Salta al contenuto principale

Cybersecurity & cyberwarfare ha ricondiviso questo.


I ricercatori avvertono: il Wi-Fi potrebbe diventare un sistema invisibile di sorveglianza di massa

una nuova tecnologia può identificare gli individui anche quando non hanno con sé un dispositivo WiFi, registrando passivamente i segnali nelle reti radio, sollevando seri problemi di privacy e spingendo a richiedere protezioni più severe.

scitechdaily.com/researchers-w…

@informatica


Cybersecurity & cyberwarfare ha ricondiviso questo.


Supplì chain: i nuovi F-35 arrivano senza radar e i ritardi nell'aggiornamento dell'AN/APG-85 rendono necessario utilizzare la zavorra🤡

I nuovi caccia F-35 di quinta generazione stanno entrando in servizio presso l'Aeronautica Militare statunitense senza radar e vengono addirittura impiegati in questa configurazione. Il motivo è l'ennesimo ritardo del progetto e problemi di fornitura di componenti.

en.defence-ua.com/news/us_deli…

@news

in reply to Gazzetta del Cadavere

@gazzettadelcadavere l'F-35 ha sempre dato l'impressione di essere il canto del cigno dell'aeronautica USA.
Non è un caso che le pressioni USA per far morire il progetto italo-nippo-inglese GCAP stanno diventando sempre più insistenti e potrebbero produrre un'escalation drammatica

@news

in reply to informapirata ⁂

in un'industria aeronautica potente come quella USAF mi viene difficile pensare che un progetto fallimentare (perché a conti fatti lo è, Imho) possa mettere in ginocchio un intero settore. Poi considera che comunque hanno tecnologie più avanzate di chiunque altro (salvo alieni), che si guardano bene dal condividere, e che nemmeno i jet serie J della Cina riescono a pareggiare. D'altro canto è forse proprio quello il tallone d'Achille, se si stacca un filo,o usano Uinzozz...

reshared this

in reply to Gazzetta del Cadavere

@gazzettadelcadavere mi sembra una analisi un po' superficiale. L'F-35 è uno dei migliori aerei di 5 generazione. Ha i suoi problemi normali per una macchina così complessa, ma fa il suo lavoro molto bene. Non mi pare che in questo settore gli USA siano in difficoltà, anzi. La Russia e anche la Cina rimangono molto distanti.
in reply to Jena

@sandropisano è ciò che ho scritto, ma rimane economicamente un fallimento, e come aggiunto in calce, la complessità può rivelarsi il suo punto debole sia dal punto di vista operazionale, che da quello dell'appetibilità da parte dei possibili compratori. Un F-35 non vola se gli USA non lo consentono.
@Jena
in reply to Gazzetta del Cadavere

@gazzettadelcadavere @sandropisano momento... A che serve un F-35 senza radar? Praticamente li tengono la solo per prendere polvere.

reshared this

in reply to We don't need AI. AI needs us.

@Imprinted tra poco no di certo... A parte che un programma per la realizzazione di un drone da combattimento vero (non i giocattoli che vediamo nella guerra russo-ucraina) costerebbe più o meno quanto il programma del F35, oggi solo due paesi avrebbero la copertura satellitare per di spiegare i droni a centinaia di chilometri da casa propria

@betelgeuse93 @gazzettadelcadavere @news @sandropisano

in reply to informapirata ⁂

@Imprinted @betelgeuse93 @gazzettadelcadavere se l'Europa si mettesse davvero d'accordo avrebbe le carte in regola per costruire anche macchine dello stesso livello. Vedi Tornado prima Eurofighter oggi e simili. Abbiamo tutte le potenzialità. E senza la dipendenza dagli USA.
in reply to informapirata ⁂

@sandropisano @Imprinted @gazzettadelcadavere il problema dei paesi europei è la lentezza. Il Tempest ancora non ne vuole sapere di uscire fuori.

Attualmente però anche l'F-35 è eccessivamente avanzato per gli scenari d'uso, considerate, che fino a quando seguivo l'ambiente nei social commerciali, gli usa stavano dismettendo alcuni F-22 per fare posto a F-15 con aggiornamenti.

Sarà che l'F-15 è una macchina cazzutissima o che il 22 costa, ma la direzione era quella.

reshared this

in reply to Fabrizio

@betelgeuse93 @Imprinted @gazzettadelcadavere d'accordo con te, per gli scenari attuali gli F-22/35 sono anche troppo. Soprattutto per questioni economiche e di robustezza mi terrei stretto F-15/16 nonché A-10 (mio preferito!).
Poi vedi i B-52...stessa cosa..
in reply to Jena

@sandropisano @Imprinted @gazzettadelcadavere il bello è che se A-10 e B-52 venissero usati in teatri di guerra dove gli avversari hanno armi avanzate e non lanciamissili a spalla, non sarebbero in grado neanche di decollare.
in reply to Fabrizio

@betelgeuse93 @Imprinted @gazzettadelcadavere IMHO con uno squadrone di A-10 ben serviti in Ucraina (o teatri simili) faresti la differenza, sicuro. B-52 non arriva sul campo da solo e anzi, magari ti molla decine di JDAM da oltre 25km, difficile anche vederlo...
in reply to Fabrizio

@sandropisano @betelgeuse93 Gli "incidenti" di percorso nello.sviluppo ci sono sempre. Quando però iniziano ad essere troppi, evidentemente è un problema. Con l'affidabilità non si scherza (non è un caso che F16 sia ancora la prima.acelta per numerose nazioni), se un jet costa troppo e funziona non perfettamente è lecito avere dei dubbi. Se EU lasciasse da parte i nazionalismi (tutti, eh, mica solo la Francia come in questo caso), sarebbe molto più competitiva. My 2cents
in reply to Gazzetta del Cadavere

@gazzettadelcadavere l'F-35 sconta il fatto di essere il primo aereo progettato per essere riconfigurato facilmente in base all'utilizzo tattico, in un momento in cui la sostenibilità di un progetto ventennale cominciava a essere un problema per le nazioni NATO.
Quanto ai progetti "europei", intesi come di tutta la UE, semplicemente non possono esistere e l'unica soluzione è creare consorzi di massimo due o tre nazioni

@news @sandropisano @betelgeuse93

in reply to informapirata ⁂

...poi c'è il fattore economico, ovviamente il Trombetta vuole i nostri soldi e fino ad oggi i costi di sviluppo probabilmente non giustificavano un progetto nostrano come quello che hai nominato; tuttavia al giorno d'oggi è quasi impossibile svilupparne uno serio da soli, a meno che tu non sia Cina, Russia, UsA, ed infatti ci associamo ad altri, che hanno interessi simili. Giusto così Imho, anche perché è uno stimolo per la ricerca e l'industria, oltre a 💪 partnership

reshared this

in reply to informapirata ⁂

ovvio che non è automatico, sviluppare un aereo non è un gioco, senza considerare gli aspetti meramente politici

Cybersecurity & cyberwarfare ha ricondiviso questo.


Allarme o il solito marketing non convenzionale di Anthropic? Il messaggio di addio del Responsabile Safeguards Research Team di Claude

"Il mondo è in pericolo. E non solo per l’IA o per le bioweapon, ma per un’intera serie di crisi interconnesse che si stanno svolgendo proprio in questo momento.
...durante il mio tempo qui, ho visto quanto sia difficile far sì che i nostri valori guidino davvero le nostre azioni".

x.com/i/status/202088172200358…

@aitech

Questa voce è stata modificata (20 ore fa)
in reply to informapirata ⁂

La policrisi! Ricordavo di averne letto da qualche parte... ilpost.it/2023/02/19/sentiremo…

reshared this


Cybersecurity & cyberwarfare ha ricondiviso questo.


L'esercito svizzero ha rescisso il contratto con Palantir Technologies Inc. a seguito di un audit di sicurezza.

L'indagine ha concluso che le agenzie di intelligence USA potrebbero accedere a dati sensibili della difesa svizzera, un fattore decisivo per la nazione alpina, imperniata sulla neutralità. Si tratta di un segnale devastante per la reputazione dell'azienda di analisi dati, con potenziali effetti a catena su altre partnership internazionali.

newscase.com/palantirs-swiss-e…

@informatica



Cyber security, l’abbondanza di formazione online fa cadere ogni alibi


@Informatica (Italy e non Italy)
La formazione gratuita o a basso costo mette le aziende e i singoli con le spalle al muro: non sapere riconoscere truffe e minacce diventa una scelta. Ecco alcune piattaforme per colmare le lacune
L'articolo Cyber security, l’abbondanza di formazione online fa cadere ogni alibi proviene da Cyber Security



Evoluzione delle campagne malevole in Italia: i numeri nel 2025


@Informatica (Italy e non Italy)
Il report riepilogativo del CERT-AgID evidenzia una crescita significativa sia in termini quantitativi sia qualitativi delle attività malevole osservate, con una notevole capacità di adattamento dei criminal hacker che sfruttano vettori consolidati introducendo tecniche di


Cybersecurity & cyberwarfare ha ricondiviso questo.


Attacco hacker al Comune di Nosate: l’appello del sindaco e il comunicato stampa

📌 Link all'articolo : redhotcyber.com/post/attacco-h…

#redhotcyber #news #cybersecurity #hacking #sicurezzainformatica #attacchihacker #comunedinotate #sindaco



Cybersecurity & cyberwarfare ha ricondiviso questo.


Arriva ZeroDayRAT: il nuovo spyware che minaccia Android e iOS. Cosa c’è da sapere

📌 Link all'articolo : redhotcyber.com/post/arriva-ze…

#redhotcyber #news #cybersecurity #hacking #malware #spyware #zerodayrat #telegram #android #ios

reshared this



Cybersecurity & cyberwarfare ha ricondiviso questo.


Lo EDPB e il #GarantePrivacy europeo (GEPD) sostengono la semplificazione e la competitività, ma sollevano al contempo preoccupazioni fondamentali

Alcune modifiche proposte al GDPR e all'EUDPR sollevano notevoli preoccupazioni in quanto potrebbero influire negativamente sul livello di protezione di cui godono gli individui, creare incertezza giuridica e rendere più difficile l'applicazione della normativa sulla protezione dei dati.

edpb.europa.eu/news/news/2026/…

@privacypride

reshared this


Cybersecurity & cyberwarfare ha ricondiviso questo.


Bug critico in Microsoft Notepad: Un semplice file di testo può hackerarti Windows

📌 Link all'articolo : redhotcyber.com/post/bug-criti…

#redhotcyber #news #cybersecurity #hacking #malware #vulnerabilita #windows #notepad #sicurezzainformatica


in reply to Catalin Cimpanu

Didn't the EU recently vote the 20th package of sanctions against Russia? What else can they do - write a strongly-worded letter to Putin?

Cybersecurity & cyberwarfare ha ricondiviso questo.


Il vampiro #IntelligenzaArtificiale

Ho notato un nuovo fenomeno preoccupante: le persone lavoravano troppo a causa della IA ma questa settimana ho improvvisamente visto un sacco di articoli sull'argomento.

Ho raccolto una serie di dati e ho formulato una teoria. Credo che tutto questo abbia una spiegazione molto semplice:

☠️ L'INTELLIGENZA ARTIFICIALE STA INIZIANDO A UCCIDERCI TUTTI, IN STILE COLIN ROBINSON!😱

steve-yegge.medium.com/the-ai-…

@aitech

in reply to informapirata ⁂

vorrei rincarare la dose (premettendo che molte delle dinamiche già citate le vedo come la "naturale continuazione" del capitalismo della sorveglianza): uno studio del MIT (2025) mostra che usare ChatGPT per compiti come la scrittura riduce l'attività cerebrale fino al 55%, con minore connettività neurale, creatività e MLT. L'uso eccessivo "scarica" lo sforzo cognitivo sull'IA, limitando l'apprendimento profondo, anche dopo aver smesso di usarla.

Fonte: arxiv.org/abs/2506.08872

Questa voce è stata modificata (20 ore fa)

reshared this

in reply to SirAldo Canaveni

@psicologo grazie, molto utile. purtroppo anche fumare provoca il cancro ma molta gente fuma lo stesso; l'AI produrrà una generazione di incapaci

informapirata ⁂ reshared this.

in reply to cipper 📌

@cipper l'esempio del fumo è molto calzante, lo uso sempre per tutte quelle pratiche nocive diffuse... "sappiamo che fa male, ma lo facciamo lo stesso".

@informapirata

in reply to SirAldo Canaveni

@psicologo @cipper concludere dall'articolo (la ricerca del MIT) che l'AI (che è un termine in ogni caso improprio, si parla di LLM) fa male in toto è un salto logico. La ricerca ha coinvolto 54 partecipanti, specificatamente misurando la scrittura di un saggio breve, se ho ben capito. Ci sono molti modi per utilizzare lo strumento. L'analogia migliore sarebbe il martello, puoi piantare un chiodo o dartelo sui denti.
in reply to Federico Bonfiglio

non credo che nel thread qualcuno abbia affermato che "fa male in toto". Forse non vedo il commento in questione (?). Sull'utilizzo sbagliato degli strumenti, sono pienamente d'accordo. Un altro esempio, oltre alla scrittura, sono i casi di rinforzo a sintomi psicotici o la promozione del suicidio: anche l'Ordine degli Psicologi si è espresso su questi temi, mettendo in guardia dall'usare un LLM per supporto psicologico.

@cipper @informapirata

Questa voce è stata modificata (3 ore fa)
in reply to Federico Bonfiglio

parla di uso "intensivo" per "alcuni" compiti come la scrittura
Questa voce è stata modificata (32 minuti fa)
in reply to cipper 📌

@cipper scusa, leggo solo ora. Si, era "Memoria a lungo termine"... ma avevo superato il limite di qualche carattere.

@informapirata

in reply to informapirata ⁂

Many have likened it to a slot machine. You pull a lever with each prompt, and get random rewards and sometimes amazing “payouts.” No wonder it’s addictive.


🤣🤣🤣



Manualetto di sicurezza digitale per giornalisti e attivisti


@Informatica (Italy e non Italy)
Guerre di Rete ha una nuova pubblicazione, un ebook intitolato: Manualetto di sicurezza digitale per giornalisti e attivisti. Inizialmente l’ebook era stato spedito in anteprima ai partecipanti al nostro crowdfunding.
L'articolo Manualetto di sicurezza digitale per giornalisti e attivisti

reshared this


Cybersecurity & cyberwarfare ha ricondiviso questo.


-Chinese APT breached all of Singapore's telcos
-Microsoft announces two new security features
-Hacktivist scrapes stalkerware provider
-GRU info-op troops unmasked based on their medals
-Russia restricts Telegram again
-Discord to implement global age verification
-Intel releases TDX 1.5
-Waymo cars use human assistance
-FTC warns 13 data brokers for selling data to banned countries
-Chrome MV3 not bad after all

Newsletter: news.risky.biz/risky-bulletin-…
Podcast: risky.biz/RBNEWS524/

reshared this

in reply to Ian Campbell 🏴

@neurovagrant isn't this what the newsletter is for? So reporters can find their next pieces?

There's quite a few infosec news sites that do this already. An edition goes out and they cover what's inside, sometimes in the exact order I list them 😅

in reply to Catalin Cimpanu

@neurovagrant

Hide Easter Eggs inside the stories so you can demonstrate who's copying them?

Hide a word or phrase in capital letters or similar? 😉

in reply to Catalin Cimpanu

ya gotta start including bullshit stories here and there. astroturf a one-off site and then completely change the content once the scrapers start linking it.

put the "risk" back in "risky business" ;)


Cybersecurity & cyberwarfare ha ricondiviso questo.


#SSHStalker #botnet targets Linux servers with legacy exploits and SSH scanning
securityaffairs.com/187833/mal…
#securityaffairs #hacking #malware

Cybersecurity & cyberwarfare ha ricondiviso questo.


Contro la guerra ibrida, il governo riorganizza il ruolo dei servizi segreti

Il governo punta alla sovranità digitale con il rafforzamento della soft intelligence, ecco come l'Italia prova a difendersi dalla guerra ibrida fatta di sabotaggi e cyberattacchi

@informatica

wired.it/article/guerra-ibrida…

in reply to informapirata ⁂

Cioè smetteranno di far usare i cittadini dai #GAFAM statunitensi nelle scuole, nelle università e nelle amministrazioni pubbliche? 🙂

reshared this



Designing a Compact RGB 14-Segment Display


Sometimes you’re looking for a component for a project that you know should exist, but you just cannot find it. Something like a 14-segment LED display, but not just one with a fixed color, instead you want some of that sweet addressable RGB-ness. Unfortunately for [EastMakes], this particular display was nowhere to be found, so he decided to try making his own.

Using addressable SK6805 RGB LEDs with a mere 1.5 x 1.5 footprint as the basis, the layout for these individual LEDs on the PCBs was determined, and a layout created in KiCad. The PCB manufacturing and assembly were straightforward enough — the thing that really makes these displays is the diffuser. Here a few different approaches were tried, including FR4 with translucent segments in the soldermask, and a 3D printed version in both white and black PLA filament.

The FR4 approach using 0.8 mm thin PCBs looked quite all right, with the addition of through vias in the 1 mm version showing how these help to boost overall brightness. The 3D printed version prototypes didn’t look too shabby either, but it would probably help a lot if this diffuser panel also fit around the LEDs to prevent light bleeding between segments.

We’d love to see this type of RGB display being experimented with, as it seems to hold a lot of promise while also definitely being something that ought to exist.

youtube.com/embed/2100sdgQtL4?…


hackaday.com/2026/02/11/design…



Scanning Table for the Professional Maker


Sometimes the simplest objects need some overthinking. This is exactly what [Chris Borge] realized when using his 3D scanner and finding that the included rotation table left quite a bit to be desired — providing him the perfect excuse to build a new one.

One of the main features of a rotation stage is the, well, rotation. This was done in [Chris]’s case with a NEMA 17 stepper motor, perfect for precise rotation of scanning. Hooking up the motor to a basic perf board with an Arduino Nano allows for on the fly adjustments to rotation speed. To really solidify the over-engineering, [Chris] applies his obligatory concrete mix to add some heft to the stage.

While the previous features could be removed/downgraded without much loss, the adjustable grid built into the top adds significant functionality. The grid is based on [Chris]’s past projects, which allows cross compatibility.

We love over-engineering here at Hackaday, especially when adding something new. For more prime overthought design, check out this over engineered egg cracker!

youtube.com/embed/GbyohbWr60A?…


hackaday.com/2026/02/10/scanni…


Cybersecurity & cyberwarfare ha ricondiviso questo.


Resilienza dei cavi sottomarini: un passo avanti per la connettività globale

📌 Link all'articolo : redhotcyber.com/post/resilienz…

#redhotcyber #news #resilienzadeicavisottomarini #protezionerete #connettivitaglobale #sviluppoeconomico


Cybersecurity & cyberwarfare ha ricondiviso questo.


RE: techhub.social/@Techmeme/11605…

Destroying evidence usually leads to jail time


South Korea's Science Ministry blames Coupang's massive 2025 data leak on management failures and accuses it of defying a government order to preserve data logs (Reuters)

reuters.com/sustainability/boa…
techmeme.com/260211/p3#a260211…


reshared this

in reply to Catalin Cimpanu

it should, shouldn't it? Who tells the FBI and the DOJ to whom this seems to be news?

Cybersecurity & cyberwarfare ha ricondiviso questo.


U.S. CISA adds Microsoft Office and Microsoft Windows flaws to its Known Exploited Vulnerabilities catalog
securityaffairs.com/187855/sec…
#securityaffairs #hacking

Cybersecurity & cyberwarfare ha ricondiviso questo.


📣 ISCRIVITI AL WEBINAR GRATUITO DI PRESENTAZIONE DEL CORSO "CYBER OFFENSIVE FUNDAMENTALS" – LIVELLO BASE 🚀

Per ricevere il link al webinar e per iscrizioni: 📞 379 163 8765 ✉️ formazione@redhotcyber.com

#redhotcyber #formazione #pentesting #pentest #formazioneonline #ethicalhacking #cybersecurity


Cybersecurity & cyberwarfare ha ricondiviso questo.


Windows: scoperta una grave bug nei servizi di Desktop Remoto sfruttato attivamente

📌 Link all'articolo : redhotcyber.com/post/windows-s…

#redhotcyber #news #cybersecurity #hacking #malware #ransomware #vulnerabilita #windows #remoteDesktop


Cybersecurity & cyberwarfare ha ricondiviso questo.


225 – AI creativa: il controllo vale più della potenza camisanicalzolari.it/225-ai-cr…

Cybersecurity & cyberwarfare ha ricondiviso questo.


Una falla silenziosa in FortiOS apre la rete: ecco come chiuderla subito

📌 Link all'articolo : redhotcyber.com/post/una-falla…

Quando si parla di firewall e VPN enterprise, l’aspettativa è sempre la stessa: #autenticazione solida, controlli affidabili, nessuna scorciatoia. E invece, ogni tanto, qualcosa scricchiola, soprattutto quando sono state effettuate delle configurazioni troppo permissive.

A cura di Carolina Vivianti

#redhotcyber #news #cybersecurity #hacking #fortinet #fortios #vulnerabilita #sicurezzainformatica #vpn #firewall #bypassautenticazione #ldap #singlesignon #malware


Cybersecurity & cyberwarfare ha ricondiviso questo.


Microsoft Patch Tuesday febbraio 2026: 54 vulnerabilità e 6 zero-day

📌 Link all'articolo : redhotcyber.com/post/microsoft…

#redhotcyber #news #microsoft #patchtuesday #vulnerabilita #windows #office #azure #cybersecurity #hacking




The Complex Engineering of Runways


Airport runways seem pretty simple, just another strip of asphalt or concrete not unlike the roads that our cars drive upon every day. We can even use these same highways as landing strips in a pinch, so you’d assume that the engineering for either isn’t that dissimilar. Of course, you can use a highway for an occasional emergency, but a runway that sees the largest and heaviest airplanes taxi, take off and land on a constant basis is a whole other challenge, as detailed in a recent [Practical Engineering] video and its transcript.

When you consider that an Airbus A380 the take-off weight is up to 550 ton, it’s quite clear what the challenge is for larger airports. Another major issue is that of friction, or lack thereof, as the speeds and kinetic energy behind it are so much higher. One only has to look at not only runway overruns but also when one skids off sideways due issues like hydroplaning and uneven friction. Keeping the surface of a runway as high-friction as possible and intact after hundreds of take-offs, tail-strikes and other events is no small feat.

Of course, the other part of runway engineering is for when things do go wrong and an airplane enters the runway safety areas, or overrun zones. This usually provides some flat and clear space where an airplane can safely bleed off its kinetic energy, with the collapsing surface of the EMAS technology being one of the best demonstrations of how this can be safely and dramatically shortened.

Another aspect not covered here that is part of these overrun zones are frangible structures, such as any localizer antennae of ILS, lighting, etc. Frangible here means that the structure easily collapses when a heavy airplane crashes into it without causing significant damage to the airplane.

It was the failure of such a design process that doomed the crew and passengers of Jeju Air Flight 2216 in December of 2024, when the airplane during an emergency belly landing skidded over the end of the runway. Although there was a lot of open space after the ILS localizer array with just a flimsy wall and further level fields, the ILS array’s base contained a poured concrete base on which the airplane effectively pulverized.

youtube.com/embed/ZJqY1WLX4zA?…


hackaday.com/2026/02/10/the-co…



Making a Hidden Door Status Sensor



The door sensor in its new enclosures. (Credit: Dillan Stock)The door sensor in its new enclosures. (Credit: Dillan Stock)
A common sight in ‘smart homes’, door sensors allow you to detect whether a door is closed or open, enabling the triggering of specific events. Unfortunately, most solutions for these sensors are relatively bulky and hard to miss, making them a bit of a eyesore. This was the case for [Dillan Stock] as well, who decided that he could definitely have a smart home, yet not have warts sticking out on every single doorframe and door. There’s also a video version of the linked blog post.

These door sensors tend to be very simple devices, usually just a magnet and a reed relay, the latter signaling a status change to the wireless transmitter or transceiver. Although [Dillan] had come across recessed door sensors before, like a Z-wave-based unit from Aeotec, this was a very poorly designed product with serious reliability issues.

That’s when [Dillan] realized that he could simply take the PCB from one of the Aqara T1 door sensors that he already had and stuff them into a similar 20 mm diameter form factor as that dodgy sensor unit. Basically this just stuffs the magnet and PCB from an existing wart-style sensor into a recessed form factor, making it a very straightforward hack, that only requires printing the housings for the Aqara T1 sensor and some intimate time between the door and a drill.

youtube.com/embed/XVaGANL2T7o?…


hackaday.com/2026/02/10/making…



Pi Pico Learns Morse Code


When [101 Things] didn’t want to copy Morse code, he decided to build a Pi Pico system to read it for him. On the face of it, this doesn’t seem particularly hard, until you look at the practical considerations. With perfectly timed dots and dashes, it would be trivial. But in real life, you get an audio signal. It has been mangled and mixed with noise and interference as it travels through the air. Then there’s the human on the other end who will rarely send at a constant speed with no errors.

Once you consider that, this becomes quite the project, indeed. The decoder captures audio via the Pi’s analog-to-digital converter. Then it resamples the input, applies an FFT, and converts the output via a complex classification pipeline that includes, among other things, Bayesian decoding. Part of the pipeline makes simple typo corrections. You can see the device do its thing in the video below.

Another issue with the code is that it decodes multiple channels in real time. So looking up spelling corrections, for example, has to be done rapidly. The device can also send code and show stats and graphics on an LCD screen.

If you know the code is arriving at a known speed, you could do something much simpler. The Pico has lots of memory which makes it easy to use complex algorithms. When you are memory-limited, you need different tricks.

youtube.com/embed/rBRf3QOt4wc?…


hackaday.com/2026/02/10/pi-pic…



Building a Self-Playing Chess Board Robot


As popular as the game of chess is, it has one massive flaw. This being that it requires two participants, which can be a challenge. Although playing chess on a computer against an AI has been a thing for many decades, it’s hard to beat physical chess boards that give you all the tactile pleasure of handling and moving pieces, yet merging the two is tricky. You can either tell the player to also move the opponent’s pieces, or use a mechanism to do so yourself, which [Joshua Stanley] recently demonstrated in a video.

There are a few ways that you can go about having the computer move and detect the pieces. Here [Joshua] chose to use Hall magnetic sensors to detect the magnets that are embedded in the 3D printed chess pieces as well as their absence. These sensors are mounted to the back side of a PCB which is also the playing field, thus using the silkscreen for the board markings.

For the electromagnet that moves the chess pieces core x/y kinematics were used to move it underneath the PCB, engaging when moving pieces but otherwise deactivated. This is all controlled by an ESP32 MCU, while the computer runs the open-source Stockfish chess engine. As the human player changes piece positions this is detected by the magnet’s presence, with the change input into Stockfish.

As the demonstration at the end of the video shows, it definitely works, yet some issues remain. Ignoring the mistake with making the near-right corners black instead of white, the pieces are large enough that e.g. moving a knight piece between others pushes them to the side, requiring these to be put back in place.

There is also no way for the computer to detect which piece is placed where, which can be incredibly helpful on some commercial self-playing chess boards like this for new players, as well as to detect invalid moves, but this might be on the list for a potential V2 of this build.

Best part of this build is probably the use of a PCB for the playing field, which would allow you to go pretty crazy with custom designs and colors, especially now that some PCB places are offering multi-color silkscreens that allow for custom graphics.

youtube.com/embed/tLgXvUgsYmw?…


hackaday.com/2026/02/10/buildi…



The Best USB To VGA Converter For The Job


There are many adapters, dongles, and cables designed for interfacing display standards, and no doubt some of you have them in the glue of your entertainment system or work space. They’re great for standards, but what about something that’s not quite standard? [Stephen] has an arcade cabinet with a CRT that runs at an unusual 336 by 262 pixel resolution. It can be driven as 320 by 240 but doesn’t look great, and even that “standard” resolution isn’t supported by many dongles. He’s shared the story of his path to a unique USB to VGA converter which may have application far beyond this arcade machine.

We follow him on a path of discovery, through RP2040 PIOs, simple resistor ladder DACs, and home-made kernel modules, before he arrives at GUD, a USB display protocol with its own upstreamed Linux kernel driver. It’s designed to be used with a Raspberry PI deriving an LCD or HDMI display, but for his task he implemented the protocol on one of the more expensive STM32 series microcontrollers. The result after several false starts and some fiendish PCB routing is a standalone GUD-based USB-to-VGA converter that delivers perfect 34-bit colour at this unusual resolution, and also presumably others if required. It’s a worthwhile read for the many hints it gives on the subject of driving displays, even if you’re not driving an odd cabinet monitor.


hackaday.com/2026/02/10/the-be…



Cybersecurity & cyberwarfare ha ricondiviso questo.


The developer of the JokerOTP phishing kit was arrested in the Netherlands today

politie.nl/nieuws/2026/februar…

reshared this


Cybersecurity & cyberwarfare ha ricondiviso questo.


NEW: Google sent ICE the personal financial data of a student and journalist who attented a pro-Palestinian protest in 2024.

The agency had sent Google an admininistrative subpoena, a request that companies are not mandated to respond to.

techcrunch.com/2026/02/10/goog…


Cybersecurity & cyberwarfare ha ricondiviso questo.


EU approves Google's acquisition of Wiz

ec.europa.eu/commission/pressc…

reshared this

in reply to Catalin Cimpanu

letting US companies do it so they shrivel when the EU stops using Google services? (Kidding, all the lobbying money paid out in the end)
Questa voce è stata modificata (1 giorno fa)


Is That Ancient Reel Of PLA Any Good?


When it comes to knowledge there are things you know as facts because you have experienced them yourself or had them verified by a reputable source, and there are things that you know because they are common knowledge but unverified. The former are facts, such as that a 100mm cube of water contains a litre of the stuff, while the latter are received opinions, such as the belief among Americans that British people have poor dental care. The first is a verifiable fact, while the second is subjective.

In our line there are similar received opinions, and one of them is that you shouldn’t print with old 3D printing filament because it will ruin the quality of your print. This is one I can now verify for myself, because I was recently given a part roll of blue PLA from a hackerspace, that’s over a decade old. It’s not been stored in a special environment, instead it’s survived a run of dodgy hackerspace premises with all the heat and humidity that’s normal in a slightly damp country. How will it print?

It Ain’t Stringy


In the first instance, looking at the filament, it looks like any other filament. No fading of the colour, no cracking, if I didn’t know its age it could have been opened within the last few weeks. It loads into the printer, a Prusa Mini, fine, it’s not brittle, and I’m ready to print a Benchy.

The prov of a Benchy 3D printer test, with visible droop.A wobbly print from our old filament.
My first surprise on printing the Benchy is that it’s a pretty good print. Received Opinion tells me that PLA is hydrophobic, and if you leave some out for a decade it will absorb so much moisture as to be unusable. In fact I was expecting a very stringy print indeed because I’ve seen that before with filament left out for about a year in the damp British climate. But this Benchy had almost no hairiness, its only flaw was a little bit of collapse along its prow line. I know the Mini isn’t at fault here as I’ve seen it print a flawless Benchy with new PLA, so that’s strike one to the ancient plastic.

Manipulating the Benchy, I found strike two. This is a reasonable print, but with not-too-hard pressure on the cabin I could snap it. The layer adhesion wasn’t as much as it is with a new-filament Benchy, and it has broken cleanly along the layer lines in the cabin pillars. Since snapping a Benchy isn’t a quantitative measure of how much the layer adhesion had degraded, I decided to formulate a test for layer adhesion. If I print something designed for measuring layer adhesion failure in both this old PLA and some new PLA, I can compare the two. It’s not perfect as I don’t have a new reel of the same formulation as the old stuff, but it’ll be close enough.

Punishing Prints, And Risking Holes In The Floor

Two 150mm 3d printed box sections clamped to a table. One of them has a wire with some weights suspended from it.My 3D print stress test setup
What I have come up with is a 150 mm long box section with a 2 mm wall. If I clamp the first 5 0mm to the edge of a table, I can apply a force to the far end of the 100 mm poking out into free space, and find its breaking point. To that end I’ve printed two, one in my blue old PLA, and another in brand new grey PLA. I’m dangling a collection of angle brackets each of which weighs 130 g from the end of the box section, and adding brackets until it breaks.
A 3d printed box section clamped to a table, with a piece of steel rail suspended from itI couldn’t even break the new filament print with a floor-damaging 3Kg piece of rail!
I had only twenty brackets, and as expected the old PLA broke first, at ten brackets, or a 1.3 kg load. My back of the envelope calculation from high school physics gives me about a 130 N force on the top edge of the layer boundary over the fulcrum on the edge of the table to do this. I ran out of brackets and other hardware to try to break the grey box section, and finally admitted defeat when it refused to break with a 3 kg piece of rail I’ve been hoarding to make an anvil dangling from its end. I have proved that layer adhesion with ancient PLA is more than three times weaker than on the same printer with new PLA. It’s interesting when examining the break, the layers have parted very cleanly, this is not tearing of the PLA but simply poor adhesion between layers.

In doing these experiments I’ve discovered, not unexpectedly, that ancient PLA isn’t as good as new PLA. I am assuming that this was as good a PLA as the modern stuff when it was new — indeed I remember printing back in the day and my prints seemed just as good as today. What does surprise me though is that how it’s deteriorated isn’t what I expected. It produces good prints in terms of their physical form, without the hairiness I was expecting. In turn I didn’t expect the prints with this stuff to be weak, so what’s going on?

When The Volatiles Depart, What’s Left?


PLA filament is not pure PLA, instead it has chemicals added to modify its properties. The most obvious one in this reel is the blue pigment, but others might modify its plasticity or melting characteristics, to name two possibilities. These are not going to be stable solids like the polymer, instead they will be volatile compounds which are capable of evaporating over time.

I’m no polymer chemist, so I’ll draw my engineer’s conclusions here and prepare for a roasting from the chemists if I’m wrong. What I think has happened is that the volatile additives in the filament have departed over the years, and both the stringiness in damp newer PLA and the strength in prints made with new PLA are as much due to their presence or absence as to the PLA itself. In my tests here I think I have seen something closer to PLA alone with the additive chemistry absent, and along the way I may have touched on why the manufacturers add it in the first place.

It’s likely few of you are printing using ancient PLA, so while interesting, these results have limited direct relevance to your printing. But I have to wonder whether there’s a lesson to be learned in filament storage, and perhaps using a warm environment to stave off moisture might hasten the departure of those volatiles. Perhaps the best thing is not to be a hoarder, and to use your filament up as quickly as you can. Meanwhile, this isn’t the first time we’ve ventured into backyard physical measurements.


hackaday.com/2026/02/10/is-tha…



ReMemory is the Amnesia-hedging Buddy Backup You Didn’t Know You Needed


What would happen if you lost your memory, even partially? With so much of our lives being digital, forgetting your passwords (or the master key to your password manager) could be disastrous. Haunted by that specter after a concussion, [eljojo] created ReMemory, a tool based on Shamir’s Secret Sharing to help your friends help you.

Shamir’s Secret Sharing, for the uninitiated, is a way to split up important data between parties so that the full picture is only available when a quorum comes together. The classic example is giving everyone a couple of digits out of the combination to the bank vault, but no one the full combination. Together, they can open the vault.

ReMemory works the same way. Rather than the combination to a bank vault, the locally-hosted, browser-based interface splits the encryption key to your sensitive data. If you’re old fashioned that might be a plaintext list of passwords, or for the more modern the recovery codes to your password manager. It could be literally anything, like your Aunt Edna’s famous cupcake recipe, which surely should not be lost to time.
Aunt Edna could probably handle this.
You can chose how many friends to split your data betwixt, and how many will be required to meet quorum– the minimum, of course, being two, but the suggested default is to split the data five ways, and allow decryption from any three parties. Each bundle includes the complete recovery tool, so anyone in your circle of trust can start the process of decrypting your data if they get the others on board. Since it’s self-hosted and browser based, those friends don’t have to be particularly tech-savvy, as long as they can be trusted to hold onto the files. Everything is explained in the readme included in each bundle.

This does have the downside of requiring you to have multiple close friends, at least some of whom you trust to come through in a crunch, and all of whom you trust not to collude behind your back. Still, if you’re the social type, this seems like it might be a useful tool. The code is available under an Apache 2.0 license, so you can audit it for yourself — a must for any tool you plan on entrusting your secrets to.

The best part of the sharing algorithm is that it’s not vulnerable to quantum computing. While [eljojo] was thinking of amnesia when he put the tool together, we can’t help but think this also solves the postmortem password problem.


hackaday.com/2026/02/10/rememo…