• The Little Handbook of Online Privacy

    This book had a very long gestation. I started writing it at the end of 2019 and then, because of more important commitments, I decided to put it on hold and pick it up a few months later. In early… read more »
  • Cyber Incident Response Plan: the Post Incident Review

    Cybersecurity is a critical issue in the modern world. As more and more of our personal and professional lives move online, the need for effective cybersecurity measures becomes increasingly important. One key aspect of maintaining strong cybersecurity posture is the… read more »
  • Will blogs be written by AIs in the future?

    I tried to ask ChatGPT (an OpenAI project based on GPT 3.5) to explain if and why in the future all blogs will be written by artificial intelligences…here is the answer! In recent years, there has been a growing trend… read more »
  • “Shine” is available on Spotify

    In the past months I have decided to move away for a while from the joyful and relaxing atmospheres that have characterized my musical production in recent years, and develop somewhat more crepuscular themes. “Shine” is a 4-track EP, designed… read more »
  • Telegram vs. WhatsApp: Pavel Durov's viewpoint

    Over the past few years, Telegram founder Pavel Durov has waged a sort of “battle” against WhatsApp, highlighting its security and privacy problems. Durov has always been very attentive to issues of privacy and freedom of speech more generally, having… read more »
  • Stable Diffusion on Google Colab

    Text-to-image algorithms creates an image from scratch from a text description, using machine learning to understand your words and convert them to a unique image each time. Researchers at OpenAI, Google, Facebook, and others have developed text-to-image tools, and similar… read more »
  • My Weekly Roundup #161

    Cybersecurity Samsung Has Been Hacked: What Data Has Been Stolen? On September 2, Samsung published a security advisory confirming it had been hacked. The breach would appear to have been of Samsung systems in the U.S. and took place in… read more »
  • Search tools for forensic investigation

    During a forensic investigation, a big part of all tasks are composed by searches on files. Below is a brief list of the tools I usually use for this type of activity.. awk An extremely useful tool, especially for parsing… read more »