Salta al contenuto principale

Cybersecurity & cyberwarfare ha ricondiviso questo.


Microsoft avverte: l’Ai è bella, ma gli attacchi di avvelenamento sono in aumento

📌 Link all'articolo : redhotcyber.com/post/microsoft…

#redhotcyber #news #microsoft #intelligenzaartificiale #cybersecurity #hacking #malware #ia



EDPB ed EDPS sul Digital omnibus: verso una massiccia semplificazione del GDPR


@Informatica (Italy e non Italy)
Il parere congiunto di EDPB ed EDPS sul pacchetto Digital omnibus ha una parola d’ordine: semplificazione senza rinunciare a innovazione e competitività. Ecco come semplificare il GDPR, cioè l’intero quadro normativo digitale della UE, per



Cybersecurity & cyberwarfare ha ricondiviso questo.


Meta condannata a pagare 30 milioni a Deutsche Telekom per l’uso della rete. Il “fair share” deciso dai giudici

Una corte tedesca ha condannato una filiale di Meta al pagamento di 30 milioni di euro a Deutsche Telekom per servizi di rete utilizzati dalle piattaforme del gruppo (Facebook, Instagram e Whatsapp). Sarà un precedente per le future dispute fra telco e OTT nell'ambito del Digital Networks Act?

key4biz.it/meta-condannata-a-p…

@informatica


Cybersecurity & cyberwarfare ha ricondiviso questo.


#LummaStealer activity spikes post-law enforcement disruption
securityaffairs.com/187896/unc…
#securityaffairs #hacking #malware

Cybersecurity & cyberwarfare ha ricondiviso questo.


AI startup Quesma has open-sourced BinaryAudit, an open-source benchmark for evaluating AI agents' ability to find backdoors hidden in compiled binaries

quesma.com/blog/introducing-bi…

github.com/quesmaOrg/BinaryAud…

reshared this


Cybersecurity & cyberwarfare ha ricondiviso questo.


Hacker cinesi in tutte le telecom di Singapore: l’operazione segreta durata 11 mesi

📌 Link all'articolo : redhotcyber.com/post/hacker-ci…

#redhotcyber #news #cyberattacchi #sicurezzainformatica #hacking #malware #operazionicibernetiche #singapore


Cybersecurity & cyberwarfare ha ricondiviso questo.


RE: techhub.social/@Techmeme/11605…

Polymarket is the new World of Tanks forum


Israeli authorities charge a reservist and a civilian for allegedly using classified information to bet on military operations on Polymarket (Financial Times)

ft.com/content/39ab13aa-7ae9-4…
techmeme.com/260212/p29#a26021…


reshared this

in reply to Catalin Cimpanu

Seems like simple corruption case. He didn't leak classified info; he used insider (classified) knowledge to make money privately.

Cybersecurity & cyberwarfare ha ricondiviso questo.


The Go Checksum Database guarantees that every Go build on the planet uses the same source for a given module version.

However, GitHub might not show you that code.

words.filippo.io/go-source/?so…

pkg.geomys.dev is a simple service to view the canonical source of a Go module, and it comes with Chrome/Firefox extensions to replace pkg.go.dev source links.

Questa voce è stata modificata (2 ore fa)
in reply to Filippo Valsorda

Here's a little demo of our new pkg.geomys.dev code viewer for Go modules!

Install the (minimal-permissions) extension from chromewebstore.google.com/deta… or addons.mozilla.org/en-US/firef… to link directly to it from pkg.go.dev.

Questa voce è stata modificata (1 ora fa)
in reply to Filippo Valsorda

Hm, i like that straight-forward view of the directory tree of the pkg

Cybersecurity & cyberwarfare ha ricondiviso questo.


Google says a lot of APTs operationalized LLMs towards the end of last year.

Financially motivated threat actors also experimented with AI tools, but they "have not yet made breakthroughs in developing AI tooling."

cloud.google.com/blog/topics/t…

reshared this


Cybersecurity & cyberwarfare ha ricondiviso questo.


Hackers have hijacked the infrastructure of an abandoned Outlook add-in to phish users and steal their Microsoft credentials.

More than 4,000 users of the AgreeTo add-in were compromised in the attack.

koi.ai/blog/agreetosteal-the-f…

Questa voce è stata modificata (2 ore fa)

reshared this


Cybersecurity & cyberwarfare ha ricondiviso questo.


Omnibus digitale - Audizioni - Presidente del Garante per la protezione dei dati personali, Brando Benifei, Anitec-Assinform, Confcommercio, ANCE, AIxIA, Google, Asstel

La Commissione Politiche Ue della Camera, nell’ambito dell’esame congiunto, ai fini della verifica della conformità al principio di sussidiarietà, della proposta di regolamento del Parlamento europeo e del Consiglio che modifica i regolamenti (UE) 2024/1689 e (UE) 2018/1139

webtv.camera.it/evento/30357

@privacypride

reshared this



Patch Tuesday febbraio 2026: 59 bug corretti, sei zero-day e un segnale chiaro per i CISO


@Informatica (Italy e non Italy)
In occasione del Patch Tuesday di febbraio 2026 Microsoft ha rilasciato gli aggiornamenti per 59 vulnerabilità, incluse sei zero-day che sarebbero state già sfruttate diffusamente in attacchi reali. Focus su RCE, privilege


Cybersecurity & cyberwarfare ha ricondiviso questo.


"Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 26."

support.apple.com/en-us/126346

reshared this


Cybersecurity & cyberwarfare ha ricondiviso questo.


A security researcher has discovered 287 Chrome extensions that exfiltrate a user's browsing history.

The extensions have been installed more than 37 million times.

They range from ad blockers to AI assistants and office aids.

qcontinuum.substack.com/p/spyi…

reshared this

in reply to Catalin Cimpanu

287 Chrome extensions that exfiltrate a user's browsing history.

The extensions have been installed more than 37 million times.

They range from ad blockers to AI assistants and office aids.

qcontinuum.substack.com/p/spyi

You do not need extensions to get your data stolen while using chrome.
It is a trojan not a browser.

If you want chrome based and privacy

ungoogled-software.github.io/u…

Oblomov reshared this.


Cybersecurity & cyberwarfare ha ricondiviso questo.


VoidLink: il malware per Linux generato dagli hacker che non vogliono scrivere codice

📌 Link all'articolo : redhotcyber.com/post/voidlink-…

#redhotcyber #news #cybersecurity #hacking #malware #linux #intelligenzaartificiale #sicurezzainformatica



Making Effective, Affordable Water Level Monitors


Water wells are simple things, but that doesn’t mean they are maintenance-free. It can be important to monitor water levels in a well, and that gets complicated when the well is remote. Commercial solutions exist, of course, but tend to be expensive and even impractical in some cases. That’s where [Hans Gaensbauer]’s low-cost, buoyancy-based well monitor comes in. An Engineers Without Border project, it not only cleverly measures water level in a simple way — logging to a text file on a USB stick in the process — but it’s so low-power that a single battery can run it for years.
The steel cable (bottom left) is attached to a submerged length of pipe, and inside the cylinder is a custom load cell. The lower the water level, the higher the apparent weight of the submerged pipe.
The monitor [Hans] designed works in the following way: suspend a length of pipe inside the well, and attach that pipe to a load cell. The apparent weight of the pipe will be directly proportional to how much of the pipe is above water. The fuller the well, the less the pipe will seem to weigh. It’s very clever, requires nothing to be in the well that isn’t already water-safe, and was designed so that the electronics sit outside in a weatherproof enclosure. Cost comes out to about $25 each, which compares pretty favorably to the $1000+ range of industrial sensors.

The concept is clever, but it took more that that to create a workable solution. For one thing, space was an issue. The entire well cap was only six inches in diameter, most of which was already occupied. [Hans] figured he had only about an inch to work with, but he made it work by designing a custom load cell out of a piece of aluminum with four strain gauges bonded to it. The resulting sensor is narrow, and sits within a nylon and PTFE tube that mounts vertically to the top of the well cap. Out from the bottom comes a steel cable that attaches to the submerged tube, and out the top comes a cable that brings the signals to the rest of the electronics in a separate enclosure. More details on the well monitor are in the project’s GitHub repository.

All one has to do after it’s installed is swap out the USB stick to retrieve readings, and every once in a long while change the battery. It sure beats taking manual sensor readings constantly, like meteorologists did back in WWII.


hackaday.com/2026/02/12/making…



Making a Functional Control Panel of the Chernobyl RBMK Reactor



Top of an RBMK at the Leningrad plant.
Control panels of a pre-digitalization nuclear plant look quite daunting, with countless dials, buttons and switches that all make perfect sense to a trained operator, but seem as random as those of the original Enterprise bridge in Star Trek to the average person. This makes the reconstruction of part of the RBMK reactor control by the [Chornobyl Family] on YouTube a fun way to get comfortable with one of the most important elements of this type of reactor’s controls.

The section that is built here pertains to the control rods of the RBMK’s reactor, its automatic regulations and emergency systems like AZ-5 and BAZ. The goal is not just to have a shiny display piece that you can put on the wall, but to make it function just like the real control panel, and to use it for demonstrations of the underlying control systems. The creators spent a lot of time talking with operators of the Chornobyl Nuclear Plant – which operated until the early 2000s – to make the experience as accurate as possible.

Although no real RBMK reactor is being controlled by the panel, its ESP32-powered logic make it work like the real deal, and even uses a dot-matrix printer to provide logging of commands. Not only is this a pretty cool simulator, it’s also just the first element of what will be a larger recreation of an RBMK control room, with more videos in this series to follow.

Also covered in this video are the changes made after the Chernobyl Nuclear Plant’s #4 accident, which served to make RBMKs significantly safer, albeit at the cost of more complexity on the control panel.

youtube.com/embed/DDlrnJIbkds?…


hackaday.com/2026/02/11/making…


Cybersecurity & cyberwarfare ha ricondiviso questo.


The trial of Ilia D., a prolific affiliate for the Phobos ransomware, has begun in Paris

zdnet.fr/actualites/ce-busines…

reshared this


Cybersecurity & cyberwarfare ha ricondiviso questo.


#Apple fixed first actively exploited zero-day in 2026
securityaffairs.com/187890/sec…
#securityaffairs #hacking

reshared this


Cybersecurity & cyberwarfare ha ricondiviso questo.


📣 ISCRIVITI AL WEBINAR GRATUITO DI PRESENTAZIONE DEL CORSO "CYBER OFFENSIVE FUNDAMENTALS" – LIVELLO BASE 🚀

📅 Data Webinar: Martedì 17 Febbraio ore 18
🖥️ Google Meet

🔗 Programma: redhotcyber.com/linksSk2L/cybe…
🎥 Intro del prof: youtube.com/watch?v=0y4GYsJMoX…

Attraverso laboratori isolati e replicabili, potrai sperimentare:
✅Ricognizione e analisi delle vulnerabilità
✅Exploitation controllata e post-exploitation in sicurezza
✅Uso professionale di strumenti come Nmap, Metasploit, BloodHound e Nessus

Per ricevere il link al webinar e per iscrizioni: 📞 379 163 8765 ✉️ formazione@redhotcyber.com

#redhotcyber #formazione #pentesting #pentest #formazioneonline #ethicalhacking #cybersecurity #penetrationtesting #cti #cybercrime #infosec #corsi #liveclass #hackerhood #pentesting


Cybersecurity & cyberwarfare ha ricondiviso questo.


La Russia alza muri digitali: WhatsApp nel mirino e la risposta di Stato

📌 Link all'articolo : redhotcyber.com/post/la-russia…

#redhotcyber #news #whatsapp #russia #censura #libertadigitali #cybersecurity #hacking #malware #bloccoapp


Cybersecurity & cyberwarfare ha ricondiviso questo.


226 – Internet batte le leggi degli Stati? Forse sì camisanicalzolari.it/226-inter…

reshared this


Cybersecurity & cyberwarfare ha ricondiviso questo.


il caso Notepad++: Quando fidarsi degli aggiornamenti è molto pericoloso

📌 Link all'articolo : redhotcyber.com/post/il-caso-n…

#redhotcyber #news #cybersecurity #hacking #malware #notepad #aggiornamentiautomatici #sicurezzainformatica


Cybersecurity & cyberwarfare ha ricondiviso questo.


Multiple Endpoint Manager bugs patched by #Ivanti, including remote auth bypass
securityaffairs.com/187882/unc…
#securityaffairs #hacking #malware

Cybersecurity & cyberwarfare ha ricondiviso questo.


Sicurezza informatica in Italia: le tendenze e le minacce del 2025 dal CERT-AgID

📌 Link all'articolo : redhotcyber.com/post/sicurezza…

#redhotcyber #news #cybersecurity #hacking #malware #ransomware #minacceinformatiche #phishing


Cybersecurity & cyberwarfare ha ricondiviso questo.


La teoria delle 10.000 ore applicata alla cybersecurity: mito, realtà o limite superato dall’AI?

📌 Link all'articolo : redhotcyber.com/post/la-teoria…

#redhotcyber #news #teoriadelle10000ore #eccellenza #malcomgladwell #apprendimento #sviluppopersonale


Cybersecurity & cyberwarfare ha ricondiviso questo.


RE: mastodon.social/@campuscodi/11…

No official report out yet, but users are reporting that Facebook and Instagram are now down too in Russia


Russia has permanently blocked YouTube yesterday and WhatsApp today

kommersant.ru/doc/8421763


reshared this


Cybersecurity & cyberwarfare ha ricondiviso questo.


Chrome 145 is out

This is the formal launch of Device Bound Session Credentials in Chrome, a feature that tries to prevent infostealers from taking your cookies

developer.chrome.com/release-n…

reshared this



Implementing 3D Graphics Basics


Plenty of our childhoods had at least one math teacher who made the (ultimately erroneous) claim that we needed to learn to do math because we wouldn’t always have a calculator in our pockets. While the reasoning isn’t particularly sound anymore, knowing how to do math from first principles is still a good idea in general. Similarly, most of us have hugely powerful graphics cards with computing power that PC users decades ago could only dream of, but [NCOT Technology] still decided to take up this project where he does the math that shows the fundamentals of how 3D computer graphics are generated.

The best place to start is at the beginning, so the video demonstrates a simple cube wireframe drawn by connecting eight points together with lines. This is simple enough, but modern 3D graphics are really triangles stitched together to make essentially every shape we see on the screen. For [NCOT Technology]’s software, he’s using the Utah Teapot, essentially the “hello world” of 3D graphics programming. The first step is drawing all of the triangles to make the teapot wireframe. Then the triangles are made opaque, which is a step in the right direction but isn’t quite complete. The next steps to make it look more like a teapot are to hide the back faces of the triangles, figure out which of them face the viewer at any given moment, and then make sure that all of these triangles are drawn in the correct orientation.

Rendering a teapot is one thing, but to get to something more modern-looking like a first-person shooter, he also demonstrates all the matrix math that allows the player to move around an object. Technically, the object moves around the viewer, but the end effect is one that eventually makes it so we can play our favorite games, from DOOM to DOOM Eternal. He notes that his code isn’t perfect, but he did it from the ground up and didn’t use anything to build it other than his computer and his own brain, and now understands 3D graphics on a much deeper level than simply using an engine or API would generally allow for. The 3D world can also be explored through the magic of Excel.

youtube.com/embed/yaG1fBNxjdE?…


hackaday.com/2026/02/11/implem…



DIY Wall-Plotter Does Generative Art, But Not As We Know It


[Teddy Warner]’s GPenT (Generative Pen-trained Transformer) project is a wall-mounted polargraph that makes plotter art, but there’s a whole lot more going on than one might think. This project was partly born from [Teddy]’s ideas about how to use aspects of machine learning in ways that were really never intended. What resulted is a wall-mounted pen plotter that offers a load of different ‘generators’ — ways to create line art — that range from procedural patterns, to image uploads, to the titular machine learning shenanigans.
There are loads of different ways to represent images with lines, and this project helps explore them.
Want to see the capabilities for yourself? There’s a publicly accessible version of the plotter interface that lets one play with the different generators. The public instance is not connected to a physical plotter, but one can still generate and preview plots, and download the resulting SVG file or G-code.

Most of the generators do not involve machine learning, but the unusual generative angle is well-represented by two of them: dcode and GPenT.

dcode is a diffusion model that, instead of converting a text prompt into an image, has been trained to convert text directly into G-code. It’s very much a square peg in a round hole. Visually it’s perhaps not the most exciting, but as a concept it’s fascinating.

The titular GPenT works like this: give it a scrap of text inspiration (a seed, if you will), and that becomes a combination of other generators and parameters, machine-selected and stacked with one another to produce a final composition. The results are unique, to say the least.

Once the generators make something, the framed and wall-mounted plotter turns it into physical lines on paper. Watch the system’s first plot happen in the video, embedded below under the page break.

This is a monster of a project representing a custom CNC pen plotter, a frame to hold it, and the whole software pipeline both for the CNC machine as well as generating what it plots. Of course, the journey involved a few false starts and dead ends, but they’re all pretty interesting. The plotter’s GitHub repository combined with [Teddy]’s write up has all the details one may need.

It’s also one of those years-in-the-making projects that ultimately got finished and, we think, doing so led to a bit of a sigh of relief on [Teddy]’s part. Most of us have unfinished projects, and if you have one that’s being a bit of a drag, we’d like to remind you that you don’t necessarily have to finish-finish a project to get it off your plate. We have some solid advice on how to (productively) let go.

youtube.com/embed/8UEqEzWdhAY?…


hackaday.com/2026/02/11/diy-wa…



Thermoforming: Shaping Curvy Grilles With No Supports



Making sure the heatgun is on 'low' and gloves are on while pushing on the mold. (Credit: Zion Brock)Making sure the heatgun is on ‘low’ and gloves are on while pushing on the mold. (Credit: Zion Brock)
Although hobbyists these days most often seem to use thermoplastics as a print-and-done material in FDM printers, there’s absolutely nothing stopping you from taking things further with thermoforming. Much like forming acrylic using a hot wire or hot air, thermoplastics like PLA can be further tweaked with a similar method. This can be much less complex than 3D printing the design with supports, as demonstrated by [Zion Brock].

For this classically styled radio project the front grille was previously 3D printed with the curved shape, but to avoid an ugly edge it had to be printed with most of the grille off the print bed, requiring countless supports and hours of printing time. To get around this, [Zion] opted to print the grille flat and then thermoform its curved shape. Of course, due to the unusual shape of the grille, this required a bit more effort than e.g. a spherical form.

This is similar to what is used with sheet metal to get detailed shaped, also requiring a mold and a way to stretch the flat shape over the mold. With the flat form designed to have all the material in the right places, it was able to be printed in less than an hour in PLA and then formed with a heatgun aimed at the part while the two-section mold is slid together to create the final form.

You can find the design files and full instructions on the website for the radio project.

youtube.com/embed/z20IXm1w-Fo?…


hackaday.com/2026/02/11/thermo…


Cybersecurity & cyberwarfare ha ricondiviso questo.


Ukraine's cyber police detained two men who tried to steal government funds from a local hospital.

The two allegedly hacked the PC of the hospital's accountant.

They then transferred more than $115,000 from the hospital's budget to their own company's accounts.

cyberpolice.gov.ua/news/zbytky…

reshared this


in reply to Catalin Cimpanu

neat, but I worry that this opens users up to self-XSS, if they get used to pasting into their browser console.

(not that I wish to imply the project is malware; I actually haven't read the script at all)


Cybersecurity & cyberwarfare ha ricondiviso questo.


Stairwell: "over 80% of monitored environments contain vulnerable versions of WinRAR affected by CVE-2025-8088"

🙃🙃🙃🙃🙃 :blobpeek:

stairwell.com/resources/stairw…

reshared this


Cybersecurity & cyberwarfare ha ricondiviso questo.


CloudSEK says it intercepted the leaked credentials of a tech support and maintenance company that had access to the IT networks of more than 200 airports. The account also didn't have MFA enabled

cloudsek.com/blog/the-hidden-b…

reshared this

in reply to ~w00p~

@w00p nah, they're good people... they just don't know how to promote their work

this is why many former infosec journalists found their way into PR jobs at cybersecurity firms

in reply to Catalin Cimpanu

Oh sorry, I didn't mean the article. 😁
I meant the stupid companies that don't secure their access/creds/missing 2fa properly.


FLOSS Weekly Episode 864: Work Hard, Save Money, Retire Early


This week Jonathan chats with Bill Shotts about The Linux Command Line! That’s Bill’s book published by No Starch Press, all about how to make your way around the Linux command line! Bill has had quite a career doing Unix administration, and has thoughts on the current state of technology. Watch to find out more!


youtube.com/embed/9zpSG6sAJiY?…

Did you know you can watch the live recording of the show right on our YouTube Channel? Have someone you’d like us to interview? Let us know, or have the guest contact us! Take a look at the schedule here.

play.libsyn.com/embed/episode/…

Direct Download in DRM-free MP3.

If you’d rather read along, here’s the transcript for this week’s episode.

Places to follow the FLOSS Weekly Podcast:


Theme music: “Newer Wave” Kevin MacLeod (incompetech.com)

Licensed under Creative Commons: By Attribution 4.0 License


hackaday.com/2026/02/11/floss-…



Motorola’s Password Pill Was Just One Idea


Let’s face it; remembering a bunch of passwords is the pits, and it’s just getting worse as time goes on. These days, you really ought to have a securely-generated key-smash password for everything. And at that point you need a password manager, but you still have to remember the password for that.

Well, Motorola is sympathetic to this problem, or at least they were in 2013 when they came up with the password pill. Motorola Mobility, who were owned by Google at the time, debuted it at the All Things Digital D11 tech conference in California. This was a future that hasn’t come to pass, for better or worse, but it was a fun thought experiment in near-futurism.

Dancing with DARPA


Back then, such bleeding-edge research was headed by former DARPA chief Regina Dugan. At the conference, Dugan stated that she was “working to fix the mechanical mismatch between humans and electronics” by doing things such as partnering with companies that “make authentication more human”.
Round, white pills spill from a bottle against a yellow background.Image by HeungSoon from Pixabay
Along with Proteus Digital Health, Dugan et. al created a pill with a small chip inside of it and a switch. Once swallowed, your various stomach acids serve as the electrolyte. The acids power the chip, and the switch goes on and off, creating an 18-bit ECG-like signal.

Basically, your entire body becomes an authentication token. Unlock your phone, your car door handle, and turn on your computer, just by existing near them.

It should be noted that Proteus already had FDA clearance for a medical device consisting of an ingestible sensor. The idea behind those is that medical staff can track when a patient has taken a pill based on the radio signal. Dugan said at the conference that it would be medically safe to ingest up to thirty of these pills per day for the rest of your life. Oh yeah, and she says the only thing that the pill exposes about the taker is whether they took it or not.

Motorola head Dennis Woodside stated that they had demonstrated this authentication technology working and authenticating a phone. While Motorola never intended to ship this pill, it was based on the Proteus device with FDA clearance, presumably so they could test it safely.

The story of Proteus Digital Health is beyond us here, but for whatever reason, their smart pills never took off. So we’re left to speculate about the impact on society that this past future of popping password pills would have had.

About That Government Influence

Robert Redford and Sidney Poitier in an open-topped convertible. Black and white.Redford and Poitier in Sneakers (1992). Image via IMDb
While it sounds sorta cool at first, it also seems like something a government might choose to force on a person sooner or later. Someone they wanted to insert behind enemy lines, perhaps, or just create an inside job that otherwise wouldn’t have happened.

Taking off my tin foil hat for a moment, I’ll compare this pill with existing modern biometrics. A face scan, a fingerprint, or even my voice is my passport, verify me are all momentary actions.

With these, you’re more or less in control of when authentication happens. A pill, on the other hand, must run its course. You can’t change the signal mid-digestive cycle. Plus, you’d have to guard your pills with your life, and if a couple pills pass through you every day, you’d better have a big pillbox.

Authentication Can Be Skin Deep

Motorola/MC10's temporary password tattoo, up close and personal.Image by MC10 via Slashgear
So the password pill never came to pass, but it’s worth mentioning that at the same conference, Dugan debuted another method of physical authentication — a temporary password tattoo they developed along with MC10, a company that makes stretchable circuits and has since been acquired by a company called Medidata.

More typically, their circuits are used to do things like concussion detection for sports, or baby thermometers that continuously track temperature.

Dugan said that the key MC10 technology is in the accordion-like structures connecting the islands of inflexible silicon. These structures can stretch up to 200% and still work just fine. The tattoos are waterproof, so go ahead and swim or shower. Of course, the password tattoo never came to be, either. And that’s just fine with me.


hackaday.com/2026/02/11/motoro…



Vintage Film Editor Becomes HDMI Monitor


With the convenience of digital cameras and editing software, shooting video today is so easy. But fifty years ago it wasn’t electronics that stored the picture but film, and for many that meant Super 8. Editing Super 8 involved a razor blade and glue, and an editing station, like a small projector and screen, was an essential accessory. Today these are a relatively useless curio, so [Endpoint101] picked one up for not a lot and converted it into an HDMI monitor.

Inside these devices there’s a film transport mechanism and a projection path usually folded with a couple of mirrors. In this case the glass screen and much of the internals have been removed, and an appropriate LCD screen fitted. It’s USB powered, and incorporates a plug-in USB power supply mounted in a UK trailing socket for which there’s plenty of space.

There’s always some discussion whenever a vintage device like this is torn apart as to whether that’s appropriate. These film editors really are ten a penny though, so even those of us who are 8 mm enthusiasts can see beyond this one. The result is a pleasingly retro monitor, which if we’re honest we could find space for ourselves. The full video is below the break. Meanwhile it’s not the first conversion we’ve seen, here’s another Hanimex packing a Raspberry Pi.

youtube.com/embed/YTQoNQL0R9E?…


hackaday.com/2026/02/11/vintag…


Cybersecurity & cyberwarfare ha ricondiviso questo.


Russia has permanently blocked YouTube yesterday and WhatsApp today

kommersant.ru/doc/8421763

in reply to Catalin Cimpanu

Signal has been blocked since 2024, it's surprising they took so long to block WhatsApp. Perhaps they were afraid of the economic fallout of blocking the chief means of communication outside the US on Russian trade.


Questo account è gestito da @informapirata ⁂ e propone e ricondivide articoli di cybersecurity e cyberwarfare, in italiano e in inglese

I post possono essere di diversi tipi:

1) post pubblicati manualmente
2) post pubblicati da feed di alcune testate selezionate
3) ricondivisioni manuali di altri account
4) ricondivisioni automatiche di altri account gestiti da esperti di cybersecurity

NB: purtroppo i post pubblicati da feed di alcune testate includono i cosiddetti "redazionali"; i redazionali sono di fatto delle pubblicità che gli inserzionisti pubblicano per elogiare i propri servizi: di solito li eliminiamo manualmente, ma a volte può capitare che non ce ne accorgiamo (e no: non siamo sempre on line!) e quindi possono rimanere on line alcuni giorni. Fermo restando che le testate che ricondividiamo sono gratuite e che i redazionali sono uno dei metodi più etici per sostenersi economicamente, deve essere chiaro che questo account non riceve alcun contributo da queste pubblicazioni.

reshared this