Keebin’ with Kristina: the One with the Split with the Num Pad
I love, love, love Saturn by [Rain2], which comes in two versions. The first, which is notably more complex, is shown here with its rings-of-Saturn thumb clusters.
Image by [Rain2] via redditSo what was the impetus for this keyboard? It’s simple: a friend mentioned that ergo keyboards are a no-go if you need a num pad really bad.
Saturn has one built right in. The basic idea was to add a num pad while keeping the total number of keys to a minimum. Thanks to a mod key, this area can be many things, including but not limited to a num pad.
As far as the far-out shape goes, and I love that the curvature covers the thumb cluster and the index finger, [Rain2] wanted to get away from the traditional thumb cluster design. Be sure to check out the back of the boards in the image gallery.
Unfortunately, this version is too complicated to make, so v2 does not have the cool collision shapes going for it. But it is still an excellent keyboard, and perhaps will be open source someday.
Phanny Kicks Butt
Say hello to Phanny, a custom 52-key wireless split from [SfBattleBeagle]. This interestingly-named board has a custom splay that they designed from the ground up along with PCBWay, who sponsored the PCBs in the first place.
Image by [SfBattleBeagle] via GitHubI personally think the thumb keys go a little too far inward for my taste, but I’m certain that [SfBattleBeagle]’s hands must be different. Probably doesn’t have these stubby little thumbs.
While Ergogen is all the rage, [SfBattleBeagle] still opts to use Fusion and KiCad, preferring the UI of the average CAD program. If you’re wondering about the lack of palm rests, the main reason is that [SfBattleBeagle] tends to bounce between screens, as well as moving between the split and the num pad. To that end, they are currently designing a pair of sliding wrist skates that I would love to hear more about.
Be sure to check out the GitHub repo for all the details and a nice build guide. [SfBattleBeagle] says this is a fun project and results in a very comfy board.
The Centerfold: Mantis WIP is Captivating
Image by [luckybipedal] via redditI love it when I can provide a lovely centerfold that’s also got a lot of story behind it. This is Mantis, a work-in-progress by [luckybipedal] aka [Felix Kühling]. You can read a lot more on GitHub, and the reasoning behind the design choices in [Felix]’s write-up over on KBD News. [Felix] expects to build the first prototypes in March or April, and publish a final design and build guide later this spring.
Via reddit
Do you rock a sweet set of peripherals on a screamin’ desk pad? Send me a picture along with your handle and all the gory details, and you could be featured here!
Historical Clackers: the Masspro
I must say, the Antikey Chop doesn’t have much to say about the Masspro typewriter, and for good reason.Image via The Antikey Chop
But here’s what we know: the Masspro was invented by a George Francis Rose, who was the son of Frank S. Rose, inventor of the Standard Folding Typewriter. That machine was the predecessor to the Corona No. 3.
Frank died right as the Rose Typewriter Co. was starting to get somewhere. George took over, but then it needed financing pretty badly.
Angel investor and congressman Bill Conger took over the company, relocated, and renamed it the Standard Folding Typewriter Co. According to the Antikey Chop, “selling his father’s company was arguably George’s greatest contribution to typewriter history”.
George Rose was an engineer like his father, but he was not very original when it came to typewriters. The Masspro is familiar yet foreign, and resembles the Corona Four. Although the patent was issued in 1925, production didn’t begin until 1932, and likely ended within to years.Image via Oz Typewriter
Why? It was the wrong machine at the wrong time. Plus, it was poorly built, and bore a double-shift keyboard which was outdated by this time. And, oh yeah, the company was started during the Depression.
But I like the Masspro. I think my favorite part, aside from the open keyboard, is the logo, which looks either like hieroglyphics or letters chiseled into a stone tablet.
I also like the textured firewall area where the logo is stamped. The Antikey Chop calls this a crinkle finish. Apparently, they came in black, blue, green, and red. The red isn’t candy apple, it’s more of an ox-blood red, and that’s just fine with me. I’d love to see the blue and green, though. Oh, here’s the green.
Finally, a Trackball Mouse With Nice Switches
Okay, so Keychron’s new Nape Pro mouse is pretty darn cool, and this is the best picture I could find that actually shows how you’re supposed to implement this thing on your desk. Otherwise, it looks like some kind of presentation remote.Image via Yanko Design
So the idea here is to never take your hands off the keyboard to mouse, although you can use it off to the side like a regular trackball if you want. I say the ability to leave your fingers on the home row is even better.
There are plenty of keyboards with trackpads and other mousing functions that let you do this. But maybe you’re not ready to go that far. This mouse is a nice, easy first step.
The ball is pretty small at 25 mm. For comparison, the M575 uses a 34 mm ball, which is pretty common for trackball mice. Under those six buttons are quiet Huano micro switches, which makes sense, but I personally think loud-ish mice are nice enough.
I’ve never given it much thought, but the switches on my Logitech M575 are nice and clicky. I wonder how these compare, but I don’t see a sound sample. If the Nape Pro switches sound anything like this, then wowsers, that is quiet.Image via Yanko Design
The super-cool part here is the software and orientation system, which they call OctaShift. The thing knows how it’s positioned and can remap its functions to match. M1 and M2 are meant to be your primary mouse buttons, and they are reported to be comfortable to reach in any position.
Inside you’ll find a Realtek chip with a 1 kHz polling rate along with a PixArt PAW3222 sensor, which puts this mouse in the realm of decent wireless gaming mice. But the connectivity choice is yours between dongle, Bluetooth, and USB-C cable.
And check this out: the firmware is ZMK, and Keychron plans to release the case STLs. Finally, it seems the mouse world is catching up with the keyboard world a bit.
Got a hot tip that has like, anything to do with keyboards? Help me out by sending in a link or two. Don’t want all the Hackaday scribes to see it? Feel free to email me directly.
When Digital Sovereignty got real
IT'S MONDAY, AND THIS IS DIGITAL POLITICS. I'm Mark Scott, and will be speaking on a webinar hosted by the Knight Georgetown Institute on Jan 28. The topic: how to improve access to social media data to support greater transparency and accountability. You can sign up here (the webinar starts at 11am ET / 5pm CET / 4pm UK).
— Even some of the United States' closest allies are re-evaluating their ties to American tech amid growing concerns about Washington's worldview.
— It's official. ByteDance sold off its US TikTok unit. But does the fire sale actually solve the underlying national security and privacy concerns?
— Many teenagers are OK with a smartphone ban at school. They are less keen on their devices being taken away forever.
Let's get started:
Astronomy Live on Twitch
Although there are a few hobbies that have low-cost entry points, amateur astronomy is not generally among them. A tabletop Dobsonian might cost a few hundred dollars, and that is just the entry point for an ever-increasing set of telescopes, mounts, trackers, lasers, and other pieces of equipment that it’s possible to build or buy. [Thomas] is deep into astronomy now, has a high-quality, remotely controllable telescope, and wanted to make it more accessible to his friends and others, so he built a system that lets the telescope stream on Twitch and lets his Twitch viewers control what it’s looking at.
The project began with overcoming the $4000 telescope’s practical limitations, most notably an annoyingly short Wi-Fi range and closed software. [Thomas] built a wireless bridge with a Raspberry Pi to extend connectivity, and then built a headless streaming system using OBS Studio inside a Proxmox container. This was a major hurdle as OBS doesn’t have particularly good support for headless operation.
The next step was reverse engineering the proprietary software the telescope uses for control. [Thomas] was able to probe network traffic on the Android app and uncovered undocumented REST and WebSocket APIs. From there, he gained full control over targeting, parking, initialization, and image capture. This allowed him to automate telescope behavior through Python scripts rather than relying on the official Android app.
To make the telescope interactive, he built a Twitch-integrated control system that enables viewers to vote on celestial targets, issue commands, and view live telemetry, including stacking progress, exposure data, and target coordinates. A custom HTML/CSS/JavaScript overlay displays real-time status, and there’s a custom loading screen when the telescope is moving to a new target. He also added ambient music and atmospheric effects, so the stream isn’t silent.
If [Thomas]’s stream is your first entry point into astronomy and you find that you need to explore it more on your own, there are plenty of paths to build your way into the hobby, especially with Dobsonian telescopes, which can be built by hand, including the mirrors.
The cURL Project Drops Bug Bounties Due To AI Slop
Over the past years, the author of the cURL project, [Daniel Stenberg], has repeatedly complained about the increasingly poor quality of bug reports filed due to LLM chatbot-induced confabulations, also known as ‘AI slop’. This has now led the project to suspend its bug bounty program starting February 1, 2026.
Examples of such slop are provided by [Daniel] in a GitHub gist, which covers a wide range of very intimidating-looking vulnerabilities and seemingly clear exploits. Except that none of them are vulnerabilities when actually examined by a knowledgeable developer. Each is a lengthy word salad that an LLM churned out in seconds, yet which takes a human significantly longer to parse before dealing with the typical diatribe from the submitter.
Although there are undoubtedly still valid reports coming in, the truth of the matter is that the ease with which bogus reports can be generated by anyone who has access to an LLM chatbot and some spare time has completely flooded the bug bounty system and is overwhelming the very human developers who have to dig through the proverbial midden to find that one diamond ring.
We have mentioned before how troubled bounty programs are for open source, and how projects like Mesa have already had to fight off AI slop incidents from people with zero understanding of software development.
reshared this
Does Carbon Fiber PLA Make Sense?
Carbon fiber (CF) has attained somewhat of a near-mystical appeal in consumer marketing, with it being praised for being stronger than steel while simultaneously being extremely lightweight. This mostly refers to weaved fibers combined with resin into a composite material that is used for everything from car bodies to bike frames. This CF look is so sexy that the typical carbon-fiber composite weave pattern and coloring have been added to products as a purely cosmetic accent.
More recently, chopped carbon fiber (CCF) has been added to the thermoplastics we extrude from our 3D printers. Despite lacking clear evidence of this providing material improvements, the same kind of mysticism persists here as well. Even as evidence emerges of poor integration of these chopped fibers into the thermoplastic matrix, the marketing claims continue unabated.
As with most things, there’s a right way and a wrong way to do it. A recent paper by Sameh Dabees et al. in Composites for example covered the CF surface modifications required for thermoplastic integration with CF.
Carbon Fibers
There are a number of ways to produce CF, often using polyacrylonitrile, rayon, or pitch as the feedstock. After spinning this precursor into a suitable filament, heating induces carbonization and produces the carbon fiber.Schematic representation of carbon fiber preparation from polyacrylonitrile.
A 6 μm diameter carbon filament, compared to 50 μm diameter human hair. (Source: Wikimedia)
Following this process, the CF is typically in the form of a few micrometer-thick fiber that is essentially pure carbon. To create a structural interface between the CF and the polymer of a composite material, some kind of process has to take place that creates this interface.
The fundamental difference between thermoset and thermoplastic polymers is that thermoset polymers are reacting in the mold as it sets, providing an environment in which the epoxy precursor and hardener can interact with the normally not chemically very reactive CF to form covalent bonds.
In comparison, thermoplastic polymers are already finalized, with covalent bonds between thermoplastics and CF unlikely. This means that the focus with CF-reinforced thermoplastics is mostly on weaker, non-covalent interactions, such as Van der Waals forces, pi-interactions and hydrogen bonds. Each of these interactions is further dependent on whether the thermoplastic is compatible, such as the presence of aromatic rings for pi-interactions.
Making It Stick
With those challenges in mind, how can thermoplastics be coaxed into forming a significant interface with CF? As noted in the earlier cited work by Sameh Dabees et al., there is no single surface treatment for CF that would work for every thermoplastic polymer, as a logical result of the limitations imposed by the available non-covalent interactions.Carbon fiber in PLA after FDM printing, showing clear voids. (Credit: I built a thing, YouTube)
One way to prepare the CF is by applying a coating to the fiber, called a sizing. By applying a sizing to the fiber that is compatible with the target thermoplastic, the interface with the bulk material is expected to improve. In one cited study involving a polyamide-acid sizing for polyimide bulk material, this coating created an approximately 85 nm interface, with an interfacial shear strength increased by 32.3%. In another study targeting CF-PEEK, this had a polyimide-based, water-soluble sizing applied that also significantly improved the shear strength.
Of course, this sizing has to actually adhere to the CF, lest it simply vanishes into the bulk thermoplastic material. This is a problem that is easily observable in FDM-printed thermoplastic polymers as distinct voids around the CF where the bulk polymer pulled away during crystallization, and no interface formed. Obviously, these voids create a weak point instead of strengthening the material.
Fiber Modding
Although CF is often confused with carbon nanotubes, it does not have the rigidly ordered structure that they do. Instead it has a graphite structure, owing to the way that they are produced, meaning sheets of graphite placed together in a disordered fashion. Despite this, the external surface is still smooth, which is where the chemical inertness comes from. Combined with the lack of reactivity from the side of thermoplastics, this highlights the need for something to bridge the gap.Various carbon fiber surface modification methods. (Credit: Dabees et al., 2025, Composites)
The review paper by Dabees et al. covers the most common types of surface treatments, with the above graphic providing a summary of the methods. Perhaps one of the most straightforward methods is the coating of the CF with an epoxy, thus shifting the interface from CF-thermoplastic to thermoset-thermoplastic. This kind of hybrid approach shows promising results, but is also cumbersome and not a universal fix.
Note that virtually all research here is focused on thermoplastic polymers like polycarbonate and PEEK, as these are most commonly used in industrial and medical settings. Yet even within that more limited scope the understanding of the exact effects of these modifications remains poorly investigated. Much of this is due to how hard it is to characterize the effects of one treatment when you take all other variables into account.
Perhaps most frustrating of all is how hard it is to research this topic considering the scale of the CF surface and the miniscule thickness of the CF-polymer interface. Relying on purely mechanical tests to quantify the impact is then tempting, but ultimately leaves us without a real understanding of why one method seems to work better than another.
Vibes Vs Science
The overall conclusion that we draw from this particular review paper is that although we know that composite materials can often provide improvements, in the case of thermoplastic-CF composites we realize that our understanding of the fundamentals is still rather lacking.
Outside of the less mainstream world of industrial and medical settings, CF is now widely being added to thermoplastic polymers, primarily in the form of filaments for FDM 3D printers. Without detailed information on whether the manufacturers of these filaments perform any kind of CF surface modification, it is very hard to even compare different CF-polymer filaments like this, even before taking into account individual FDM printer configurations and testing scenarios.
Considering that CF has for a few years now been identified as a potential carcinogen akin to asbestos, this raises the question of whether we really want to put CF and particularly the very small chopped carbon fibers into everything around us and thermoplastics in particular. When the empirical evidence available to us today shows that any mechanical improvements are not due to a solid CF-polymer interface, and any potential carcinogenic risks still years into the future of becoming clear, then the logical choice would be to hold back on CF-thermoplastics until we gain a better understanding of the benefits and risks.
Augmented Reality Project Utilizes the Nintendo DSi
[Bhaskar Das] has been tinkering with one of Nintendo’s more obscure handhelds, the DSi. The old-school console has been given a new job as part of an augmented reality app called AetherShell.
The concept is straightforward enough. The Nintendo DSi runs a small homebrew app which lets you use the stylus to make simple line drawings on the lower touchscreen. These drawings are then trucked out wirelessly as raw touch data via UDP packets, and fed into a Gemini tool which transforms them into animation frames. These are then sent to an iPhone app, which uses ARKit APIs and the phone’s camera to display the animations embedded into the surrounding environment via augmented reality.
One might question the utility of this project, given that the iPhone itself has a touch screen you can draw on, too. It’s a fair question, and one without a real answer, beyond the fact that sometimes it’s really fun to play with an old console and do weird things with it. Plus, there just isn’t enough DSi homebrew out in the world. We love to see more.
youtube.com/embed/I389PbAJmVE?…
LLM-Generated Newspaper Provides Ultimate in Niche Publications
If you’re reading this, you probably have some fondness for human-crafted language. After all, you’ve taken the time to navigate to Hackaday and read this, rather than ask your favoured LLM to trawl the web and summarize what it finds for you. Perhaps you have no such pro-biological bias, and you just don’t know how to set up the stochastic parrot feed. If that’s the case, buckle up, because [Rafael Ben-Ari] has an article on how you can replace us with a suite of LLM agents.The AI-focused paper has a more serious aesthetic, but it’s still seriously retro.
He actually has two: a tech news feed, focused on the AI industry, and a retrocomputing paper based on SimCity 2000’s internal newspaper. Everything in both those papers is AI-generated; specifically, he’s using opencode to manage a whole dogpen of AI agents that serve as both reporters and editors, each in their own little sandbox.
Using opencode like this lets him vary the model by agent, potentially handing some tasks to small, locally-run models to save tokens for the more computationally-intensive tasks. It also allows each task to be assigned to a different model if so desired. With the right prompting, you could produce a niche publication with exactly the topics that interest you, and none of the ones that don’t. In theory, you could take this toolkit — the implementation of which [Rafael] has shared on GitHub — to replace your daily dose of Hackaday, but we really hope you don’t. We’d miss you.
That’s news covered, and we’ve already seen the weather reported by “AI”— now we just need an agenetic sports section and some AI-generated funny papers. That’d be the whole newspaper. If only you could trust it.
Story via reddit.
securityaffairs.com/187349/hac…
#securityaffairs #hacking
Emergency Microsoft update fixes in-the-wild Office zero-day
Microsoft issued emergency updates to fix an actively exploited Office zero-day affecting Office 2016–2024 and Microsoft 365 Apps.Pierluigi Paganini (Security Affairs)
reshared this
Data Act, c’è un aggiornamento delle FAQ: cosa cambia per aziende e utenti
@Informatica (Italy e non Italy 😁)
La Commissione Europea aggiorna le FAQ sul Data Act, fornendo chiarimenti pratici su accesso e uso dei dati, interoperabilità dei servizi digitali e rispetto delle norme UE, tra cui il GDPR, per supportare aziende e professionisti nella compliance e nella
Informatica (Italy e non Italy) reshared this.
securityaffairs.com/187340/dat…
#securityaffairs #hacking
ShinyHunters claims 2 Million Crunchbase records; company confirms breach
Crunchbase confirms a data breach after cybercrime group ShinyHunters claims to have stolen over 2 million personal records.Pierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
Gli utenti di TikTok subiscono interruzioni dopo l'accordo con gli Stati Uniti
TikTok ha riscontrato diffusi problemi tecnici durante il primo fine settimana dopo la vendita delle sue attività negli Stati Uniti, con utenti che hanno segnalato errori di accesso, caricamenti interrotti, pagine "Per te" reimpostate e commenti mancanti.
1003thepeak.iheart.com/content…
TikTok Users Experience Outages After U.S. Deal | 100.3 The Peak
TikTok experienced widespread technical issues during the first weekend after selling its U.S. operations, with users reporting login failures, broken uploads, reset For You Pages, and missing comments.100.3 The Peak
reshared this
Scoperta Shock su Instagram: Post Privati Accessibili Senza Login!
📌 Link all'articolo : redhotcyber.com/post/scoperta-…
#redhotcyber #news #cybersecurity #hacking #instagram #vulnerabilita #privacy #sicurezzainformatica #protezioneonline #datipersonali #accessoai
Scoperta Shock su Instagram: Post Privati Accessibili Senza Login!
Scopri come una vulnerabilità su Instagram ha messo a rischio i post privati degli utenti. Leggi la storia della scoperta e della correzione del bug.Redazione RHC (Red Hot Cyber)
reshared this
Vertice Ue‑India a Nuova Delhi: accordo di libero scambio “più vicino che mai”
L’Europa, dopo il Mercosur, punta così a rafforzare le relazioni economiche con un partner di scala globale, guardando a oriente
reshared this
RE: wetdry.world/@16af93/115961732…
Because not using AI tools for what they excel at will produce less secure code.
For example, they are great at debugging (words.filippo.io/claude-debugg…), they can find real issues in code review, they know more math than me or most of my colleagues, and they can write static analyzers I would have never had the time to write myself.
Claude Code Can Debug Low-level Cryptography
Surprisingly (to me) Claude Code debugged my new ML-DSA implementation faster than I would have, finding the non-obvious low-level issue that was making Verify fail.words.filippo.io
Cybersecurity & cyberwarfare reshared this.
Great idea. I've been doing a lot more Go with Claude at work recently.
We're trying to solve exactly these kinds of context engineering problems. This blog post is from one of our Go engineers and explains what we're doing. May be of interest. 🙏
tessl.io/blog/making-claude-go…
Making Claude good at Go using Context Engineering with Tessl
Discover how Tessl's context engineering boosts Claude's Go skills, achieving 100% success and cutting costs. Learn to optimize coding agents now!Tessl
149 Milioni di Account Esposti: Il Database Che Nessuno Doveva Vedere
📌 Link all'articolo : redhotcyber.com/post/149-milio…
#redhotcyber #news #cybersecurity #hacking #malware #leakdidati #violazionididati #sicurezzainformatica #databreach #protezionedidati
149 Milioni di Account Esposti: Il Database Che Nessuno Doveva Vedere
Una massiccia violazione dei dati ha esposto online 149 milioni di credenziali di accesso rubate. Scopri come proteggerti da questo attacco informatico.Redazione RHC (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
securityaffairs.com/187332/cyb…
#securityaffairs #hacking
Energy sector targeted in multi-stage phishing and BEC campaign using SharePoint
Microsoft warns of a multi-stage phishing and BEC campaign hitting energy firms, abusing SharePoint links.Pierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
securityaffairs.com/187317/apt…
#securityaffairs #hacking
North Korea–linked KONNI uses AI to build stealthy malware tooling
Check Point links an active phishing campaign to North Korea–aligned KONNI, using an AI-written PowerShell backdoor.Pierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
Sicurezza email sotto pressione: raddoppiano i kit di phishing nel 2025
📌 Link all'articolo : redhotcyber.com/post/sicurezza…
#redhotcyber #news #phishing #cybersecurity #intelligenzaartificiale #malware #kitdiattacchi #servizidiphishing #attacchimalevoli
Sicurezza email sotto pressione: raddoppiano i kit di phishing nel 2025
Nel 2025 il numero di kit di phishing-as-a-service è raddoppiato, con tecniche sempre più elusive e ingegnose.Redazione RHC (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
❌ SE PENSI CHE UN FIREWALL BASTI, QUESTO CORSO NON FA PER TE. ❌
Se invece vuoi capire:
• come ragiona un attaccante
• perché certi sistemi cadono sempre
• cosa c’è prima del pentest
allora sei nel posto giusto.
🔥 Cyber Offensive Fundamentals – Live Class
40 ore. Live. Niente scorciatoie.
🔗 Programma: redhotcyber.com/linksSk2L/cybe…
🎥 Intro del prof: youtube.com/watch?v=0y4GYsJMoX…
💎 Prima edizione = prezzo irripetibile
⛔ Numero chiuso
Per info e iscrizioni: 📞 379 163 8765 ✉️ formazione@redhotcyber.com
#redhotcyber #formazione #pentesting #pentest #formazionelive #ethicalhacking #hacking #cybersecurity #penetrationtesting #cti #cybercrime #infosec #corsi #liveclass #hackerhood #pentesting
Cyber Offensive Fundamentals - Corso ethical hacking, penetration test
Corso in Live Class di Cyber Offensive Fundamentals: scopri penetration testing, vulnerabilità e strumenti pratici per la sicurezza informatica offensiva.Red Hot Cyber
Cybersecurity & cyberwarfare reshared this.
209 - Robot che imparano a fare tutto guardando i nostri video - Marco Camisani Calzolari
Robot umanoidi che imparano a fare tutto guardando i nostri video. Seguitemi, perché pochi spiegano gli effetti di questa “svolta”, che cambierà il lavoro molto più in fretta di quanto si sente dire in giro.Web Staff MCC (Marco Camisani Calzolari)
Cybersecurity & cyberwarfare reshared this.
🤖 Tracking strings detected and removed!
🔗 Clean URL(s):
camisanicalzolari.it/209-robot…
❌ Removed parts:
?utm_source=dlvr.it&utm_medium=mastodon
209 - Robot che imparano a fare tutto guardando i nostri video - Marco Camisani Calzolari
Robot umanoidi che imparano a fare tutto guardando i nostri video. Seguitemi, perché pochi spiegano gli effetti di questa “svolta”, che cambierà il lavoro molto più in fretta di quanto si sente dire in giro.Web Staff MCC (Marco Camisani Calzolari)
securityaffairs.com/187309/bre…
#securityaffairs #hacking
Russia-linked Sandworm APT implicated in major cyber attack on Poland’s power grid - Security Affairs
Russia-linked APT Sandworm launched what was described as the largest cyber attack on Poland’s power grid in Dec 2025.Pierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
Quando il Malware si Nasconde nei Video! La Tecnica PixelCode Smonta le Regole
📌 Link all'articolo : redhotcyber.com/post/quando-il…
#redhotcyber #news #pixelcode #steganografia #crittografia #sicurezzainformatica #hacking #malware #cybersecurity #informatica #codicebinario
Quando il Malware si Nasconde nei Video! La Tecnica PixelCode Smonta le Regole
Scopri come i ricercatori hanno sviluppato una tecnica per nascondere dati binari all'interno di immagini e video, sfruttando i pixel per veicolare malware.Redazione RHC (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
Come un semplice file di Visual Studio Code può diventare una backdoor per hacker statali
📌 Link all'articolo : redhotcyber.com/post/come-un-s…
#redhotcyber #news #cybersecurity #hacking #malware #git #visualstudiocode #sicurezzainformatica #minacceinformatiche #evoluzione
Come un semplice file di Visual Studio Code può diventare una backdoor per hacker statali
La Corea del Nord utilizza Visual Studio Code per attacchi informatici tramite repository GitHub e ingegneria sociale.Redazione RHC (Red Hot Cyber)
reshared this
🚀 RHC CONFERENCE 2026 (V EDIZIONE) - Termine massimo 28 febbraio
Se siete ancora indecisi, è ora di decidersi. Scrivete a sponsor@redhotcyber.com.
📍 Pagina dell'evento: redhotcyber.com/red-hot-cyber-…
#redhotcyber #rhcconference #conferenza #informationsecurity #ethicalhacking #dataprotection
RHC Conference 2026
Red Hot Cyber è lieta di annunciare la prossima RHC Conference 2026. In questa pagina potete trovare tutte le informazioni relative all'evento.Red Hot Cyber
Cybersecurity & cyberwarfare reshared this.
Microsoft Teams saprà dove sei: la posizione geografica verrà dedotta dal Wi-Fi
📌 Link all'articolo : redhotcyber.com/post/microsoft…
#redhotcyber #news #microsoftteams #posizionefisica #retewifi #utentewindows #utentemacos #istanzecloud #cloudstandard #multitenant
Microsoft Teams saprà dove sei: la posizione geografica verrà dedotta dal Wi-Fi
Microsoft Teams introduce un aggiornamento che rileva automaticamente la posizione fisica dei lavoratori tramite la rete Wi-Fi, suscitando preoccupazioni sulla privacy.Redazione RHC (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
Khaby Lame vende i diritti della sua identità digitale per 900 milioni di dollari. Ma c’è da riflettere
📌 Link all'articolo : redhotcyber.com/post/khaby-lam…
#redhotcyber #news #khobylame #creatoritaliano #diritticommerciali #partnership #licenze #ecommerce #marchio #italianisucces #socialmedia
Khaby Lame vende i diritti della sua identità digitale per 900 milioni di dollari. Ma c'è da riflettere
Khaby Lame, il creator italiano più seguito al mondo, ha venduto parte dei diritti commerciali legati alla sua identità digitale per 900-975 milioni di dollari.Redazione RHC (Red Hot Cyber)
Ricardo Antonio Piana likes this.
Cybersecurity & cyberwarfare reshared this.
Bike Spokes, Made of Rope
We know this one is a few years old, but unless you’re deep into the cycling scene, there’s a good chance this is the first time you’ve heard of [Ali Clarkson’s] foray into home made rope spokes.
The journey to home-made rope spoke begun all the way back in 2018, shortly after the company Berd introduced their very expensive rope spokes. Berd’s spokes are made of a hollow weaved ultrahigh molecular weight polyethylene (UHMWPE) rope with very low creep. They claim wheels stronger than steel spoke equivalents at a fraction of the weight. Naturally forum users asked themselves, “well why can’t we make our own?” As it turns out, there are a handful of problems with trying this at home.
There are a number of ways to skin this proverbial cat, but they all center around some very special nautical ropes, namely, Robline DM20. This rope has excellent wear and creep characteristics, in a hollow weave much like what Berd developed. The hubs also require the addition of a bevel around the spoke holes to prevent wear. Beyond those two similarities, there are quite a number of ways to lace the spokes between the hub and wheels.
As detailed by [Ali Clarkson], one method involves creating loops out of bike spokes, with a custom jig and some brazing. Then a length of rope is passed through the hub and a special hitch is used to keep it in place. Two loops are made in the ends of this length of rope and passed through the spoke ends made earlier. Finally everything is brought up to tension and trued much like a normal wheelset. The front wheel ended up weighing around 700g, a rather impressive feat for a 24 inch downhill wheel.
However, a number of other methods have been tried on the forum threads. Namely, a number of users have attempted to varying degrees of success putting a length of spoke inside the hollow rope weave and “Chinese finger trapping” it together. The key issue here is sourcing a glue strong enough to hold the spoke piece on at lower tensions, but flexible enough to not crack with the cyclical loading on a rim.
Ultimately, this is a great look at the properties of some extremely special rope. This also isn’t the first time we have seen strange bicycle wheels made with UHMWPE.
youtube.com/embed/6hXOYfnhStI?…
Truffe dei falsi abbonamenti in scadenza - Marco Camisani Calzolari testimonial della Polizia di Stato -
Video del nuovo episodio della campagna "Cyber Hygiene", promossa dalla di Polizia Postale. In questo episodio le truffe dell'abbonamento alle piattaforme diWeb Staff MCC (Marco Camisani Calzolari)
reshared this
Hackaday Links: January 25, 2026
If predictions hold steady, nearly half of the United States will be covered in snow by the time this post goes live, with the Northeast potentially getting buried under more than 18 inches. According to the National Weather Service, the “unusually expansive and long-duration winter storm will bring heavy snow from the central U.S. across the Midwest, Ohio Valley, and through the northeastern U.S. for the remainder of the weekend into Monday.” If that sounds like a fun snow day, they go on to clarify that “crippling to locally catastrophic impacts can be expected”, so keep that in mind. Hopefully you didn’t have any travel plans, as CNBC reported that more than 13,000 flights were canceled as of Friday night. If you’re looking to keep up with the latest developments, we recently came across StormWatch (GitHub repo), a slick open source weather dashboard that’s written entirely in HTML. Stay safe out there, hackers.
Speaking of travel, did you hear about Sebastian Heyneman’s Bogus Journey to Davos? The entrepreneur (or “Tech Bro” to use the parlance of our times) was in town to woo investors attending the World Economic Forum, but ended up spending the night in a Swiss jail cell because the authorities thought he might be a spy. Apparently he had brought along a prototype for the anti-fraud device he was hawking, and mistakenly left it laying on a table while he was rubbing shoulders. It was picked up by security guards and found to contain a very spooky ESP32 development board, so naturally he was whisked off for interrogation. A search of his hotel room uncovered more suspicious equipment, including an electric screwdriver and a soldering iron. Imagine if a child had gotten their hands on them?
But the best part of the story is when Sebastian tries to explain the gadget’s function to investigators. When asked to prove that the code on the microcontroller wasn’t malicious, he was at a loss — turns out our hero used AI to create the whole thing and wasn’t even familiar with the language it was written in. In his own words: “Look, I’m not a very good hardware engineer, but I’m a great user of AI. I was one of the top users of Cursor last year. I did 43,000 agent runs and generated 25 billion tokens.” Oof. Luckily, the Swiss brought in a tech expert who quickly determined the device wasn’t dangerous. He was even nice enough to explain the code line-by-line to Sebastian before he was released. No word on whether or not they charged him for the impromptu programming lesson.
It wasn’t hard for the Swiss authorities to see what was inside the literal black box Sebastian brought with him, but what if that wasn’t possible? Well, if you’ve got an x-ray machine handy, that could certainly help. The folks at Eclypsium recently released a blog post that describes how they compared a legit FTDI cable with a suspect knock-off by peering at their innards. What we thought was particularly interesting was how they were able to correctly guess which one was the real deal based on the PCB design. The legitimate adapter featured things like ground pours and decoupling caps, and the cheap one…didn’t. Of course, this makes sense. If you’re looking to crank something out as cheaply as possible, those would be the first features to go. (Editor’s note: sarcasm.)
It doesn’t take an x-ray machine or any other fancy equipment to figure out that the Raspberry Pi 5 is faster than its predecessors. But quantifying just how much better each generation of Pi is compared to the other members of the family does require a bit more effort, which is why we were glad to see that The DIY Life did the homework for us. It’s not much of a spoiler to reveal that the Pi 5 won the head-to-head competition in essentially every category, but it’s still interesting to read along to see how each generation of hardware fared in the testing.
Finally, Albedo has released a fascinating write-up that goes over the recent flight of their Very Low Earth Orbit (VLEO) satellite, Clarity-1. As we explained earlier this week, operating at a lower orbit offers several tangible benefits to spacecraft. One of the major ones is that such an orbit decays quickly, meaning a spacecraft could burn up just months or even days after its mission is completed. For Albedo specifically, they’re taking advantage of the lower altitude to snap closeup shots of the Earth. While there were a few hiccups, the mission was overall a success, providing another example of how commercial operators can capitalize on this unique space environment.
See something interesting that you think would be a good fit for our weekly Links column? Drop us a line, we’ve love to hear about it.
Gli utenti di TikTok impazziscono per la raccolta di "stati di immigrazione" dell'app: ecco cosa significa
Molti utenti stanno anche postando sui social media commenti sul testo dell'informativa, in cui si afferma che TikTok potrebbe raccogliere informazioni sensibili sui suoi utenti, tra cui la loro "vita sessuale o orientamento sessuale, stato di transgender o non binario, cittadinanza o stato di immigrazione".
techcrunch.com/2026/01/23/tikt…
TikTok users freak out over app's 'immigration status' collection -- here's what it means | TechCrunch
TikTok users are freaking out over a mention of "immigration status" data collection, but lawyers explain the disclosure is related to state privacy laws.Sarah Perez (TechCrunch)
adhocfungus likes this.
reshared this
@AleF2050 esattamente. Probabilmente biden avrebbe semplicemente fatto chiudere il Tik Tok statunitense, mentre Trump ha deciso di trasformarlo in un asset statunitense e di far entrare nel business i suoi amici della Silicon Valley.
Poi presto anche convinto del fatto che i cinesi una bella back door L'hanno sicuramente infilata dentro al codice
reshared this
La Cina ti spia. Gli USA di più. TikTok USA si impegna a raccogliere dati precisi sulla posizione degli utenti
La nuova joint venture statunitense di TikTok ha apportato modifiche alla propria politica sulla privacy, tra cui l'ampliamento del tipo di dati sulla posizione che l'azienda può raccogliere dai suoi 200 milioni di utenti americani.
bbc.com/news/articles/cvgnj7v2…
TikTok US venture to collect precise user location data
Details on the expanded access to location information was published in a new privacy policy for the popular social media app.Lily Jamali (BBC News)
like this
reshared this
@anon_4601
> chi potrà impedire loro di inserirlo in tutti i vari play store e app store, compresi quelli dell'UE?
Al momento sono proprio le leggi europee che lo impediscono
Ecco Rayhunter: un nuovo strumento open source di EFF per rilevare lo spionaggio cellulare (post di marzo 2025)
Rayhunter è un nuovo strumento open source che abbiamo creato, basato su un hotspot mobile conveniente, che speriamo consenta a chiunque, indipendentemente dalle competenze tecniche, di cercare CSS in tutto il mondo
eff.org/deeplinks/2025/03/meet…
Meet Rayhunter: A New Open Source Tool from EFF to Detect Cellular Spying
Rayhunter is a new open source tool we’ve created that runs off an affordable mobile hotspot that we hope empowers everyone, regardless of technical skill, to help search out cell-site simulators (CSS) around the world.Electronic Frontier Foundation
reshared this
L'ICE chiede alle aziende informazioni sugli strumenti "Ad Tech e Big Data" che potrebbero utilizzare nelle indagini
Un nuovo documento federale dell'ICE dimostra come il governo stia prendendo sempre più in considerazione gli strumenti commerciali per l'applicazione della legge e la sorveglianza.
adhocfungus likes this.
reshared this
Una nuova guida al Fediverso. Ce n'è davvero bisogno? E a voi cosa piacerebbe sapere? (Edit: PUBBLICATA!)
Sono in procinto di pubblicare una nuova guida esperienziale rivolta a chi desidera capire il fediverso a 360 gradi.
Il titolo sarà probabilmente questo:
«La scuola guida per esplorare il Fediverso, goderselo e vivere meglio»
Ma c'è una sorpresa...
Eccola qui:
mastodon.uno/@informapirata@ww…
like this
reshared this
No certo è che non avevo considerato i divulgatori come content creator, quando chiaramente lo sono.
Che succede nel Fediverso? reshared this.
Balancing a Turbine Rotor to 1 mg With a DIY Dynamic Balancer
Although jet engines are theoretically quite simple devices, in reality they tread a fine line between working as intended and vaporizing into a cloud of lethal shrapnel. The main reason for this is the high rotational speed of the rotors, with any imbalance due to poor manufacturing or damage leading to undesirable outcomes. It’s for this reason that [AlfMart CNC Garage] on YouTube decided to spend some quality time building a balancer for his DIY RC turbine project and making sure it can prevent such a disaster scenario.
In the previous part of the series the turbine disc was machined out of inconel alloy, as the part will be subjected to significant heat as well when operating. To make sure that the disc is perfectly balanced, a dynamic balancing machine is required. The design that was settled on after a few failed attempts uses an ADXL335 accelerometer and Hall sensor hooked up to an ESP32, which is said to measure imbalance down to ~1 mg at 4,000 RPM.
A big part of the dynamic balancing machine is the isolation of external vibrations using a bearing-supported free-floating structure. With that taken care of, this made measuring the vibrations caused by an imbalanced rotor much easier to distinguish. The ESP32 is here basically just to read out the sensors and output the waveforms to a connected PC via serial, with the real work being a slow and methodical data interpretation and balancing by hand.
youtube.com/embed/oMzTQzkCGVw?…
Allarme CISA: exploit in corso contro VMware vCenter. Rischio RCE senza autenticazione
📌 Link all'articolo : redhotcyber.com/post/allarme-c…
#redhotcyber #news #cybersecurity #hacking #vulnerabilita #vmware #broadcom #cisa #sicurezzainformatica
Allarme CISA: exploit in corso contro VMware vCenter. Rischio RCE senza autenticazione
Scopri la vulnerabilità critica CVE-2024-37079 in VMware vCenter Server e come proteggere la tua rete aziendale da questo attacco.Redazione RHC (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
SSH over USB on a Raspberry Pi
Setting up access to a headless Raspberry Pi is one of those tasks that should take a few minutes, but for some reason always seems to take much longer. The most common method is to configure Wi-Fi access and an SSH service on the Pi before starting it, which can go wrong in many different ways. This author, for example, recently spent a few hours failing to set up a headless Pi on a network secured with Protected EAP, and was eventually driven to using SSH over Bluetooth. This could thankfully soon be a thing of the past, as [Paul Oberosler] developed a package for SSH over USB, which is included in the latest versions of Raspberry Pi OS.
The idea behind rpi-usb-gadget is that a Raspberry Pi in gadget mode can be plugged into a host machine, which recognizes it as a network adapter. The Pi itself is presented as a host on that network, and the host machine can then SSH into it. Additionally, using Internet Connection Sharing (ICS), the Pi can use the host machine’s internet access. Gadget mode can be enabled and configured from the Raspberry Pi Imager. Setting up ICS is less plug-and-play, since an extra driver needs to be installed on Windows machines. Enabling gadget mode only lets the selected USB port work as a power input and USB network port, not as a host port for other peripherals.
An older way to get USB terminal access is using OTG mode, which we’ve seen used to simplify the configuration of a Pi as a simultaneous AP and client. If you want to set up headless access to Raspberry Pi desktop, we have a guide for that.
Thanks to [Gregg Levine] for the tip!
This Unlikely Microsoft Prediction Might Just Hit The Mark
It’s fair to say that there are many people in our community who just love to dunk on Microsoft Windows. It’s an easy win, after all, the dominant player in the PC operating system market has a long history of dunking on free software, and let’s face it, today’s Windows doesn’t offer a good experience. But what might the future hold? [Mason] has an unexpected prediction: that Microsoft will eventually move towards offering a Windows-themed Linux distro instead of a descendant of today’s Windows.
The very idea is sure to cause mirth, but on a little sober reflection, it’s not such a crazy one. Windows 11 is slow and unfriendly, and increasingly it’s losing the position once enjoyed by its ancestors. The desktop (or laptop) PC is no longer the default computing experience, and what to do about that must be a big headache for the Redmond company. Even gaming, once a stronghold for Windows, is being lost to competitors such as Valve’s Steam OS, so it wouldn’t be outlandish for them to wonder whether the old embrace-and-extend strategy could be tried on the Linux desktop.
We do not possess a working crystal ball here at Hackaday, so we’ll hold off hailing a Microsoft desktop Linux. But we have to admit it’s not an impossible future, having seen Apple reinvent their OS in the past using BSD, and even Microsoft bring out a cloud Linux distro. If you can’t wait, you’ll have to make do with a Windows skin, WINE, and the .NET runtime on your current Linux box.
jfk
in reply to Filippo Valsorda • • •Can Acar
in reply to Filippo Valsorda • • •Filippo Valsorda
in reply to Can Acar • • •@canacar I know my capabilities (and their limits!) thank you very much, and your description suggests you have not seriously tried a state-of-the-art model for more than five minutes.
Load up Claude with Opus 4.5, ask it to reason about stuff you know the right answer for, and get back to me.
I am good at combinatorics/probabilities (IMO Bronze medal), and it still helped me do the analysis for the recent bruteforce of test vectors I did.
Can Acar
in reply to Filippo Valsorda • • •the "reasoning" is a series of RAG queries, which in turn are web searches or agent outputs that then get added to the context, with no additional component of "understanding" or "knowing" or "reasoning". Just text generation with more context which may or may not be correct. Yes, they are helpful if you can verify the output and they speed things up if you can easily identify and discard incorrect outputs
I am not a developer. I am on the other side, dealing with summaries devoid of content or originality and and increased workload because people think that these things are like a fellow developer that "knows" or "learned" something just because they did it correctly once.
In that, I support your effort pointing these tools to better patterns, but refuse to anthromorphize it.
Filippo Valsorda
in reply to Can Acar • • •@canacar "reasoning" is about using longer outputs to produce better final results, it has nothing to do with RAG and little to do with extra context.
You don't have to anthropomorphize them, but you are doing yourself a disservice by thinking about themselves in excessively simplified terms which seem to describe Markov chains more than LLMs.
The Anthropic blog has a lot of great research if you want a more realistic mental model, or again you can try them.
Daniel Spiewak
in reply to Filippo Valsorda • • •λ crime, that problematic bitch from fedi
in reply to Daniel Spiewak • • •Filippo Valsorda
in reply to λ crime, that problematic bitch from fedi • • •felixlinker
in reply to Filippo Valsorda • • •Using AI to generate test cases for my current project, and it's just so valuable. Would have never done that on my own. Especially because the cost of setting up the entire testing pipeline is often quite high for me (remembering or learning a testing framework).
I use QuickCheck for Haskell, i.e., I test invariants on my code with random inputs. It's so nice to describe the expected invariants in natural language and have them almost ready to test.