Salta al contenuto principale

Creating Python GUIs with GIMP


GUI design can be a tedious job, requiring the use of specialist design tools and finding a suitable library that fits your use case. If you’re looking for a lightweight solution, though, you might consider just using a simple image editor with a nifty Python library that [Manish Kathuria] whipped up.

[Manish’s] intention was to create a better-looking user interface solution for Python apps that was also accessible. He’d previously considered other Python GUI options to be unimpressive, requiring a lot of code and delivering undesirable results. His solution enables the use of just about any graphic you can think of as a UI object, creating all kinds of visually-appealing possibilities. He also was eager to make sure his solution would work with irregular-shaped buttons, sliders, and other controls—a limitation popular libraries like Tkinter never quite got around.

The system simply works by using layered image files to create interactive interfaces, with a minimum of code required to define the parameters and performance of the interface. You’re not strictly limited to using the GIMP image editor, either; some of the examples use MS Paint instead. Files are on Github for those eager to try the library for themselves.

We’ve featured some neat GUI tools before, too, like this library for embedded environments. Video after the break.

youtube.com/embed/382ugrMfP8g?…

youtube.com/embed/MbUyM4_DJAU?…


hackaday.com/2025/09/29/creati…


TekaSketch: Where Etch A Sketch Meets Graph Theory


Two hands working a TekaSketch

The Etch A Sketch was never supposed to meet a Raspberry Pi, a camera, or a mathematical algorithm, but here we are. [Tekavou]’s Teka-Cam and TekaSketch are a two-part hack that transforms real photos into quite stunning, line-drawn Etch A Sketch art. Where turning the knobs only results in wobbly doodles, this machine plots out every curve and contour better than your fingertips ever could.

Essentially, this is a software hack mixed with hardware: an RPi Zero W 2, a camera module, Inkplate 6, and rotary encoders. Snap a picture, and the image is conveyed to a Mac Mini M4 Pro, where Python takes over. It’s stripped to black and white, and the software creates a skeleton of all black areas. It identifies corner bridges, and unleashes a modified Chinese Postman Algorithm to stitch everything into one continuous SVG path. That file then drives the encoders, producing a drawing that looks like a human with infinite patience and zero caffeine jitters. Originally, the RPi did all the work, but it was getting too slow so the Mac was brought in.

It’s graph theory turned to art, playful and serious at the same time, and it delivers quite unique pieces. [Tekavou] is planning on improving with video support. A bit of love for his efforts might accellerate his endeavours. Let us know in the comments below!

youtube.com/embed/g_TLOn1jJWY?…


hackaday.com/2025/09/29/tekask…


Macintosh System 7 Ported To x86 With LLM Help


You can use large language models for all sorts of things these days, from writing terrible college papers to bungling legal cases. Or, you can employ them to more interesting ends, such as porting Macintosh System 7 to the x86 architecture, like [Kelsi Davis] did.

When Apple created the Macintosh lineup in the 1980s, it based the computer around Motorola’s 68K CPU architecture. These 16-bit/32-bit CPUs were plenty capable for the time, but the platform ultimately didn’t have the same expansive future as Intel’s illustrious x86 architecture that underpinned rival IBM-compatible machines.

[Kelsi Davis] decided to port the Macintosh System 7 OS to run on native x86 hardware, which would be challenging enough with full access to the source code. However, she instead performed this task by analyzing and reverse engineering the System 7 binaries with the aid of Ghidra and a large language model. Soon enough, she had the classic System 7 desktop running on QEMU with a fully-functional Finder and the GUI working as expected. [Kelsi] credits the LLM with helping her achieve this feat in just three days, versus what she would expect to be a multi-year effort if working unassisted.

Files are on GitHub for the curious. We love a good port around these parts; we particularly enjoyed these efforts to recreate Portal on the N64. If you’re doing your own advanced tinkering with Macintosh software from yesteryear, don’t hesitate to let us know.


hackaday.com/2025/09/29/macint…


0-day 0-click su WhatsApp! un’immagine basta per prendere il controllo del tuo iPhone


Qualche produttore di spyware starà probabilmente facendo ginnastica… strappandosi i capelli. Ma ormai è il solito teatrino: c’è chi trova, chi incassa, chi integra e poi arriva il ricercatore di turno a rovinare la festa — per etica o per qualsiasi altra ragione scenica.

Recentemente è stata individuata una falla di sicurezza in WhatsApp che consente l’esecuzione di codice remoto (RCE) senza necessità di clic (0-click). Questa vulnerabilità risulta essere già attivamente sfruttata dagli aggressori su piattaforme Apple, tra cui iOS, macOS e iPadOS.

I ricercatori di DarkNavyOrg hanno individuato una falla sfruttando due vulnerabilità, CVE-2025-55177 e CVE-2025-43300, in una proof-of-concept. Questa debolezza permette di compromettere i dispositivi in modo silenzioso, senza richiedere alcun intervento dell’utente.

Le vittime ricevono un file immagine DNG dannoso tramite WhatsApp e, dopo l’analisi automatica, subiscono il controllo completo del dispositivo. Lo sfruttamento inizia con CVE-2025-55177, un difetto logico critico nella logica di gestione dei messaggi di WhatsApp.

Per impostazione predefinita, WhatsApp non è in grado di comprendere che un messaggio in arrivo sia realmente originato da un dispositivo connesso autorizzato. Un aggressore può aggirare le verifiche di sicurezza iniziali e includere un file DNG contraffatto nella cronologia chat della vittima modificando la fonte del messaggio.

Poiché WhatsApp elabora i messaggi automaticamente, anche prima che l’utente li visualizzi, il payload viene recapitato senza avvisare la vittima. Una volta consegnato, il carico utile DNG malformato innesca la seconda falla, CVE-2025-43300. Questa vulnerabilità risiede nella libreria di analisi dei file DNG, dove un controllo improprio dei limiti provoca un errore di danneggiamento della memoria.

Quando il motore di elaborazione multimediale di WhatsApp tenta di analizzare la struttura DNG non corretta, sovrascrive le regioni di memoria critiche, consentendo a un aggressore di dirottare il flusso di esecuzione ed eseguire codice arbitrario sul dispositivo di destinazione. Uno sfruttamento riuscito comporta la compromissione completa del dispositivo e in questo scenario gli aggressori possono effettuare tutte le classiche operazione di un spyware:

  • Esfiltrare dati personali, inclusi messaggi, contatti, foto e credenziali;
  • Intercettazione dei flussi audio e video in diretta dalla telecamera e dal microfono;
  • Installare backdoor persistenti o malware per l’accesso a lungo termine;
  • Manipolare le impostazioni di sistema, disattivare le funzionalità di sicurezza o rimuovere le prove di compromissione.

Le vittime non hanno la possibilità di ispezionare o bloccare il payload dannoso prima dell’esecuzione e le protezioni standard degli endpoint potrebbero non contrassegnare il file DNG malformato come dannoso.

La società DarkNavyOrg è tuttora impegnata nell’investigazione degli exploit di tipo zero-click associati. Una vulnerabilità relativa a Samsung (CVE-2025-21043) è stata menzionata dal gruppo come attualmente in fase di studio. La recente serie di scoperte mette in evidenza la difficoltà costante nel salvaguardare i parser di file sofisticati all’interno delle app di messaggistica che operano su più piattaforme, ove persino formati sicuri come il DNG possono essere sfruttati come canali di attacco.

L'articolo 0-day 0-click su WhatsApp! un’immagine basta per prendere il controllo del tuo iPhone proviene da il blog della sicurezza informatica.


Lumafield Shows Why Your Cheap 18650 Cells Are Terrible


Lithium-ion cells deliver very high energy densities compared to many other battery technologies, but they bring with them a danger of fire or explosion if they are misused. We’re mostly aware of the battery conditioning requirements to ensure cells stay in a safe condition, but how much do we know about the construction of the cells as a factor? [Lumafield] is an industrial imaging company, and to demonstrate their expertise, they’ve subjected a large number of 18650 cells from different brands to a CT scan.

The construction of an 18650 sees the various layers of the cell rolled up in a spiral inside the metal tube that makes up the cell body. The construction of this “jellyroll” is key to the quality of the cell. [Lumafield’s] conclusions go into detail over the various inconsistencies in this spiral, which can result in cell failure. It’s important that the edges of the spiral be straight and that there is no electrode overhang. Perhaps unsurprisingly, they find that cheap no-name cells are poorly constructed and more likely to fail, but it’s also interesting to note that these low-quality cells also have fewer layers in their spiral.

We hope that none of you see more of the inside of a cell in real life than you have to, as they’re best left alone, but this report certainly sheds some light as to what’s going on inside a cell. Of course, even the best cells can still be dangerous without protection.


hackaday.com/2025/09/29/lumafi…


Ask Hackaday: How Do You Distro Hop?


If you read “Jenny’s Daily Drivers” or “Linux Fu” here on Hackaday, you know we like Linux. Jenny’s series, especially, always points out things I want to try on different distributions. However, I have a real tendency not to change my distro, especially on my main computer. Yet I know people “distro hop” all the time. My question to you? How do you do it?

The Easy but Often Wrong Answer


Sure, there’s an easy answer. Keep your /home directory on a separate disk and just use it with a new boot image. Sounds easy. But the truth is, it isn’t that easy. I suppose if you don’t do much with your system, that might work. But even if you don’t customize things at the root level, you still have problems if you change desktop environments or even versions of desktop environments. Configuration files change over time. Good luck if you want to switch to and from distros that are philosophically different, like systemd vs old-school init; apparmor vs SELinux. So it isn’t always as simple as just pointing a new distro at your home directory.

One thing I’ve done to try out new things is to use a virtual machine. That’s easy these days. But it isn’t satisfying if your goal is to really switch to a new distro as your daily driver.

The Reason

Not a cuddly logo, but a good distro nonetheless.
The reason this came up is that I generally like KDE and was using Kubuntu for a number of years. They tend to lag a bit on the KDE desktop, so when KDE came out with Neon, I was sold. However, since they were both based on Ubuntu/Debian, there was a mostly working upgrade path to convert a Kubuntu installation to Neon.

Fast forward to today. Neon has been suffering lately. I hear there is one volunteer keeping it running. KDE has decided to shift focus to a new distro that does things I’m not crazy about (immutable system; Wayland). So it was time to hop again.

I’d heard that OpenSUSE was good at keeping up with KDE, and the rolling release of Tumbleweed appeals to me. So I made the switch.

The Hard Way


I am in no way suggesting you do this. It was a bad idea, and while it worked, it was a lot of effort. Even so, it only worked because I have way more disk storage than I need: my root file system is way under 3 TB, and I have about 9 TB of RAID as my primary hard drive. Of course, you should be backed up. But if you’ve ever had to restore from a backup, you know that’s no fun. Better to have it and not need it.

So what did I do? I used kvm to stand up a virtual machine, and then I installed Tumbleweed on it. I turned off the btrfs features since I didn’t plan to use them. Then I set about matching my Neon desktop. All the KDE settings. All the strange systemd services and timers I have set up. The systems I use to run my own dynamic DNS. As much of everything as I could think of.

I got to the point where working in the VM was comfortable. My browsers and all my other tools were ready and configured.

You know I forgot something. I knew too, so I wanted to save things for reference. First, I booted from a live image and made a copy of my entire root file system under /NEON. Then I rebooted and created a new virtual machine and booted a “live” ISO file on it.

A Hard Day’s Night


The next step was to copy the snapshot of the /NEON directory into the VM. Sure, I could have used LVM snapshots or, if I were still using btrfs, a snapshot from that. But I have plenty of disk space, especially after pruning off some very large directories from the copy.

The key to this, by the way, is using the nbd program to mount the VM’s disk image. You do need the nbd module loaded, if you have it as a module, and then you export it using nbd. From there, you get a device you can mount just like any other. I’d explain it, but you really shouldn’t be taking this as instructions. Still, if you need to do it, [shamil] has a good, concise explanation.

Of course, the new VM won’t boot. You have to bind mount all the running directories (like /run and /proc) to the right mountpoint and then chroot into the mounted file system. Once there, you can rebuild your init image and run grub. After that, you should be able to boot into the old Neon system in the new VM.

The Beauty of It…

It has been a while since I’ve installed Linux from a CD, but you still have an ISO file.
So at this point, I had not made any changes to my main OS. I had a copy of it for backup purposes, and I was able to boot into a clone of it using a VM. I could also boot into the target system with a different VM.

The next step was to boot to a live image again and nuke nearly everything on the root file system except for /NEON, and the VMs, of course, which were on separate drives.

I thought about running the Tumbleweed installer and then copying files from the VM, but instead I decided to just do it by hand. I copied the files from the new VM over to the real root drive, using nbd again. Then I had to do the whole bind/mount/chroot/reinstall steps again.

Did It Boot?


It did, in fact, boot up. There were a few glitches, mostly due to self-inflicted problems. When I restored some large directories and some SSD-based temporary directories, I created some SELinux problems that were fun to track down. I had, of course, forgotten a few things installed deeply, too. But that wasn’t a problem. I could still go grab stuff from /NEON or even boot the Neon install up in the VM to compare things.

I am about to the point where I will delete the extra copies of things. I’ve already released the Tumbleweed VM. But it occurs to me: I won’t do this again. That leads to my question for you. If you distro hop, how do you do it? Let us know in the comments. Then again, current thinking is to have a minimal system and then put everything in its own container anyway.

Again, I beg you, don’t follow my example. This was way too much work and risk. But I’m also crazy enough to relocate /usr.


hackaday.com/2025/09/29/ask-ha…


10″ LEGO Tyre is Practical Nostalgia


Blocky tread, yellow hub-- yep, it looks like LEGO

If there’s one thing that has come to define the generations after the baby boom, it’s probably nostalgia. It’s heavily marketed and weaponized by the market: yearning for better, simpler times seems to be a core thread of the consumer economy these days. [Makerneer] combined his xilennial love of LEGO bricks with the flat tires on his log splitter to produce a 10″ TPU tyre will never go flat, and provide a dopamine release every time he sees it.

The tyre is a custom model to fit his particular rims, but he does provide STEP and F3D files if you’d like to try modifing it for your own purpose — they’re at Step 6 of the Instructable. Props to [Makerneer] for truly open-sourcing the design instead of just tossing STL files online. His build log also takes the time to point out the ways he had to modify the LEGO tyre profile to make it amenable to 3D printing: notably chamfering some of the tread pattern to eliminate bridging, which is a bit of a no-no with TPU.

As you can see in the (unfortunately vertical) demo video below, it’s a bit quite a bit squishier than a regular run-flat tyre, but that was part of [Makerneer]’s design goal. He didn’t like how rigid the non-pneumatic tyres he’d tried were, so endevoured to design something himself; the whole LEGO thing was just for fun. If you wanted to replicate this tyre with a bit less skoosh, you need only tune the infill on your print.

While only time will tell how long this LEGO-inspired add-on will continue adding whimsy to [Makerneer]’s log-splitting, we have tests to show it will outperform any other plastic he might have printed. This project is probably more practical than a 3D printed bicycle tyre, which doesn’t even have the side benefit of whimsy.

youtube.com/embed/_iNaEs9MEEw?…


hackaday.com/2025/09/29/10-leg…


Two Decades Of Hackaday In Words


I think most of us who make or build things have a thing we are known for making. Where it’s football robots, radios, guitars, cameras, or inflatable textile sculptures, we all have the thing we do. For me that’s over the years been various things but has recently been camera hacking, however there’s another thing I do that’s not so obvious. For the last twenty years, I’ve been interested in computational language analysis. There’s so much that a large body of text can reveal without a single piece of AI being involved, and in pursuing that I’ve created for myself a succession of corpus analysis engines. This month I’ve finally been allowed to try one of them with a corpus of Hackaday articles, and while it’s been a significant amount of work getting everything shipshape, I can now analyse our world over the last couple of decades.

The Burning Question You All Want Answered

A graph of "arduino" versis "raspberry", comparing Arduino and Raspberry Pi coverage over time.Battle of the Boards, over the decades.
A corpus engine is not clever in its own right, instead it will simply give you straightforward statistics in return for the queries you give it. But the thing that keeps me coming back for more is that those answers can sometimes surprise you. In short, it’s a machine for telling you things you didn’t know. To start off, it’s time to settle a Hackaday trope of many years’ standing. Do we write too much about Arduino projects? Into the engine goes “arduino”, and for comparison also “raspberry”, for the Raspberry Pi.

What comes out is a potted history of experimenter’s development boards, with the graph showing the launch date and subsequent popularity of each. We’re guessing that the Hackaday Arduino trope has its origins in 2011 when the Italian board peaked, while we see a succession of peaks following the launch of the Pi in 2012. I think we are seeing renewals of interest after the launch of the Pi 3 and Pi 4, respectively. Perhaps the most interesting part of the graph comes on the right as we see both boards tail off after 2020, and if I had to hazard a guess as to why I would cite the rise of the many cheap dev boards from China.

The Perils Of The Corpus Maintainer


The astute among you might wonder why the figures on the graph above are not higher, because surely we have featured more Arduino or Raspberry Pi projects than that. And here we touch on a problem faced by anyone working with data. It comes down to this: are we looking at spotting the trends from the data, or absolute figures? When I built this corpus, I had to make two choices, one over how much I was allowed to stress Hackaday’s infrastructure, and the other in how much computing power and physical storage space I was prepared to give the project on my bench. I lack a computing cloud for my work, instead I have to rely on silicon and spinning rust I own, and to that there’s a finite limit.

Thus in building this corpus I reasoned that the more important words pertaining to each story would be nearer the start, and restricted myself to the title and first paragraph of each Hackaday piece, or about a hundred words. It’s definitely enough for trend analysis, but for obvious reasons if the word you are looking for is way down in the third or fourth paragraph, you’ll be disappointed. Furthermore if this technique angers you, don’t look too closely at how your oscilloscope samples higher frequency waveforms.

World Events Playing Out On Our 3D Printers


We’re not a world news site, but there are times when events intrude upon our world. Perhaps the greatest of these was the COVID pandemic, when for many people the world stopped. Hackaday kept going, but unsurprisingly there was a lot of discussion of the pandemic and the projects which surrounded it.

Do you remember the period in which governments were in a panic about not having enough ventilators? We had quite a few stories on the subject at the time, and they appear in the corpus. Fortunately it was pretty soon understood that home made ventilators would be dangerous so we were right to be cautious covering such projects.

Language Evolving Before Our Very Eyes

A graph showing the rise of the word retrocomputing.Rise Of The Retrocomputers!
When I started on my corpus software projects, I was interested in the relationships between words because I had spent a while working in the search engine business. Later on I became interested in using the same techniques to spot trends in news content which is what has sustained my interest, but there’s another use for these techniques.

In the dictionary business, lexicographers use corpus engines to track developments in language, and we can see that in action in Hackaday too. When did you first hear the term “Retrocomputer”? We’ve all been fooling around with old computers for years now, but in our corpus it first appeared in 2012. Since then it’s had a few ups and downs, but it remains on an upward trajectory. For the graph I combined all the various forms of the word, “retrocomputer”, “retrocomputing”, and so on.

So What’s Under The Hood?


Computers are not clever in themselves, they are merely very good at repetitively doing something you tell them to, for many hours without complaint. In this case, my computer is analysing and indexing a large body of text, and the way I’m doing it was arrived at over quite a few iterations. It’s a product of the hardware I had when i started work on it, an Intel Core laptop which was quite flashy for the mid-2000s, and then later a pair of always-on Raspberry Pi boards with USB hard drives. My problem was that if I tried to use any of the available databases to store my index they would quickly become unusable due to its immense size, so I arrived at a technique using flat files instead.
A graph of the word "football" versus "soccer" in British news, June 2025. Soccer briefly peaks, because of an American tournament.We Brits only use the word “soccer” when Americans play it. From my UK news corpus, not from Hackaday.
You can run a version of my software yourself, it can be found in my GitHub repository. The processing script takes the text and splits it into sentences and words, then stores frequency and collocate data as a huge tree of small JSON files on a hard disk volume, the reasoning being that the filesystem is an extremely fast way to retrieve data categorised by directory and filename.

The version I’ve used only deals in single word phrases, but other versions have extended the directory tree based index to support multi-word phrases. You can also plumb in a part-of-speech tagger if you wish. The result is a fully functional corpus engine that can run on an original Raspberry Pi 1, not bad considering that it can mine multi-million-word corpora in an instant. Mine has the task of continually updating a corpus of news data, allowing me to watch events unfold in real time.

Now. Over To You


I have spent a lot of time over the last month getting the Hackaday corpus together and ready for analysis, and then more time gathering the data for and writing this story. I’ve only been able to show you a small amount of what’s in this trove of data, so perhaps there are trends you’d like to see explored. Use the comments below to request, and maybe I can show them in a follow-up.


hackaday.com/2025/09/29/two-de…


Mentre Windows 10 va in pensione Windows 7 raddoppia le installazioni in due mesi


Windows 7 è stato uno tra i migliori sistemi operativi di casa Microsoft, e moltissimi ne decantano ancora oggi le doti di stabilità. Ma Microsoft ha interrotto il supporto di questo prodigio dei sistemi operativi da gennaio 2020.

Secondo le statistiche di Statcounter aggiornate a settembre 2025, il sistema operativo Windows 7, da tempo fuori produzione, ha raddoppiato la sua quota di mercato tra i sistemi operativi Microsoft negli ultimi due mesi.

Nel frattempo, la quota di mercato di Windows 11 è cresciuta notevolmente, trainata dai nuovi acquisti di PC e dalle migrazioni dal precedente Windows 10, il cui supporto terminerà a ottobre 2025.

Secondo StatCounter, la quota di mercato globale di Windows 11 ha superato quella di Windows 10 nel luglio 2025. A settembre, la sua quota di utilizzo era del 50,74%, rispetto al 43,09% di Windows 10.

Illustrazione: Statcounter

Lanciato nel 2009, Windows 7 ha mantenuto la sua quota di mercato per gran parte dell’anno, fino ad agosto. Il suo utilizzo è cresciuto dal 2,02% di luglio al 3,59% di agosto. E a settembre aveva raggiunto un “rivoluzionario” 5,2%.

Naturalmente, questo non significa che gli utenti di Windows 10 stiano passando in massa a Windows 7 invece di aggiornare a Windows 11. Qualunque siano i fattori che determinano l’aumento di popolarità di Windows 7, i numeri sono impressionanti, soprattutto considerando che Microsoft ha interrotto il supporto per il sistema operativo a gennaio 2020.

L'articolo Mentre Windows 10 va in pensione Windows 7 raddoppia le installazioni in due mesi proviene da il blog della sicurezza informatica.


TikTok: The art of the (non) deal


TikTok: The art of the (non) deal
IT'S MONDAY, AND THIS IS DIGITAL POLITICS. I'm Mark Scott, and I bring you an exclusive first look at the latest Star Wars epic coming to a cinema near you later this year.

— The United States has a deal to shift ownership of TikTok's US unit to American owners — or does it?

— Some of the biggest social media companies are speaking out of both sides of their mouths when it comes to online safety.

— Artificial intelligence is expected to boost global trade by at least a third by 2040, according to estimates from the World Trade Organization.

Let's get started



digitalpolitics.co/newsletter0…


Mini Laptop Needs Custom Kernel


These days, you rarely have to build your own Linux kernel. You just take what your distribution ships, and it usually works just fine. However, [Andrei] became enamored with a friend’s cyberdeck and decided that he’d prefer to travel with a very small laptop. The problem is, it didn’t work well with a stock kernel. So, time to build the kernel again.

Of course, he tried to simply install Linux. The installer showed a blank screen. You might guess that you need to add ‘nomodeset’ to the kernel options. But the screen was still a bit wacky. [Andrei] likens troubleshooting problems like this to peeling an onion. There are many layers to peel back, and you are probably going to shed some tears.

He did turn to ChatGPT for some help, but found there were many hallucinations, so it was sometimes helpful and sometimes not. What follows is a detective story with many twists and turns.

He finally decided he needed a custom kernel and had to learn the steps. If you haven’t done it, it really isn’t that hard. If you are trying to get “close” to another existing kernel, you can read /proc/config.gz to get a list of how the person who built your kernel set it up (even if that someone was you).

The custom kernel worked. Sort of. The screen finally turned on, but it was rotated 90 degrees. Not too convenient. A few more options paid off. Along the way, he mentions a few common debugging procedures, like divide and conquer or testing kernels on a virtual machine before moving to real hardware.

The culprit turned out to be an errant video module. But… there was still no sound or touchpad. That caused even more detective work that uncovered some confusing documentation. At the end, he has a mostly working machine, although he didn’t have sleep mode, and the machine tends to run hot. He’s ok with that. We often find that we have similar problems with things like orientation sensors, although the situation is improving.

Of course, building the kernel is a far cry from writing new code for it. If you want to get your feet wet, maybe start with an old version. You can even find some automation scripts that help you get straight to debugging your code.

youtube.com/embed/6iqRg_rB6lQ?…


hackaday.com/2025/09/29/mini-l…


infinityTerminal Brings Infinite Horizontal Scrolling


The creator of infinite vertical scrolling in social media, [Aza Raskin], infamously regrets his creation that has helped to waste a tremendous amount of human attention and time on the Internet. But that’s vertical scrolling. [bujna94] has created infinityTerminal, a program with infinite scrolling, but in the horizontal direction instead. This tool has had the opposite effect to go along with its opposite orientation: increased productivity and improved workflow.

The impetus for infinityTerminal is [bujna94]’s need for many simultaneous SSH sessions, and the fact that no other terminal program can support an indefinite number of visible terminal windows. This application starts with four terminal windows in a 2×2 grid, and allows the user to open more terminals, two at a time, to form a 2xN grid. As many terminals as needed will open in pairs in the horizontal direction with smooth, trackpad-compatible scrolling and automatic color-coded backgrounds for servers accessed by SSH.

For anyone with a similar dislike of tabs like [bujna94], this might be worth trying out. It’s built with Electron, xterm.js, and node-pty.

There are a few more details about the project on a Reddit post. [Bujna94] also made it completely open source and freely available with the files on a GitHub page, and welcomes anyone to try out his creation that wants to. For more terminal magic, we’d also recommend checking out Notcurses, a terminal application capable enough to output SNES-level detail natively.


hackaday.com/2025/09/29/infini…


Rendi la formazione un’avventura! Scegli Betti RHC per il tuo Cybersecurity Awareness


Sei stanco dei noiosi corsi di formazione in e-learning?

Vuoi davvero far comprendere ai dipendenti della tua azienda i comportamenti sbagliati ed errati per poterla mettere al sicuro?

Bene! E’ arrivato il momento di scoprire Betti RHC, la graphic novel di Red Hot Cyber che unisce intrattenimento e formazione, trasformando la cybersecurity in un’esperienza coinvolgente e memorabile e immersiva.
Una vignetta tratta dal secondo volume “Zero Decrypt” dedicato al ransomware.

Cos’è Betti-RHC


Betti RHC è una serie a fumetti (graphic novel) pensata per sensibilizzare i dipendenti sui rischi digitali attraverso storie avvincenti e personaggi realistici. Ogni episodio affronta tematiche specifiche come phishing, ransomware, password deboli e cyberbullismo, offrendo lezioni pratiche su come riconoscere e prevenire le minacce informatiche. Attualmente la serie conta 4 episodi già realizzati e ulteriori 3 in realizzazioni entro la fine del 2026.

La graphic novel si distingue per un approccio narrativo che cattura l’attenzione, rendendo l’apprendimento efficace e piacevole. I concetti rimangono impressi, perché il fumetto permette di apprendere dagli errori dei personaggi, evitando di ripetere gli stessi comportamenti rischiosi nella realtà.

I personaggi e le situazioni sono progettati per far comprendere immediatamente quali comportamenti siano rischiosi e quali invece proteggano l’azienda, evitando il classico senso di noia che accompagna i corsi tradizionali.
Una scena tratta da “byte the silence”, il quarto episodio sul cyberbullismo, scaricabile gratuitamente dalla nostra academy in formato elettronico.

Cybersecurity Awareness per tutti!


Le storie di Betti RHC sono adatte a tutti i livelli di competenza, dai neofiti ai più esperti, e permettono di apprendere concetti complessi della cybersecurity senza sacrificare il divertimento. La formazione diventa così un’esperienza condivisa che rafforza anche il senso di squadra e collaborazione all’interno dell’azienda.

Le aziende hanno la possibilità di acquistare i fumetti in stock e personalizzarli, sia in formato digitale che cartaceo, usufruendo di sconti speciali per ordini multipli. Questo permette di distribuire il materiale rapidamente a tutti i dipendenti e garantire che ogni team possa beneficiare della formazione. Per maggiori dettagli e per acquistare i fumetti, è possibile visitare il nostro shop online: Betti RHC Shop.

Oltre all’acquisto in stock, le aziende possono personalizzare i fumetti inserendo il logo aziendale, messaggi dedicati o addirittura creando storie su misura. È inoltre possibile sponsorizzare la realizzazione di un nuovo episodio e ottenere gratuitamente il formato elettronico da distribuire internamente. Questo offre un’occasione unica di marketing interno e di coinvolgimento diretto dei dipendenti nella formazione.
Una vignetta tratta dal secondo volume “Zero Decrypt” dedicato al ransomware.

Un fumetto: un regalo e un gadget per i tuoi dipendenti


Un fumetto come Betti RHC non è solo uno strumento di formazione: viene percepito dai dipendenti come un regalo o un gadget offerto dall’azienda, e non come il solito noioso corso obbligatorio da completare. Grazie al formato creativo e coinvolgente, leggere il fumetto diventa un’esperienza piacevole e desiderata, che rafforza il senso di appartenenza e valorizza i dipendenti, trasformando l’apprendimento sulla cybersecurity in un momento di intrattenimento e scoperta.

Inoltre, Betti RHC può diventare anche un regalo originale per i clienti, offrendo un modo innovativo di comunicare la cultura della sicurezza informatica dell’azienda e consolidare rapporti commerciali con un oggetto utile, educativo e memorabile.

Contattaci subito, non aspettare


Per ulteriori informazioni, richieste di personalizzazione o per discutere delle opportunità di sponsorizzazione, le aziende possono contattare il team di Red Hot Cyber all’indirizzo email graphicnovel@redhotcyber.com. E’ possibile anche acquistare i fumetti in formato cartaceo per valutare direttamente la qualità dei contenuti e i temi trattati, assicurandosi che siano in linea con le esigenze aziendali.
Una vignetta tratta dal secondo volume “Zero Decrypt” dedicato al ransomware.
L'articolo Rendi la formazione un’avventura! Scegli Betti RHC per il tuo Cybersecurity Awareness proviene da il blog della sicurezza informatica.


WALL-E’s Forgotten Sibling Rebuilt


Do you remember the movie WALL-E? Apparently, [Leviathan engineering] did, and he wasn’t as struck by the title character, or Eva, or even the Captain. He was captivated by BURN-E. His working model shows up in the video below.

We’ll be honest. BURN-E didn’t ring a bell for us, though we remember the movie. He grabbed a 3D design for the robot on the Internet and planned out holes for some servos and other hardware.

That was the idea, anyway. Turns out he didn’t quite leave enough clearance for the motors, so a little hand surgery was in order. The painting was, by his own admission, suboptimal (we would point him to oil paint markers, which are amazing).

The next step was to get the servos actually working, along with the small LCD screen. Space in the body is tight, so it took a few tries to get everything wired up. We didn’t see any code, but it should be pretty simple to draw the eyes and move the servos as you like.

We can’t remember seeing another BURN-E build. But we’ve seen a number of WALL-Es. Some have even been useful.

youtube.com/embed/n3Yr0Gf0tAw?…


hackaday.com/2025/09/28/wall-e…


IO E CHATGPT E18: Insegnare agli altri


In questo episodio vediamo come l’IA possa potenziare la nostra capacità di spiegare, trasmettere, insegnare agli altri ciò che sappiamo.


zerodays.podbean.com/e/io-e-ch…


Playing DOOM In Discord With a Special Image URL


Can you play DOOM in Discord? At first glance, that may seem rather nonsensical, as Discord is a proprietary chat service and neither a hardware device nor something else that may seem like an obvious target for being (ab)used for demon-shooting points. That is, until you look at Discord’s content embedding feature. This is where [PortalRunner]’s Doomcord hack comes into play, allowing you to play the entire game in a Discord client by submitting text messages after embedding a very special image URL.

Rather than this embedding being done in the client as done with e.g., IRC clients, the Discord backend handles the content fetching, caching, and handing off to clients. This system can easily be used with an animated GIF of gameplay, but having it be seen as a GIF file required adding .gif to the end of the URL to trick Discord’s backend into not simply turning it into a static PNG. After this, Discord’s throttling of message speed turned out to kill the concept of real-time gameplay, along with the server load.

Plan C thus morphed into using Chocolate Doom headless, rendering gameplay into cached video files by using the demo gameplay feature in DOOM. The Doomcord server template project provides a server if you want to give it a whirl yourself. Since this uses recorded gameplay, the switch was made from GIF to the WEBP format to save space, along with a cache expiry system. Just level 1 with all possible input sequences takes up 12 TB of disk space.

youtube.com/embed/ZFV76-qJhM4?…


hackaday.com/2025/09/28/playin…


Hackaday Links: September 28, 2025


Hackaday Links Column Banner

In today’s “News from the Dystopia” segment, we have a story about fighting retail theft with drones. It centers on Flock Safety, a company that provides surveillance technologies, including UAVs, license plate readers, and gunshot location systems, to law enforcement agencies. Their flagship Aerodome product is a rooftop-mounted dock for a UAV that gets dispatched to a call for service and acts as an eye-in-the-sky until units can arrive on scene. Neat idea and all, and while we can see the utility of such a system in a first responder situation, the company is starting to market a similar system to retailers and other private sector industries as a way to contain costs. The retail use case, which the story stresses has not been deployed yet, would be to launch a drone upon a store’s Asset Protection team noticing someone shoplifting. Flock would then remotely pilot the drone, following the alleged thief back to their lair or hideout and coordinating with law enforcement, who then sweep in to make an arrest.

Police using aerial assets to fight crime is nothing new; California has an entire entertainment industry focused on live-streaming video from police chases, after all. What’s new here is that these drones lower the bar for getting aerial support into the mix. At a $1,000 per hour or more to operate, it’s hard to justify sending a helicopter to chase down a shoplifter. Another objection is that these drones would operate entirely for the benefit of private entities. One can certainly make a case for a public interest in reducing retail theft, since prices tend to increase for everyone when inventory leaves the store without compensation. But we don’t know if we really like the idea of being tailed home by a drone just because a minimally trained employee on the Asset Protection team of BigBoxCo is convinced a crime occurred. It’s easy enough to confuse one person for another or to misidentify a vehicle, especially on the potato-cams retailers seem to love using for their security systems. We also really don’t like one of the other markets Flock is targeting: residential HOAs. The idea of neighborhoods being patrolled by drones and surveilled by license plate cameras is a bridge too far, at least to our way of thinking.

Are you old enough to remember when having access to a T1 line was a true mark of geek cachet? We sure are, and in a time when the plebes were stuck with 9,600-baud dial-up over their POTS lines, working on a T1 line was a dream come true. Such was the allure that we can even recall apartment complexes in the tech neighborhoods outside of Boston listing T1 lines among their many amenities. It was pretty smart marketing, all things considered, especially compared to the pool you could only use three months a year. But according to a new essay by J. B. Crawford over at “Computers Are Bad”, T1 lines were actually pretty crappy, even in the late 90s and early 2000s. The article isn’t just dunking on T1, of course, but rather a detailed look at the whole T-carrier system, which can trace its roots back to the 1920s with Bell’s frequency-division multiplexing trunking systems. T1 was an outgrowth of those trunking systems, intended to link central offices but evolving to service customers on the local loop. Fascinating stuff, as always, especially the bit about replacing the loading coils that were used every 6,600′ along trunk lines to compensate for capacitance with repeaters.

We’ve heard of bricking a GPU, but ordering a GPU and getting a brick instead is something new. A Redditor who ordered an RTX 5080 from Amazon was surprised to find a plain old brick in the package instead. To be fair, whoever swiped the card was kind enough to put the brick in the original antistatic bag; one can’t be too careful, after all. The comments on the Reddit post have a good selection of puns — gigabricks, lol — and good fun was had by all, except perhaps for the unfortunate brickee. The article points out that this might not be a supply chain issue, such as the recent swap of a GPU for a backpack, which, given the intact authentication seals, was likely done at the factory. In this case, it seems like someone returned the GPU after swapping it out for the brick, assuming (correctly, it would seem) that Amazon wouldn’t check the contents of the returned package beyond perhaps weighing it. How the returned inventory made it back into circulation is a bit of a mystery; we thought returned items were bundled together on pallets and sold off at auction.

Speaking of auctions, someone just spent almost half a million bucks on one of the nine estimated remaining wooden-cased Apple I computers. It’s a lovely machine, to be sure, with its ByteShop-style wooden case intact and in excellent shape. The machine is still working, too, which is a nice plus, but $475,000? Even with a Dymo embossed label in Avocado Green — or is that Harvest Gold? — that seems a bit steep. There’s apparently some backstory to the machine that lends to its provenance, including former ownership by the first female graduate of Stanford Law School, June Blodgett Moore. This makes it the “Moore Apple-1” in the registry (!) for these machines, only 50 of which were ever made. One wonders if the registry makes allowance for basic maintenance of vintage electronics like these machines; does routine recapping affect their value?

And finally, continuing with the vintage theme, we’ve been following the adventures of [Buy It Fix It] over on YouTube as he attempts to revive a Williams Defender arcade machine from the 1980s. We remember this game well, having fed far too many quarters into the one at the Crazy 8s Pool and Arcade back in the day. This machine is in remarkably good shape for being over 40 years old, but it still needed some TLC to get it running again. The video documents a series of cascading failures and maddening intermittent faults, requiring nearly every tool in his kit to figure out. At the end of the second video, [Buy It] reckons he put 60 hours into the repair, a noble effort with fantastic results. Enjoy!

youtube.com/embed/IpuPvdyxeW0?…

youtube.com/embed/PyCM_PB92r4?…


hackaday.com/2025/09/28/hackad…


Decorate Your Neck with The First Z80 Badge


Over the years, we’ve brought you many stories of the creative artwork behind electronic event badges, but today we may have a first for you. [Spencer] thinks nobody before him has made a badge powered by a Z80, and we believe he may be right. He’s the originator of the RC2014 Z80-based retrocomputer, and the badge in question comes from the recent RC2014 Assembly.

Fulfilling the function of something you can write your name on is a PCB shaped like an RC2014 module, with LEDs on all the signal lines. It could almost function as a crude logic analyser for the system, were the clock speed not far too high to see anything. To fix this, [Spencer]’s badge packs a single-board RC2014 Micro with a specially slow clock, and Z80 code to step through all memory addresses, resulting in a fine set of blinkenlights.

Thus was created the first Z80-based event badge, and we’re wondering whether or not it will be the last. If you’re curious what this RC2014 thing is about, we reviewed the RC2014 Micro when it came out.


hackaday.com/2025/09/28/decora…


A Walk Down PC Video Card Memory Lane


These days, video cards are virtually supercomputers. When they aren’t driving your screen, they are decoding video, crunching physics models, or processing large-language model algorithms. But it wasn’t always like that. The old video cards were downright simple. Once PCs gained more sophisticated buses, video cards got a little better. But hardware acceleration on an old-fashioned VGA card would be unworthy of the cheapest burner phone at the big box store. Not to mention, the card is probably twice the size of the phone. [Bits and Bolts] has a look at several old cards, including a PCI version of the Tseng ET4000, state-of-the-art of the late 1990s.

You might think that’s a misprint. Most of the older Tseng boards were ISA, but apparently, there were some with the PCI bus or the older VESA local bus. Acceleration here typically meant dedicated hardware for handling BitBlt and, perhaps, a hardware cursor.

It is fun watching him test these old cards and work on them under the microscope, too. Since the PCI bus was new when this board was introduced, it apparently had some bugs that made it incompatible with certain motherboards.

We recall being blown away by the color graphics these boards provided when they were new. Now, of course, you wouldn’t see graphics like this even on a cheap video game. Still, fun to take a walk down memory lane with these old boards.

[Bits and Bolts] definitely has a hobby. We love that these were high-tech in their day, but now designing a VGA card is well within reach for anyone adept at using FPGAs.

youtube.com/embed/2aapI_uyvII?…


hackaday.com/2025/09/28/a-walk…


Fully-Local AI Agent Runs on Raspberry Pi, With a Little Patience


[Simone]’s AI assistant, dubbed Max Headbox, is a wakeword-triggered local AI agent capable of following instructions and doing simple tasks. It’s an experiment in many ways, but also a great demonstration not only of what is possible with the kinds of open tools and hardware available to a modern hobbyist, but also a reminder of just how far some of these software tools have come in only a few short years.

Max Headbox is not just a local large language model (LLM) running on Pi hardware; the model is able to make tool calls in a loop, chaining them together to complete tasks. This means the system can break down a spoken instruction (for example, “find the weather report for today and email it to me”) into a series of steps to complete, utilizing software tools as needed throughout the process until the task is finished.

Watch Max in action in the video (also embedded just below). Max is a little slow, but not unusably so. As far as proofs of concept go, it demonstrates that a foundation for such systems is perfectly feasible on budget hardware running free, locally installed software. Check out the GitHub repository.

The name is, of course, a play on Max Headroom, the purportedly computer-generated TV personality of the ’80s who was actually an actor in a mask, just like the person behind what was probably the most famous broadcast TV hack of all time (while wearing a Max Headroom mask).

Thanks to [JasonK] for the tip!

youtube.com/embed/ZnuXIrbRQiE?…


hackaday.com/2025/09/28/fully-…


Fujitsu svela Post-K: il supercomputer ARM che sarà 100 volte più veloce di “K”


Dopo aver firmato la realizzazione del supercomputer giapponese “K”, uno dei più potenti al mondo, Fujitsu ha annunciato un nuovo progetto di punta: Post-K, basato sull’architettura ARMv8 a 64 bit. La presentazione è avvenuta durante l’International Supercomputing Conference di Francoforte, in Germania, e il lancio ufficiale è previsto entro il 2020.

Secondo le previsioni, Post-K sarà in grado di raggiungere prestazioni 100 volte superiori rispetto al suo predecessore, aprendo la strada a un livello di calcolo che potrebbe superare i 1.000 petaflop (PFLOPS).

Al momento, il supercomputer “K” – noto anche come “King” – si colloca al quinto posto nella classifica mondiale dei 500 sistemi più potenti. Le sue capacità si attestano a 10,5 PFLOPS, garantite da circa 705.000 core Sparc64 VIIIfx.

Il progetto Post-K punterà a rivoluzionare le architetture tradizionali, adottando ARMv8 a 64 bit come base. Non è ancora chiaro se verranno utilizzati core ARM standard, come i Cortex-A73 o versioni successive, oppure una soluzione sviluppata direttamente da Fujitsu, progettata per rispettare le specifiche ARM.

Tra le possibilità allo studio figura anche un approccio eterogeneo con l’integrazione di una GPU per incrementare ulteriormente le capacità di elaborazione. Tuttavia, l’azienda non ha diffuso dettagli tecnici definitivi.

L’interesse verso ARM in ambito supercomputing rappresenta un segnale di svolta. L’azienda britannica aveva già espresso l’intenzione di entrare nel mercato dei server, dominato ancora da Intel, ma le sue potenzialità sembrano più promettenti proprio nel campo dei supercomputer.

Inoltre, la progressiva maturazione della tecnologia Mali e la sua possibile applicazione come acceleratore eterogeneo potrebbero favorire lo sviluppo di sistemi ad alte prestazioni e a basso consumo energetico, uno degli obiettivi più ambiziosi nel settore del calcolo avanzato.

L'articolo Fujitsu svela Post-K: il supercomputer ARM che sarà 100 volte più veloce di “K” proviene da il blog della sicurezza informatica.


Smart Home Gets A Custom Keypad Controller


Voice assistants and smartphones are often the go-to interfaces for modern smart home systems. However, if you fancy more direct physical controls, you can go that route as well. To that end, [Salim Benbouziyane] whipped up a nifty keypad to work with his Home Assistant setup.

The build is based on an ESP32 microcontroller, which has wireless hardware onboard to communicate with the rest of [Salim’s] Home Assistant setup. Using the ESPHome firmware framework as a base, the microcontroller is connected to a four-by-three button keypad array, built using nice clicky key switches. There’s also an indicator light on top as a system status indicator. A fingerprint scanner provides an easy way for users to authenticate when disarming the alarm.

Security and speed were the push for [Salim] to whip up this system. He found it difficult to disarm his alarm in a hurry when fumbling with his phone, and the direct keypad entry method was far more desirable.

Sometimes, the easiest route to the smart home of your dreams is to just build the exact solutions you need. Video after the break.

youtube.com/embed/Mt3QerTMITg?…


hackaday.com/2025/09/28/smart-…


NTRON Plays Games, Music


What do you get if you meld a Raspberry Pi, a chiptune synthesizer, and a case that looks like an imaginary Kenback-2000? Well, if you are [Artifextron], you get the NTRON. Part Nintendo console, part chip tune synthesizer, and part objet d’art. You can see the device do its things in the video below.

This is less of a bare metal design and more of a synthesis of parts, but it is a very clever system design using audio mixers and an assortment of modules to do its tasks. It does have an IC handling the gamepad ports. Of course, it also features a ton of 3D printed parts.

Not only is the build excellent-looking, but the documentation is painstakingly detailed. If the old Heathkit manuals were a perfect 10, this one is easily in the 7.5 to 8 range. Pictures, diagrams, and links for the materials are all there. It should be reasonably easy to replicate one of the variants described in the manual.

Overall, a great fusion of items in a gorgeous presentation. Maybe enough time to get one made to give as a holiday gift. Chiptune is definitely a thing. We see plenty of RetroPie projects, some of which don’t even use a Pi.

youtube.com/embed/ssZVzNC4sl0?…


hackaday.com/2025/09/28/ntron-…


Consegna di 13 milioni di euro in cavi sottomarini per il progetto offshore Shanhaiguan


Al porto di Haihui a Xiaoting, lungo il fiume Yangtze, una grande struttura in acciaio rosso ha fatto da cornice alla consegna di un imponente ordine di cavi sottomarini da parte di Yichang Qifan. Attraverso un sistema specializzato, i cavi sono stati trasportati dall’officina fino alla sommità della struttura e poi avvolti ordinatamente in una gabbia di stoccaggio, in un’operazione del valore di centinaia di milioni di yuan.

Secondo Yu Jun, direttore del reparto produzione, l’azienda ha già superato i 500 milioni di yuan in consegne di cavi sottomarini nel corso dell’anno, con ordini programmati fino a fine anno. Tra i clienti figurano progetti strategici nelle isole di Xiangyun e Xugong, per i quali le produzioni sono in fase di completamento e spedizione.

La commessa in partenza riguarda cavi da 220 kV e 66 kV destinati al progetto eolico offshore Shanhaiguan Offshore Wind Power, fasi I e II. La spedizione include 15 cavi in otto specifiche, per un totale di 60,1 chilometri e 4.524 tonnellate, dal valore complessivo di 116 milioni di yuan. Le consegne, iniziate il 16 settembre, si concluderanno entro il 30 settembre con trasporto combinato fiume-mare verso Qinhuangdao.

Yu Jun ha sottolineato come si tratti della consegna più grande, pesante e lunga mai realizzata dall’azienda. La produzione è iniziata ad aprile e si è conclusa a metà agosto, con elevati requisiti tecnici. La complessità dei cavi, che devono essere realizzati senza interruzioni, rende la produzione particolarmente delicata: un difetto anche a pochi chilometri dal completamento porta allo scarto dell’intero nucleo. Le riparazioni in mare, inoltre, comportano costi molto elevati.

La sfida tecnologica è ancora maggiore per i cavi sottomarini ad altissima tensione con fibra ottica, che richiedono uno spessore di isolamento di 26 mm. Solo pochi produttori sono in grado di realizzare cavi da 220 kV, considerati il punto più avanzato della produzione del settore per gli elevati standard e rischi.
Fonte banyuetan.org
Il cuore produttivo di Yichang Qifan si trova in un edificio di 180 metri che ospita la linea di reticolazione delle torri, destinata alla realizzazione di nuclei isolati ad alta e altissima tensione. Con tre linee di produzione, l’azienda è l’unico produttore in Hubei capace di fornire cavi sottomarini di lunga lunghezza, oltre a cavi terrestri fino a 500 kV. Una piattaforma di trasporto di 300 metri collega lo stabilimento direttamente ai moli del fiume.

Dal 2020, anno del suo insediamento a Xiaoting, l’azienda ha progressivamente rafforzato la ricerca e sviluppo nel settore dei cavi sottomarini, fino a produrre un singolo cavo da 220 kV lungo 35 chilometri. Nel 2023 ha consegnato circa 200 chilometri di cavi e stretto accordi con grandi gruppi energetici nazionali. Secondo Jiang Jingwen, l’obiettivo è trasformare la base di Xiling in un polo di produzione nazionale di cavi ad alta gamma e puntare a un valore di 10 miliardi di yuan nei prossimi anni, grazie a investimenti e innovazione tecnologica.

L'articolo Consegna di 13 milioni di euro in cavi sottomarini per il progetto offshore Shanhaiguan proviene da il blog della sicurezza informatica.


Kinethreads: A Low Cost Haptic Exo-Suit


There have been lots of haptic vest devices over the years, though the vast majority have been very simple. Many existing suits pack in a few speakers or vibration motors to give feedback to the wearer. Kinethreads aims to go further, serving as a full-body haptic suit using an innovative mechanical setup.

Kinethreads is effectively an exosuit, which mounts several motorized pulley systems to the wearer’s body. These pulleys are attached to the user’s hands, feet, back, torso, and head via strings. By winding in the pulleys, it’s possible for the device to effectively tug on different parts of the body, creating rich, dynamic physical feedback that can easily be felt and interpreted by the user. The whole system weighs 4.6 kilograms—not light, but very practical. It can also run for 6 hours on a single charge. The whole suit can be donned or doffed in under a minute. Cost is stated to be under $500.

It’s a particularly interesting device for VR use. The team notes applications such as simulating the weight of picking up a virtual object, creating the feeling of virtual “gravity,” or giving continuous dynamic feedback during a driving simulation. Other demos include mimicking the sensation of touching hard objects, or the more diffuse feeling of standing under a waterfall.

As virtual worlds become a bigger part of our daily lives, expect ever more developments in these kinds of exosuit feedback systems. We’ve seen other great work in this space before, too. Video after the break.

youtube.com/embed/4ev0w_tbuw8?…


hackaday.com/2025/09/27/kineth…


Drones At Danish Airports, A Plea For Responsible Official Response


In Europe, where this is being written, and possibly further afield, news reports are again full of drone sightings closing airports. The reports have come from Scandinavia, in particular Denmark, where sightings have been logged across the country. It has been immediately suggested that the Russians might somehow be involved, something they deny, which adds a dangerous geopolitical edge to the story.

To us here at Hackaday, this is familiar territory. Back in the last decade, we covered the saga of British airports closing due to drone sightings. In that case, uninformed hysteria played a large part in the unfolding events, leading to further closures. The problem was that the official accounts did not seem credible. Eventually, after a lot of investigation and freedom of information requests by the British drone community, there was a shamefaced admission that there had never been any tangible evidence of a drone being involved.

In the case of the Danish drone sightings, it seems that credible evidence has been shown for some of the events. The problem is this: just as we saw a few years ago in southern England, and in late 2024 in the US, such things create a fertile atmosphere for mass hysteria. Large numbers of people with no idea what a drone looks like are nervously scanning the skies. Before too long, they are seeing phantom drones everywhere, and then the danger is that a full-scale drone panic ensues over nothing.

Based on our on-the-ground experience of the debacle in the UK in 2018, we hope that our Danish neighbours don’t fall into the same trap as their UK counterparts by escalating matters to a crescendo based on sketchy evidence. We trust that their response will be sober, proportionate, and based on evidence for all to see.

Our concern back in 2018 was for drone enthusiasts who might lose the right to fly, while now it’s more one for all of our collective safety.


hackaday.com/2025/09/27/drones…


How Many Phones Sport a 5 and 1/4 Diskette Drive? This One.


It all started with a sarcastic comment right here on Hackaday.com: ” How many phones do you know that sport a 5 and 1/4 inch diskette drive?” — and [Paul Sanjay] took that personally, or at least thought “Challenge accepted” because he immediately hooked an old Commodore floppy drive to his somewhat-less-old smartphone.

The argument started over UNIX file directories, in a post about Redox OS on smartphones— which was a [Paul Sanja] hack as well. [Paul] had everything he needed to pick up the gauntlet, and evidently did so promptly. The drive is a classic Commodore 1541, which means you’ll want to watch the demo video at 2x speed or better. (If you thought loading times felt slow in the old days, they’re positively glacial by modern standards.) The old floppy drive is plugged into a Google Pixel 3 running Postmarket OS. Sure, you could do this on Android, but a fully open Linux system is obviously the hacker’s choice. As a bonus, it makes the whole endeavor almost trivial.

Between the seven-year-old phone and the forty-year-old disk drive is an Arduino Pro Micro, configured with the XUM1541 firmware by [OpenBCM] to act as a translator. On the phone, the VICE emulator pretends to be a C64, and successfully loads Impossible Mission from an original disk. Arguably, the phone doesn’t “sport” the disk drive–if anything, it’s the other way around, given the size difference–but we think [Paul Sanja] has proven the point regardless. Bravo, [Paul].

Thanks to [Joseph Eoff], who accidentally issued the challenge and submitted the tip. If you’ve vexed someone into hacking (or been so vexed yourself), don’t hesitate to drop us a line!

We wish more people would try hacking their way through disagreements. It really, really beats a flame war.

youtube.com/embed/VahuI9jt1L8?…


hackaday.com/2025/09/27/how-ma…


NEC V20: The Original PC Processor Upgrade


In the early 1980s, there was the IBM PC, with its 4.77 MHz Intel 8088 processor. It was an unexpected hit for the company, and within a few years there were a host of competitors. Every self-respecting technology corporation wanted a piece of the action including processor manufacturers, and among those was NEC with their V20 chip and its V30 sibling. From the outside they were faster pin-compatible 8088 and 8086 clones, but internally they could also run both 8080 and 80186 code. [The Silicon Underground] has a look back at the V20, with some technical details, history, and its place as a PC upgrade.

For such a capable part it’s always been a surprise here that it didn’t take the world by storm, and the article sheds some light on this in the form of an Intel lawsuit that denied it a critical early market access. By the time it was available in quantity the PC world had moved on from the 8088, so we saw it in relatively few machines. It was a popular upgrade for those in the know back in the day though as it remains in 2025, and aside from its immediate speed boost there are a few tricks it lends to a classic PC clone. The version of DOS that underpinned Windows 95 won’t run on an 8086 or 8088 because it contains 8016 instructions, but a V20 can run it resulting in a much faster DOS experience. One to remember, if an early PC or clone cones your way.

Hungry for the good old days of DOS? You don’t need to find 80s hardware for that.


hackaday.com/2025/09/27/nec-v2…


Bluetooth Earrings Pump Out The Tunes


When you think of a Bluetooth speaker, you’re probably picturing a roughly lunchbox-sized device that pumps out some decent volume for annoying fellow beachgoers, hikers, or public transport users. [Matt Frequencies] has developed something in an altogether different form factor—tiny Bluetooth speakers you can dangle from your earlobes! They’re called Earrays, and they’re awesome.

The build started with [Matt] harvesting circuit boards from a pair of off-the-shelf Bluetooth earbuds. These are tiny, and perfect for picking up a digital audio stream from a smartphone or other device, but they don’t have the grunt to drive powerful speakers. Thus, [Matt] hooked them up to a small Adafruit PAM8302A amplifier board, enabling them to drive some larger speaker drivers that you can actually hear from a distance. These were then installed in little 3D printed housings that are like a tiny version of the speaker arrays you might see hanging from the rigging at a major dance festival. Throw on a little earring hook, and you’ve got a pair of wearable Bluetooth speakers that are both functional, fashionable, and very audible!

[Matt] has continued to develop the project, even designing a matching pendant and a charging base to make them practical to use beyond a proof-of concept. Despite the weight of the included electronics, they’re perfectly wearable, as demonstrated by [DJ Kaizo Trap] modelling the hardware in the images seen here.

We’ve seen plenty of great LED earrings over the years, but very few jewelry projects in the audio space thus far. Perhaps that will change in future—if you pursue such goals, let us know!


hackaday.com/2025/09/27/blueto…


La nave spia russa Yantar ha monitorato per mesi i cavi sottomarini


La nave oceanografica russa Yantar, spesso descritta in Occidente come una “nave spia”, ha completato un viaggio di tre mesi lungo le coste europee, durante il quale ha seguito rotte che coincidono con alcune delle principali infrastrutture di comunicazione e approvvigionamento energetico.

L’analisi del Financial Times, basata su immagini satellitari e dati del Sistema di Identificazione Automatica (AIS), indica che l’imbarcazione si è soffermata in aree strategiche come il Mare d’Irlanda e l’arcipelago delle Svalbard, zone in cui transitano cavi sottomarini vitali per la NATO.
Nave russa Yantar

Un’unità segreta del Ministero della Difesa russo


Lo Yantar appartiene alla Flotta del Nord ma opera sotto la supervisione della Direzione Generale per la Ricerca in Acque Profonde (GUGI), un’unità del Ministero della Difesa russo creata durante la Guerra Fredda e considerata altamente riservata. Secondo fonti citate dal quotidiano britannico, il GUGI agisce in stretta connessione con l’intelligence militare russa (GRU), piuttosto che con la Marina, che fornisce solo supporto tecnico.

La base principale dell’unità si trova a Olenya Guba, nella regione di Murmansk, lungo la costa del Mare di Barents, sorvegliata da decenni dalla CIA. Le difese del sito sono state recentemente rafforzate con barriere navali e sistemi di disturbo dei segnali GPS, che rendono difficile anche la navigazione civile nelle vicinanze.

La nave è dotata di veicoli sottomarini telecomandati e bracci meccanici in grado di collegarsi ai cavi posati sui fondali marini, consentendo intercettazioni o potenziali operazioni di sabotaggio. Gli esperti ritengono che il suo obiettivo principale sia l’individuazione dei nodi in cui convergono più linee, così da massimizzare l’impatto di un eventuale attacco.

Il Financial Times sottolinea che, dopo l’invasione russa dell’Ucraina nel 2022, la Yantar ha ridotto i viaggi di lunga durata, probabilmente per timore di un’escalation con i paesi occidentali o a causa delle sanzioni. Tuttavia, nel novembre 2024 ha ripreso le missioni estese, completando un percorso di 97 giorni attraverso zone infrastrutturali critiche dell’Atlantico europeo.

Infrastrutture a rischio


Le reti di cavi sottomarini hanno un ruolo centrale nella sicurezza e nell’economia globale. Nel Regno Unito, il 99% delle comunicazioni digitali transita attraverso cavi in fibra ottica sui fondali, mentre i gasdotti sottomarini forniscono circa il 75% dell’approvvigionamento nazionale. Le stesse linee sono cruciali anche per le transazioni finanziarie internazionali e le comunicazioni militari tra Stati Uniti e Regno Unito.

La vulnerabilità di queste infrastrutture è al centro delle preoccupazioni delle marine occidentali. Secondo David Fields, ex addetto navale britannico a Mosca, la strategia russa punta a colpire rapidamente le reti critiche, causando blackout, interruzioni di corrente o blocchi delle comunicazioni, con conseguenze politiche e sociali potenzialmente destabilizzanti.

Il Segretario alla Difesa britannico John Healey ha denunciato pubblicamente la “crescente aggressività russa”, dopo che la Yantar è stata avvistata due volte nelle acque territoriali britanniche nell’ultimo anno. Nel frattempo, Londra ha intensificato i pattugliamenti e avviato lo sviluppo del sistema Atlantic Bastion, progettato per monitorare i fondali marini. L’Irlanda, considerata un punto vulnerabile perché fuori dalla NATO, ha stanziato 60 milioni di euro per un sistema sonar in grado di rilevare minacce subacquee.

Episodi collegati


Le attività russe hanno attirato attenzione anche in altre aree. In Finlandia, la Procura nazionale ha incriminato il capitano e due membri dell’equipaggio della petroliera Eagle S, accusati di aver danneggiato deliberatamente i cavi elettrici tra Finlandia ed Estonia.

L’imbarcazione, parte della cosiddetta “flotta ombra” russa, è stata inserita nella lista nera dell’India.

L'articolo La nave spia russa Yantar ha monitorato per mesi i cavi sottomarini proviene da il blog della sicurezza informatica.


Whither the Chip Shortage?


Do you remember the global chip shortage? Somehow it seems so long ago, but it’s not even really been three years yet. Somehow, I had entirely forgotten about it, until two random mentions about it popped up in short succession, and brought it all flooding back like a repressed bad dream.

Playing the role of the ghost-of-chip-shortage-past was a module for a pair of FPV goggles. There are three versions of the firmware available for download at the manufacturer’s website, and I had to figure out which I needed. I knew it wasn’t V1, because that was the buggy receiver PCB that I had just ordered the replacement for. So it was V2 or V3, but which?

Digging into it, V2 was the version that fixed the bug, and V3 was the redesign around a different microcontroller chip, because they couldn’t get the V2 one during the chip shortage.

I saw visions of desperate hackers learning new toolchains, searching for alternative parts, finding that they could get that one chip, but that there were only 20 of them left and they were selling for $30 instead of $1.30. I know a lot of you out there were designing through these tough couple years, and you’ve all probably got war stories.

And yet here we are, definitively post-chip-shortage. How can you be sure? A $30 vape pen includes a processor that we would have killed for just three years ago. The vape includes a touchscreen, just because. And it even has a Bluetooth LE chip that it’s not even using. My guess is that the hardware designers just put it in there hoping that the firmware team would get around to using it for something.

This vape has 16 MB of external SPI Flash! During the chip shortage, we couldn’t even get 4 MB SPI flash.

It’s nice to be on the other side of the chip shortage. Just order whatever parts you want and you get them, but don’t take for granted how luxurious that feels. Breathe easy, and design confidently. You can finally use that last genuine STM32F103 blue pill board without fear of it being the last one on earth.

(Featured image is not an actual photo of the author, although he does sometimes have that energy.)

This article is part of the Hackaday.com newsletter, delivered every seven days for each of the last 200+ weeks. It also includes our favorite articles from the last seven days that you can see on the web version of the newsletter. Want this type of article to hit your inbox every Friday morning? You should sign up!


hackaday.com/2025/09/27/whithe…


Bringing Bluetooth to the Zune


The Zune might have joined the portable media player game too late to ever really be competition for the iPod, but that doesn’t mean it didn’t pick up some devoted fans along the way. Some of them are still breathing new life into the device, such as [The Director of Legal Evil Emeritus] at the Louisville Hackerspace, with this project that gives it Bluetooth capability.

As far as media players go, there’s still some solid reasons to rock a Zune. Compared to other devices of the era, it offers a better DAC, an FM tuner, and no iTunes reliance. The goal of this project was to bring a bit of modern functionality without having to do any modification of the Zune itself. As the player supported docks with IR remotes, this build involves using an ESP32 to listen to the Bluetooth signal coming from the speakers, interpret any button presses, and forward them along to the Zune’s dock.

There is a dedicated scene for these old music players, but this build is unique for not needing to crack open the case and splice in a Bluetooth module. Even then, those typically don’t have the ability to interact with things like this speaker with its integrated control buttons.

We don’t often seen Zune hacks come our way — the last time Microsoft’s player graced these pages was in 2010, when the Open Zune Development Kit was released.

Thanks to [JAC_101] for the tip!


hackaday.com/2025/09/27/bringi…


An LED Sphere For Your Desk


The Las Vegas Sphere is great and all, but few of us can afford the expense to travel to out there to see it on the regular. If you’re looking for similar vibes you can access at home, you might enjoy the desk toy that [AGBarber] has designed.

The scale is small — the sphere measures just 98 mm (3.6 inches) in diameter — but that just means it’s accessible enough to be fun. The build is based around various sizes of WS2812B addressable LED rings, and contains 120 individual RGB LEDs in total. They’re wrapped up in a 3D printed housing which does a great job of diffusing the light. Transparent filament was used to print parts that light up with a richly-saturated glow with few visible hotspots. Commanding the LEDs is an ESP8266 microcontroller in the form of a Wemos D1 Mini, which provides plenty of grunt to run animations as well as great wireless connectivity options. [AGBarber] relied on their own Pixel Spork library to handle all the cool lighting effects. Files are on GitHub for the curious.

Maybe you don’t like spheres, and icosahedrons are more your speed. Well, we’ve featured those too—with 2,400 LEDs, no less.

youtube.com/embed/cquZKZue7UM?…


hackaday.com/2025/09/27/an-led…


Identità digitali italiane in vendita: pacchetti KYC a 300 dollari sul Dark Web


Recentemente, un avviso sul noto forum underground “DarkForum” ha riacceso i riflettori sul crescente e pericoloso mercato della compravendita di documenti d’identità rubati o falsificati.

L’annuncio, che offre un “pacchetto privato di documenti italiani” al costo di circa 300 dollari (circa 280-300 euro), rivela come l’identità digitale sia diventata una merce di scambio fondamentale per il crimine finanziario.

L’obiettivo esplicito di questi pacchetti è superare i processi di KYC (Know Your Customer o “Conosci il tuo cliente”). Il KYC è lo standard di verifica dell’identità imposto a banche, piattaforme di criptovalute e servizi di pagamento per prevenire il riciclaggio di denaro e il finanziamento del terrorismo. Aggirare questi controlli con documenti falsi o autentici rubati permette ai criminali di operare nell’anonimato.

Il Contenuto di un Pacchetto: Non Solo la Carta d’Identità


Un “pacchetto KYC” completo venduto su questi canali non include solo una copia scannerizzata di un documento d’identità, ma è spesso una combinazione di dati e immagini realizzate per ingannare i sofisticati sistemi di verifica.

“Questi set di documenti sono la chiave di volta per i truffatori,” spiega un analista di sicurezza informatica. “Non basta avere una foto della patente. Spesso includono anche prove di residenza, come bollette o estratti conto, e, nel caso di frodi più elaborate, persino un ‘selfie KYC’ della vittima ignara che tiene in mano il proprio documento. Questi documenti vengono tipicamente sottratti tramite attacchi di phishing, malware o violazioni di database“, spiega Dark Lab il gruppo di intelligence delle minacce di Red Hot Cyber che ha rilevato questo post nei mercati underground.

Le Frodi Sostenute dall’Anonimato


L’identità rubata viene impiegata per una serie di attività illecite, creando gravi problemi per le vittime:

  1. Riciclaggio di Denaro: La destinazione principale è l’apertura di conti “muli” su exchange di criptovalute o servizi di trasferimento di denaro. Utilizzando l’identità rubata, i criminali possono convertire fondi di origine illecita (provenienti da ransomware, truffe informatiche, ecc.) in valuta pulita, rendendo il tracciamento quasi impossibile;
  2. Furto d’Identità Finanziario: I documenti permettono di aprire conti bancari o linee di credito, contrarre prestiti o richiedere carte a nome della vittima, lasciandola con debiti e un profilo creditizio rovinato;
  3. Evasione di Restrizioni: Vengono usati per aggirare i divieti imposti da piattaforme online, permettendo agli utenti bannati di ricreare nuovi profili per perpetrare ulteriori truffe.


La Risposta delle Autorità e La Difesa del Cittadino


Le autorità investigative, monitorano costantemente questi annunci. La vendita e l’acquisto di tali pacchetti costituiscono reato, con pene severe per furto d’identità e riciclaggio di denaro.

Per i cittadini, la prevenzione è l’unica vera difesa. Gli esperti raccomandano di:

  • Non condividere mai copie di documenti d’identità tramite email o canali non crittografati;
  • Diffidare di richieste inaspettate di “aggiornare i documenti” o di inviare “selfie con la carta d’identità” da parte di siti web o app non verificati;
  • Utilizzare password forti e l’autenticazione a due fattori (2FA) per tutti gli account online, in particolare quelli finanziari, per ridurre il rischio di violazioni.

Il mercato nero dei documenti d’identità è un promemoria costante di come i nostri dati personali siano l’asset più prezioso per il crimine organizzato, e di come la prudenza digitale sia ormai essenziale quanto la sicurezza fisica.

L'articolo Identità digitali italiane in vendita: pacchetti KYC a 300 dollari sul Dark Web proviene da il blog della sicurezza informatica.


UNIX for a Legacy TI


Although now mostly known as a company who cornered the market on graphing calculators while only updating them once a decade or so, there was a time when Texas Instruments was a major force in the computing world. In the late 70s and early 80s they released a line of computers called the TI-99 to compete (unsuccessfully) with various offerings from Commodore, and these machines were fairly robust for the time. They did have limited memory but offered a 16-bit CPU and plenty of peripherals, and now there’s even a UNIX-like OS that they can run.

This version of UNIX is called UNIX99 and is the brainchild of AtariAge forum member [mrvan] who originally wasn’t looking to develop a full operating system for this computer but rather a set of standard C libraries to help with other projects. Apparently the step from that to a UNIX-flavored OS wasn’t too big so this project was born. While the operating system doesn’t have a UNIX certification, it has most of the tools any of us would recognize on similar machines. The OS has support for most of the TI-99 hardware, file management, a basic user account system, and a command shell through which scripts can be written and executed.

That being said, the limitations of the hardware do come through in the operating system. There’s no multitasking, for example, and the small amount of memory is a major hurdle as well. But that’s what makes this project all the more impressive, and [mrvan] isn’t stopping here. He’s working on a few other improvements to this platform, and we look forward to seeing future releases. UNIX itself is extremely influential in the computing world, and has been used a the model for other homebrew UNIX-like operating systems on similar platforms of this era such as the Z80.

Thanks to [Stephen] for the tip!

Photo courtesy of Rama & Musée Bolo via Wikimedia Commons


hackaday.com/2025/09/26/unix-f…


The 19th Century Quantum Mechanics


While William Rowan Hamilton isn’t a household name like, say, Einstein or Hawking, he might have been. It turns out the Irish mathematician almost stumbled on quantum theory in the or around 1827. [Robyn Arianrhod] has the story in a post on The Conversation.

Famously, Newton worked out the rules for the motion of ordinary objects back in 1687. People like Euler and Lagrange kept improving on the ideas of what we call Newtonian physics. Hamilton produced an especially useful improvement by treating light rays and moving particles the same.

Sure, he was using it as an analogy. But fast forward a bit, and we find out that while light is like a wave, it is also like a particle. In 1924, de Broglie proposed that perhaps, then, matter could also be a particle or a wave. He was right, and this was the birth — or at least the conception — of what we now call quantum mechanics. This led to work from Schrödinger, Dirac, and others. Schrödinger, in particular, was intrigued with Hamilton’s analogies and joined them to de Broglie’s ideas. This led to his famous wave equation.

Hamilton did many other things, too. He was an amateur poet and developed the algebra of quaternions, although another mathematician, Benjamin Rodrigues, had written about an early version of them a few years earlier. He was also famous, or perhaps infamous, for being struck by inspiration while on a walk and carving an equation into a nearby bridge.


hackaday.com/2025/09/26/the-19…


Active Probe Reaches 3 GHz


When you think of a scope probe, you usually think of what is basically a wire with a spring hook and an attenuator. Those are passive probes. [Kerry Wong] shows off a pre-release active probe that sidesteps some problems with those ordinary passive probes.

The trick is that passive probes have input capacitance that interferes with very high-frequency signals. They also tend to have less noise. Although the probe isn’t on the market yet, it is set to debut at a price lower than competitive probes. Still, be warned. The reason you don’t see them more often is that $1,000 is relatively inexpensive for an active probe.

Because the probe is pretty hefty, it comes with a tripod that can hold it while you use it. [Kerry] connects some probe adapters to a PCB with two square wave oscillators. Square waves are a good test waveform because they have odd-numbered harmonics that rise well above the target frequency.

The probe adapters are a little longer than you might like, which causes some ringing on the input signal. However, if you compare the results to a standard passive probe, you’ll quickly see the value of the active probe setup.

You can save some money if you roll your own, of course. Most of the ones we’ve seen don’t quite make 3 GHz, though.

youtube.com/embed/pN8wHRxeny4?…


hackaday.com/2025/09/26/active…


Detecting Surveillance Cameras With The ESP32


These days, surveillance cameras are all around us, and they’re smarter than ever. In particular, many of them are running advanced algorithms to recognize faces and scan license plates, compiling ever-greater databases on the movements and lives of individuals. Flock You is a project that aims to, at the very least, catalogue this part of the surveillance state, by detecting these cameras out in the wild.

The system is most specifically set up to detect surveillance cameras from Flock Safety, though it’s worth noting a wide range of companies produce plate-reading cameras and associated surveillance systems these days. The device uses an ESP32 microcontroller to detect these devices, relying on the in-built wireless hardware to do the job. The project can be built on a Oui-Spy device from Colonel Panic, or just by using a standard Xiao ESP32 S3 if so desired. By looking at Wi-Fi probe requests and beacon frames, as well as Bluetooth advertisements, it’s possible for the device to pick up telltale transmissions from a range of these cameras, with various pattern-matching techniques and MAC addresses used to filter results in this regard. When the device finds a camera, it sounds a buzzer notifying the user of this fact.

Meanwhile, if you’re interested in just how prevalent plate-reading cameras really are, you might also find deflock.me interesting. It’s a map of ALPR camera locations all over the world, and you can submit your own findings if so desired. The techniques used by in the Flock You project are based on learnings from the DeFlock project. Meanwhile, if you want to join the surveillance state on your own terms, you can always build your own license plate reader instead!

[Thanks to Eric for the tip!]


hackaday.com/2025/09/26/detect…


Robot Bartender Is The Life of the Party


As the old saying goes, when the only tool you have is a 6 DOF industrial robotic arm, every problem looks like an opportunity to make it serve up adult beverages. [benkokes] found himself in this familiar predicament and did what any of us would do, but his process wasn’t without a few party fouls as well as a few head-scratchers.

One of the common problems that people who suddenly find themselves with an old industrial robot have is that there’s usually no documentation or instructions. This was true here with the added hiccup of the robot’s UI being set to Chinese. Luckily no one had changed the root password, and eventually he was able to get the robot up and working.

Getting it to make drinks was a different matter altogether. [benkokes] needed a custom tool to hold the cup as well as shake it, and 3D printed a claw-style end effector with a lid. Out of his multi-colored pack of party cups, however, the orange cups were different enough in dimension to cause problems for the shaking lid which was discovered when the robot spilled a drink all over the table.

Eventually, though, the robot was successfully serving drinks at a party. One of [benkokes]’s friends happened to be a puppet maker and was able to outfit it with a tailored tuxedo for the party as well, and he also programmed it to dance in between serving drinks, completing the AI revolution we have all been hoping for. Perhaps unsurprisingly, this is a common project for people who suddenly come to posses a large general-purpose industrial robot, while others build robots specifically for this task alone.

youtube.com/embed/gczwmDvI31E?…


hackaday.com/2025/09/26/robot-…


Hackaday Podcast Episode 339: The Vape Episode, a Flying DeLorean, and DIY Science


Hackaday Editors Elliot Williams and Tom Nardi start this week’s episode off with an update on the rapidly approaching 2025 Supercon in Pasadena, California. From there they’ll talk about the surprisingly high-tech world of vapes, a flying DeLorean several years in the making, non-contact pulse monitoring, and the potential of backyard radio telescopes to do real astronomy. You’ll hear about a dodecahedron speaker, a page turning peripheral, and 3D printed tools for unfolding boxes. They’ll wrap things up by taking a look at the latest generation of wearable smart glasses, and wonder if putting a bank of batteries in your home is really with the hassle.

Check out the links below if you want to follow along, and as always, tell us what you think about this episode in the comments!

html5-player.libsyn.com/embed/…

Direct download in DRM-free MP3.

Where to Follow Hackaday Podcast

Places to follow Hackaday podcasts:



Episode 339 Show Notes:

News:



What’s that Sound?



Interesting Hacks of the Week:



Quick Hacks:



Can’t-Miss Articles:



hackaday.com/2025/09/26/hackad…