Modifying a QingPing Air Quality Monitor for Local MQTT Access


The media in this post is not displayed to visitors. To view it, please log in.

The QingPing Air Quality Monitor 2 is an Android-based device that not only features a touch screen with the current air quality statistics of the room, but also includes an MQTT interface that normally is used in combination with the QingPing mobile app and the Xiaomi IoT ecosystem. Changing it to report to a local MQTT server instead for integration with e.g. Home Assistant can be done in an official way that still requires creating a cloud account, or you can just do it yourself via an ADB shell and some file modifications as [ea] has done.

By default these devices do not enumerate when you connect a computer to their USB-C port, but that’s easily resolved by enabling Android’s developer mode. This involves seven taps on the Device Name line in the About section of settings. After this you can enter Developer Options to toggle on Debug Mode and Adbd Debugging, which creates the option to connect to the device via USB with ADB and open up a shell with adb shell.

From there you can shoot off the QingSnow2 app and the watchdog.sh that’s running in the background, disable IPv6 and edit /etc/host to redirect all the standard cloud server calls to a local server. Apparently there is even SSH access at this point, with root access and password rockchip. The MQTT configuration is found under /data/etc/ in settings.ini, which is used by the QingPing app, so editing redirects all that.

Of course, the device also queries a remote server for weather data for your location, so if you modify this you have to provide a proxy, which [ea] did with a simple MQTT server that’s found along with other files on the GitHub project page.


hackaday.com/2026/01/04/modify…

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

188 – Se non controlli il tuo sito, l’AI controlla la tua reputazione camisanicalzolari.it/188-se-no…
Cybersecurity & cyberwarfare ha ricondiviso questo.

#Sedgwick discloses data breach after #TridentLocker #ransomware attack
securityaffairs.com/186525/dat…
#securityaffairs #hacking #cybercrime
Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Il buio digitale di Caracas: cyber operazioni e resistenza anonima nella crisi venezuelana
#CyberSecurity
insicurezzadigitale.com/il-bui…

Il buio digitale di Caracas: cyber operazioni e resistenza anonima nella crisi venezuelana


@Informatica (Italy e non Italy 😁)
Mentre i titoli dei giornali di tutto il mondo raccontano del blitz militare statunitense in Venezuela e della cattura del presidente Nicolás Maduro, un’altra battaglia, più silenziosa ma non meno significativa, si sta combattendo nel

reshared this

Sleeping Rough in Alaska with a USPS Cargo Bike


The media in this post is not displayed to visitors. To view it, please log in.

Out of all 49 beautiful US states (plus New Jersey), the one you’d probably least want to camp outside in during the winter is arguably Alaska. If you were to spend a night camping out in the Alaskan winter, your first choice of shelter almost certainly wouldn’t be a USPS electric cargo trike, but over on YouTube [Matt Spears] shows that it’s not that hard to make a lovely little camper out of the mail bike.

We’re not sure how much use these sorts of cargo trikes get in Alaska, but [Matt] seems to have acquired this one surplus after an entirely-predictable crash took one of the mirrors off. A delta configuration trike — single wheel in front — is tippy at the best of times, but the high center of gravity you’d get from a loading the rear with mail just makes it worse. That evidently did not deter the United States Postal Service, and it didn’t deter [Matt] either.

His conversion is rather minimal: to turn the cargo compartment into a camper, he only adds a few lights, a latch on the inside of the rear door, and a wood-burning stove for heat. Rather than have heavy insulation shrink the already-small cargo compartment, [Matt] opts to insulate himself with a pile of warm sleeping bags. Some zip-tie tire chains even let him get the bike moving (slowly) in a winter storm that he claims got his truck stuck.

While it might not be a practical winter vehicle, at least on un-plowed mountain roads, starting with an electric-assist cargo trike Uncle Sam already paid for represented a huge cost and time savings vs starting from scratch like this teardrop bike camper we featured a while back. While not as luxurious, it seems more practical for off-roading than another electric RV we’ve seen.

youtube.com/embed/s9MqbLbFRDQ?…


hackaday.com/2026/01/04/sleepi…

Ray Marching in Excel


The media in this post is not displayed to visitors. To view it, please log in.

3D graphics are made up of little more then very complicated math. With enough time, you could probably compute a ray marching by hand. Or, you could set up Excel to do it for you!

Ray marching is a form of ray tracing, where a ray is stepped along based on how close it is to the nearest surface. By taking advantage of signed distance functions, such an algorithm can be quite effective, and in some instances much more efficient then traditional ray marching algorithms. But the fact that ray marching is so mathematically well defined is probably why [ExcelTABLE] used it to make a ray traced game in Excel.

Under the hood, the ray marching works by casting a ray out from the camera and measuring its distance from a set of three dimensional functions. If that distance is below a certain value, this is considered a surface hit. On surface hits, a simple normal shader computes pixel brightness. This is then rendered out by variable formatting in the cells of the spreadsheet.

For those of you following along at home, the tutorial should work just fine in any modern spreadsheet software including Google Sheets and LibreOffice Calc. It also provides a great explanation of the math and concepts of ray marching, so is worth a read regardless your opinions on Excel’s status as a so-called “programming language.”

This is not the first time we have come across a ray tracing tutorial. If computer graphics are your thing, make sure to check out this ray tracing in a weekend tutorial next!

Thanks [Niklas] for the tip!


hackaday.com/2026/01/04/ray-ma…

Cybersecurity & cyberwarfare ha ricondiviso questo.

#Resecurity Caught #ShinyHunters in Honeypot
securityaffairs.com/186528/sec…
#securityaffairs #hacking #cybercrime
Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

ShinyHunters attacca Resecurity, ma era una HoneyPot creata ad arte per prenderli

📌 Link all'articolo : zurl.co/TlQ8i

#redhotcyber #news #cybersecurity #hacking #malware #ransomware #sicurezzainformatica #violazione

Cybersecurity & cyberwarfare ha ricondiviso questo.

What is happening to the Internet in #Venezuela? Did the U.S. use cyber capabilities?
securityaffairs.com/186509/int…
#securityaffairs #hacking
Cybersecurity & cyberwarfare ha ricondiviso questo.

Do you have an idle cluster? Can you spare a couple core-years?

Help me bruteforce some test vectors for RSA key generation edge cases!

Here are the instructions, it's just a matter of running a single self-contained cross-compilable Go binary that will report the results autonomously.

gist.github.com/FiloSottile/19…

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

What is happening to the Internet in #Venezuela? Did the U.S. use cyber capabilities?
securityaffairs.com/186509/int…
#securityaffairs #hacking
Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

7 anni di inganni e 9 milioni di dispositivi infettati. Il più grande attacco ai browser mai visto

📌 Link all'articolo : redhotcyber.com/post/7-anni-di…

#redhotcyber #news #cybersecurity #hacking #malware #ransomware #sicurezzainformatica #hacker #darkweb

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

SECURITY AFFAIRS #MALWARE #NEWSLETTER ROUND 78
securityaffairs.com/186497/mal…
#securityaffairs #hacking

Exploring Nintendo 64DD Code Remnants in Ocarina of Time


The media in this post is not displayed to visitors. To view it, please log in.

The Nintendo 64DD, an N64 add-on released only in Japan in 1999.

What if you took a Nintendo 64 cartridge-based game and allowed it to also use a large capacity magnetic disc format alongside it? This was the premise of the Nintendo 64DD peripheral, and the topic of a recent video by [Skawo] in which an archaeological code dig is performed to see what traces of the abandoned product may remain.

The 64DD slots into the bottom of the console where the peripheral connector is located, following which the console can read and write the magnetic discs of the 64DD. At 64 MB it matched the cartridge in storage capacity, while also being writable unlike cartridges or CDs. It followed on previous formats like the Famicom Disk System.

For 1998’s Game of the Year title The Legend of Zelda: Ocarina of Time such a 64DD-based expansion was worked on for a while before being cancelled along with the 64DD. With this Zelda game now decompiled, its source code has shown to be still full of 64DD-related code that [Skawo] takes us through in the video.

The Nintendo 64DD discs resembled ZIP discs. (Credit: Evan-Amos, Wikimedia)The Nintendo 64DD discs resembled ZIP discs. (Credit: Evan-Amos, Wikimedia)
As is typical for CD- and magnetic storage formats like these 64DD discs, their access times and transfer speeds are atrociously slow next to a cartridge’s mask ROM, which clearly left the developers scrambling to find some way to use the 64DD as an actual enhancement. Considering that the 64DD never was released outside of Japan and had a very short life, it would seem apparent that, barring PlayStation-level compromises, disc formats just weren’t a good match for the console.

The interface with the 64DD in the game’s code gives some idea of what the developers had in mind, which mostly consisted out of swapping on-cartridge resources like dungeon maps with different ones. Ultimately this content did make its way into a commercial release, in the form of the Master Quest option on the game’s re-release on the GameCube.

Although this doesn’t enable features once envisioned, such as tracking the player’s entire route and storing permanent map changes during gameplay, it at least gives us a glimpse of what the expansion game on the 64DD could have looked like.

youtube.com/embed/2xyk-EozojY?…


Top image: N64 with stacked 64DD, credit: Evan-Amos


hackaday.com/2026/01/04/explor…

Cybersecurity & cyberwarfare ha ricondiviso questo.

Security Affairs #newsletter Round 557 by Pierluigi #Paganini – INTERNATIONAL EDITION
securityaffairs.com/186485/bre…
#securityaffairs #hacking #Grok

Are We Ready for AR Smart Glasses Yet?


The media in this post is not displayed to visitors. To view it, please log in.

In a recent article from IEEE Spectrum, [Alfred Poor] asks the question what do consumers really want in smart glasses? And are you finally ready to hang a computer screen on your face?

[Alfred] says that since Google Glass was introduced in 2012, smart glasses haven’t yet found their compelling use-case. Apparently it looks like while virtual reality (VR) might be out, augmented reality (AR) might be in. And of course now we have higher levels of “AI” in the mix, whatever that means.

According to the article in the present day there are two competing visions of what smart glasses might be: we have One Pro from Xreal in Beijing, and AI Glasses from Halliday in Singapore, each representing different design concepts evolving in today’s market. The article goes into further detail. The video below the break is promotional material from Halliday showing people’s reactions to their AI Glasses product.

[Alfred] talks with Louis Rosenberg, CEO and chief scientist of Unanimous AI, who says he believes “that within five years, immersive AI-powered glasses will replace the smartphone as the primary mobile device in our digital lives.” Predicting the future is hard, but what do you think? Sound off in the comments!

All in all smart glasses remain a hot topic. If you’d like to read more check out our recent articles Making Glasses That Detect Smartglasses and Mentra Brings Open Smart Glasses OS With Cross-Compat.

youtube.com/embed/C0Iwq2auR_g?…


hackaday.com/2026/01/04/are-we…

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

La mente dietro le password – Puntata 3 – Il rumore della sicurezza (e perché è necessario)

📌 Link all'articolo : redhotcyber.com/post/la-mente-…

La #sicurezza delle password e il comportamento umano sono più legati di quanto immaginiamo. Nelle puntate precedenti abbiamo provato a spostare lo sguardo: le password non proteggono solo i #sistemi, raccontano le #persone.Le scelte che facciamo davanti a una casella di login parlano di #memoria, fretta, abitudine, fiducia.

A cura di Simone D'Agostino

#redhotcyber #news #sicurezzadellepassword #sicurezzainformatica #comportamentoumano #memoria #fretta #abitudine #fiducia #sistemidisicurezza #cybersecurity #hacking #protezionedeidati #sicurezzadigital

Cybersecurity & cyberwarfare ha ricondiviso questo.

President #Trump blocks $2.9M Emcore chip sale over security concerns
securityaffairs.com/186473/sec…
#securityaffairs #hacking #Grok
Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Dati sensibili delle reti elettriche USA in vendita sul dark web: 6,5 Bitcoin il loro prezzo

📌 Link all'articolo : redhotcyber.com/post/dati-sens…

#redhotcyber #news #cybersecurity #hacking #malware #ransomware #datavolo #furtoinformazioni

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Forensic Timeliner 2.2: analisi forensi avanzate attraverso l’unificazione dei dati

📌 Link all'articolo : redhotcyber.com/post/forensic-…

#redhotcyber #news #analisiForense #DFIR #sicurezzaInformatica #timeliner #forensicTimeliner #triage

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Patchwork è tornato: il gruppo di hacker che spia i militari con un virus scritto in Python

📌 Link all'articolo : redhotcyber.com/post/patchwork…

#redhotcyber #news #cybersecurity #hacking #malware #python #patchwork #phishing #msbuild #downloader

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Google presenta il nuovo modello di intelligenza artificiale Nano Banana 2 Flash

📌 Link all'articolo : redhotcyber.com/post/google-pr…

#redhotcyber #news #google #intelligenzaartificiale #aipersistorage #velocita #convenienza #applicazionistandard

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

187 – L’IA non funziona senza etica e ce ne accorgiamo adesso camisanicalzolari.it/187-lia-n…

Quote Printer Keeps Receipts


The media in this post is not displayed to visitors. To view it, please log in.

In the world of social media, “keeping receipts” refers to the practice of storing evidence that may come in handy for a callout post at a later date. For [Teddy Warner], though, it’s more applicable to a little printer he whipped up to record the very best banter from his cadre of friends.

[Teddy’s] idea was simple. He hoped to capture amusing or interesting quotes his friends made in his apartment, and store them in a more permanent form. He also wanted to allow his friends to do the same. To that end, he whipped up a small locally-hosted web interface which his friends could use to record quotes, along with proper attribution. Hosted on a Raspberry Pi 5, the web interface can then truck those quotes out to an 80 mm thermal receipt printer. The anecdote, epithet, or witticism is then spat out with a timestamp in a format roughly approximating a receipt you might get from your local gas station. What’s neat is that [Teddy] was also able to install the entire system within the housing of the Miemieyo receipt printer, by 3D printing a custom base that could house the Pi and a suitable power supply.

Beyond being fun, this system also serves a critical purpose. It creates a paper trail, such that in-jokes, rumors, and insults alike can be traced back to their originating source. No more can Crazy Terry claim to have invented “the Malaga bit,” because the server and the receipt clearly log that Gerald dropped it first at the Boxing Day do.

We’ve seen similar projects before, too. There’s just something neat about holding a bit of paper in your hand.

youtube.com/embed/F5_00bj8dHo?…


hackaday.com/2026/01/03/quote-…

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Oltre il ransomware: Handala e l’evoluzione dell’attacco come messaggio
#CyberSecurity
insicurezzadigitale.com/oltre-…

DarkSpectre e Patchwork: quando l’attaccante entra dalla porta di servizio e nessuno se ne accorge


@Informatica (Italy e non Italy 😁)
Negli ultimi anni, l’immaginario collettivo della cybersecurity ha fin troppo spesso romanticizzato l’hacker solitario, genio ribelle in grado di violare sistemi con exploit a zero-day e toolkit fantascientifici. La

reshared this

Oltre il ransomware: Handala e l’evoluzione dell’attacco come messaggio


@Informatica (Italy e non Italy 😁)
Negli attacchi rivendicati dal collettivo Handala tra la fine del 2025 e l’inizio del 2026, il dato non è più soltanto l’obiettivo finale dell’intrusione, ma diventa un mezzo narrativo, un’arma semiotica utilizzata per costruire consenso, intimidire e orientare il dibattito

FPGA Dev Kit Unofficially Brings MSX Standard Back


The media in this post is not displayed to visitors. To view it, please log in.

In the 1980s there were an incredible number of personal computers of all shapes, sizes, and operating system types, and there was very little interoperability. Unlike today’s Windows-Mac duopoly, this era was much more of a free-for-all but that didn’t mean companies like Microsoft weren’t trying to clean up all of this mess. In 1983 they introduced the MSX standard for computers, hoping to coalesce users around a single design. Eventually it became very successful in Japan and saw some use in a few other places but is now relegated to the dustbin of history, but a new FPGA kit unofficially supports this standard.

The kit is called the OneChip Book and, unlike most FPGA kits, includes essentially everything needed to get it up and running including screen, keyboard, and I/O all in a pre-built laptop case. At its core it’s just that: and FPGA kit. But its original intent was to recreate this old 80s computer standard with modern hardware. The only problem is they never asked for permission, and their plans were quickly quashed. The development kit is still available, though, and [electricadventures] goes through the steps to get this computer set up to emulate this unofficially-supported retro spec. He’s also able to get original MSX cartridges running on it when everything is said and done.

Although MSX is relatively unknown in North America and Western Europe, it remains a fairly popular platform for retro computing enthusiasts in much of the rest of the world. We’ve seen a few similar projects related to this computer standard like this MSX-inspired cyberdeck design, but also others that bring new hardware to this old platform.

youtube.com/embed/Iy7R29bjuJ8?…


hackaday.com/2026/01/03/fpga-d…

Apollo Lunar Module Thrust Meter Lives Again


The media in this post is not displayed to visitors. To view it, please log in.

A photo of the thrust meter from the Apollo lunar module

[Mike Stewart] powers up a thrust meter from an Apollo lunar module. This bit of kit passed inspection on September 25, 1969. Fortunately [Mike] was able to dig up some old documentation which included the pin numbers. Score! It’s fun to see the various revisions this humble meter went through. Some of the latest revisions are there to address an issue where there was no indication upon failure, so they wired in a relay which could flip a lamp indicator if the device lost power.

This particular examination of this lunar thrust module is a good example of how a system’s complexity can quickly get out of hand. Rather than one pin there are two pins to indicate auto or manual thrust, each working with different voltage levels; the manual thrust is as given but the auto thrust is only the part of the thrust that gets added to a baseline thrust, so they need to be handled differently, requiring extra logic and wiring for biasing the thrust meter when appropriate. The video goes into further detail. Toward the end of the video [Mike] shows us what the meter’s backlights look like when powered.

If you’re interested in Apollo mission technology be sure to check out Don Eyles Walks Us Through The Lunar Module Source Code.

youtube.com/embed/H3bxe7gynQk?…


hackaday.com/2026/01/03/apollo…

Pickle Diodes, Asymmetric Jacobs Ladders, and Other AC Surprises


The media in this post is not displayed to visitors. To view it, please log in.

While we’re 100 years past Edison’s fear, uncertainty, and doubt campaign, the fact of the matter is that DC is a bit easier to wrap one’s head around. It’s just so honest in its directness. AC, though? It can be a little shifty, and that results in some unexpected behaviors, as seen in this video from [The Action Lab].

He starts off with a very relatable observation: have you ever noticed that when you plug in a pickle, only half of it lights up? What’s up with that? Well, it’s related to the asymmetry he sees on his Jacobs ladder that has one side grow hotter than the other. In fact, it goes back to something welders who use DC know about well: the Debye sheath.

The arc of a welder, or a Jacobs ladder, or a pickle lamp is a plasma: ions and free electrons. Whichever electrode has negative is going to repel the plasma’s electrons, resulting in a sheath of positive charge around it. This positively-charged ions in the Debye sheath are going to accelerate into the anode, and voila! Heating. That’s why it matters which way the current goes when you’re welding.

With DC, that makes sense. In AC, well — one side starts as negatively charged, and that’s all it takes. It heats preferentially by creating a temporary Debye sheath. The hotter electrode is going to preferentially give off electrons compared to its colder twin — which amplifies the effect every time it swings back to negative. It seems like there’s no way to get a pure AC waveform across a plasma; there’s a positive feedback loop at whatever electrode starts negative that wants to introduce a DC bias. That’s most dramatically demonstrated with a pickle: it lights up on the preferentially heated side, showing the DC bias. Technically, that makes the infamous electric pickle a diode. We suspect the same thing would happen in a hot dog, which gives us the idea for the tastiest bridge rectifier. Nobody tell OSHA.

[The Action Lab] explains in more detail in his video, and demonstrates with ring-shaped electrode how geometry can introduce its own bias. For those of us who spend most of our time slinging solder in low-voltage DC applications, this sort of thing is fascinating. It might be old hat to others here; if the science of a plain Jacobs ladder no longer excites you, maybe you’d find it more electrifying built into a blade.

youtube.com/embed/_59b75Vql38?…


hackaday.com/2026/01/03/pickle…

Teardown of Boeing 777 Cabin Pressure Control System


The media in this post is not displayed to visitors. To view it, please log in.

Modern passenger airliners are essentially tubes-with-wings, they just happen to be tubes that are stuffed full with fancy electronics. Some of the most important of these are related to keeping the bits of the tube with humans inside it at temperatures and pressures that keeps them alive and happy. Case in point the Boeing 777, of which [Michel] of Le Labo de Michel on YouTube recently obtained the Cabin Pressure Control System (CPCS) for a teardown.

The crucial parts on the system are the two Nord-Micro C0002 piezo resistive pressure transducers, which measure the pressure inside the aircraft. These sensors, one of which is marked as ‘backup’, are read out by multiple ADCs connected to a couple of FPGAs. The system further has an ARINC 429 transceiver, for communicating with the other avionics components. Naturally the multiple PCBs are conformally coated and with vibration-proof interconnects.

Although it may seem like a lot of hardware just to measure air pressure with, this kind of hardware is meant to work without errors over the span of years, meaning significant amounts of redundancy and error checking has to be built-in. Tragic accidents such as Helios Airways Flight 522 involving a 737-300 highlight the importance of these systems. Although in that case human error had disabled the cabin pressurization, it shows just how hard it can be to detect hypoxia before it is too late.

youtube.com/embed/rsCxEcR-AYE?…


hackaday.com/2026/01/03/teardo…

The Setun Was a Ternary Computer from the USSR in 1958


The media in this post is not displayed to visitors. To view it, please log in.

Scientific staff members working on the computing machine Setun

[Codeolences] tells us about the FORBIDDEN Soviet Computer That Defied Binary Logic. The Setun, the world’s first ternary computer, was developed at Moscow State University in 1958. Its troubled and short-lived history is covered in the video. The machine itself uses “trits” (ternary digits) instead of “bits” (binary digits).

When your digits have three discrete values there are a multiplicity of ways of assigning meaning to each state, and the Setun uses a system known as balanced ternary where each digit can be either -1, 0, or 1 and otherwise uses a place-value system in the normal way.

An interesting factoid that comes up in the video is that base-3 (also known as radix-3) is the maximally efficient way to represent numbers because three is the closest integer to the natural growth constant, the base of the natural logarithm, e, which is approximately 2.718 ≈ 3.

If you’re interested to know more about ternary computing check out There Are 10 Kinds Of Computers In The World and Building The First Ternary Microprocessor.

youtube.com/embed/4vwOJE0Dq38?…


hackaday.com/2026/01/03/the-se…

Anon reshared this.

Printing in Metal with DIY SLM


The media in this post is not displayed to visitors. To view it, please log in.

A bed of metal powder is visible through a green-tinted window. A fused metal pattern, roughly square, is visible, with one corner glowing white and throwing up sparks.

An accessible 3D printer for metals has been the holy grail of amateur printer builders since at least the beginning of the RepRap project, but as tends to be the case with holy grails, it’s proven stubbornly elusive. If you have the resources to build it, though, it’s possible to replicate the professional approach with a selective laser melting (SLM) printer, such as the one [Travis Mitchell] built (this is a playlist of nine videos, but if you want to see the final results, the last video is embedded below).

Most of the playlist shows the process of physically constructing the machine, with only the last two videos getting into testing. The heart of the printer is a 500 Watt fiber laser and a galvo scan head, which account for most of the cost of the final machine. The print chamber has to be purged of oxygen with shielding gas, so [Travis] minimized the volume to reduce the amount of argon needed. The scan head therefore isn’t located in the chamber, but shines down into it through a window in the chamber’s roof. A set of repurposed industrial servo motors raises and lowers the two pistons which form the build plate and powder dispenser, and another servo drives the recoater blade which smooths on another layer of metal powder after each layer.

As with any 3D printer, getting good first-layer adhesion proved troublesome, since too much power caused the powder to melt and clump together, and too little could result in incomplete fusion. Making sure the laser was in focus improved things significantly, though heat management and consequent warping remained a challenge. The recoater blade was originally made out of printed plastic, with a silicone cord along the edge. Scraping along hot fused metal in the early tests damaged it, so [Travis] replaced it with a stainless steel blade, which gave much more consistent performance. The final results looked extremely promising, though [Travis] notes that there is still room for redesign and improvement.

This printer joins the very few other DIY SLM machines we’ve seen, though there is an amazingly broad range of other creative ideas for homemade metal printers, from electrochemical printers to those that use precise powder placement.

youtube.com/embed/MPXp3hpsdjA?…


hackaday.com/2026/01/03/printi…

Cybersecurity & cyberwarfare ha ricondiviso questo.

Grazie a @DavidPuente per la verifica delle informazioni sulle notizie relative all'attacco USA al Venezuela. Un lavoro efficace ed equilibrato (malgrado le sue posizioni dichiaratamente ostili al corrotto e autoritario regime di Maduro)

open.online/2026/01/03/fake-ne…

Cybersecurity & cyberwarfare ha ricondiviso questo.

French authorities investigate AI ‘undressing’ deepfakes on X
securityaffairs.com/186460/ai/…
#securityaffairs #hacking #Grok
Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Vulnerabilità critica in GNU Wget2: gli aggressori possono sovrascrivere file. 8.8 di score

📌 Link all'articolo : redhotcyber.com/post/vulnerabi…

#redhotcyber #news #cybersecurity #hacking #malware #vulnerabilita #sicurezzainformatica #gnu #wget2

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

DarkSpectre e Patchwork: quando l’attaccante entra dalla porta di servizio e nessuno se ne accorge
#CyberSecurity
insicurezzadigitale.com/darksp…
Cybersecurity & cyberwarfare ha ricondiviso questo.

Androidiani.net: un nuovo inizio per una community che non vuole fermarsi

Era impossibile restare indifferenti leggendo l’ultimo saluto di Androidiani.com. Quel messaggio ha segnato la fine di un’era, ma anche l’inizio di qualcosa di nuovo

🔗 androidiani.net/androidiani-ne…

Cybersecurity & cyberwarfare ha ricondiviso questo.

Thousands of #ColdFusion exploit attempts spotted during Christmas Holiday
securityaffairs.com/186450/unc…
#securityaffairs #hacking #adobe