Skip to main content



Gaza Health Ministry reports 83 martyrs in 24 hours

This brings the total death toll from the Israeli aggression on the Gaza Strip, since October 7, 2023, to 60,332 martyrs and 147,643 injured.

en.mdn.tv/8bOK

#Politics




“America Built It but Spain Took It” as US Space Balloon Pioneer Gets Snapped Up and Sparks Furious Clash Over Tech Ownership and National Pride byteseu.com/1247492/ #Spain



Près de Tours, Mohamed attend que sa mère ayant fui Gaza puisse le rejoindre

Pour fuir #Gaza, Aysha a rejoint l’Égypte, où elle n’a aucun droit ni attache. Elle a depuis essuyé deux refus de visa pour la France, alors qu’elle espérait y retrouver son fils, prêt à l’accueillir et à l’héberger. Plusieurs recours ont été déposés.

Par Nejma Brahim › mediapart.fr/journal/france/01…

#Gaza



Early on in my online experiment in uploading philosophy class videos to YouTube, one of the main things that told me those efforts were worth it was the kinds of comments I got from people watching and using those videos
gregorybsadler.substack.com/p/…



Portugal intends to recognize Palestine in September byteseu.com/1247490/ #Negotiations #Palestine #Parliament #Portugal


Hackaday Podcast Ep 331: Clever Machine Tools, Storing Data in Birds, and the Ultimate Cyberdeck

Another week, another Hackaday podcast, and for this one Elliot is joined by Jenny List, fresh from the BornHack hacker camp in Denmark. There’s a definite metal working flavour to …read more
#hacking #projects
hackaday.com/2025/08/01/hackad…



It's great to see more people using 2FA to secure their accounts!

We’ve been building Ente Auth with privacy, security, and simplicity in mind
More features
More flexibility
Community first

If you're looking for a polished auth app that respects your privacy and security check us out ente.io/auth

Unknown parent

mastodon - Link to source
Ente
@Seedymofo Sadly Authy is very hard to export from. You can read more about it here: help.ente.io/auth/migration/au…
in reply to Ente

Thank you very much for Ente Auth. I use it regularly, whether it's the Android app, the software on Linux Mint or Windows, or the browser version (auth.ente.io ; great idea to offer this access). No complaints, very well designed and functional. #ente #auth #enteauth #2FA


From Project Gutenberg:

The Adventure of Princess Sylvia

by A. M. (Alice Muriel) Williamson

Get it at: gutenberg.org/ebooks/42357



Do neck cooling fans really help you beat the heat?


You might see more people wearing a neck cooling fan to fight the summer heat. But can they really help? We talk to experts about how our bodies deal with heat — and to people using the fans.

#news #npr #publicradio #usa
posted by pod_feeder_v2



Kazakhstan and the Netherlands keen to strengthen economic and investment cooperation byteseu.com/1247488/ #Netherlands


The one they worship says this, or did he?


Belgium – Project 1 | Copernicus byteseu.com/1247486/ #Belgium


sev:CRIT RCE in ms-swift.

github.com/Anchor0221/CVE-2025…

in reply to Bill

Good catch. IDK.

cve.org/CVERecord?id=CVE-2025-…

A remote code execution (RCE) vulnerability exists in the ms-swift project version 3.3.0 due to unsafe deserialization in tests/run.py using yaml.load() from the PyYAML library (versions = 5.3.1). If an attacker can control the content of the YAML configuration file passed to the --run_config parameter, arbitrary code can be executed during deserialization. This can lead to full system compromise. The vulnerability is triggered when a malicious YAML file is loaded, allowing the execution of arbitrary Python commands such as os.system(). It is recommended to upgrade PyYAML to version 5.4 or higher, and to use yaml.safe_load() to mitigate the issue.
in reply to cR0w

@Sempf Related:

cve.org/CVERecord?id=CVE-2025-…

The modelscope/ms-swift library thru 2.6.1 is vulnerable to arbitrary code execution through deserialization of untrusted data within the load_model_meta() function of the ModelFileSystemCache() class. Attackers can execute arbitrary code and commands by crafting a malicious serialized .mdl payload, exploiting the use of pickle.load() on data from potentially untrusted sources. This vulnerability allows for remote code execution (RCE) by deceiving victims into loading a seemingly harmless checkpoint during a normal training process, thereby enabling attackers to execute arbitrary code on the targeted machine. Note that the payload file is a hidden file, making it difficult for the victim to detect tampering. More importantly, during the model training process, after the .mdl file is loaded and executes arbitrary code, the normal training process remains unaffected'meaning the user remains unaware of the arbitrary code execution.
@Bill


Trump has a new plan to supercharge crypto markets

businessinsider.com/crypto-whi…

If there could be a more genocidal and evil country on earth at the moment, it would be hard to find one more base, cruel and depraved than the United States of America.




Shouldn’t be that confusing. Remember, it’s all based on faith. Whatever they tell you, you just believe it because you’re a dutiful, faithful member of the church, right? Eat some of His flesh. Drink some of His blood. He died for your sins. Not the sins of His father, the dude that somehow impregnated a virgin and it was “immaculate,” not rape, even though it was nonconsensual, or at least involved the epitome of unequal power dynamics. Not to mention, it’s monotheistic religion with 3 different gods who are all somehow the same god? Nah, it’s not at all confusing.
in reply to MikeDunnAuthor

wait! wait?!
mononotheistic? with all those intervening angels and saints? surely not