Qualche idea per sopravvivere al divorzio transatlantico. Conversazione con Giuliano Da Empoli
“quelli che chiamo predatori digitali e predatori politici, i proprietari delle grandi aziende digitali, sostengono esplicitamente i movimenti nazionalisti, perché si sono resi conto di poterli sfruttare per smantellare le democrazie liberali: su quello che viene dopo, sul futuro, non c’è convergenza, ma intanto si distrugge insieme, e con più efficacia”
We report in the pink few minutes of sunrise. In the morning, the sun veers more and more northeast from its wintry southeast position - although it is not any warmer that we can tell. We follow a host of sparrows from tree to tree as we are trying to dodge a very thin drizzle.
Moving Beyond the NPM elliptic PackageIf you're in a hurry, head on over to soatok/elliptic-to-noble and follow the instructions in the README in order to remove the elliptic package from your project and all dependencies in node_modules. Art: CMYKat Why replace the elliptic package? Yesterday, the Trail of Bits blog published a post about finding cryptographic bugs in the elliptic library (a Javascript package on NPM) by using the Wycheproof.http://soatok.blog/2025/11/19/moving-beyond-the-npm-elliptic-package/#npm #crypto #cryptography #elliptic #security #infosec #cve #mitigation #appsec #javascript #js #npm #npmsecurity #npmpackages
🔎 Google Vulnerability that allows to delete pages from Google SearchIn the cybersecurity scenarios we usually encounter, we would hardly take into consideration SEO and Google’s search results. But if a malicious actor had the ability to remove from the search results of the most famous search engine in the world all the pages of a company, what economic and reputational damage could they cause? 🔗 https://8bitsecurity.com/posts/google-vulnerability-that-allows-to-delete-pages-from-google-search/#cybersecurity #threatintelligence #security #InfoSec#hacking