Salta al contenuto principale



PoE-powered GPIB Adapter with Ethernet and USB-C Support


In the world of (expensive) lab test equipment the GPIB (general purpose interface bus) connection is hard to avoid if you want any kind of automation, but nobody likes wrangling with the bulky cables and compatibility issues when they can just use Ethernet instead. Here [Chris]’s Ethernet-GPIB adapter provides an easy solution, with both Power over Ethernet (PoE) and USB-C power options. Although commercial adapters already exist, these are rather pricey at ~$500.

Features of this adapter include a BOM total of <$50, with power provided either via PoE (802.3af) or USB-C (5V-only). The MCU is an ATmega4809 with the Ethernet side using a Wiznet W5500 SPI Ethernet controller. There is also a serial interface (provided by a CH340X USB-UART adapter), with the firmware based on the AR488 project.

The adapter supports both the VXI-11.2 and Prologix protocols, though not at the same time (due to ROM size limitations). All design documents are available via the GitHub repository, with the author also selling assembled adapters and providing support primarily via the EEVBlog forums.


hackaday.com/2025/05/10/poe-po…



Parla al processo del suo omicidio: la vittima “resuscitata” con l’IA testimonia in tribunale


Per la prima volta nella storia giudiziaria americana, una vittima di omicidio è “salita alla sbarra” durante il processo per il proprio omicidio.

Un tribunale dell’Arizona ha mostrato un videoclip di un avatar digitale di Christopher Pelkey, un veterano dell’esercito americano morto in un incidente stradale nel 2021, mentre parla sullo schermo. La sua voce e il suo aspetto sono stati ricreati utilizzando modelli di reti neurali. Il video è stato creato dalla sorella della vittima e faceva parte dell’udienza di condanna che ha portato all’omicidio la pena massima di 10,5 anni di carcere.

youtube.com/embed/cMs-_8etNts?…

L’omicidio è avvenuto più di tre anni fa. Gabriel Orcasitas ha sparato e ucciso Pelkey ​​durante un episodio di violenza stradale. La famiglia della vittima ha dovuto sopportare due processi e la visione ripetuta di filmati dell’omicidio, tra cui quello in cui Pelkey ​​viene ferito a morte e cade a terra. Ai parenti non era consentito mostrare emozioni in aula per evitare precedenti che avrebbero potuto portare all’invalidità del processo. Ma nella fase della sentenza, affermano, hanno avuto la loro prima possibilità di parlare e di controllare il modo in cui la storia di Christopher sarebbe stata raccontata.

La sorella del defunto, Stacey Wales, ha avuto difficoltà a scrivere la sua testimonianza in tribunale. Ammette di aver riscritto la sua dichiarazione per mesi, finché non ha deciso di fare qualcosa di diverso: lasciare che fosse suo fratello a “dirlo da solo”. Lei e suo marito Tim, che lavora nel settore tecnologico, hanno creato un video in cui si esibisce una controfigura digitale di Pelkey. Hanno utilizzato Stable Diffusion con pre-addestramento LoRA per generare l’immagine visiva e strumenti di sintesi vocale per creare una voce a partire da frammenti audio. Tutte le parole pronunciate dall’avatar sono state scritte da Stacy stessa. Sottolinea che il suo obiettivo era la sincerità, non la vendetta: secondo lei, il discorso doveva essere una “coperta d’amore” perché così era suo fratello. La paranoia digitale è il nuovo buon senso.

Il video iniziava con un avvertimento: “Ciao. Giusto perché tutti lo sappiano, sono una versione di Chris Pelkey, ricreata dall’intelligenza artificiale usando la mia immagine e la mia voce”. In seguito, agli spettatori viene mostrato un frammento reale con un Pelki dal vivo, che parla del servizio nell’esercito e della fede in Dio, e poi di nuovo un passaggio a un avatar digitale, che fa la sua affermazione. Ringrazia tutti coloro che sono venuti all’udienza, hanno sostenuto la famiglia, ricorda amici e parenti e passa all’appello chiave: l’assassino.

“A Gabriel Orcasitas, l’uomo che mi ha sparato”, dice Christopher digitale, “mi dispiace che ci siamo incontrati in quelle circostanze. In un’altra vita, forse saremmo potuti essere amici. Credo nel perdono e in un Dio che perdona. Ci ho sempre creduto. E ci credo ancora.”

Il giudice Todd Lang ha affermato che il video ha lasciato una profonda impressione. Ha dichiarato di essere convinto della sincerità di quanto aveva sentito e si è persino rifiutato di rivolgersi formalmente al defunto usando il suo cognome, chiamandolo per nome. Il giudice ha sottolineato che, nonostante la famiglia avesse chiesto la pena massima, le parole della Pelka digitale non invocavano vendetta, ma solo perdono. E questo, a suo avviso, rifletteva la vera essenza nobile dell’intera famiglia del defunto.

L’avvocato di Orcasitas ha cercato di usare le stesse parole dell’avatar nella sua difesa, affermando che il defunto e l’imputato avrebbero potuto effettivamente avere interessi in comune e sarebbero potuti diventare amici. Tuttavia, il tribunale non ha attenuato la pena. Stacey Wales ammise in seguito che il loro obiettivo era quello di “far piangere il giudice” e “resuscitare Christopher almeno per qualche minuto”.

Da un punto di vista tecnico e giuridico, l’uso dell’intelligenza artificiale non ha suscitato controversie. L’Arizona ha una Carta dei diritti delle vittime che consente ai familiari di scegliere come presentare le richieste di risarcimento. L’avvocato Jessica Gattuso, che ha rappresentato la famiglia, ha osservato che il video era accompagnato fin dall’inizio da una spiegazione della sua natura di intelligenza artificiale, nessuno ha cercato di far passare il discorso per le reali parole di Pelkey ​​e nessuna delle due parti ha sollevato obiezioni. Secondo lei la decisione è stata attuata in modo corretto e onesto.

Il contrasto con altri casi di intelligenza artificiale in contenzioso è stato netto: all’inizio di quest’anno, un avvocato del Wyoming è stato pubblicamente rimproverato per aver utilizzato precedenti fittizi generati da un modello linguistico. A marzo, un altro team legale è stato multato di 15.000 dollari per aver fatto riferimento a casi “allucinatori”. Nel caso della famiglia Pelkey, la tecnologia è stata utilizzata come strumento emotivo, non per sostituire i fatti, ma per mettere in luce la voce umana che altrimenti non sarebbe stata ascoltata.

La procura ha chiesto nove anni di reclusione; il massimo era dieci e mezzo. Il giudice ha dato il massimo. E secondo la stessa Stacey, il video ha avuto un ruolo decisivo: “Ha mostrato chi era Chris e ci ha dato la possibilità di parlare a suo nome. Non vendicatevi. E di farci sentire”.

L'articolo Parla al processo del suo omicidio: la vittima “resuscitata” con l’IA testimonia in tribunale proviene da il blog della sicurezza informatica.



Orly Noy sulla Conferenza di Pace: “A Gaza è genocidio, la sinistra parli di lotta non solo di speranza”


@Notizie dall'Italia e dal mondo
"Se l’intera conferenza non ha previsto nemmeno un panel che tratti del genocidio in atto a Gaza, per non parlare di un invito esplicito a rifiutarsi di prendervi parte, è improbabile che possa farci



Dalle auto alla geopolitica. Così l’industria tedesca mira alla difesa e allo spazio

@Notizie dall'Italia e dal mondo

C’è una Germania che guarda nuovamente alla geopolitica, ma lo fa con i piedi ben piantati a terra e gli occhi puntati sullo spazio. Una Germania che, mentre cerca di lasciarsi alle spalle la monocultura dell’auto, riposiziona la propria industria al



Geolocalizzazione e lavoro agile, l’accordo sindacale non basta: il Garante privacy traccia i limiti


@Informatica (Italy e non Italy 😁)
Il caso di una dipendente di una società in house della Regione Calabria fa emergere criticità nel controllo dei lavoratori in modalità agile: in gioco privacy, trasparenza e limiti dell’art. 4 dello Statuto dei



Si sono conclusi ieri, a Silvi Marina (TE), i lavori del Consiglio Nazionale delle Consulte Provinciali 2025, principale organo della rappresentanza studentesca.


Web Dashboard and OTA Updates for the ESP32


Mongoose Wizard new project dialog.

Today we are happy to present a web-based GUI for making a web-based GUI! If you’re a programmer then web front-end development might not be your bag. But a web-based graphical user interface (GUI) for administration and reporting for your microcontroller device can look very professional and be super useful. The Mongoose Wizard can help you develop a device dashboard for your ESP32-based project.

In this article (and associated video) the Mongoose developers run you through how to get started with their technology. They help you get your development environment set up, create your dashboard layout, add a dashboard page, add a device settings page, add an over-the-air (OTA) firmware update page, build and test the firmware, and attach the user-interface controls to the hardware. The generated firmware includes an embedded web server for serving your dashboard and delivering its REST interface, pretty handy.

You will find no end of ESP32-based projects here at Hackaday which you could potentially integrate with Mongoose. We think the OTA support is an excellent feature to have, but of course there are other ways of supporting that functionality.

youtube.com/embed/nUwmnySG-FI?…

Thanks to [Toly] for this tip.


hackaday.com/2025/05/10/web-da…




da molte parti si dice di usare linux per ridare vita ai vecchi pc. tutto molto bello. io faccio parte di un'associazione che fra le altre cose fa proprio questo: prende vecchi pc e portatili e li riattiva, spesso a uso didattico per le scuole, installando linux. peccato però che sulle distro più importanti e gettonate sta ad esempio sparendo il supporto alle cpu 32 bit. per cui alla fine per un utilizzo non dico serio, ma almeno articolato, le uniche distro di nicchia che ancora funzionano, non sono spesso adatte a fornire tutti i pacchetti (programmi) necessari. anche perché se si deve usare un pc per la posta elettronica o per navigazione web, è quasi (e dico quasi perché ci sono dei limiti sui tablet) meglio usare direttamente un tablet...
in reply to simona

c'è sempre, no? E m'è sempre sembrata molto flessibile e completa.

reshared this

in reply to simona

beh... non sono una grande fan di debian.... e poi a uno che installa linux su un pc lento neppure troppo pratico non puoi consigliare debian. e comunque ognuno di fissa si una ramo specifico o derivate e solitamente non ama cambiare. io sono su arch. e comunque quello che sostenevo che rendere disponibile un'uncia distro e costringere ad usare quella non è il modo di aumentare il consenso in merito a linux su sistemi "deboli".


Qilin domina le classifiche del Ransomware! 72 vittime solo nel mese di aprile 2025!


Il gruppo Qilin, da noi intervistato qualche tempo fa, è in cima alla lista degli operatori di ransomware più attivi nell’aprile 2025, pubblicando i dettagli di 72 vittime sul suo sito Data Leak Site (DLS). Secondo Group-IB si tratta di una cifra record: da luglio 2024 a gennaio 2025 il numero di tali pubblicazioni raramente superava le 23 al mese, ma da febbraio la curva ha registrato un forte aumento: 48 casi a febbraio, 44 ​​a marzo e già 45 nelle prime settimane di aprile.

La causa principale dell’aumento dell’attività è stata la scomparsa improvvisa del gruppo concorrente RansomHub, che in precedenza si classificava al secondo posto per numero di attacchi. Dopo il crollo, un numero significativo di aggressori affiliati si è spostato a Qilin, causando una crescita esponenziale delle loro operazioni. Secondo Flashpoint, in un solo anno, da aprile 2024 ad aprile 2025, RansomHub è riuscito a colpire 38 organizzazioni del settore finanziario prima di scomparire dalla scena.

La particolarità delle campagne Qilin è l’utilizzo di un nuovo pacchetto di componenti dannosi: il già noto modulo SmokeLoader e un nuovo loader .NET, nome in codice NETXLOADER.

I ricercatori di Trend Micro hanno studiato NETXLOADER in dettaglio e hanno notato il suo ruolo chiave nella distribuzione di malware. Questo downloader installa silenziosamente moduli dannosi, è protetto dall’analisi tramite .NET Reactor versione 6 e utilizza diverse tecniche di bypass.

NETXLOADER è estremamente difficile da analizzare: il codice è crittografato, i nomi dei metodi non sono informativi e la logica di esecuzione è confusa. Vengono utilizzate tecniche avanzate di occultamento, come gli hook JIT e il caricamento controllato delle DLL direttamente nella memoria, rendendo impossibile l’analisi statica o la ricerca di stringhe. Infatti, senza eseguirlo in un ambiente reale, è impossibile capire esattamente cosa fa questo bootloader.

Le catene di attacco iniziano molto spesso con il phishing o la compromissione di account reali, dopodiché NETXLOADER penetra nel sistema infetto. Successivamente, attiva SmokeLoader, che esegue controlli di anti-analisi, di virtualizzazione e disabilita i processi da un elenco predefinito. Nella fase finale, SmokeLoader contatta il server di controllo remoto e riceve da lì NETXLOADER, che carica già il ransomware Agenda utilizzando la tecnica Reflective DLL Loading, caricando la libreria direttamente nella memoria senza scriverla sul disco.

Agenda viene utilizzato attivamente per attaccare domini di rete, unità esterne, storage e hypervisor VCenter ESXi. Trend Micro ha osservato che le vittime più comuni sono le organizzazioni sanitarie, finanziarie, delle telecomunicazioni e delle infrastrutture IT in paesi come Stati Uniti, India, Brasile, Filippine e Paesi Bassi.

Con l’aumento del numero delle vittime e della maturità tecnica degli strumenti utilizzati, Qilin continua a consolidare la sua posizione come uno dei ransomware tecnologicamente più avanzati nel panorama della criminalità informatica.

L'articolo Qilin domina le classifiche del Ransomware! 72 vittime solo nel mese di aprile 2025! proviene da il blog della sicurezza informatica.



Il quadro rubato


altrenotizie.org/spalla/10672-…




The Apple II MouseCard IRQ is Synced to Vertical Blanking After All


The Apple II MouseCard (Credit: AppleLogic.org)

Recently [Colin Leroy-Mira] found himself slipping into a bit of a rabbit hole while investigating why only under Apple II MAME emulation there was a lot of flickering when using the (emulated) Apple II MouseCard. This issue could not be reproduced on real (PAL or NTSC) hardware. The answer all comes down to how the card synchronizes with the system’s vertical blanking (VBL) while drawing to the screen.

The Apple II MouseCard is one of the many peripheral cards produced for the system, originally bundled with a version of MacPaint for the Apple II. While not a super popular card at the time, it nevertheless got used by other software despite this Apple system still being based around a command line interface.

According to the card’s documentation the interrupt call (IRQ) can be set to 50 or 60 Hz to match the local standard. Confusingly, certain knowledgeable people told him that the card could not be synced to the VBL as it had no knowledge of this. As covered in the article and associated MAME issue ticket, it turns out that the card is very much synced with the VBL exactly as described in The Friendly Manual, with the card’s firmware being run by the system’s CPU, which informs the card of synchronization events.


hackaday.com/2025/05/09/the-ap…



The Nuclear War You Didn’t Notice


We always enjoy [The History Guy], and we wish he’d do more history of science and technology. But when he does, he always delivers! His latest video, which you can see below, focuses on the Cold War pursuit of creating transfermium elements. That is, the discovery of elements that appear above fermium using advanced techniques like cyclotrons.

There was a brief history of scientists producing unnatural elements. The two leaders in this work were a Soviet lab, the Joint Institute of Nuclear Research, and a US lab at Berkeley.

You’d think the discovery of new elements wouldn’t be very exciting. However, with the politics of the day, naming elements became a huge exercise in diplomacy.

Part of the problem was the difficulty in proving you created a huge atom for a few milliseconds. It was often the case that the initial inventor wasn’t entirely clear.

We were buoyed to learn that American scientists named an element(Mendelevium) after a Russian scientist as an act of friendship, although the good feelings didn’t last.

We wonder if a new element pops up, if we can get some votes for Hackadaium. Don’t laugh. You might not need a cyclotron anymore.

youtube.com/embed/GgJrnrDh8y4?…


hackaday.com/2025/05/09/the-nu…



Antique Mill Satisfies Food Cravings


Everyone knows what its like to get a hankering for a specific food. In [Attoparsec]’s case, he wanted waffles. Not any waffles would do, though; he needed waffles in the form of a labyrinth. Those don’t exist, so he had to machine his own waffle maker.
Antique pantograph millWhen computers were the size of rooms, these stood in where we’d use CNC today.
Most of us would have run this off on a CNC, but [Attoparsec] isn’t into CNCing–manual machining is his hobby, and he’s not interested in getting into another one, no matter how much more productive he admits it might make him. We can respect that. After a bit of brain sweat thinking of different ways to cut out the labyrinth shape, he has the opportunity to pick up an antique Deckle pantograph mill.

These machines were what shops used to do CNC before the ‘computer numeric’ part was a thing. By tracing out a template (which [Attoparsec] 3D prints, so he’s obviously no Luddite) complex shapes can be milled with ease. Complex shapes like a labyrnthine wafflemaker. Check out the full video below; it’s full of all sorts of interesting details about the machining process and the tools involved.

If you don’t need to machine cast iron, but are interested in the techniques seen here, a wooden pantorouter might be more your speed than a one-tonne antique. If you have a hankering for waffles but would rather use CNC, check out these design tips to help you get started. If pancakes are more your style, why not print them?

Shoutout to [the gambler] for sending this into the tip line. We think he struck the jackpot on this one. If you have a tip, don’t be shy.

youtube.com/embed/SlCJ6hp1xZY?…


hackaday.com/2025/05/09/antiqu…



Spotify la spunta su Apple, tutti i dettagli

L'articolo proviene da #StartMag e viene ricondiviso sulla comunità Lemmy @Informatica (Italy e non Italy 😁)
Questa volta Apple sembra essersi realmente arresa a Spotify, intenzionata a suggerire ai propri utenti di effettuare transizioni senza passare dall'App Store e dunque senza pagare il fio a Cupertino. L'ultima volta la Big Tech di Tim Cook aveva



Inside a Selective Voltmeter


[Martin Lorton] has a vintage Harmon 4200B selective voltmeter that needed repair. He picked it up on eBay, and he knew it wasn’t working, but it was in good condition, especially for the price. He’s posted four videos about what’s inside and how he’s fixing it. You can see the first installment below.

The 4200B is an RMS voltmeter and is selective because it has a tuned circuit to adjust to a particular frequency. The unit uses discrete components and has an analog meter along with an LCD counter.

The initial tests didn’t work out well because the analog meter was stuck, so it wouldn’t go beyond about 33% of full scale.

Since there are four videos (so far), there is a good bit of information and detail about the meter. However, it is an interesting piece of gear and part 3 is interesting if you want to see inside an analog meter movement.

By the fourth video, things seem to be working well. You might want to browse the manual for the similar 4200A manual to get oriented.

Forgot why we measure RMS? You weren’t the only one. RMS conversion in meters is a big topic and there are many ways to do it.

youtube.com/embed/P614i6uTfqk?…


hackaday.com/2025/05/09/inside…



Apple volterà le spalle a Google nella ricerca (con l’IA)?

L'articolo proviene da #StartMag e viene ricondiviso sulla comunità Lemmy @Informatica (Italy e non Italy 😁)
Il remunerativo sodalizio che ha condotto Google e Apple insieme in tribunale per pratiche anticoncorrenziali potrebbe ora essere messo in crisi, oltre che dal verdetto, dall'integrazione dell'IA nei motori di ricerca



A Single Chip Computer For The 8051 Generation


The Intel 8051 series of 8-bit microcontrollers is long-discontinued by its original manufacturer, but lives on as a core included in all manner of more recent chips. It’s easy to understand and program, so it remains a fixture despite much faster replacements appearing.

If you can’t find an original 40-pin DIP don’t worry, because [mit41301] has produced a board in a compatible 40-pin format. It’s called the single chip computer not because such a thing is a novelty in 2025, but because it has no need for the support chips which would have come with the original.

The modern 8051 clone in use is a CH558 or CH559, both chips with far more onboard than the original. The pins are brought out to one side only of the board, because on the original the other side would interface with an external RAM chip. It speaks serial, and can be used through either a USB-to-serial or Bluetooth-to-serial chip. There’s MCS-BASIC for it, so programming should be straightforward.

We can see the attraction of this board even though we reach for much more accomplished modern CPUs by choice. Several decades ago the original 8051 on Intel dev boards was our university teaching microcontoller, so there remains here a soft spot for it. We certainly see other 8051 designs, as for example this Arduino clone.


hackaday.com/2025/05/09/a-sing…



17 maggio, giornata contro l'omolesbobitransfobia

In Africa, nella regione dei Grandi Laghi, alla problematiche dovute alle ingiustizie socio-economiche e ambientali si aggiunge un livello di discriminazione ulteriore dovuto ad una sistematica persecuzione delle persone appartenenti alle comunità LGBTQI+.

Chiediamo aiuto concreto e immediato:

  1. Salviamo vite nella regione del Kivu, in Congo. Persone LGBTQ+ fuggono dalle aree occupate da forze militari non governative, cercando disperatamente rifugio e sicurezza. Collaboriamo con Gay Christian Africa per sostenere queste persone e permettere loro di trovare riparo.
  2. Sosteniamo chi lotta contro l’HIV in Uganda. Il progetto della Mbarara RISE Foundation fornisce farmaci salvavita per persone LGBT+ che vivono con HIV, ma i fondi sono stati recentemente cancellati dall’U.S.AID.

Agire ora può fare la differenza. Le persone colpite da queste crisi non possono aspettare. Il nostro contributo può significare la possibilità di una nuova vita per chi è intrappolato dalla persecuzione o dalla mancanza di cure.
Qui, trovi la scheda informativa sulla raccolta "Focus sul continente africano e le comunità LGBTQI+".
Samaria APS

@LGBTQI+

LGBTQI+ reshared this.



E il papa nuovo comincia subito insinuando che gli atei siano privi di etica e morale.
Mi chiedo chi frequenti…


👥 Fediverso e Livello Segreto: una palestra di libertà digitale

🕤 Martedì 13 Maggio, ore 21.30 presso Officina Informatica, via Magolo 32 Empoli

Una chiacchierata con @Kenobit , uno dei fondatori di #LivelloSegreto - un'istanza Mastodon - sulle potenzialità del #Fediverso e delle piattaforme libere, in ottica di libertà e resistenza digitale

Grazie a @Giulia Bimbi per la segnalazione

@Che succede nel Fediverso?



Supercon 2024: An Immersive Motion Rehabilitation Device


When you’ve had some kind of injury, rehabilitation can be challenging. You often need to be careful about how you’re using the affected parts of your body, as well as pursue careful exercises for repair and restoration of function. It can be tedious and tiring work, for patients and treating practitioners alike.

Juan Diego Zambrano, Abdelrahman Farag, and Ivan Hernandez have been working on new technology to aid those going through this challenging process. Their talk at the 2024 Hackaday Supercon covers an innovative motion monitoring device intended to aid rehabilitation goals in a medical context.

Motion Project


youtube.com/embed/_5ySbBsYnZg?…

As outlined in the talk, the team took a measured and reasoned approach to developing their device. The project started by defining the problem at hand, before proposing a potential solution. From there, it was a case of selecting the right hardware to do the job, and developing it alongside the necessary software to make it all work.
The Arduino Nano BLE33 had most of the necessary functionality for this project, out of the box.
The problem in question regarded helping children through rehabilitative therapies. Structured activities are used to help develop abilities in areas like motor skills, coordination, and balance. These can be particularly challenging for children with physical or developmental difficulties, and can be repetitive at the best of times, leading to a lack of engagement. “We wanted to solve that… we wanted to make it more interactive and more useful for the therapies and for the doctors,” Ivan explains, with an eye to increasing motivation for the individual undergoing rehabilitation.

Other challenges also exist in this arena. Traditional rehabilitation methods offer no real-time feedback to the individual on how they’re performing. There is also a need for manual monitoring and record keeping of the individual’s performance, which can be tedious and often relies on subjective assessments.
The device was demonstrated mounted on a patient’s chest, while being used in a game designed for balance work.
Having explored the literature on game-based therapy techniques, the team figured a wearable device with sensors could aid in solving some of these issues. Thus they created their immersive motion rehabilitation device.

At the heart of the build is an Arduino Nano BLE33, so named for its Bluetooth Low Energy wireless communications hardware. Onboard is an nRF52840 microcontroller, which offers both good performance and low power consumption. The real benefit of this platform, though, is that it includes an inertial measurement unit (IMU) and magnetometer on board and ready to go. The IMU in question is the BMI270, which combines a high-precision 3-axis accelerometer and 3-axis gyroscope into a single package. If you want to track motion in three dimensions, this is a great way to do it.

For user feedback, some additional hardware was needed. The team added a vibration motor, RGB LED, and buzzer for this reason. Controlling the device is simple, with the buttons on board. In order to make the device easy to use for therapists, it’s paired with a Windows application, programmed in C#. It’s used for monitoring and analysis of the wearer’s performance during regular rehabilitation activities.
The user’s motions are recorded while playing a simple game, providing useful clinical data.
The talk explains how this simple, off-the-shelf hardware was used to aid the rehabilitation experience. By gamifying things, users are prompted to better engage with the therapy process by completing tasks monitored by the device’s sensors. Fun graphics and simple gameplay ideas are used to make a boring exercise into something more palatable to children going through rehabilitation.

The team go on to explain the benefits on the clinical side of things, regarding how data collection and real time monitoring can aid in delivery. The project also involved the creation of a system for generating reports and accessing patient data to support this work, as well as a fun connection assistant called Sharky.

Overall, the talk serves as a useful insight as to how commonly-available hardware can be transformed into useful clinical tools. Indeed, it’s not so different from the gamification we see all the time in the exercise space, where smartwatches and apps are used to increase motivation and provide data for analysis. Ultimately, with a project like this, if you can motivate a patient to pursue their rehabilitation goals while collecting data at the same time, that’s useful in more ways than one.


hackaday.com/2025/05/09/superc…



This week, we discuss the death of Mr. Deepfakes, introducing kids to the Manosphere, and working on big, difficult, high-brain-power scoops.#BehindTheBlog


Ricardo Prada Vásquez was not on a government list of people sent to a mega prison in El Salvador. But hacked data shows he was booked on a flight to the country.#News
#News


Spazio e Gcap. Ecco tutte le sfide per il gen. Conserva, nuovo capo dell’Aeronautica

@Notizie dall'Italia e dal mondo

Il nuovo capo di Stato maggiore dell’Aeronautica militare è il generale Antonio Conserva, che subentra al posto del generale Luca Goretti. Lo ha deciso oggi il Consiglio dei ministri presieduto da Giorgia Meloni, che ha accolto la proposta del ministro della Difesa, Guido



Hackaday Podcast Episode 320: A Lot of Cool 3D Printing, DIY Penicillin, and an Optical Twofer


This week, Hackaday’s Elliot Williams and Kristina Panos met up across the universe to bring you the latest news, mystery sound, and of course, a big bunch of hacks from the previous week.

In Hackaday news, the 2025 Pet Hacks Contest rolls on. You have until June 10th to show us what you’ve got, so head over to Hackaday.IO and get started today!

On What’s That Sound, Kristina actually got it this time, although she couldn’t quite muster the correct name for it, however at Hackaday we’ll be calling it the “glassophone” from now on. Congratulations to [disaster_recovered] who fared better and wins a limited edition Hackaday Podcast t-shirt!

After that, it’s on to the hacks and such, beginning with a complete and completely-documented wireless USB autopsy. We take a look at a lovely 3D-printed downspout, some DIY penicillin, and a jellybean iMac that’s hiding a modern PC. Finally, we explore a really cool 3D printing technology, and ask what happened to typing ‘www.’.

Check out the links below if you want to follow along, and as always, tell us what you think about this episode in the comments!

html5-player.libsyn.com/embed/…

Download in DRM-free MP3 and savor at your leisure.

Where to Follow Hackaday Podcast

Places to follow Hackaday podcasts:



Episode 320 Show Notes:

News:



What’s that Sound?


  • Congratulations to [disaster_recovered] for the glass armonica pick!


Interesting Hacks of the Week:



Quick Hacks:



Can’t-Miss Articles:



hackaday.com/2025/05/09/hackad…



Meta previously lost its shit at 404 Media when we reported that someone had paired facial recognition tech with the company's smart glasses. Now Meta is building the invasive technology itself.

Meta previously lost its shit at 404 Media when we reported that someone had paired facial recognition tech with the companyx27;s smart glasses. Now Meta is building the invasive technology itself.#News

#News #x27


Oscilloscope Digital Storage, 1990s Style


You’re designing an oscilloscope with modest storage — only 15,000 samples per channel. However, the sample rate is at 5 Gs/s, and you have to store all four channels at that speed and depth. While there is a bit of a challenge implied, this is quite doable using today’s technology. But what about in the 1990s when the Tektronix TDS 684B appeared on the market? [Tom Verbure] wondered how it was able to do such a thing. He found out, and since he wrote it up, now you can find out, too.

Inside the scope, there are two PCBs. There’s a CPU board, of course. But there’s not enough memory there to account for the scope’s capability. That much high-speed memory would have been tough in those days, anyway. The memory is actually on the analog board along with the inputs and digitizers. That should be a clue.

The secret is the ADG286D from National Semiconductor. While we can’t find any info on the chip, it appears to be an analog shift register, something all the rage at the time. These chips often appeared in audio special effect units because they could delay an analog signal easily.

In practice, the device worked by charging a capacitor to an input signal and then, using a clock, dumping each capacitor into the next one until the last capacitor produced the delayed output. Like any delay line, you could feed the output to the input and have a working memory device.

The scope would push samples into the memory at high speed. Then the CPU could shift them back out on a much slower clock. A clever design and [Tom] gives us a great glimpse inside a state-of-the-art 1990s-era scope.

While we haven’t seen the ADG286D before, we have looked at analog shift registers, if you want to learn more.


hackaday.com/2025/05/09/oscill…



This Week in Security: Encrypted Messaging, NSO’s Judgement, and AI CVE DDoS


Cryptographic messaging has been in the news a lot recently. Like the formal audit of WhatsApp (the actual PDF). And the results are good. There are some minor potential problems that the audit highlights, but they are of questionable real-world impact. The most consequential is how easy it is to add additional members to a group chat. Or to put it another way, there are no cryptographic guarantees associated with adding a new user to a group.

The good news is that WhatsApp groups don’t allow new members to read previous messages. So a user getting added to a group doesn’t reveal historic messages. But a user added without being noticed can snoop on future messages. There’s an obvious question, as to how this is a weakness. Isn’t it redundant, since anyone with the permission to add someone to a group, can already read the messages from that group?

That’s where the lack of cryptography comes in. To put it simply, the WhatsApp servers could add users to groups, even if none of the existing users actually requested the addition. It’s not a vulnerability per se, but definitely a design choice to keep in mind. Keep an eye on the members in your groups, just in case.

The Signal We Have at Home


The TeleMessage app has been pulled from availability, after it was used to compromise Signal communications of US government officials. There’s political hay to be made out of the current administration’s use and potential misuse of Signal, but the political angle isn’t what we’re here for. The TeleMessage client is Signal compatible, but adds message archiving features. Government officials and financial companies were using this alternative client, likely in order to comply with message retention laws.

While it’s possible to do long term message retention securely, TeleMessage was not doing this particularly well. The messages are stripped of their end-to-end encryption in the client, before being sent to the archiving server. It’s not clear exactly how, but those messages were accessed by a hacker. This nicely demonstrates the inherent tension between the need for transparent archiving as required by the US government for internal communications, and the need for end-to-end encryption.

The NSO Judgement


WhatsApp is in the news for another reason, this time winning a legal judgement against NSO Group for their Pegasus spyware. The $167 Million in damages casts real doubt on the idea that NSO has immunity to develop and deploy malware, simply because it’s doing so for governments. This case is likely to be appealed, and higher courts may have a different opinion on this key legal question, so hold on. Regardless, the era of NSO’s nearly unrestricted actions is probably over. They aren’t the only group operating in this grey legal space, and the other “legal” spyware/malware vendors are sure to be paying attention to this ruling as well.

The $5 Wrench


In reality, the weak point of any cryptography scheme is the humans using it. We’re beginning to see real world re-enactments of the famous XKCD $5 wrench, that can defeat even 4096-bit RSA encryption. In this case, it’s the application of old crime techniques to new technology like cryptocurrency. To quote Ars Technica:

We have reached the “severed fingers and abductions” stage of the crypto revolution


The flashy stories involve kidnapping and torture, but let’s not forget that the most common low-tech approach is simple deception. Whether you call it the art of the con, or social engineering, this is still the most likely way to lose your savings, whether it’s conventional or a cryptocurrency.

The SonicWall N-day


WatchTowr is back with yet another reverse-engineered vulnerability. More precisely, it’s two CVEs that are being chained together to achieve pre-auth Remote Code Execution (RCE) on SonicWall appliances. This exploit chain has been patched, but not everyone has updated, and the vulnerabilities are being exploited in the wild.

The first vulnerability at play is actually from last year, and is in Apache’s mod_rewrite module. This module is widely used to map URLs to source files, and it has a filename confusion issue where a url-encoded question mark in the path can break the mapping to the final filesystem path. A second issue is that when DocumentRoot is specified, instances of RewriteRule take on a weird dual-meaning. The filesystem target refers to the location inside DocumentRoot, but it first checks for that location in the filesystem root itself. This was fixed in Apache nearly a year ago, but it takes time for patches to roll out.

SonicWall was using a rewrite rule to serve CSS files, and the regex used to match those files is just flexible enough to be abused for arbitrary file read. /mnt/ram/var/log/httpd.log%3f.1.1.1.1a-1.css matches that rule, but includes the url-encoded question mark, and matches a location on the root filesystem. There are other, more interesting files to access, like the temp.db SQLite database, which contains session keys for the currently logged in users.

The other half of this attack is a really clever command injection using one of the diagnostic tools included in the SonicWall interface. Traceroute6 is straightforward, running a traceroute6 command and returning the results. It’s also got good data sanitization, blocking all of the easy ways to break out of the traceroute command and execute some arbitrary code. The weakness is that while this sanitization adds backslashes to escape quotes and other special symbols, it stores the result in a fixed-length result buffer. If the result of this escaping process overflows the result buffer, it writes over the null terminator and into the buffer that holds the original command before it’s sanitized. This overflow is repeated when the command is run, and with some careful crafting, this results in escaping the sanitization and including arbitrary commands. Clever.

The AI CVE DDoS


[Daniel Stenberg], lead developer of curl, is putting his foot down. We’ve talked about this before, even chatting with Daniel about the issue when we had him on FLOSS Weekly. Curl’s bug bounty project has attracted quite a few ambitious people, that don’t actually have the skills to find vulnerabilities in the curl codebase. Instead, these amateur security researchers are using LLMs to “find vulnerabilities”. Spoiler, LLMs aren’t yet capable of this task. But LLMs are capable of writing fake vulnerability reports that look very convincing at first read. The game is usually revealed when the project asks a question, and the fake researcher feeds the LLM response back into the bug report.

This trend hasn’t slowed, and the curl project is now viewing the AI generated vulnerability reports as a form of DDoS. In response, the curl Hackerone bounty program will soon ask a question with every entry: “Did you use an AI to find the problem or generate this submission?” An affirmative answer won’t automatically disqualify the report, but it definitely puts the burden on the reporter to demonstrate that the flaw is real and wasn’t hallucinated. Additionally, “AI slop” reports will result in permanent bans for the reporter.

It’s good to see that not all AI content is completely disallowed, as it’s very likely that LLMs will be involved in finding and describing vulnerabilities before long. Just not in this naive way, where a single prompt results in a vulnerability find and generates a patch that doesn’t even apply. Ironically, one of the tells of an AI generated report is that it’s too perfect, particularly for someone’s first report. AI is still the hot new thing, so this issue likely isn’t going away any time soon.

Bits and Bytes


A supply chain attack has been triggered against several hundred Magento e-commerce sites, via at least three software vendors distributing malicious code. One of the very odd elements to this story is that it appears this malicious code has been incubating for six years, and only recently invoked for malicious behavior.

On the WordPress side of the fence, the Ottokit plugin was updated last month to fix a critical vulnerability. That update was force pushed to the majority of WordPress sites running that plugin, but that hasn’t stopped threat actors from attempting to use the exploit, with the first attempts coming just an hour and a half after disclosure.

It turns out it’s probably not a great idea to allow control codes as part of file names. Portswigger has a report of a couple ways VS Code can do the wrong thing with such filenames.

And finally, this story comes with a disclaimer: Your author is part of Meshtastic Solutions and the Meshtastic project. We’ve talked about Meshtastic a few times here on Hackaday, and would be remiss not to point out CVE-2025-24797. This buffer overflow could theoretically result in RCE on the node itself. I’ve seen at least one suggestion that this is a wormable vulnerability, which may be technically true, but seems quite impractical in practice. Upgrade your nodes to at least release 2.6.2 to get the fix.


hackaday.com/2025/05/09/this-w…