Comunicazione quantistica: la nuova frontiera della sicurezza digitale europea
@Informatica (Italy e non Italy 😁)
La missione SAGA e le mosse di Cina, Usa e Russia: la corsa globale per proteggere i dati grazie alla fisica dei fotoni è entrata nel vivo
L'articolo Comunicazione quantistica: la nuova frontiera della sicurezza digitale europea proviene da Guerre di Rete.
Informatica (Italy e non Italy) reshared this.
Cyber security 2026, perché la tecnologia non è più la risposta: i dati del World Economic Forum
@Informatica (Italy e non Italy 😁)
Il report WEF 2026 smonta l'illusione del controllo tecnologico. L'AI moltiplica rischi sotto l'etichetta dell'innovazione, la geopolitica rende il cyber spazio asimmetrico e le supply chain rivelano dipendenze invisibili. La cyber
Informatica (Italy e non Italy) reshared this.
🔴 Benvenuta in Red Hot Cyber Cyber Angels 🔴
🔗 Seguite Ambra :
📌Sul suo profilo LinkedIn: linkedin.com/in/ambra-santoro-…
📌Leggendo gli articoli attraverso la pagina personale di Red Hot Cyber: redhotcyber.com/rhc/redazione/…
#redhotcyber #rhccyberangels #hacking #benesseredigitale #cti #ai #online #it #cybercrime #cybersecurity #technology #news #innovation #privacy
Redazione - Red Hot Cyber
RedHotCyber è una community con lo scopo di divulgare contenuti di cybersecurity, attraverso la pubblicazione di news e ricerche.Red Hot Cyber
Ricardo Antonio Piana likes this.
Cybersecurity & cyberwarfare reshared this.
Buongiorno, sono Claude. Il nuovo “collega” che usa il tuo stesso computer!
📌 Link all'articolo : redhotcyber.com/post/buongiorn…
#redhotcyber #news #intelligenzaartificiale #assistenzialli #tecnologiaai #simulazioneumana #apicomputer
Buongiorno, sono Claude. Il nuovo "collega" che usa il tuo stesso computer!
Anthropic introduce Computer Use, tecnologia che permette a Claude di interagire con l'ambiente informatico dell'utente.Redazione RHC (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
securityaffairs.com/186888/hac…
#securityaffairs #hacking
Microsoft Patch Tuesday security updates for January 2026 fixed actively exploited zero-day
Microsoft Patch Tuesday addressed 110 security flaws across Windows, Office, Azure, Edge, and more, including eight critical vulnerabilities.Pierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
La Cina lancia le prime targhe per la guida autonoma di Livello 3
📌 Link all'articolo : redhotcyber.com/post/la-cina-l…
#redhotcyber #news #guidaautonoma #intelligenzaartificiale #veicoliintelligenti #produzionedimassa #testdisicurezza
La Cina lancia le prime targhe per la guida autonoma di Livello 3
La Cina rilascia le prime targhe per la guida autonoma di Livello 3 a Pechino, segnando un passo avanti nello sviluppo dell'intelligenza automobilistica.Redazione RHC (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
🔐 LA CYBERSECURITY NON È UNA LISTA DI TOOL. È UN MINDSET.
“Cyber Offensive Fundamentals” nasce per chi vuole capire prima di fare.
📌 40 ore di formazione LIVE
📌 Percorso strutturato da zero
📌 Laboratori pratici su ambienti reali
Guidati dal Prof. Alessio Lauro, entrerai nella logica offensiva:
perché difendere senza comprendere l’attacco è un’illusione.
🔗 Programma completo: redhotcyber.com/linksSk2L/cybe…
🎥 Introduzione al corso: youtube.com/watch?v=0y4GYsJMoX…
Per info e iscrizioni: 📞 379 163 8765 ✉️ formazione@redhotcyber.com
#redhotcyber #formazione #pentesting #pentest #formazionelive #ethicalhacking #hacking #cybersecurity #penetrationtesting #cti #cybercrime #infosec #corsi #liveclass #hackerhood #pentesting
Cyber Offensive Fundamentals - Corso ethical hacking, penetration test
Corso in Live Class di Cyber Offensive Fundamentals: scopri penetration testing, vulnerabilità e strumenti pratici per la sicurezza informatica offensiva.Red Hot Cyber
reshared this
197 - Google ti usa, poi ti chiude il rubinetto. E i giornali muoiono - Marco Camisani Calzolari
Google ti usa, poi ti chiude il rubinetto. E i giornali muoiono Qui negli Stati Uniti sta succedendo una cosa enorme, e quasi nessuno la sta spiegando bene.Web Staff MCC (Marco Camisani Calzolari)
Cybersecurity & cyberwarfare reshared this.
Cloudflare minaccia di chiudere in Italia per una multa milionaria. Ma la verità dove sta?
📌 Link all'articolo : redhotcyber.com/post/cloudflar…
#redhotcyber #news #cloudflare #cloudcomputing #sicurezzainformatica #multa #telecomunicazioni #escalation
Cloudflare minaccia di chiudere in Italia per una multa milionaria. Ma la verità dove sta?
Cloudflare, multa milionaria dall'Italia: il CEO minaccia di chiudere. Scopri di più sulla vicenda e le sue implicazioni.Redazione RHC (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
Ha coinvolto dati personali? Fine del dibattito: è Data Breach
📌 Link all'articolo : redhotcyber.com/post/ha-coinvo…
#redhotcyber #news #gdpr #databreach #sicurezzadigital #protezionedatidigitali #violazionididati #accesso
Ha coinvolto dati personali? Fine del dibattito: è Data Breach
Uno degli errori più diffusi, nonostante l’operatività del GDPR sin dal 2018, è quello di considerare come data breach solamente le violazioni di sicurezza che coinvolgono dati di natura sensibile.Stefano Gazzella (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
Orion Leaks: Erede Legittimo o “Scavenger” nell’Ombra di LockBit?
📌 Link all'articolo : redhotcyber.com/post/orion-lea…
#redhotcyber #news #orionleaks #lockbit #ransomware #cybersecurity #hacking #malware #operazionecronos #leak
Orion Leaks: Erede Legittimo o "Scavenger" nell'Ombra di LockBit? Orion Leaks erede legittimo di Lockbit? Analisi Tecnica
Il possibile collegamento tra Orion Leaks e LockBit: un’analisi approfondita del fenomeno di repackaging dei dati, evidenze infrastrutturali e implicazioni per la threat intelligence.Raffaela Crisci (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
securityaffairs.com/186882/cyb…
#securityaffairs #hacking
AZ Monica hospital in Belgium shuts down servers after cyberattack
A cyberattack hit AZ Monica hospital in Belgium, forcing it to shut down servers, cancel procedures, and transfer critical patients.Pierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
securityaffairs.com/186861/cyb…
#securityaffairs #hacking
Threat actor claims the theft of full customer data from Spanish energy firm Endesa
Endesa disclosed a data breach exposing full customer data, including contact details, national ID numbers, and payment information.Pierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
NEW: 24-year-old Nicholas Moore will plead guilty to hacking the U.S. Supreme Court electronic filing system in 2023.
There aren't a lot of public details about this case for now. It will be interesting to find out what he accessed or stole.
techcrunch.com/2026/01/13/man-…
Man to plead guilty to hacking US Supreme Court filing system | TechCrunch
A 24-year-old from Tennessee is expected to admit to accessing the Supreme Court’s electronic filing system without authorization dozens of times throughout 2023.Lorenzo Franceschi-Bicchierai (TechCrunch)
Cybersecurity & cyberwarfare reshared this.
#Fedinews: il "giornale" con le migliori notizie provenienti dal fediverso italiano
Vuoi leggere un flusso di notizie selezionato dagli utenti italiani del @fediverso ?
Allora puoi provare ad aprire la pagina
di fedinews.it, realizzata da @skariko
E se vuoi pubblicare anche tu una notzia che secondo dovrebbe essere presente su FediNews, allora puoi pubblicarla dal tuo attuale account social menzionando i gruppi Activitypub su feddit.it e su citiverse.it
Fediverso Italia - Le Ultime Discussioni
Scopri le discussioni più interessanti dal fediverso italiano. Citiverse e Feddit in un unico posto.fedinews.it
like this
reshared this
informapirata ⁂ reshared this.
no perché è sufficiente seguire il feed RSS di feddit.it e di citiverse.it
Se disponi di un buon sistema di lettura dei Feed RSS ti conviene Anzi selezionare solo le community di tuo interesse
@dajelinux grazie. Forse per molti era ovvio, ma per me è stato un suggerimento illuminante.
È bastato aggiungere al mio aggregatore (Feeder) rss il link feddit.it/c/news ed ora leggo le "news dal fediverso" comodamente lì. 🙏🙏🙏
Poliverso - notizie dal Fediverso ⁂ likes this.
informapirata ⁂ reshared this.
@saxeee esattamente. Con NodeBB basta andare sulla categoria e il feed è uno solo (vedi img)
Il feed RSS di una categoria NodeBB
Con Lemmy poi è ancora più configurabile (vedi img) perché puoi vere un feed personalizzato
saxeee reshared this.
Meta nomina l'ex consigliera di Trump Dina Powell McCormick presidente e vicepresidente
La notizia ha ottenuto il plauso del presidente degli Stati Uniti Donald Trump . In un post sulla sua piattaforma social Truth Social, il presidente repubblicano ha affermato che la mossa è stata una "grande scelta" da parte del CEO di Meta Mark Zuckerberg, e ha sottolineato che Powell McCormick ha "servito l'amministrazione Trump con forza e distinzione".
reshared this
I robot imparano guardando YouTube: NEO potrebbe cambiare per sempre la robotica
📌 Link all'articolo : redhotcyber.com/post/i-robot-i…
#redhotcyber #news #intelligenzaartificiale #robotica #neo #1xworldmodel #comandidigitali #azionireali
I robot imparano guardando YouTube: NEO potrebbe cambiare per sempre la robotica
Il robot umanoide NEO di 1X si aggiorna con un nuovo modulo di apprendimento che gli permette di tradurre comandi vocali o di testo in azioni reali.Redazione RHC (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
Morte on demand: le reti digitali che trasformano i ragazzi e i disabili in killer
📌 Link all'articolo : redhotcyber.com/post/morte-on-…
#redhotcyber #news #cybercrime #violenzaonline #criminalitàinformatica #sicurezzainformatica
Morte on demand: le reti digitali che trasformano i ragazzi e i disabili in killer
Un giovane svedese di 21 anni, associato alla rete criminale Foxtrot, è stato arrestato in Iraq per organizzazione di omicidi e associazione a delinquere.Redazione RHC (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
Privilegi di accesso e identità alimentate dall’AI: rischi e mitigazioni
@Informatica (Italy e non Italy 😁)
Molte aziende fanno affidamento sull'accesso sempre attivo, na gli ambienti operativi attuali sono più dinamici di quelli di ieri. Invece oggi l’AI amplia velocemente la superficie di attacco focalizzata sulle identità. Ecco quali rischi cyber sono legati agli
Informatica (Italy e non Italy) reshared this.
Sensitive content
reshared this
The ARCTURUS Computer Developed at Sydney University in the 1960s
[State of Electronics] have released their latest video about ARCTURUS, the 14th video in their series The Computer History of Australia.
ARCTURUS was a research computer system developed on a shoestring budget at Sydney University in the 1960s, and was in service until 1975. Particularly the system was developed by [David Wong] as a part of his PhD thesis: The design and construction of the digital computers snocom, nimbus and arcturus (PDF). [David] worked in collaboration with [Kevin R. Rosolen] who is interviewed in the video.
The machine is described as a fixed-point, binary, parallel, single address, general-purpose digital computer using packaged diode-transistor circuits. Ferrite-core memory was used instead of drum memory because drum memory was too slow and performance was a high priority feature. For the same reason parallel features were implemented where serial might have been done more simply, if it hadn’t been so slow. In addition to the ferrite-core there were paper-tape peripherals and control panels.
The machine supported 32 distinct instructions and had a 13-bit address space allowing it to directly address 8,192 words, each word comprising 20-bits. Those word bits were one sign bit and nineteen magnitude bits for fixed-point two’s complement binary numbers.
We covered The Computer History of Australia by [State of Electronics] back when they released their 5th video in the series, Australia’s Silliac Computer, if you’re interested in more history of computing in Australia.
youtube.com/embed/h7cw7BNOZ-Y?…
Electronic Nose Sniffs out Mold
It turns out, that mold is everywhere. The problem is when it becomes too much, as mold infestations can have serious health effects on both humans and animals. Remediation is extremely expensive, too. So there are plenty of benefits to finding mold early. Now, German researchers are proposing an electronic “nose” that uses UV-activated tin oxide nanowires that change resistance in the presence of certain chemicals, and they say it can detect two common indoor mold species.
The nanowire sensors can detect Staachybotrys chartarum and Chaetominum globosum. The real work, though, is in the math used to determine positive versus negative results.
Traditional methods take some sort of physical sample that is sent to a lab and require days to process. However, trained dogs can also smell mold, but as you might expect, there aren’t many dogs trained to find mold. Besides, the training is expensive, you have to maintain the dog all the time, and if the dog knows what kind of mold it is, it can’t say. So an electronic nose that can give fast, specific results is quite attractive.
Even if you don’t care about mold, the data crunching to classify the sensor data has application to many types of sensors. They used training to build multiple models, then they combine the outputs using a regression algorithm to predict the true output. Finally, they use a majority voting technique to combine the results of the model and the regression output.
Could you make a sensor like this? Reading section 4.2 of the paper, it looks like you need a pretty stout set of lab gear to play. But the math ideas are certainly something you could replicate or use as a starting point for your own sensor fusion projects.
Want a deep dive into sensor fusion? You should have been at the Hackaday Superconference a few years ago. Luckily, you can still watch [Christal’s] talk about fusing multiple streams of sensor data.
Optimizing a Desktop, 3D Printed Wind Tunnel
You’ve heard of wind tunnels– get some airflow going over a thingy, put some some smoke on, and voila! Flow visualization. How hard could it be? Well, as always, the devil is in the details and [toast] is down in there with him with this Hot-Wheels sized wind tunnel video.
To get good, laminar flow inside of a wind tunnel, there are important ratios to be followed– the inlet and outlet diameters must relate to the interior size to get the correct slope on the contraction and exhaust cones. You need a flow straightener on both ends. All of it can be easily 3D printed, as [toast] shows, but you have to know those design rules and pay attention to, which [toast] does… this time. One of his “don’t do this” examples in this video is previous build of his where he did not follow all the rules, and the difference is clear.
Now, unless you’re hooked on flow visualizations —guilty— or are a Hot-Wheels aficionado, since that’s what this wind tunnel is sized for, you probably won’t rush to gumroad to buy [toast]’s STLs. On the other hand, if you pay attention to the lessons [toast] has learned in this video you can apply them to wind tunnels of whatever size and construction technique you need, be it cardboard or junk box plastic and get a more stable result.
youtube.com/embed/D60PdZJggyk?…
The Distroless Linux Future May Be Coming
Over the decades the number of Linux distributions has effectively exploded, from a handful in the late ’90s to quite literally hundreds today, not counting minor variations. There lately seems to be a counter-movement brewing in response to this fragmentation, with Project Bluefin’s Distroless project being the latest addition here. Also notable are KDE’s efforts, with KDE Linux as its own top-down KDE-based distro, but now with a switch to BuildStream from Arch likely as a distroless move.
It should be clear that there is no obvious course here yet, and that opinions are very much divided. The idea of ‘Linux’ becoming a more singular OS appeals to some, while to others it’s the antithesis of what ‘Linux’ is about. This much becomes clear in [Brodie Robertson]’s exploration of this topic as well.
The way to think about ‘distroless’ is that there is a common base using the Freedesktop SDK on which the customization layer is applied, such as Bluefin, KDE or Gnome’s environments. You could think of this base as the common runtime, using the Freedesktop standards for interoperability for a user-selected layer that’s installed on top. This way the idea of basing a distro on a specific distro is tossed out in favor of something that’s vaguely reminiscent of the Linux Standard Base attempt at standardization.
It’ll be fascinating to see how things will move from here, as there are definite arguments to be made in favor of less fragmentation and resultingly less duplicated effort. In many ways this would bring Linux closer to for example FreeBSD, which avoids the Linux Chaos Vortex problem by having a singular codebase. FreeBSD ‘distros’ like GhostBSD and NomadBSD are therefore essentially just specialized customizations that target a sub-group of FreeBSD users.
Of course, when we start talking about package managers and other base-distro specific features, we may very well risk igniting the same problems that tore apart the LSB so many years ago. Will we also standardize on RPM over DEB package files and kin, or something else?
youtube.com/embed/k6qCtIHFu_c?…
Michelson Interferometer Comes Home Cheap
We suspect there are three kinds of people in the world. People who have access to a Michelson Interferometer and are glad, those who don’t have one and don’t know what one is, and a very small number of people who want one but don’t have one. But since [Longest Path Search] built one using 3D printing, maybe the third group will dwindle down to nothing.
If you are in the second camp, a Michelson interferometer is a device for measuring very small changes in the length of optical paths (oversimplifying, a distance). It does this by splitting a laser into two parts. One part reflects off a mirror at a fixed distance from the splitter. The other reflects off another, often movable, mirror. The beam splitter also recombines the two beams when they reflect back, producing an interference pattern that varies with differences in the path length between the splitter and the mirror. For example, if the air between the splitter and one mirror changes temperature, the change in the refraction index will cause a minute difference in the beam, which will show up using this instrument.
The device has been used to detect gravitational waves, study the sun and the upper atmosphere, and also helped disprove the theory that light is transmitted through a medium known as luminiferous aether.
The tolerances for such a device are tight, but within the capability of modern 3D printers. The CAD files are online. The key was the mirror mounts, which use springs and thumbscrews. So you do need some hardware and, oh yeah, a laser, although that’s not as hard to obtain as it once was. You obviously can’t 3D print the mirrors or the beam splitter either.
The post claims the device is cheap because the bill of materials was roughly $3, although that didn’t include the beamsplitter, which would bring the cost up to maybe $20. The device, in theory, could detect distance changes as small as one wavelength of the laser, which is around 650nm. Not bad for a few bucks.
Not all Michelsons use lasers. The man behind the Michelson instrument also worked out how to do Fourier analysis with a mechanical computer.
Keebin’ with Kristina: the One with the Cheap-O Keyboard
All right, I’ll cut to the chase: Cheap03xD is mainly so cheap because the PCB falls within a 10 x 10 cm footprint. The point was to make a very affordable keyboard — all the parts come to ~40 Euro (~$47). So it would seem that [Lander03xD_] succeeded.
Image by [Lander03xD_] via redditCheap03xD is all the things — 36-key, split, column-staggered, wireless, hot-swappable, and uses ZMK. The batteries are easily replaceable, and no they don’t get in the way.
Those are MMD Princess silent switches, which I wouldn’t choose, but [Lander03xD_] is taking this board to the office, so I get it. They sure are a nice shade of pink, anyway, and they go really well with the pastels of the DSA keycaps and the bezel.
One cool thing to note is that the PCBs are reversible, like the ErgoDox. This isn’t [Lander03xD_]’s first board, and it won’t be the last.
Now, let’s talk batteries. [Saixos] pointed out that the design doesn’t appear to include a protection circuit. In case you can’t tell from where you’re sitting, those are nice!nano clones that [Lander03xD_] is using, and they expect a protection circuit.
[Lander03xD_] is going to look through the docs and see what’s what. The goal is not to have any daughter boards, so this may take some rethinking.
Via reddit
Arc Raiders Keyboard Looks the Part
So Arc Raiders is this cool-looking, stripe-logoed, multiplayer extraction shooter that just came out a couple of months ago for all the platforms. It’s not something I could personally play as it’s way too immersive (read: time-consuming), but it definitely looks good, much like this keyboard that [RunRunAndyRun] designed to play it.
Image by [RunRunAndyRun] via redditHaving enjoyed the game with a game pad for a couple of weeks, [RunRunAndyRun] longed for the precision of a keyboard and mouse. The only problem was that his stock of split keyboards all lack a number row.
No matter; just make a new one. Why not? This rustic beauty runs on the Waveshare RP2040 Zero. The case was 3D printed on a Prusa Mk4, which you’d never know unless you blew up the picture. And then [RunRunAndyRun] gave it that nice patina using Panduro hobby acrylics and a bit of weathering powder.
For now, it’s working pretty well, though [RunRunAndyRun] is still perfecting the keymap. If you’d like to build one yourself, the STLs are available here, and the firmware is on GitHub.
Thanks for the tip, [John]!
The Centerfold: Witch’s Brew
Image by [CaptLynx] via redditThis stunning beauty, Witch’s Brew, was created by [CaptLynx] with the Cosmos keyboard configurator. Doesn’t sound familiar? It’s the one that uses a scan of your hand to create your ultimate comfort. This keyboard is a custom build for a commission. I must say, as much as I dislike the work of Jackson Pollock, I do absolutely love the spatter on those keycaps.
Do you rock a sweet set of peripherals on a screamin’ desk pad? Send me a picture along with your handle and all the gory details, and you could be featured here!
Historical Clackers: the Keystone
Image via The Antikey Chop
This spartan beauty was named after the state in which it was made, Pennsylvania. Manufactured between 1898 and 1903, the Keystone was invented by William Prehn Quentell.
Quentell was living in Kansas City, MO when he first applied for a patent, and later moved to the east coast. At the time, the machine was nameless. The patent looks nothing like the finished product pictured here, but the genesis of the key feature of this “poor man’s Hammond” is there — the swinging type sector.
What this means is that the Keystone has its type on a half wagon wheel, which is evident in the patent drawing. The glyphs are molded around the outside edge of the wheel, which gets rotated into the correct position with each keystroke. This type wheel could be easily changed out for different fonts.Image via Google Patents
To imprint the paper, a spring-driven hammer strikes from behind, pushing the paper and ribbon against the type wheel. The paper is loaded into a cylindrical holder in the rear, and unfurls as one types.
So, why was it a poor man’s Hammond? Well, for one, the patent image looks like a Hammond. But the poor part is felt the hardest in the makeup of the typewriter.
In the early Keystone examples, the carriage rails were made of pig iron. Why? It’s a simple case of lateral integration. The factory that was retrofitted to manufacture the machine had previously been the Lochiel iron mill, a producer of pig iron. They were just using up old stock, I imagine.
The Keystone featured two Shift keys on the left, one for Caps and one for Figures. It was a comparatively inexpensive at $40, and then later, $35 (around $1,200 today).
Production was supposed to begin in May of 1898. But by June of ’99, “the company has been unable to fill the orders which are piling up at the works.” Sounds like your average Kickstarter. Quentell was already working on his next project by 1902, the Postal typewriter.
Finally, a Keyboard That Charges Your Phone
So this article mainly centers on the new little Blackberry-esque number from Clicks which might just be my next phone, except that it doesn’t actually telephone. Clicks is meant to be your second phone, the one you use for emailing and such. You can pre-order it for $399 if you put a $199 deposit down before February 27th. If you decide to drop the full four hundo as an early bird, you’ll get two additional back covers, which slightly change the look of the phone.Image by Clicks via TechCrunch
But I’d like to talk about the add-on Power Keyboard for smart phones that Clicks is also dropping at CES this year. Do you miss your Sidekick? Well, here’s a sliding keyboard with multiple positions for differently-sized smart phones, tablets, and even smart TVs. (Because forget typing with the remote control.)
It uses a 2,150 mAh battery and attaches via MagSafe or Qi2, but it also can be used with the case on. When paired with a smart TV, you just use it by itself. Honestly, it looks kind of hard to type on without the phone for support. But I don’t use the smart features of my TV, so whatever.
Honestly, I will probably start by getting the keyboard, which is $79 for early birds through their site, and $109 later on. Pre-orders started a week ago, so I guess I should get on that.
Got a hot tip that has like, anything to do with keyboards? Help me out by sending in a link or two. Don’t want all the Hackaday scribes to see it? Feel free to email me directly.
Chasing The Coca-Cola Recipe
One of the most widely recognised product brands in the world is probably Coca-Cola, and its formula is famously kept a secret through precautions that probably rival those of many nation states. There are other colas, and there are many amateurs who have tried to copy Coke’s flavour, but in well over a century, nobody has managed it. Why does [LabCoatz] think his attempt will be successful where others failed? He has friends with their own mass spectrometers.
‘The video below the break is a nearly half-hour exploration into food chemistry and the flavour profile of the well-known soft drink. It’s easy to name many of the ingredients, but some, such as acetic acid, are unexpected. Replicating the contribution from Coke’s de-cocainised coca leaf extract requires the purchase of some of the constituent chemicals in pure form. Its value lies in showing us how flavour profiles are built up, and the analytical methods used in their decoding.
He makes the point that Coke has never patented the formula because to do so would reveal it, but perhaps in that lies the real point. The value in a secret formula for brands such as Coke lies not in the secret itself, as it’s not difficult to make a refreshing cola drink. Instead, it’s the mystique of their product having a secret recipe that matters. Since this isn’t the recipe itself but something that’s supposed to taste a lot like it, that mystique stays intact. He’s not positioning his Lab-Cola as the real thing, so while we might have used a different label colour and font just to make sure, we’re guessing he’s safe from the lawyers. If you’re interested in the legal grey areas surrounding perceived infringement, though, it’s a topic we’ve looked at before.
youtube.com/embed/TDkH3EbWTYc?…
Thanks [Hans] for the tip!
La civiltà dei dati. Rivista
Civiltà dei dati è una bella rivista. Prosecuzione ideale della Civiltà delle macchine che dal 1953 al 1979 ha contribuito a modellare la cultura dell’innovazione nel nostro paese, aspira oggi come allora a intrecciare il dialogo tra scienza, tecnologica e sperimentazione letteraria e artistica con un focus specifico sull’ontologia del dato. Proprio quel dato che consente scelte e previsioni, il dato che ci anticipa e rappresenta nel mondo digitale e che è il carburante delle nuove macchine IA è il centro e al centro della rivista. Diretta da Jaime D’Alessandro, storica penna tecnologica dell’Espresso e di Repubblica, è un contenitore di alcune delle migliori firme del pensiero contemporaneo in lingua italiana, Floridi, Taddeo, Benanti, Aresu, e del giornalismo tech come Iacona, Aluffi, Sterling e altri. I primi quattro numeri della rivista, frutto di un progetto della Fondazione Leonardo, direttrice generale la giornalista Helga Cossu, sono stati dedicati a quattro grandi temi d’attualità: lo spazio, la mente, gli archivi, l’IA e i digital twins.
La rivista è molto curata, sia dal punto di vista grafico, con una chiara impronta visiva, sia per i contenuti.
Il primo numero è una parata delle stelle femminili protagoniste della ricerca spaziale; il secondo, è incentrato sugli effetti psicologici della tecnologia e dei social network; il terzo si fonda sul rapporto tra analogico e digitale per parlare di archivi. Particolarmente interessanti sono le riflessioni di Paolo Benanti in questo numero tre quando parla dell’importanza della memoria selettiva, cioè di quel processo che è umano ma non macchinico, di ritenere solo quello che serve, come accadeva con le biblioteche. Benanti fa anche un riferimento importante all’etica dell’IA quando ricorda che gli strumenti, tutti gli strumenti, non sono neutri, ma forme d’ordine e disposizioni di potere. Nella rivista numero 4 va letta l’intervista a Lucilla Sioli, direttrice dell’ufficio europeo per l’IA. Detto per inciso è quella graficamente più bella (recupera le copertine di Urania). Ma è sempre nel numero 3 che troviamo la chicca: una storia a fumetti dell’impareggiabile Milo Manara basato sulla storia della biblioteca meccanica di Jorge Luis Borges. Chissà se quell’utopia bella e terribile della macchina da scrivere universale, oggi rappresentata dall’IA generativa, potrà mai predirci il futuro dentro a un libro. Accetteremmo anche qualche errore di sintassi.
«Civiltà dei dati. 2025. Fondazione Leonardo. Direttore Jaime D’Alessandro». Nella foto i primi quattro numeri.
securityaffairs.com/186851/cyb…
#securityaffairs #hacking
Dutch court convicts hacker who exploited port networks for drug trafficking
Dutch appeals court jails a 44-year-old hacker for 7 years for hacking port systems to help smuggle cocaine through European logistics hubs.Pierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
Basta un riavvio: il trucco che spegne Windows Defender prima ancora che parta
📌 Link all'articolo : redhotcyber.com/post/basta-un-…
#redhotcyber #news #cybersecurity #hacking #malware #ransomware #sicurezzainformatica #edr #antivirus #windows
Basta un riavvio: il trucco che spegne Windows Defender prima ancora che parta
Un ricercatore pubblica su GitHub uno strumento chiamato EDRStartupHinder che impedisce ad antivirus ed EDR di avviarsi su Windows.Redazione RHC (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
La controversa battaglia legislativa dell'UE su chatcontrol sta entrando in una fase decisiva. L'intervista a @echo_pbreyer
Il 2026 è l’anno in cui impareremo fino a che punto l’UE è disposta ad arrivare. Il regolamento sugli abusi sessuali sui minori, comunemente noto come #chatcontrol richiederà alle piattaforme online di rilevare, segnalare e rimuovere materiale illegale, ha una storia lunga e controversa.
euperspectives.eu/2025/12/brey…
Chat Control faces crunchtime. Heavy lifting is scheduled for 2026, Breyer warns - EU Perspectives
EU Chat Control heads into decisive 2026 talks as trilogues begin, with debates over encryption, surveillance and child protection.Joana Soares (EU Perspetives)
reshared this
La mente dietro le password: Errore umano? No, un legame che non c’è. Puntata 4
📌 Link all'articolo : redhotcyber.com/post/la-mente-…
#redhotcyber #news #sicurezzainformatica #cybersecurity #fattoreumano #sicurezzadeldipendente #violazionididati
La mente dietro le password: Errore umano? No, un legame che non c’è. Puntata 4 Fattore umano e sicurezza
Il fattore umano nella sicurezza è coinvolto in molte violazioni. Perché l’errore non è la causa, ma l’ultimo anello visibile.Simone D'Agostino (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
🔴 Benvenuta in Red Hot Cyber Cyber Angels 🔴
📩 Chi fosse interessata a partecipare alle RHC Cyber Angels può inviare la propria candidatura a
👉 redazione@redhotcyber.com
#redhotcyber #rhccyberangels #hacking #benesseredigitale #cti #ai #online #it #cybercrime #cybersecurity
Cybersecurity & cyberwarfare reshared this.
Report annuale Polizia Postale 2025: la normalità dell’attacco, il dovere della resilienza
@Informatica (Italy e non Italy 😁)
La fotografia scattata dal report annuale della Polizia Postale è netta: frodi industrializzate, incidenti continui, AI che aumenta la credibilità delle truffe. Un’analisi dei punti salienti e delle scelte operative che imprese e
Informatica (Italy e non Italy) reshared this.
CORSO NIS2 SENZA SEGRETI: LA FORMAZIONE PER AZIENDE E PROFESSIONISTI FIRMATA RED HOT CYBER!
📌 𝗔𝗰𝗰𝗲𝘀𝘀𝗼 𝗳𝗹𝗲𝘀𝘀𝗶𝗯𝗶𝗹𝗲: contenuti sempre disponibili
📌 𝗗𝘂𝗿𝗮𝘁𝗮 𝗱𝗲𝗹 𝗰𝗼𝗿𝘀𝗼: 10 ore suddivise in 5 moduli e 26 lezioni
📌 𝗟𝗶𝘃𝗲𝗹𝗹𝗼: Base
📌 𝗣𝗿𝗲𝗿𝗲𝗾𝘂𝗶𝘀𝗶𝘁𝗶 𝗽𝗲𝗿 𝗶𝗹 𝗰𝗼𝗿𝘀𝗼: conoscenza base della valutazione del rischio
📌 𝗦𝘂𝗽𝗽𝗼𝗿𝘁𝗼 𝗮𝗹 𝗰𝗼𝗿𝘀𝗼: docente disponibile via mail
👉Iscriviti all'Academy per vedere l'anteprima gratuita del corso academy.redhotcyber.com/course…
👉Scrivici ad academy@redhotcyber.com o Whatsapp al 3791638765
#redhotcyber #hacking #cti #ai #online #it #cybercrime #cybersecurity #threat #OnlineCourses #Elearning #DigitalLearning #RemoteCourses #VirtualClasses #CourseOfTheDay #LearnOnline #OnlineTraining #Webinars #academy #corso #formazioneonline #direttivanis
Cybersecurity & cyberwarfare reshared this.
Drive 1024×600 Pixels via I2C with an ATtiny85
If you need to drive a big screen for a project, it’s fair to say your first thought isn’t going to be to use the ATtiny85. With just 512 bytes of RAM and 8 kilobytes of flash memory, the 8-bit micro seems a little cramped to drive, say, a 10″ screen. Yet that’s exactly what [ToSStudio] is doing with TinyTFT_LT7683: 1024 x 600 pixels of TFT goodness, over I2C no less.With the right TFT controller, this little micro-controller can do magic.
The name kind of gives away the secret: it won’t work on just any TFT display. It’s using properties of the LT7683 display driver, though if you don’t have one of those, the RA8875 is also compatible. Those drivers can take more than just a pixel stream– a good thing, since you’d be hard pressed to get that many pixels streaming from an ATtiny. These are character/graphic display drivers, which means you can get them to draw both characters and graphics on the screen if you speak the lingo.
It’s still not blazing fast; the documentation suggests “static or moderately dynamic UIs” as the suggested use case, and a clock is of the pre-programmed examples. From that, we can surmise that you can get 1 FPS or better with this code. You’re limited both by the simple micro-controller and the bandwidth of the I2C bus, but within those limits this seems like a very powerful technique.
This isn’t the first ATtiny graphics library to blow our minds, but if you really want an impressive graphics demo from the little micro that could, you really need to race the beam.
Thanks to [Thomas Scherer] for the tip!
LA GUERRA: ALCUNE DEFINIZIONI E CARATTERISTICHE (PRIMA PARTE)
@Informatica (Italy e non Italy 😁)
In questi ultimi anni la comunicazione, scritta e verbale, ci ha subissato di informazioni inerenti alle guerre, seppur concentrandosi sulle due principali.
L'articolo LA GUERRA: ALCUNE DEFINIZIONI E CARATTERISTICHE (PRIMA PARTE) proviene da GIANO NEWS.
#DIFESA
Informatica (Italy e non Italy) reshared this.
Burnout: un allarme di sistema nell’IT e nella Cyber Security aziendale
📌 Link all'articolo : redhotcyber.com/post/burnout-u…
#redhotcyber #news #cybersecurity #burnout #stresslavorativo #salutelavorativa #sicurezzainformatica
Burnout: un allarme di sistema nell'IT e nella Cyber Security aziendale
Il burnout nella cybersecurity: come lo stress lavorativo cronico può incidere sulla sicurezza informatica e sul benessere dei professionisti del settore.Paloma Donadi (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
196 - L’AI è ovunque, ma il lavoro no. Cosa fare, adesso - Marco Camisani Calzolari
L’AI è ovunque, ma il lavoro no. Cosa fare, adesso Stiamo entrando in un mercato del lavoro in cui il problema non è l’AI che ruba posti, ma le persone che restano ferme mentre il lavoro cambia.Web Staff MCC (Marco Camisani Calzolari)
Cybersecurity & cyberwarfare reshared this.
🤖 Tracking strings detected and removed!
🔗 Clean URL(s):
camisanicalzolari.it/196-lai-e…
❌ Removed parts:
?utm_source=dlvr.it&utm_medium=mastodon
196 - L’AI è ovunque, ma il lavoro no. Cosa fare, adesso - Marco Camisani Calzolari
L’AI è ovunque, ma il lavoro no. Cosa fare, adesso Stiamo entrando in un mercato del lavoro in cui il problema non è l’AI che ruba posti, ma le persone che restano ferme mentre il lavoro cambia.Web Staff MCC (Marco Camisani Calzolari)
The Intel 8087 and Conditional Microcode Tests
Continuing his reverse-engineering of the Intel 8087, [Ken Shirriff] covers the conditional tests that are implemented in the microcode of this floating point processing unit (FPU). This microcode contains the details on how to perform the many types of specialized instructions, like cos and arctan, all of which decode into many microcode ops. These micro ops are executed by the microcode engine, which [Ken] will cover in more detail in an upcoming article, but which is effectively its own CPU.
Conditional instructions are implemented in hardware, integrating the states of various functional blocks across the die, ranging from the instruction decoder to a register. Here, the evaluation is performed as close as possible to the source of said parameter to save on wiring.
Implementing this circuitry are multiplexers, with an example shown in the top die shot image. Depending on the local conditions, any of four pass transistors is energized, passing through that input. Not shown in the die shot image are the inverters or buffers that are required with the use of pass transistors to amplify the signal, since pass transistors do not provide that feature.
Despite how firmly obsolete the 8087 is today, it still provides an amazing learning opportunity for anyone interested in ASIC design, which is why it’s so great that [Ken] and his fellow reverse-engineering enthusiasts keep plugging away at recovering all this knowledge.
Il feed RSS di una comunità Lemmy
Kamo
in reply to Redhotcyber • • •