the hands of bored and enterprising students, but these laptops write the encrypted password and associated settings to a separate Flash memory. Although a master key purportedly exists, HP’s policy here is to replace the system board. Further, while there are some recovery options that do not involve reflashing this Flash memory, they require answers to recovery questions.

This led [Casey] to try brute-force cracking, starting with a Rust-based project on GitHub that promised much but failed to even build. Undeterred, he tasked the Claude AI to write a Python script to do the brute-forcing via the Windows-based HP BIOS utility. The chatbot was also asked to generate multiple lists of unique passwords to try that might be candidates based on some human guesses.

Six months later of near-continuous attempts at nine seconds per try, this method failed to produce a hit, but at least the laptop can still be used, just without BIOS access. This may require [Casey] to work up the courage to do some hardware hacking and erase that pesky UEFI BIOS administrator password, proving at least that apparently it’s fairly good BIOS security.


hackaday.com/2026/01/15/projec…


Cybersecurity & cyberwarfare ha ricondiviso questo.


Qualche idea per sopravvivere al divorzio transatlantico. Conversazione con Giuliano Da Empoli

“quelli che chiamo predatori digitali e predatori politici, i proprietari delle grandi aziende digitali, sostengono esplicitamente i movimenti nazionalisti, perché si sono resi conto di poterli sfruttare per smantellare le democrazie liberali: su quello che viene dopo, sul futuro, non c’è convergenza, ma intanto si distrugge insieme, e con più efficacia”

foglioeuropeo.ilfoglio.it/qual…

@politica



Building an Escape Room Lockbox with the ESP32 Cheap Yellow Display (CYD)


A hand operating a numeric touch pad

Here’s something fun from [Chad Kapper] over on HackMakeMod: Escape Room Lockbox with the Cheap Yellow Display.

You may have heard of the “cheap yellow display” (CYD), so-called due to the board’s typical color. It’s a dodgy cheapo board with, among other things, TFT display, touchscreen, and ESP32 built-in. You can learn more about the CYD over here: Getting Started with ESP32 Cheap Yellow Display Board – CYD (ESP32-2432S028R).

In this build eight AA batteries are used to deliver 12 volts to operate a solenoid controlling a latch and 5 volts for the microcontroller. The encasing is clear in order to entice players in an escape-room style sitting. The custom software is included down the bottom of the project page and it is also available from arduino.cc, if that’s your bag.

Of course we’ve done plenty of other ESP32 TFT projects before, such as Piko – Your ESP32 Powered Fitness Buddy and ESP32 Brings New Features To Classic Geiger Circuit.


hackaday.com/2026/01/15/buildi…


Cybersecurity & cyberwarfare ha ricondiviso questo.


A #ransomware attack disrupted operations at South Korean conglomerate #Kyowon
securityaffairs.com/186964/dat…
#securityaffairs #hacking


Building a Carousel Autosampler


A common task in a laboratory setting is that of sampling, where a bit of e.g. liquid has to be sampled from a series of containers. Doing this by hand is possible, but tedious, ergo an autosampler can save a lot of time and tedium. Being not incredibly complex devices that have a lot in common with e.g. FDM 3D printers and CNC machines, it makes perfect sense to build one yourself, as [Markus Bindhammer] of Marb’s Lab on YouTube has done.

The specific design that [Markus] went for uses a sample carousel that can hold up to 30 bottles of 20 mL each. An ATmega-based board forms the brain of the machine, which can operate either independently or be controlled via I2C or serial. The axes and carousel are controlled by three stepper motors, each of which is driven by a TB6600 microstep driver.

Why this design is a time saver should be apparent, as you can load the carousel with bottles and have the autosampler handle the work over the course of however long the entire process takes instead of tying up a human. Initially the autosampler will be used for the synthesis of cadmium-selenium quantum dots, before it will be put to work for an HPLC/spectrometer project.

Although [Markus] intends this to be an open hardware and software project, it will take a bit longer to get all the files and documentation organized. Until then we will have to keep manually sampling, or use the video as the construction tutorial.

youtube.com/embed/9yzY5WbTRmg?…


hackaday.com/2026/01/15/buildi…



The Random Laser


When we first heard the term “random laser,” we did a double-take. After all, most ordinary sources of light are random. One defining characteristic of a traditional laser is that it emits coherent light. By coherent, in this context, that usually includes temporal coherence and spatial coherence. It is anything but random. It turns out, though, that random laser is a bit of a misnomer. The random part of the name refers to how the device generates the laser emission. It is true that random lasers may produce output that is not coherent over long time scales or between different emission points, but individually, the outputs are coherent. In other words, locally coherent, but not always globally so.

That is to say that a random laser might emit light from four different areas for a few brief moments. A particular emission will be coherent. But not all the areas may be coherent with respect to each other. The same thing happens over time. The output now may not be coherent with the output in a few seconds.

Baseline


A conventional laser works by forming a mirrored cavity, including a mirror that is only partially reflective. Pumping energy into the gain medium — the gas, semiconductor, or whatever — produces more photons that further stimulate emission. Only cavity modes that satisfy the design resonance conditions and experience gain persist, allowing them to escape through the partially reflecting mirror.

The laser generates many photons, but the cavity and gain medium favor only a narrow set of modes. This results in a beam that is of a very narrow band of frequencies, and the photons are highly collimated. Sure, they can spread over a long distance, but they don’t spread out in all directions like an ordinary light source.

So, How does a Random Laser Work?


Random lasers also depend on gain, but they have no mirrors. Instead, the gain medium is within or contains some material that highly scatters photons. For example, rough crystals or nanoparticles may act as scattering media to form random lasers.

The scattering has photons bounce around at random. Some of the photons will follow long paths, and if the gain exceeds the losses along those paths, laser emission occurs. Incoherent random lasers that use powder (to scatter) or a dye (as gain medium) tend to have broadband output. However, coherent random lasers produce sharp spectral lines much like a conventional laser. They are, though, more difficult to design and control.

Random lasers are relatively new, but they are very simple to construct. Since the whole thing depends on randomness, defects are rarely fatal. The downside is that it is difficult to predict exactly what they will emit.

There are some practical use cases, including speckle-free illumination or creating light sources with specific fingerprints for identification.

It’s Alive!


Biological tissue often can provide scattering for random lasers. Researchers have used peacock feathers, for example. Attempts to make cells emit laser light are often motivated by their use as cellular tags or to monitor changes in the laser light to infer changes in the cell itself.

The video below isn’t clearly using a random laser, but it gives a good overview of why researchers want your cells to emit laser light.

youtube.com/embed/SHbXDlnLIYA?…

You may be thinking: “Isn’t this just amplified spontaneous emission?” While random lasers can resemble amplified spontaneous emission (ASE), true random lasing exhibits a distinct turn-on threshold and, in some cases, well-defined spectral modes. ASE will exhibit a smooth increase in output as the pump energy increases. A random laser will look like ASE until you reach a threshold pump energy. Then a sharp rise will occur as the laser modes suddenly dominate.

We glossed over a lot about conventional lasers, population inversion, and related topics. If you want to know more, we can help.


hackaday.com/2026/01/15/the-ra…



AC Motor Converted into DC eBike Powerplant


AC induction motors are everywhere, from ceiling fans to vehicles. They’re reliable, simple, and rugged — but there are some disadvantages. It’s difficult to control the speed without complex electronics, and precisely placing the shaft at a given angle is next to impossible. But the core of these common induction machines can be modified and rewired into brushless DC (BLDC) motors, provided you have a few tools on hand as [Austin] demonstrates.

To convert an AC induction motor to a brushless DC electric motor (BLDC), the stator needs to be completely rewired. It also needs a number of poles proportional to the number of phases of the BLDC controller, and in this case the 24-pole motor could accommodate the three phases. [Austin] removed the original stator windings and hand-wound his own in a 16-pole configuration. The rotor needs modification as well, so he turned the rotor on a lathe and then added a set of permanent magnets secured to the rotor with JB Weld. From there it just needs some hall effect sensors, a motor controller and power to get spinning.

At this point the motor could be used for anything a BLDC motor would be used. For this project, [Austin] is putting it on a bicycle. A 3D printed pulley mounts to the fixed gear on the rear wheel, and a motor controller, battery, and some tensioners are all that is left to get this bike under power. His tests show it comfortably drawing around 1.3 kW so you may want to limit this if you’re in Europe but other than that it works extremely well and reminds us of one of our favorite ebike conversions based on a washing machine motor instead of a drill press.

youtube.com/embed/Sxq1ncduPvw?…


hackaday.com/2026/01/15/ac-mot…



ISS Medical Emergency: An Orbital Ambulance Ride


Over the course of its nearly 30 years in orbit, the International Space Station has played host to more “firsts” than can possibly be counted. When you’re zipping around Earth at five miles per second, even the most mundane of events takes on a novel element. Arguably, that’s the point of a crewed orbital research complex in the first place — to study how humans can live and work in an environment that’s so unimaginably hostile that something as simple as eating lunch requires special equipment and training.

Today marks another unique milestone for the ISS program, albeit a bittersweet one. Just a few hours ago, NASA successfully completed the first medical evacuation from the Station, cutting the Crew-11 mission short by at least a month. By the time this article is released, the patient will be back on terra firma and having their condition assessed in California. This leaves just three crew members on the ISS until NASA’s Crew-12 mission can launch in early February, though it’s possible that mission’s timeline will be moved up.

What We Know (And Don’t)


To respect the privacy of the individual involved, NASA has been very careful not to identify which member of the multi-nation Crew-11 mission is ill. All of the communications from the space agency have used vague language when discussing the specifics of the situation, and unless something gets leaked to the press, there’s an excellent chance that we’ll never really know what happened on the Station. But we can at least piece some of the facts together.
Crew-11: Oleg Platonov, Mike Fincke, Kimiya Yui, and Zena Cardman
On January 7th, Kimiya Yui of Japan was heard over the Station’s live audio feed requesting a private medical conference (PMC) with flight surgeons before the conversation switched over to a secure channel. At the time this was not considered particularly interesting, as PMCs are not uncommon and in the past have never involved anything serious. Life aboard the Station means documenting everything, so a PMC could be called to report a routine ailment that we wouldn’t give a second thought to here on Earth.

But when NASA later announced that the extravehicular activity (EVA) scheduled for the next day was being postponed due to a “medical concern”, the press started taking notice. Unlike what we see in the movies, conducting an EVA is a bit more complex than just opening a hatch. There are many hours of preparation, tests, and strenuous work before astronauts actually leave the confines of the Station, so the idea that a previously undetected medical issue could come to light during this process makes sense. That said, Kimiya Yui was not scheduled to take part in the EVA, which was part of a long-term project of upgrading the Station’s aging solar arrays. Adding to the mystery, a representative for Japan’s Aerospace Exploration Agency (JAXA) told Kyodo News that Yui “has no health issues.”

This has lead to speculation from armchair mission controllers that Yui could have requested to speak to the flight surgeons on behalf of one of the crew members that was preparing for the EVA — namely station commander Mike Fincke and flight engineer Zena Cardman — who may have been unable or unwilling to do so themselves.

Within 24 hours of postponing the EVA, NASA held a press conference and announced Crew-11 would be coming home ahead of schedule as teams “monitor a medical concern with a crew member”. The timing here is particularly noteworthy; the fact that such a monumental decision was made so quickly would seem to indicate the issue was serious, and yet the crew ultimately didn’t return to Earth for another week.

Work Left Unfinished


While the reusable rockets and spacecraft of SpaceX have made crew changes on the ISS faster and cheaper than they were during the Shuttle era, we’re still not at the point where NASA can simply hail a Dragon like they’re calling for an orbital taxi. Sending up a new vehicle to pickup the ailing astronaut, while not impossible, would have been expensive and disruptive as one of the Dragon capsules in rotation would have had to be pulled from whatever mission it was assigned to.

So unfortunately, bringing one crew member home means everyone who rode up to the Station with them needs to leave as well. Given that each astronaut has a full schedule of experiments and maintenance tasks they are to work on while in orbit, one of them being out of commission represents a considerable hit to the Station’s operations. Losing all four of them at once is a big deal.

Granted, not everything the astronauts were scheduled to do is that critical. Tasks range form literal grade-school science projects performed as public outreach to long-term medical evaluations — some of the unfinished work will be important enough to get reassigned to another astronaut, while some tasks will likely be dropped altogether.
Work to install the Roll Out Solar Arrays (ROSAs) atop the Stations original solar panels started in 2021.
But the EVA that Crew-11 didn’t complete represents a fairly serious issue. The astronauts were set to do preparatory work on the outside of the Station to support the installation of upgraded roll-out solar panels during an EVA scheduled for the incoming Crew-12 to complete later on this year. It’s currently unclear if Crew-12 received the necessary training to complete this work, but even if they have, mission planners will now have to fit an unforeseen extra EVA into what’s already a packed schedule.

What Could Have Been


Having to bring the entirety of Crew-11 back because of what would appear to be a non-life-threatening medical situation with one individual not only represents a considerable logistical and monetary loss to the overall ISS program in the immediate sense, but will trigger a domino effect that delays future work. It was a difficult decision to make, but what if it didn’t have to be that way?
The X-38 CRV prototype during a test flight in 1999.
In other timeline, the ISS would have featured a dedicated “lifeboat” known as the Crew Return Vehicle (CRV). A sick or injured crew member could use the CRV to return to Earth, leaving the spacecraft they arrived in available for the remaining crew members. Such a capability was always intended to be part of the ISS design, with initial conceptual work for the CRV dating back to the early 1990s, back when the project was still called Space Station Freedom. Indeed, the idea that the ISS has been in continuous service since 2000 without such a failsafe in place is remarkable.

Unfortunately, despite a number of proposals for a CRV, none ever made it past the prototype stage. In practice, it’s a considerable engineering challenge. A space lifeboat needs to be cheap, since if everything goes according to plan, you’ll never actually use the thing. But at the same time, it must be reliable enough that it could remain attached to the Station for years and still be ready to go at a moment’s notice.

In practice, it was much easier to simply make sure there are never more crew members on the Station than there are seats in returning spacecraft. It does mean that there’s no backup ride to Earth in the event that one of the visiting vehicles suffers some sort of failure, but as we saw during the troubled test flight of Boeing’s CST-100 in 2024, even this issue can be resolved by modifications to the crew rotation schedule.

No Such Thing as Bad Data


Everything that happens aboard the International Space Station represents an opportunity to learn something new, and this is no different. When the dust settles, you can be sure NASA will commission a report to dives into every aspect of this event and tries to determine what the agency could have done better. While the ISS itself may not be around for much longer, the information can be applied to future commercial space stations or other long-duration missions.

Was ending the Crew-11 mission the right call? Will the loses and disruptions triggered by its early termination end up being substantial enough that NASA rethinks the CRV concept for future missions? There are many questions that will need answers before it’s all said and done, and we’re eager to see what lessons NASA takes away from today.


hackaday.com/2026/01/15/iss-me…



Sfiduciati


I social sono un pericolo per la democrazia. Sono numerosi i saggi che argomentano questo aspetto distruttivo della comunicazione paritaria online che si afferma nelle logiche algoritmiche di Facebook, Tik Tok, Truth, eccetera. I social media sono spesso fonte e canale di propaganda e disinformazione.

Purtroppo la maggior parte delle persone non sa distinguere tra notizie vere e notizie false e le notizie false sono più virali di quelle vere. E questo è il danno principale che fanno alla democrazia.

Giovanni Boccia Artieri lo sintetizza bene nel suo ultimo libro, “Sfiduciati. Democrazia e disordine comunicativo nella società aperta” appena pubblicato da Feltrinelli, provando a dare qualche rimedio.
“I social media favoriscono ciò che funziona: e ciò che funziona polarizza, semplifica, infiamma. La democrazia ha bisogno di ascolto, mediazione, argomentazione. E se il conflitto algoritmico si consuma in millisecondi, il dissenso democratico richiede tempo”, ma è necessario.

La riflessione del professore di sociologia, prorettore dell’Università degli Studi di Urbino, già autore di diversi saggi sul tema è ovviamente molto più ampia.
Nel libro sostiene infatti che l’agorà pubblica negli ultimi anni è stata inquinata soprattutto da tre fenomeni. Il primo è l’ingresso nell’era della post-verità. In questa fase della comunicazione infatti non è tanto importante la verità e neanche la validità la coerenza e l’utilità con cui si comunicano concetti semplici e complessi ma il modo in cui le persone vi reagiscono. Chi sa gestire quelle reazioni può farci credere a ciò che vero non è. Il secondo fenomeno è la piattaformizzazione di Internet. Secondo questa famosa teorizzazione di Van Dijck e Poell, le piattaforme che connettono gli individui tra di loro permettendogli di fruire e consumare servizi non offerti dagli Stati, creano strutture sociali disomogenee producendo valori
con un potenziale rischio etico. Il terzo fenomeno è la fringe democracy, cioè l’annullamento del confine tra cio che è legittimo e cio che non lo è, insieme al livellamento delle opinioni sempre più autoreferenziali.

Queste tre dinamiche creano la società esposta, un ambiente in cui la comunicazione e la sfera pubblica, attraversate dalla sfiducia, sono diventate vulnerabili.


dicorinto.it/articoli/recensio…


Cybersecurity & cyberwarfare ha ricondiviso questo.


NEW: Iran is entering its second week (170 hours and counting) of a nationwide internet blackout, now one of the longest in history.

Depending on who's counting, this shutdown either the third longest, or in the top ten.

Either way, the ongoing internet blackout is helping the Iranian authorities hide their brutal crackdown on protesters, which has killed more than 2,000 people according to one estimate.

techcrunch.com/2026/01/15/iran…


Cybersecurity & cyberwarfare ha ricondiviso questo.


La Germania avrebbe costretto Lexus a disattivare a distanza il riscaldamento dell'auto nel cuore dell'inverno

L'avviamento a distanza della tua Lexus è appena stato "assassinato" a distanza dalle autorità di regolamentazione, che hanno deciso che riscaldare l'auto è considerato terrorismo ambientale

autos.yahoo.com/policy-and-env…

@pirati


Cybersecurity & cyberwarfare ha ricondiviso questo.


L'ELITE dei figli di puttana: l'app Palantir che l'ICE usa per trovare i quartieri da razziare

Il materiale interno dell'ICE e la testimonianza di un funzionario ottenuti da 404 Media forniscono il collegamento più chiaro finora tra l'infrastruttura tecnologica che Palantir sta costruendo per l'ICE e le attività dell'agenzia sul campo

404media.co/elite-the-palantir…

@eticadigitale


‘ELITE’: The Palantir App ICE Uses to Find Neighborhoods to Raid


Palantir is working on a tool for Immigration and Customs Enforcement (ICE) that populates a map with potential deportation targets, brings up a dossier on each person, and provides a “confidence score” on the person’s current address, 404 Media has learned. ICE is using it to find locations where lots of people it might detain could be based.

The findings, based on internal ICE material obtained by 404 Media, public procurement records, and recent sworn testimony from an ICE official, show the clearest link yet between the technological infrastructure Palantir is building for ICE and the agency’s activities on the ground. The tool receives peoples’ addresses from the Department of Health and Human Services (HHS) among a range of other sources, according to the material.

The news comes after Department of Homeland Security (DHS) head Kristi Noem said the agency is sending hundreds more federal agents to Minneapolis amid widespread protests against the agency. Last week ICE officer Jonathan Ross shot and killed 37 year old U.S. citizen Renee Nicole Good. During Operation Metro Surge, which DHS calls the “largest immigration operation ever,” immigration agents have surrounded rideshare drivers and used pepper spray on high school students.

“Enhanced Leads Identification & Targeting for Enforcement (ELITE) is a targeting tool designed to improve capabilities for identifying and prioritizing high-value targets through advanced analytics,” a user guide for ELITE obtained by 404 Media says. The tool aims to be nearly all encompassing when it comes to finding ICE targets, from identifying subjects in the first place, to building a list of people, to supervisors approving selections for officers to ultimately go into the field and apprehend.

💡
Do you know anything else about this tool? Do you work at ICE, CBP, or Palantir? I would love to hear from you. Using a non-work device, you can message me securely on Signal at joseph.404 or send me an email at joseph@404media.co.

One feature of ELITE is the “Geospatial Lead Sourcing Tab,” according to the user guide. This lets ICE see people it may potentially want to detain on a map interface, based on various criteria such as “Bios & IDs,” “Location,” “Operations,” and “Criminality.” An ICE officer can then select people one by one, or draw a shape on the map to see people in that selected area.

ELITE has already been used by ICE to target specific areas, according to sworn testimony from an ICE official in Oregon. In October, immigration officers waited in three unmarked SUVs outside an apartment complex in Woodburn. They went on to bust a driver’s window and pull a 45-year-old woman from a van, used ICE’s facial recognition app Mobile Fortify on her, and agents had the goal of making eight arrests per team per day, Oregon Live reported. Lawyers representing the woman say authorities arrested her and more than 30 other people in a “dragnet.”

“One of our apps, it’s called ELITE. And so it tells you how many people are living in this area and what’s the likelihood of them actually being there,” a deportation officer with ICE’s Fugitive Operations Unit, identified in court records as JB, testified about the raid in early December. 404 Media purchased a transcript of JB’s testimony from the court. “It’s basically a map of the United States. It’s kind of like Google Maps.”

“It pulls from all kinds of sources,” JB continued. “It’s a newer app that was actually given to us in ICE.” JB said ELITE is what ICE sometimes uses to track the apparent density of people at a particular location to target. “You’re going to go to a more dense population rather than [...] like, if there’s one pin at a house and the likelihood of them actually living there is like 10 percent [...] you’re not going to go there.” For that raid in Woodburn, JB suggested the immigration officers used ELITE to generate leads. Additionally, in a text thread of immigration officers, someone described the area as “target rich,” which JB explained meant the officials had run multiple license plates in that area and found vehicles registered to people “who had either a criminal or immigration nexus.”


Screenshots of the ICE official's testimony. Image: 404 Media.

JB and other officials were testifying in the case of MJMA, the woman pulled from the van during the Woodburn raid. She is being represented by attorneys from Innovation Law Lab.

Once a person is selected on the map interface, ELITE then shows a dossier on that particular person, according to the user guide. That includes their name, a photo, their Alien Number (the unique code given by the U.S. government to each immigrant), their date of birth, and their full address. ELITE notes the source of the address (such as the government agency that supplied it), and gives an “address confidence score.” One address confidence score example in the guide is 98.95 out of 100; another is 77.25 out of 100. This score is based on both the source of the address and how recent the data is, the user guide says. (ICE is paying skip tracers, private investigators, and bounty hunters to help verify peoples’ addresses.)

Those sources can include HHS, U.S. Citizenship and Immigration Services (USCIS), and “CLEAR.” The guide does not provide any more specifics on what CLEAR might be, but ICE has repeatedly contracted with Thomson Reuters which sells a data product called CLEAR. Thomson Reuters did not respond to a request for comment. HHS did not respond to a request for comment.

The documents don’t say if those are the only entities providing data for ELITE. The user guide says ELITE is “integrating new data sources” to reduce officer workload.

ICE can also use ELITE to look up people based on an unique identifier, such as their Alien Number, name, or date of birth. ELITE also lets ICE do this in bulk, selecting up to 50 people at once, according to the guide.
playlist.megaphone.fm?p=TBIEA2…
ICE can filter the map by what the guide calls Special Operations. These are “groups of pre-defined aliens specifically targeted by Leadership for action.” ICE officers are told to consult ICE leadership or “broadcasts” on when to use these operation filters. DHS’s surge in Minneapolis is focused at least in part on the city’s Somali community after renewed focus on a COVID-19 fraud case. The overwhelming majority of Somalis who live in the Minneapolis and St. Paul area are U.S. citizens, PBS reported.

“These records give us behind-the-scenes insight into the kind of mass surveillance machine ICE is building with help from powerful tech companies like Palantir,” Laura Rivera, senior staff attorney at Just Futures Law, told 404 Media. “When combined with what we know from ICE testimony and other public information, it gives us a blueprint into how ICE is going into communities and identifying people for arrest in real-time.”

Senator Ron Wyden, who represents Oregon where ELITE was discussed, told 404 Media in a statement, “The fact ICE is using this app proves the completely indiscriminate nature of the agency's aggressive and violent incursions into our communities. This app allows ICE to find the closest person to arrest and disappear, using government and commercial data, with the help of Palantir and Trump's Big Brother databases. It makes a mockery of the idea that ICE is trying to make our country safer. Rather, agents are reportedly picking people to deport from our country the same way you'd choose a nearby coffee shop.”
Screenshot of the Palantir contract, via highergov.com.
The ELITE user guide does not say who developed the system. But the tool’s distinctive title—Enhanced Leads Identification & Targeting for Enforcement—exactly matches one included in an addendum to a Palantir contract from last year. It says Palantir should “continue configuration and engineering services” for ELITE and some other ICE tools. That supplemental agreement for $29.9 million started in September and is planned to go on for at least a year.

Palantir has worked with ICE for years and was focused on criminal investigations, supporting Homeland Security Investigations’ (HSI) Investigative Case Management (ICM) system. That changed in the second Trump administration, with Palantir now working on ICE’s deportation efforts.

After participating in a three-week coding sprint, ICE updated an ongoing Palantir contract related to “Enforcement Prioritization and Targeting,” to “support the development of an accurate picture of actionable leads based on existing law enforcement datasets to allow law enforcement to prioritize enforcement actions,” according to an internal Palantir wiki previously obtained by 404 Media. The goal was to find the physical location of people marked for deportation, and Palantir said it believes its work with ICE is “intended to promote government efficiency, transparency, and accountability.”

The leaked material described Palantir’s deportation-focused work as “concentrated on delivering prototype capabilities” and lasting around six months. It left open the room for more work with ICE, and said “Palantir has developed into a more mature partner for ICE.” Documents ICE published described Palantir’s work as building a tool called ImmigrationOS.

More than eight months have passed since Palantir discussed the issue internally. Neither Palantir nor DHS responded to multiple requests for comment.

In their testimony, JB said, “it’s a tool that we use that gives you a probability. But there’s never [...] there’s no such thing as 100 percent.” The user guide adds, “As always, make sure you do your due diligence on each target to confirm removability prior to action.”




AI & Deepfake: il mondo che credi reale è già morto. Chi controlla la narrazione detiene il potere

Non è il futuro che fa paura. È il presente che fingiamo di non vedere: è parte della guerra cognitiva globale. Va oltre alla propaganda classica ed è più profonda, intima ed epistemica.

tommasin.org/blog/2026-01-15/a…

Il nuovo post di @Davide Tommasin ዳቪድ

Per avere altre notizie e leggere altri articoli sulla #IntelligenzaArtificiale, segui il gruppo @Intelligenza Artificiale

reshared this



AI & Deepfake: il mondo che credi reale è già morto. Chi controlla la narrazione detiene il potere

Non è il futuro che fa paura. È il presente che fingiamo di non vedere: è parte della guerra cognitiva globale. Va oltre alla propaganda classica ed è più profonda, intima ed epistemica.

tommasin.org/blog/2026-01-15/a…

Il nuovo post di @Davide Tommasin ዳቪድ

Per avere altre notizie e leggere altri articoli sulla #IntelligenzaArtificiale, segui il gruppo @Intelligenza Artificiale

reshared this



Pechino ordina alle aziende cinesi di abbandonare i software di cybersecurity made in USA e Israele

Reuters rivela una mossa drastica delle autorità cinesi, che hanno notificato a numerose imprese domestiche di interrompere l’uso di soluzioni di sicurezza informatica prodotte da oltre una dozzina di vendor stranieri, motivata da preoccupazioni per la sicurezza nazionale.

Le aziende americane colpite includono VMware di proprietà Broadcom, Palo Alto Networks con i suoi firewall next-generation e piattaforme XDR, Fortinet nota per i suoi FortiGate e soluzioni SD-WAN integrate, CrowdStrike con il suo endpoint detection and response Falcon basato su AI per threat hunting, SentinelOne per la protezione autonoma degli endpoint, Recorded Future per l’intelligence sulle minacce, McAfee, Claroty specializzata in OT security, Rapid7 con i tool di vulnerability management come InsightVM, oltre a Mandiant di Alphabet e Wiz per la cloud security. Tra le israeliane figurano Check Point con Harmony e Quantum per protezione perimeter e endpoint, CyberArk acquisita da Palo Alto per privileged access management, Orca Security per agentless cloud scanning, Cato Networks per SASE e Imperva di Thales per web application firewall e data masking.

insicurezzadigitale.com/pechin…

@Informatica (Italy e non Italy 😁)

reshared this


Cybersecurity & cyberwarfare ha ricondiviso questo.


Central Maine Healthcare data breach impacted over 145,000 patients
securityaffairs.com/186959/unc…
#securityaffairs #hacking


Looking at a Real Fake Raspberry Pi RP2040 Board


Since the RP2040 microcontroller is available as a stand-alone component, it’s easy enough for third parties to churn out their own variations — or outright clones of — the Raspberry Pi Pico. Thus we end up with for example AliExpress sellers offering their own versions that can be significantly cheaper than the genuine article. The ones that [electronupdate] obtained for a test and decapping session cost just $2.25 a pop.

RP2 B0 stepping imprinted on the die shot.

As can be seen in the top image, the board from AliExpress misses the Raspberry Pi logo on the silkscreen for obvious reasons, but otherwise appears to feature an identical component layout. The QSPI Flash IC is marked on the die as BY250156FS, identifying it as a Boya part.

Niggles about flash ROM quality aside, what’s perhaps most interesting about this teardown is what eagle-eyed commentators spotted on the die shot of the RP2040. Although on the MCU the laser markings identify the RP2040 as a B2 stepping, the die clearly identifies it as an ‘RP2 B0’ part, meaning B0 stepping. This can be problematic when you try to use the USB functionality due to hardware USB bugs in the B0 and B1 steppings.

As they say, caveat emptor.

youtube.com/embed/uQ3kNFOhTIw?…


hackaday.com/2026/01/15/lookin…



Windows? Linux? Browser? Same Executable


We’ve been aware of projects like Cosmopolitan that allow you to crank out a single executable that will run on different operating systems. [Kamila] noticed that the idea was sound, but that the executables were large and there were some limitations. So she produced a 13K file that will run under Windows, Linux, or even in a Web browser. The program itself is a simple snake game.

There seems to be little sharing between the three versions. Instead, each version is compressed and stitched together so that each platform sees what it wants to see. To accommodate Windows, the file has to start with a PE header. However, there is enough flexibility in the header that part of the stub forms a valid shell script that skips over the Windows code when running under Linux.

So, essentially, Windows skips the “garbage” in the header, which is the part that makes Linux skip the “garbage” in the front of the file.

That leaves the browser. Browsers will throw away everything before an <HTML> tag, so that’s the easy part.

Should you do this? Probably not. But if you needed to make this happen, this is a clear template for how to do it. If you want to go back to [Kamila’s] inspiration, we’ve covered Cosmopolitan and its APE format before.


hackaday.com/2026/01/15/window…


Cybersecurity & cyberwarfare ha ricondiviso questo.


Cloudflare, Piracy Shield e il punto cieco europeo: quando la governance diventa un rischio cyber

📌 Link all'articolo : redhotcyber.com/post/cloudflar…

#redhotcyber #news #cybersecurity #dataprotection #governancedigitale #cloudflare #italiadigitale #piracyshield


Cybersecurity & cyberwarfare ha ricondiviso questo.


⚠️Quorum raggiunto? NO, NON ADESSO! Non smettete di firmare per il #ReferendumGiustizia

Il raggiungimento del 100% è SALVO BUON FINE: in quel 100% potrebbero esserci ⚠️molte firme duplicate!⚠️

Non smettete di firmare: prendete SPID o la CIE e datevi da fare!

firmereferendum.giustizia.it/r…

@politica

in reply to Max - Poliverso 🇪🇺🇮🇹

@max il referendum è stato richiesto dai parlamentari (con ben 4 richieste valide) ma è importante la raccolta di firme, sia per massimizzare il coinvolgimento dei cittadini, sia per aumentare l'eco mediatica su un referendum di cui la stampa parla poco e sempre a favore del governo
in reply to Max - Poliverso 🇪🇺🇮🇹

@Max - Poliverso 🇪🇺🇮🇹 @informapirata ⁂ 𝐏𝐞𝐫𝐜𝐡𝐞‌ 𝐪𝐮𝐞𝐬𝐭𝐞 𝐟𝐢𝐫𝐦𝐞 𝐜𝐨𝐧𝐭𝐚𝐧𝐨 𝐚𝐧𝐜𝐨𝐫𝐚, 𝐚𝐧𝐜𝐡𝐞 𝐬𝐞 𝐢𝐥 𝐫𝐞𝐟𝐞𝐫𝐞𝐧𝐝𝐮𝐦 𝐞‌ 𝐠𝐢𝐚‌ 𝐢𝐧𝐝𝐞𝐭𝐭𝐨.

Abbiamo superato 𝐥𝐞 𝟓𝟏𝟐.𝟎𝟗𝟖 𝐟𝐢𝐫𝐦𝐞 (alle ore 17:23), e si continua a firmare 𝐟𝐢𝐧𝐨 𝐚𝐥 𝟑𝟎 𝐠𝐞𝐧𝐧𝐚𝐢𝐨, ma la cosa importante da capire è questa: con il quorum raggiunto, i promotori possono depositare le firme in Cassazione e diventare a tutti gli effetti 𝐂𝐨𝐦𝐢𝐭𝐚𝐭𝐨 𝐩𝐫𝐨𝐦𝐨𝐭𝐨𝐫𝐞, cioè un soggetto riconosciuto dall’ordinamento che rappresenta direttamente la 𝐬𝐨𝐯𝐫𝐚𝐧𝐢𝐭𝐚‌ 𝐩𝐨𝐩𝐨𝐥𝐚𝐫𝐞 e che ha quindi titolo per pretendere 𝐬𝐩𝐚𝐳𝐢 𝐝𝐢 𝐢𝐧𝐟𝐨𝐫𝐦𝐚𝐳𝐢𝐨𝐧𝐞, regole di parità e strumenti di campagna, come avviene in tutte le consultazioni referendarie.
Se poi il Governo, fissando il voto al 22 e 23 marzo e comprimendo i tempi del confronto, limita di fatto la possibilità di far conoscere ai cittadini cosa c’è davvero nella riforma, il Comitato può anche aprire un fronte istituzionale ulteriore, il cosiddetto 𝐜𝐨𝐧𝐟𝐥𝐢𝐭𝐭𝐨 𝐝𝐢 𝐚𝐭𝐭𝐫𝐢𝐛𝐮𝐳𝐢𝐨𝐧𝐞 davanti alla Corte costituzionale, che in parole semplici significa chiedere: chi decide cosa e con quali limiti, quando è in gioco un potere riconosciuto direttamente ai cittadini.
C’è poi un altro punto molto concreto. 𝐈𝐥 𝐪𝐮𝐞𝐬𝐢𝐭𝐨 𝐬𝐮𝐥𝐥𝐚 𝐬𝐜𝐡𝐞𝐝𝐚 non è un dettaglio: oggi quello ammesso richiama soprattutto il titolo della legge, mentre i promotori sostengono che debba essere più chiaro e indicare esattamente 𝐪𝐮𝐚𝐥𝐢 𝐚𝐫𝐭𝐢𝐜𝐨𝐥𝐢 𝐝𝐞𝐥𝐥𝐚 𝐂𝐨𝐬𝐭𝐢𝐭𝐮𝐳𝐢𝐨𝐧𝐞 vengono modificati, così che tutti possano capire davvero cosa stanno approvando o respingendo.
Insomma, 𝐥𝐞 𝐟𝐢𝐫𝐦𝐞 𝐧𝐨𝐧 𝐬𝐨𝐧𝐨 𝐮𝐧 𝐫𝐢𝐭𝐨, sono 𝐥𝐚 𝐜𝐡𝐢𝐚𝐯𝐞 𝐜𝐡𝐞 𝐦𝐞𝐭𝐭𝐞 𝐢 𝐜𝐢𝐭𝐭𝐚𝐝𝐢𝐧𝐢 𝐧𝐞𝐥𝐥𝐚 𝐩𝐚𝐫𝐭𝐢𝐭𝐚, con strumenti veri.
E adesso il passaggio decisivo è trasformare questa energia in 𝐩𝐚𝐫𝐭𝐞𝐜𝐢𝐩𝐚𝐳𝐢𝐨𝐧𝐞 𝐚𝐥𝐥𝐞 𝐮𝐫𝐧𝐞, perché alla fine 𝐧𝐨𝐧 𝐛𝐚𝐬𝐭𝐚 𝐟𝐢𝐫𝐦𝐚𝐫𝐞: bisogna andare a votare e 𝐯𝐨𝐭𝐚𝐫𝐞 𝐍𝐎

Questo il link per firmare: firmereferendum.giustizia.it/r…

Unknown parent

mastodon - Collegamento all'originale
informapirata ⁂
@Davide_Sandini non so se c'è un controllo valido in tempo reale oppure se il controllo avviene solo alla conclusione della raccolta


Cybersecurity & cyberwarfare ha ricondiviso questo.


Il Brussels Effect e la sfida della sovranità tecnologica nel contrasto al CSAM

📌 Link all'articolo : redhotcyber.com/post/il-brusse…

#redhotcyber #news #digitale #europa #regolamentazione #cybersecurity #brusselseffect #legislazione #autoritari


Cybersecurity & cyberwarfare ha ricondiviso questo.


Perquisizioni al Garante della Privacy dopo Report: indagati Stanzione e gli altri del collegio

Al centro delle inchieste le spese di rappresentanza del collegio. I reati ipotizzati sono peculato e corruzione. I servizi di Report dopo la sanzione e l'ipotesi dimissioni

open.online/2026/01/15/garante…

@news


Cybersecurity & cyberwarfare ha ricondiviso questo.


Pechino ordina alle aziende cinesi di abbandonare i software di cybersecurity made in USA e Israele
#CyberSecurity
insicurezzadigitale.com/pechin…

Cybersecurity & cyberwarfare ha ricondiviso questo.


Microsoft Patch Tuesday, gennaio 2026
#CyberSecurity
insicurezzadigitale.com/micros…

Cybersecurity & cyberwarfare ha ricondiviso questo.


🔥 SONO UFFICIALMENTE APERTE LE ISCRIZIONI! 🔥

Sta partendo la Settima Live Class del corso "𝗗𝗔𝗥𝗞 𝗪𝗘𝗕 𝗘 𝗖𝗬𝗕𝗘𝗥 𝗧𝗛𝗥𝗘𝗔𝗧 𝗜𝗡𝗧𝗘𝗟𝗟𝗜𝗚𝗘𝗡𝗖𝗘" – livello intermedio 🚀

📌 Inizio: Domenica 8 Marzo 2026
📌 Posti super limitati (max 14 partecipanti)
📌 Sarà un’esperienza live e interattiva, guidata dal prof. Pietro Melillo (PhD – Università del Sannio, docente IUSI University), che ti porterà dentro il cuore del Dark Web e delle minacce cyber reali

✅ Pagina del corso: redhotcyber.com/linksSk2L/acad…
✅ Presentazione del corso: youtube.com/watch?v=9VaQUnTz4J…
✅ Webinar introduttivo: youtube.com/watch?v=ExZhKqjuwf…

Per info e iscrizioni: 📱 💬 379 163 8765 ✉️ formazione@redhotcyber.com

#redhotcyber #formazione #cybersecurity #darkweb #cyberthreatintelligence #ethicalhacking #infosec #intelligence #liveclass #corsi #cybercrime




Microsoft Patch Tuesday, gennaio 2026


@Informatica (Italy e non Italy 😁)
Microsoft ha inaugurato il 2026 con il suo primo Patch Tuesday, un appuntamento che ha portato alla luce e alla correzione di 114 vulnerabilità nei prodotti Windows e correlati, tra cui otto classificazioni critiche e una zero-day già sfruttata attivamente in attacchi reali. Questo round di aggiornamenti, distribuito martedì 13 gennaio,



Pechino ordina alle aziende cinesi di abbandonare i software di cybersecurity made in USA e Israele


@Informatica (Italy e non Italy 😁)
Reuters rivela una mossa drastica delle autorità cinesi, che hanno notificato a numerose imprese domestiche di interrompere l’uso di soluzioni di sicurezza informatica prodotte da oltre una dozzina di vendor

reshared this

Unknown parent

mastodon - Collegamento all'originale
liberoseleni
@elettrona a parte che non vedo una grande differenza con quanto accade in occidente, il discorso non era mica quello. Far proteggere le proprie informazioni da chi te le vuole rubare mi sembra un tantino ingenuo.


Cybersecurity & cyberwarfare ha ricondiviso questo.


Intelligenza artificiale: Ora la vera sfida si sposta su alimentare i data center

📌 Link all'articolo : redhotcyber.com/post/intellige…

#redhotcyber #news #intelligenzaartificiale #energiarinnovabile #datacenter #autosufficienzaenergetica


Cybersecurity & cyberwarfare ha ricondiviso questo.


#China bans U.S. and Israeli cybersecurity software over security concerns
securityaffairs.com/186920/int…
#securityaffairs #hacking

Cybersecurity & cyberwarfare ha ricondiviso questo.


Arriva Reprompt! Un nuovo Attacco a Copilot per esfiltrare i dati sensibili degli utenti

📌 Link all'articolo : redhotcyber.com/post/arriva-re…

#redhotcyber #hacking #cti #ai #online #it #cybercrime #cybersecurity #technology #news #cyberthreatintelligence


Cybersecurity & cyberwarfare ha ricondiviso questo.


198 – AI e digitale. Attenzione ai venditori di soluzioni facili camisanicalzolari.it/198-ai-e-…

Cybersecurity & cyberwarfare ha ricondiviso questo.


MOVEit nel mirino: patch urgenti per falle ad alta gravità in LoadMaster e WAF

📌 Link all'articolo : redhotcyber.com/post/moveit-ne…

#redhotcyber #news #cybersecurity #vulnerabilita #patch #aggiornamentidisicurezza #sicurezzainformatica



Philips Kid’s Kit Revisited


[Anthony Francis-Jones], like us, has a soft spot for the educational electronic kits from days gone by. In a recent video you can see below, he shows the insides of a Philips EE08 two-transistor radio kit. This is the same kit he built a few months ago (see the second video, below).

Electronics sure look different these days. No surface mount here or even printed circuit boards. The kit had paper cards to guide the construction since the kit could be made into different circuits.

The first few minutes of the video recap how AM modulation works. If you skip to about the ten-minute mark, you can see the classic instruction books for the EE08 and EE20 kits (download a copy in your favorite language), which were very educational.

There were several radios in the manual, but the one [Anthony] covers is the two-transistor version with a PNP transistor as a reflex receiver with a diode detector with a second transistor as an audio power amplifier.

We covered [Anthony’s] original build a few months ago, but we liked the deep dive into how it works. We miss kits like these. And P-Boxes, too.

youtube.com/embed/eC2wwNq92mw?…

youtube.com/embed/PWPHGEWwKbU?…


hackaday.com/2026/01/14/philip…