Mushroom risotto Serves 3 as a main course. Active time: 25m. Total time: 45m. Ingredients:pic.twitter.com/9gD4OGLZDs e. hashman (@ehashdn) December 17, 2020
Guglielmo Achille Cavellini (11 September 1914 20 November 1990), also known as GAC, was an Italian artist and art collector. After an initial activity as a painter, in the 1940s and 1950s he became one of the major collectors of contemporary Italian abstract art, developing a deep relationship of patronage and friendship with the artists. This experience has its pinnacle in the exhibition Modern painters of the Cavellini collection at the National Gallery of Modern Art in Rome in 1957. In the 1960s Cavellini resumed his activity as an artist, with an ample production spanning from Neo-Dada to performance art to mail art, of which he became one of the prime exponents with the Exhibitions at Home and the Round Trip works. In 1971 he invented autostoricizzazione (self-historicization), upon which he acted to create a deliberate popular history surrounding his existence. He also authored the books Abstract Art (1959), Man painter (1960), Diary of Guglielmo Achille Cavellini (1975), Encounters/Clashes in the Jungle of Art (1977) and Life of a Genius (1989).
Paul Gustave Louis Christophe Dor (/d re /; French: [ ys.tav d . e]; 6 January 1832 23 January 1883[1]) was a French artist, printmaker, illustrator, comics artist, caricaturist, and sculptor who worked primarily with wood-engraving.
Enrico Baj era bravissimo a pij per culo er potere usanno a fantasia. Co quaa sempricit che solo dii granni, raccatta robbe tipo bottoni, pezzi de stoffa, cordoni, passamanerie varie, e l appiccica su a tela insieme aa pittura sua: che pare quasi che sta a gioc ma giocanno giocanno, zitto zitto, riesce a rovesci er monno. >>
Artemisia Lomi or Artemisia Gentileschi (US: / d nt l ski, -ti -/, Italian: [arte mi zja d enti leski]; July 8, 1593 c. 1656) was an Italian Baroque painter, now considered one of the most accomplished seventeenth-century artists working in the dramatic style of Caravaggio. In an era when women had few opportunities to pursue artistic training or work as professional artists, Artemisia was the first woman to become a member of the Accademia di Arte del Disegno in Florence and had an international clientele.
Maria Pellegrina Amoretti (1756 1787), was an Italian lawyer. She is referred to as the first woman to graduate in law in Italy, and the third woman to earn a degree.
Laura Maria Caterina Bassi (October 1711 20 February 1778) was an Italian physicist and academic. She received a doctoral degree in Philosophy from the University of Bologna in May 1732. She was the first woman to earn a professorship in physics at a university. She is recognized as the first woman in the world to be appointed a university chair in a scientific field of studies. Bassi contributed immensely to the field of science while also helping to spread the study of Newtonian mechanics through Italy.
Maria Gaetana Agnesi (UK: / n je zi/ an-YAY-zee,[1] US: / n -/ ahn-,[2][3] Italian: [ma ri a ae ta na a zi, - e z-];[4] 16 May 1718 9 January 1799) was an Italian mathematician, philosopher, theologian, and humanitarian. She was the first woman to write a mathematics handbook and the first woman appointed as a mathematics professor at a university.[5]
Elena Lucrezia Cornaro Piscopia (US: /k r n ro p sko pi /,[4] Italian: [ lena lu kr ttsja kor na ro pi sk pja]) or Elena Lucrezia Corner (Italian: [kor n r]; 5 June 1646 26 July 1684), also known in English as Helen Cornaro, was a Venetian philosopher of noble descent who in 1678 became one of the first women to receive an academic degree from a university, and the first to receive a Doctor of Philosophy degree.
Maria Tecla Artemisia Montessori (/ m nt s ri/ MON-tiss-OR-ee, Italian: [ma ri a montes s ri]; August 31, 1870 May 6, 1952) was an Italian physician and educator best known for the philosophy of education that bears her name, and her writing on scientific pedagogy. At an early age, Montessori broke gender barriers and expectations when she enrolled in classes at an all-boys technical school, with hopes of becoming an engineer. She soon had a change of heart and began medical school at the Sapienza University of Rome, where she graduated with honors in 1896. Her educational method is still in use today in many public and private schools throughout the world.
Rita Levi-Montalcini OMRI OMCA (US: / le vi mo nt l t i ni, l v-, li vi m nt l -/, Italian: [ ri ta l vi montal t i ni]; 22 April 1909 30 December 2012) was an Italian Nobel laureate, honored for her work in neurobiology. She was awarded the 1986 Nobel Prize in Physiology or Medicine jointly with colleague Stanley Cohen for the discovery of nerve growth factor (NGF). From 2001 until her death, she also served in the Italian Senate as a Senator for Life. This honor was given due to her significant scientific contributions. On 22 April 2009, she became the first Nobel laureate ever to reach the age of 100, and the event was feted with a party at Rome's City Hall. At the time of her death, she was the oldest living Nobel laureate.
Margherita Hack Knight Grand Cross OMRI (Italian: [mar e ri ta (h)ak]; 12 June 1922 29 June 2013) was an Italian astrophysicist and scientific disseminator. The asteroid 8558 Hack, discovered in 1995, was named in her honour.
Samantha Cristoforetti (Italian pronunciation: [sa manta kristofo retti]; born 26 April 1977, in Milan) is an Italian European Space Agency astronaut, former Italian Air Force pilot and engineer. She holds the record for the longest uninterrupted spaceflight by a European astronaut (199 days, 16 hours), and until June 2017 held the record for the longest single space flight by a woman until this was broken by Peggy Whitson and later by Christina Koch. She is also the first Italian woman in space. Samantha Cristoforetti is also known as the first person who brewed an espresso in space.
Silicon Valley s elite are hatching plans to escape disaster and when it comes, they ll leave the rest of us behind
Heteronomy refers to action that is influenced by a force outside the individual, in other words the state or condition of being ruled, governed, or under the sway of another, as in a military occupation.
Poster P590CW $9.00 Early Warning Signs Of Fascism Laurence W. Britt wrote about the common signs of fascism in April, 2003, after researching seven fascist regimes: Hitler's Nazi Germany; Mussolini's Italy; Franco's Spain; Salazar's Portugal; Papadopoulos' Greece; Pinochet's Chile; Suharto's Indonesia. Get involved! Text: Early Warning Signs of Fascism Powerful and Continuing Nationalism Disdain For Human Rights Identification of Enemies As a unifying cause Supremacy of the military Rampant Sexism Controlled Mass Media Obsession With National Security
Political and social scientist Stefania Milan writes about social movements, mobilization and organized collective action. On the one hand, interactions and networks achieve more visibility and become a proxy for a collective we . On the other hand: Law enforcement can exercise preemptive monitorin
How new technologies and techniques pioneered by dictators will shape the 2020 election
A regional election offers lessons on combatting the rise of the far right, both across the Continent and in the United States.
The Italian diaspora is the large-scale emigration of Italians from Italy. There are two major Italian diasporas in Italian history. The first diaspora began more or less around 1880, a decade or so after the Unification of Italy (with most leaving after 1880), and ended in the 1920s to early-1940s with the rise of Fascism in Italy. The second diaspora started after the end of World War II and roughly concluded in the 1970s. These together constituted the largest voluntary emigration period in documented history. Between 1880-1980, about 15,000,000 Italians left the country permanently. By 1980, it was estimated that about 25,000,000 Italians were residing outside Italy. A third wave is being reported in present times, due to the socio-economic problems caused by the financial crisis of the early twenty-first century, especially amongst the youth. According to the Public Register of Italian Residents Abroad (AIRE), figures of Italians abroad rose from 3,106,251 in 2006 to 4,636,647 in 2015, growing by 49.3% in just ten years.
&
or !
, have special meaning on the web or the shell and can wreak
havoc when transferred. Certain software also has policies of refusing
(or requiring!) some special characters exactly for that reason. Weird
characters also make it harder for humans to communicate passwords
across voice channels or different cultural backgrounds. In a more
extreme example, the popular Signal software even resorted to using
only digits to
transfer key fingerprints. They outlined that numbers are "easy to
localize" (as opposed to words, which are language-specific) and
"visually distinct".
But the critical piece is the "memorable" part: it is trivial to
generate a random string of characters, but those passwords are hard for
humans to remember. As xkcd noted,
"through 20 years of effort, we've successfully trained everyone
to use passwords that are hard for human to remember but easy for
computers to guess". It explains how a series of words is a
better password than a single word with some characters replaced.
Obviously, you should not need to remember all passwords. Indeed, you
may store some in password managers (which we'll look at in another
article) or write them down in your wallet. In those cases, what you
need is not a password, but something I would rather call a "token", or,
as Debian Developer Daniel Kahn Gillmor (dkg) said in a private email, a
"high entropy, compact, and transferable string". Certain APIs are
specifically crafted to use tokens. OAuth, for
example, generates "access tokens" that are random strings that give
access to services. But in our discussion, we'll use the term "token" in
a broader sense.
Notice how we removed the "memorable" property and added the "compact"
one: we want to efficiently convert the most entropy into the shortest
password possible, to work around possibly limiting password policies.
For example, some bank cards only allow 5-digit security PINs and most
web sites have an upper limit in the password length. The "compact"
property applies less to "passwords" than tokens, because I assume that
you will only use a password in select places: your password manager,
SSH and OpenPGP keys, your computer login, and encryption keys.
Everything else should be in a password manager. Those tools are
generally under your control and should allow large enough passwords
that the compact property is not particularly important.
$ xkcdpass
estop mixing edelweiss conduct rejoin flexitime
In verbose mode, it will show the actual entropy of the generated
passphrase:
$ xkcdpass -V
The supplied word list is located at /usr/lib/python3/dist-packages/xkcdpass/static/default.txt.
Your word list contains 38271 words, or 2^15.22 words.
A 6 word password from this list will have roughly 91 (15.22 * 6) bits of entropy,
assuming truly random word selection.
estop mixing edelweiss conduct rejoin flexitime
Note that the above password has 91 bits of entropy, which is about what
a fifteen-character password would have, if chosen at random from
uppercase, lowercase, digits, and ten symbols:
log2((26 + 26 + 10 + 10)^15) = approx. 92.548875
It's also interesting to note that this is closer to the entropy of a
fifteen-letter base64 encoded password: since each character is six
bits, you end up with 90 bits of entropy. xkcdpass is scriptable and
easy to use. You can also customize the word list, separators, and so on
with different command-line options. By default, xkcdpass uses the 2 of
12 word list from 12
dicts, which is not specifically
geared toward password generation but has been curated for "common
words" and words of different sizes.
Another option is the diceware system. Diceware
works by having a word list in which you look up words based on dice
rolls. For example, rolling the five dice "1 4 2 1 4" would give the
word "bilge". By rolling those dice five times, you generate a five word
password that is both memorable and random. Since paper and dice do not
seem to be popular anymore, someone wrote that as an actual program,
aptly called diceware. It works in a
similar fashion, except that passwords are not space separated by
default:
$ diceware
AbateStripDummy16thThanBrock
Diceware can obviously change the output to look similar to xkcdpass,
but can also accept actual dice rolls for those who do not trust their
computer's entropy source:
$ diceware -d ' ' -r realdice -w en_orig
Please roll 5 dice (or a single dice 5 times).
What number shows dice number 1? 4
What number shows dice number 2? 2
What number shows dice number 3? 6
[...]
Aspire O's Ester Court Born Pk
The diceware software ships with a few word lists, and the default list
has been deliberately created for generating passwords. It is derived
from the standard diceware list with additions from the SecureDrop
project. Diceware ships with the EFF word
list
that has words chosen for better recognition, but it is not enabled by
default, even though diceware recommends using it when generating
passwords with dice. That is because the EFF list was added later
on. The project is
currently considering
making the EFF list be the default.
One disadvantage of diceware is that it doesn't actually show how much
entropy the generated password has those interested need to compute it
for themselves. The actual number depends on the word list: the default
word list has 13 bits of entropy per word (since it is exactly 8192
words long), which means the default 6 word passwords have 78 bits of
entropy:
log2(8192) * 6 = 78
Both of these programs are rather new, having, for example, entered
Debian only after the last stable release, so they may not be directly
available for your distribution. The manual diceware method, of course,
only needs a set of dice and a word list, so that is much more portable,
and both the diceware and xkcdpass programs can be installed through
pip. However, if this is all too complicated,
you can take a look at Openwall's
passwdqc, which is older and more
widely available. It generates more memorable passphrases while at the
same time allowing for better control over the level of entropy:
$ pwqgen
vest5Lyric8wake
$ pwqgen random=78
Theme9accord=milan8ninety9few
For some reason, passwdqc
restricts the entropy of passwords between
the bounds of 24 and 85 bits. That tool is also much less customizable
than the other two: what you see here is pretty much what you get. The
4096-word list is also hardcoded in the C source code; it comes from a
Usenet sci.crypt
posting
from 1997.
A key feature of xkcdpass and diceware is that you can craft your own
word list, which can make dictionary-based attacks harder. Indeed, with
such word-based password generators, the only viable way to crack those
passwords is to use dictionary attacks, because the password is so long
that character-based exhaustive searches are not workable, since they
would take centuries to complete. Changing from the default dictionary
therefore brings some advantage against attackers. This may be yet
another "security through obscurity" procedure, however: a naive
approach may be to use a dictionary localized to your native language
(for example, in my case, French), but that would deter only an attacker
that doesn't do basic research about you, so that advantage is quickly
lost to determined attackers.
One should also note that the entropy of the password doesn't depend on
which word list is chosen, only its length. Furthermore, a larger
dictionary only expands the search space logarithmically; in other
words, doubling the word-list length only adds a single bit of entropy.
It is actually much better to add a word to your password than words to
the word list that generates it.
pass
, the standard UNIX password
manager, delegates this task to the widely known
pwgen
program. It turns out
that pwgen
has a pretty bad track record for security issues,
especially in the default "phoneme" mode, which generates non-uniformly
distributed passwords. While pass
uses the more "secure" -s
mode, I
figured it was worth removing that option to discourage the use of
pwgen
in the default mode. I made a trivial patch to pass so that it
generates passwords correctly on its own. The gory details are in this
email.
It turns out that there are lots of ways to skin this particular cat. I
was suggesting the following pipeline to generate the password:
head -c $entropy /dev/random base64 tr -d '\n='
The above command reads a certain number of bytes from the kernel
(head -c $entropy /dev/random
) encodes that using the base64
algorithm and strips out the trailing equal sign and newlines (for large
passwords). This is what Gillmor described as a "high-entropy compact
printable/transferable string". The priority, in this case, is to have a
token that is as compact as possible with the given entropy, while at
the same time using a character set that should cause as little trouble
as possible on sites that restrict the characters you can use. Gillmor
is a co-maintainer of the Assword
password manager, which chose base64 because it is widely available and
understood and only takes up 33% more space than the original 8-bit
binary encoding. After a lengthy discussion, the pass maintainer, Jason
A. Donenfeld, chose the following pipeline:
read -r -n $length pass < <(LC_ALL=C tr -dc "$characters" < /dev/urandom)
The above is similar, except it uses tr
to directly to read characters
from the kernel, and selects a certain set of characters ($characters
)
that is defined earlier as consisting of [:alnum:]
for letters and
digits and [:graph:]
for symbols, depending on the user's
configuration. Then the read
command extracts the chosen number of
characters from the output and stores the result in the pass
variable.
A participant on the mailing list, Brian Candler, has
argued
that this wastes entropy as the use of tr
discards bits from
/dev/urandom
with little gain in
entropy
when compared to base64. But in the end, the maintainer
argued
that reading "reading from /dev/urandom
has no [effect] on
/proc/sys/kernel/random/entropy_avail
on Linux" and dismissed
the objection.
Another password manager, KeePass uses its own
routines to generate tokens, but the procedure is the same: read from
the kernel's entropy source (and user-generated sources in case of
KeePass) and transform that data into a transferable string.
pwgen
software showed. Furthermore, left to their own devices, users will
generate passwords that can be easily guessed by a skilled attacker,
especially if they can profile the user. It is therefore essential we
provide easy tools for users to generate strong passwords and encourage
them to store secure tokens in password managers.
Note: this article first appeared in the Linux Weekly News.
Enigma machine photo by Alessandro Nassiri [CC BY-SA 4.0], via Wikimedia Commons |
--fix-autoload-date
option (on by default) to take autoload dates from changelog.
Lunar updated and sent the patch adding the generation of .buildinfo to dpkg.
SOURCE_DATE_EPOCH
in the build system.SOURCE_DATE_EPOCH
in the build system.armhf
build nodes provided by Vagrant Cascadian. This added 7 more armhf
builder jobs. We now run around 900 tests of armhf
packages each day. (h01ger)
The footer of each page now indicates by which Jenkins jobs build it. (h01ger)
armhf
. (h01ger)
Four new armhf
build nodes provided by Vagrant Cascandian were integrated in the infrastructer. This allowed for 9 new armhf
builder jobs. (h01ger)
The RPM-based build system, koji, is now in unstable and testing. (Marek Marczykowski-G recki, Ximin Luo).
Package reviews
131 reviews have been removed, 71 added and 53 updated in the previous week.
58 new FTBFS reports were made by Chris Lamb and Chris West.
New issues identified this week:
nondeterminstic_ordering_in_gsettings_glib_enums_xml,
nondeterminstic_output_in_warnings_generated_by_breathe, qt_translate_noop_nondeterminstic_ordering.
Misc.
Steven Chamberlain explained in length why reproducible cross-building across architectures mattered, and posted results of his tests comparing a stage1 debootstrapped chroot of linux-i386
once done from official Debian packages, the others cross-built from kfreebsd-amd64.
Departure airport | Arrival airport | Flight cost | Bus to Swiss border | Rail pass | Total (Flight+bus/train) | Airport car hire, 10 days | Total (Flight+car) |
---|---|---|---|---|---|---|---|
New York | Geneva | $1,153 | n/a | CHF 82 Return ticket |
$1,235 | CHF 668 | $1,823 |
New York | Milan | $990 | $20 | CHF 315 Flexi pass |
$1,350 | EUR 413 CHF 496 |
$1,490 |
Next.