mastodon.bida.im is part of the decentralized social network powered by Mastodon.
Un'istanza mastodon antifascista. autogestita, italofona con base a Bologna. Rispettosa di privacy e anonimato.

Server stats:

936
active users

Learn more

#uncategorized

13 posts12 participants0 posts today

Portal raises $17.5M for spacecraft powered by sun’s heat
Bothell, Wash.-based Portal Space Systems says it has raised $17.5 million in seed funding to accelerate the development of its Supernova space vehicle, which aims to harness the heat of the sun to power rapid-response maneuvers in orbit.

The oversubscribed inves
cosmiclog.com/2025/04/03/porta
#GeekWire #Uncategorized #PortalSpaceSystems #Propulsion #SolarPower #Space

Illustration: Portal Space Systems' Supernova space vehicle in orbit
Cosmic Log · Portal raises $17.5M for spacecraft powered by sun’s heatBothell, Wash.-based Portal Space Systems says it has raised $17.5 million in seed funding to accelerate the development of its Supernova space vehicle, which aims to harness the heat of the sun to…

Web 3.0 Requires Data Integrity

If you’ve ever taken a computer security class, you’ve probably learned about the three legs of computer security—confidentiality, integrity, and availability—known as the CIA ... schneier.com/blog/archives/202

Schneier on Security · Web 3.0 Requires Data Integrity - Schneier on SecurityIf you’ve ever taken a computer security class, you’ve probably learned about the three legs of computer security—confidentiality, integrity, and availability—known as the CIA triad. When we talk about a system being secure, that’s what we’re referring to. All are important, but to different degrees in different contexts. In a world populated by artificial intelligence (AI) systems and artificial intelligent agents, integrity will be paramount. What is data integrity? It’s ensuring that no one can modify data—that’s the security angle—but it’s much more than that. It encompasses accuracy, completeness, and quality of data—all over both time and space. It’s preventing accidental data loss; the “undo” button is a primitive integrity measure. It’s also making sure that data is accurate when it’s collected—that it comes from a trustworthy source, that nothing important is missing, and that it doesn’t change as it moves from format to format. The ability to restart your computer is another integrity measure...

L’editoriale di Pietro Soldini.
Il 25 aprile è passato, per la seconda volta nel tempo del governo Meloni, ma non è passato il pericolo neonazi fascista e quindi il bisogno di antifascismo, ma non di antifascismo celebrativo, bensi' militante.Per fare un bilancio, occorre partire dalle due affermazioni più significative del governo, una per bocca della Meloni e l'altra per bocca di suo cognato, ma ispir
europeleft.it/2025/04/02/ledit
#Uncategorized

Europa a Sinistra · L’editoriale di Pietro Soldini.Il 25 aprile è passato, per la seconda volta nel tempo del governo Meloni, ma non è passato il pericolo neonazi fascista e quindi il bisogno di antifascismo, ma non di antifascismo celebrativo, ben…

L’editoriale di Pietro Soldini.
Il 25 aprile è passato, per la seconda volta nel tempo del governo Meloni, ma non è passato il pericolo neonazi fascista e quindi il bisogno di antifascismo, ma non di antifascismo celebrativo, bensi' militante.Per fare un bilancio, occorre partire dalle due affermazioni più significative del governo, una per bocca della Meloni e l'altra per bocca di suo cognato, ma ispir
europeleft.it/2025/04/02/ledit
#Uncategorized

Europa a Sinistra · L’editoriale di Pietro Soldini.Il 25 aprile è passato, per la seconda volta nel tempo del governo Meloni, ma non è passato il pericolo neonazi fascista e quindi il bisogno di antifascismo, ma non di antifascismo celebrativo, ben…

Klimakollaps, Faschismus und verdammt was kann ich tun?

radio.nrdpl.org/2025/04/01/kli

Chapter A - Gespräch mit Arne Semsrott 

Die Zeiten sind beschissen. In Deutschland, Europa und weiteren Ländern der Welt erleben wir ein erstarken autoritärer und rechtsextremer Parteien und Bewegungen. Wir befinden uns - mal wieder - im Präfaschismus und dem Ende des uns b (...)

radio.nrdpl.orgKlimakollaps, Faschismus und verdammt, was kann ich tun? – radio nordpol

Il Giubileo, don Giovanni Franzoni ed Elon Musk: l’editoriale di Pietro Soldini.
Sono al terzo, ultimo per quanto mi riguarda, Giubileo (1975-2000-2025) e per parlare di Trump e Musk, voglio partire da lontano e dal punto di vista di un monaco benedettino che potrebbe essere l'esatto contrario rispetto a Musk ed alla sua genialità finalizzata al potere ed a
europeleft.it/2025/04/01/il-gi
#Uncategorized

Europa a Sinistra · Il Giubileo, don Giovanni Franzoni ed Elon Musk: l’editoriale di Pietro Soldini.Sono al terzo, ultimo per quanto mi riguarda, Giubileo (1975-2000-2025) e per parlare di Trump e Musk, voglio partire da lontano e dal punto di vista di un monaco benedettino che potrebbe essere l&…

Ranger’s Dilemma by Armanis Ar-feinial
Blurb

Protect the Goddess's forest. And protect all who dwell within.Those were the two oaths Teyerian swore to uphold when appointed to lead the rangers in their Guildmaster's absence. But when the king makes a pact with unknown forces and magical amulets which amplifies prowess with violent spellcasting, the elves of the forest go mad and turn against the Goddess, t
readerbarn.com/rangers-dilemma
#Uncategorized

AIs as Trusted Third Parties

This is a truly fascinating paper: “Trusted Machine Learning Models Unlock Private Inference for Problems Currently Infeasible with Cryptography.” The basic idea is that AIs can act as tr... schneier.com/blog/archives/202

Schneier on Security · AIs as Trusted Third Parties - Schneier on SecurityThis is a truly fascinating paper: “Trusted Machine Learning Models Unlock Private Inference for Problems Currently Infeasible with Cryptography.” The basic idea is that AIs can act as trusted third parties: Abstract: We often interact with untrusted parties. Prioritization of privacy can limit the effectiveness of these interactions, as achieving certain goals necessitates sharing private data. Traditionally, addressing this challenge has involved either seeking trusted intermediaries or constructing cryptographic protocols that restrict how much data is revealed, such as multi-party computations or zero-knowledge proofs. While significant advances have been made in scaling cryptographic approaches, they remain limited in terms of the size and complexity of applications they can be used for. In this paper, we argue that capable machine learning models can fulfill the role of a trusted third party, thus enabling secure computations for applications that were previously infeasible. In particular, we describe Trusted Capable Model Environments (TCMEs) as an alternative approach for scaling secure computation, where capable machine learning model(s) interact under input/output constraints, with explicit information flow control and explicit statelessness. This approach aims to achieve a balance between privacy and computational efficiency, enabling private inference where classical cryptographic solutions are currently infeasible. We describe a number of use cases that are enabled by TCME, and show that even some simple classic cryptographic problems can already be solved with TCME. Finally, we outline current limitations and discuss the path forward in implementing them...