Playful ‘Space Dice’ Kit Shows Off Clever Design


The media in this post is not displayed to visitors. To view it, please log in.

[Tommy] at Oskitone has been making hardware synth kits for years, and his designs are always worth checking out. His newest offering Space Dice is an educational kit that is a combination vintage sci-fi space laser sound generator, and six-sided die roller. What’s more, as a kit it represents an effort to be genuinely educational, rather than just using it as a meaningless marketing term.

There are several elements we find pretty interesting in Space Dice. One is the fact that, like most of [Tommy]’s designs, there isn’t a microcontroller in sight. Synthesizers based mostly on CMOS logic chips have been a mainstay of DIY electronics for years, as have “electronic dice” circuits. This device mashes both together in an accessible way that uses a minimum of components.

There are only three chips inside: a CD4093 quad NAND with Schmitt-trigger inputs used as a relaxation oscillator, a CD4040 binary counter used as a prescaler, and a CD4017 decade counter responsible for spinning a signal around six LEDs while sound is generated, to represent an electronic die. Sound emerges from a speaker on the backside of the PCB, which we’re delighted to see is driven not by a separate amplifier chip, but by unused gates on the CD4093 acting as a simple but effective square wave booster.

In addition, [Tommy] puts effort into minimizing part count and complexity, ensuring that physical assembly does not depend on separate fasteners or adhesives. We also like the way he uses a lever assembly to make the big activation button — mounted squarely above the 9 V battery — interface with a button on the PCB that is physically off to the side. The result is an enclosure that is compact and tidy.

We recommend checking out [Tommy]’s concise writeup on the design details of Space Dice for some great design insights, and take a look at the assembly guide to see for yourself the attention paid to making the process an educational one. We love the concept of presenting an evolving schematic diagram, which changes and fills out as each assembly step is performed and tested.

Watch it in action in a demo video, embedded just below. Space Dice is available for purchase but if you prefer to roll your own, all the design files and documentation are available online from the project’s GitHub repository.

player.vimeo.com/video/1172325…


hackaday.com/2026/03/28/playfu…

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

If the Trivy, RICS, and LiteLLM incidents have confused you, the team at OpenSourceMalware has published a profile of TeamPCP, the group behind the larger attack (as well on how the attack was carried out)

opensourcemalware.com/blog/tea…

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Il Ransomware colposce Netalia: Cloud italiano sotto attacco, ma l’azienda frena sul data breach

📌 Link all'articolo : redhotcyber.com/post/il-ransom…

#redhotcyber #news #cybersecurity #hacking #malware #ransomware #attacchinformatici #gruppQilin #netalia #cloudsecurity

reshared this

Apple’s Most Repairable Laptop is Thanks to Right-to-Repair


The media in this post is not displayed to visitors. To view it, please log in.

An upside down laptop with its cover removed on a grey surface. The inside of the laptop is a series of black modules connected to the frame with glorious amounts of screws and not glue!

The common narrative around device design is that you can have repairability or a low price, but that they are inversely proportional to each other. Apple’s new budget MacBook Neo seems to attempt a bit of both.

Brittle snap-fit enclosures or glue can make a device pop together quickly during manufacture, but are a headache when it comes time to repair or hack it. Our friends at iFixit tore down the Neo and found it to be the most repairable MacBook since the 2012 unibody model. A screwed in battery, and modules for many of the individual components including the USB ports and headphone jack make it fairly simple to replace individual components. Most of those components are even accessible as soon as you pop the bottom cover instead of requiring major surgery.

As someone who has done a keyboard replacement on a 2010 MacBook, the 41 screws holding the keyboard in brought back (bad) memories. While this is a great improvement over Apple’s notoriously painful repair processes, we’re still only looking at an overall 6/10 score from iFixit versus a 10/10 from Framework or Lenovo.

The real story here is that these improvements from Apple were spurred by Right-to-Repair developments, particularly in the EU, that were the result of pressure from hackers like you.

If you want to push a Neo even further, how about water cooling it? If you’d rather have user-upgradeable RAM and storage too in a Mac, you’ve got to go a bit older.

youtube.com/embed/PbPCGqoBB4Y?…


hackaday.com/2026/03/28/apples…

Cybersecurity & cyberwarfare ha ricondiviso questo.

«Ho decompilato la nuova app della Casa Bianca.»

L'app ufficiale della Casa Bianca per Android include un sistema per aggirare i cookie e i sistemi di pagamento, traccia la tua posizione GPS ogni 4,5 minuti e carica codice JavaScript dalle pagine GitHub di un tizio non specificato... 🤡

blog.thereallo.dev/blog/decomp…

@informatica

Cybersecurity & cyberwarfare ha ricondiviso questo.

Attacchi cyber a Commissione Ue e Fbi: che sta succedendo?


@Informatica (Italy e non Italy)
Due episodi molto diversi mostrano quanto la minaccia cyber resti alta anche su profili istituzionali altissimi. Il caso della mail del direttore Fbi Patel violata da hacker iraniani sembra legato a dati personali datati mentre la violazione del cloud della Commissione europea

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

Hack iraniano al capo dell’FBI: ecco le ricadute


@Informatica (Italy e non Italy)
La violazione dell’account mail personale di Kash Patel mostra quanto un profilo privato possa diventare un obiettivo strategico. Anche senza dati classificati, il materiale sottratto può alimentare intelligence, propaganda e futuri attacchi di spear phishing
L'articolo Hack iraniano al capo dell’FBI:

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Basta uno sticker su Telegram per hackerarti! L’RCE critica da 9.8 è senza patch

📌 Link all'articolo : redhotcyber.com/post/basta-uno…

A cura di Carolina Vivianti

#redhotcyber #news #cybersecurity #hacking #malware #telegram #vulnerabilita #android #linux #sicurezzainformatica

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

Censys has discovered a custom-built post-exploitation framework.

Named CTRL, the framework is coded in .NET, was used in the wild, and appears to be the work of a Rsusian-speaking developer

censys.com/blog/under-ctrl-dis…

reshared this

Turning Tesla Model 3’s Computer Into a Desktop PC


The media in this post is not displayed to visitors. To view it, please log in.

Like many high-tech companies Tesla runs a bug bounty program. But in the case of a car manufacturer, this means that you either already have one of their cars, are interested in buying one, or can gain access to its software-bits in another legal manner. Being a Tesla-less individual, yet with an interest in hunting bugs [David Schütz] thus decided to pursue the option of obtaining the required parts from crashed Tesla cars.

Specifically [David] was interested in the Tesla Model 3 and its combined Media Control Unit (MCU) and Autopilot computer (AAP) assembly. In addition to the main unit, it also requires – obviously – a power supply, and the proprietary display. These were all obtained fairly easily, but unfortunately the devices all had their cables cut off, leaving just a sad little stump of wiring with the still plugged-in connectors.

After trying his luck with an incompatible BMW LVDS cable from one of their headunit infotainment systems, he then proceeded to try and use the cable stumps with some creative patching. This briefly worked, but some debris fell onto the MCU board and blew a power rail IC.

Ultimately this IC got swapped after [David] had already purchased a whole new Model 3 computer, leaving him with two units and the easy way out of buying the Dashboard Wiring Harness cable loom that contained the Rosenberger connectors he needed to connect the display to the main unit.


hackaday.com/2026/03/28/turnin…

Cybersecurity & cyberwarfare ha ricondiviso questo.

#ShinyHunters claims the hack of the #European #Commission
securityaffairs.com/190095/dat…
#securityaffairs #hacking
Cybersecurity & cyberwarfare ha ricondiviso questo.

Accidental eCall activation in cars lead to 75% false 112 calls in Nederland
L: nltimes.nl/2026/03/28/one-thre…
C: news.ycombinator.com/item?id=4…
posted on 2026.03.28 at 10:22:42 (c=0, p=3)

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Dipendenza dai social media, verdetto storico negli USA contro le Big Tech e una riflessione

📌 Link all'articolo : redhotcyber.com/post/dipendenz…

A cura di Massimiliano Brolli

#redhotcyber #news #responsabilitàsocial #giuristecnologia #meta #youtube #dipendenzaonline

reshared this

For Art’s Sake


The media in this post is not displayed to visitors. To view it, please log in.

Hackers can be a strange folk. Our idea of beauty, for instance, can be rather odd. This week, Hackaday saw a few projects that were not just functional – the aesthetics were the goal. I don’t think we’ll be taking over the fine art world any time soon, but I’m absolutely convinced that the same muse that guides the hand that holds the paintbrush sometimes also guides the hand holding the soldering iron.

Take “circuit sculpture”, for instance. Heck, we even give it an art-inspired name that classifies it correctly. This week’s project that got me thinking about the aesthetics of hand-bent wire circuits was this marvelous clock build, but the works of Mohit Bhoite or Kelly Heaton are also absolute must-sees in this category.

Outside of the Hackaday orbit, one of my all-time favorite artists in this genre was Peter Vogel, who made complex audience-reactive sound sculptures that looked as good as they sound.

Is a wireframe animated moving jellyfish art? It was certainly intended to be beautiful, and I personally find it so. Watch some of the video clips attached to the project to get a better sense of it.

In the sculpture world, there is a sub-genre of kinetic art pieces where the work itself is secondary to the beauty of the motions that the pieces pull off. Think ballet, but mechanical. Perhaps my absolute favorite of these artists is Arthur Ganson. If you haven’t seen his work before, check out “Thinking Chair” for the beauty of movement, but don’t miss “Machine with Concrete” if you’re feeling more conceptual.

If you’re willing to buy an insane geartrain as art, what about these 3D printed wire strippers? Is this “art”? It’s clear that they were designed with real intent and attention to the aesthetics of the final form, and am I wrong for finding the way they move literally beautiful?

What’s your favorite offbeat hacker artform?

This article is part of the Hackaday.com newsletter, delivered every seven days for each of the last 200+ weeks. It also includes our favorite articles from the last seven days that you can see on the web version of the newsletter. Want this type of article to hit your inbox every Friday morning? You should sign up!


hackaday.com/2026/03/28/for-ar…

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

ATTUAZIONE DELLA LEGISLAZIONE EUROPEA SUL RIPRISTINO DELLA NATURA. IL POTENZIALE RUOLO DEI CARABINIERI FORESTALI


La Commissione Ambiente della Camera dei Deputati ha audito il rappresentante del Comando unità forestali, ambientali e agroalimentari (CUFAA) dell'Arma dei Carabinieri - la "grande unità elementare" dell'Arma dei Carabinieri, istituita il 25 ottobre 2016 che svolge funzioni di polizia ambientale, forestale e agroalimentare - per esaminare un decreto legislativo di attuazione del Regolamento UE 2024/1991 sul ripristino della natura (Nature Restoration Law).
Si tratta di una legislazione europea che stabilisce obiettivi vincolanti per il ripristino di almeno il 20% delle aree terrestri e marine dell'UE entro il 2030 e di tutti gli ecosistemi degradati entro il 2050. Mira inoltre a mitigare il cambiamento climatico e i disastri naturali, aiutando l'UE a rispettare gli impegni ambientali internazionali.

I CARABINIERI DI CUFAA POSSONO SOSTENERE IL PIANO NAZIONALE DI RISANAMENTO


Il Generale di Divisione Massimo Zuccher, Capo di Stato Maggiore del CUFAA, ha spiegato che il decreto designa il Ministero dell'Ambiente e il Ministero dell'Agricoltura come autorità nazionali competenti, con responsabilità distribuite tra regioni, province autonome, comuni, autorità di bacino ed enti di gestione. Ha osservato che, sebbene questa struttura sia accolta favorevolmente nel suo quadro essenziale, la sua efficacia trarrebbe beneficio dall’integrazione con un meccanismo robusto dal punto di vista tecnico e operativo. A questo proposito l’Arma dei Carabinieri, attraverso il CUFAA, può fornire un valido supporto a tale assetto di governance.

TUTELA DELL'AMBIENTE: DAL CORPO FORESTALE AI CARABINIERI


Zuccher ha ricordato che il CUFAA esercita competenze tecniche e funzioni di vigilanza radicate nella storia d'Italia, trasferite ai Carabinieri in seguito all'assorbimento del Corpo Forestale dello Stato. Questa specializzazione garantisce la tutela della biodiversità, il monitoraggio dei rischi idrogeologici, la gestione dell'inventario forestale e la valutazione delle condizioni fitosanitarie dell'ecosistema.

Attraverso il CUFAA, i Carabinieri assicurano un controllo ambientale completo dei territori rurali attraverso oltre 900 unità forestali e dei parchi, che monitorano e proteggono le aree montane da più di due secoli, prima come Corpo Forestale e ora come Carabinieri.

Secondo il Capo di Stato Maggiore, l'attuazione della normativa europea richiede un processo analitico articolato in fasi critiche: mappatura preliminare, elaborazione del piano nazionale, attuazione degli interventi e successiva rendicontazione dei risultati.

Zuccher ha sottolineato che attualmente il CUFAA gestisce oltre 130 riserve naturali statali e 20 terreni demaniali. Nel corso degli anni, questi territori sono serviti come laboratori di ingegneria ecologica, con decenni di sforzi di rewilding e ripristino ecologico che hanno trasformato aree un tempo fragili in alcuni degli ecosistemi meglio conservati d'Europa.

SUPPORTO TECNICO CONTINUO ALLE IMPRESE


Per quanto riguarda gli ecosistemi agricoli e forestali, Zuccher ha affermato che la transizione verso pratiche sostenibili e il ripristino delle popolazioni di impollinatori richiederà un supporto tecnico continuo per le imprese di questi settori. L’imponente piano di rimboschimento imposto dal regolamento, in linea con l’obiettivo europeo di piantare 3 miliardi di alberi, ha già rivelato un’allarmante carenza di materiale vegetale certificato sul mercato nazionale. Senza piante di origine genetica autoctona e verificata, qualsiasi progetto di ripristino rischia il fallimento ecologico. I Carabinieri sono posizionati per fungere da moltiplicatore in quest’area, sfruttando risorse strategiche come i Centri Nazionali per la Biodiversità dei Carabinieri a Pieve Santo Stefano e Peri, centri di eccellenza per la produzione di massa e la conservazione di specie rare o minacciate.

#NatureRestorationLaw #carabinieriforestale #armadeicarabinieri #carabinieriforestali

Cybersecurity & cyberwarfare ha ricondiviso questo.

Attacco a Ita Airways, allarme per utenti Volare


@Informatica (Italy e non Italy)
Ita Airways ha avvisato gli iscritti Volare di un accesso non autorizzato ai dati personali. Non risultano coinvolte password o carte, ma il rischio di phishing cresce mentre il programma chiude e il passaggio a Miles & More entra nella fase finale
L'articolo Attacco a Ita Airways, allarme per utenti

Magic-less 8 Ball Finds New Life With Pi Pico Inside


The media in this post is not displayed to visitors. To view it, please log in.

There’s an old saying that goes: when life gives you lemons, make lemonade. [lds133] must have heard that saying, because when life took the magic liquid out of his Magic 8 Ball, [lds133] made not eight-ball-aide, but an electronic replacement with a Raspberry Pi Pico and a round TFT display.

In case the Magic 8 Ball is unknown in some corners of the globe, it is a toy that consists of a twenty-sided die with a set of oracular messages engraved on it, enclosed in a magical blue liquid — and by magical, we mean isopropyl alcohol and dye. The traditional use is to ask a question, shake the eight-ball, and then ignore its advice and do whatever you wanted to do anyway.

[lds133]’s version replicates the original behavior exactly by using the accelerometer to detect the shaking, the round display to show an icon of the die, and a Raspberry Pi Pico to do the hard work. There’s also the obligatory lithium pouch cell for power, which is managed by one of the usual TP4056 breakout boards. One very nice detail is that instead of a distracting battery indicator, the virtual die changes color as the battery wears out.

We’ve seen digital 8 Balls before, like this one that used an STM32, or another that used a Raspberry Pi to display reaction GIFs. Some projects are just perennial.


hackaday.com/2026/03/28/magic-…

Cybersecurity & cyberwarfare ha ricondiviso questo.

Iran-linked group #Handala hacked #FBI Director #Kash #Patel’s personal email account
securityaffairs.com/190088/hac…
#securityaffairs #hacking
Cybersecurity & cyberwarfare ha ricondiviso questo.

Iran-linked group #Handala hacked #FBI Director #Kash #Patel’s personal email account
securityaffairs.com/190088/hac…
#securityaffairs #hacking
Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Lunga e interessante (molto) lettura dal Guardian: theguardian.com/media/ng-inter…

«L’era dell’invincibilità è finita»: la settimana in cui le big tech sono state rimesse al loro posto

La sentenza secondo cui Meta e YouTube hanno deliberatamente progettato prodotti che creano dipendenza segna una possibile svolta epocale per i social media

#Gafam #BigTech #giustizia #USA #sentenze #dipendenze #addictions #TheGuardian #Meta #YouTube

@scuola
@maupao
@lealternative
@informapirata
@quinta
@lindasartini
@Khrys
@wikimediaitalia
@lgsp
@DarioZanette
@prealpinux
@devol
@nemobis

Making a Nichrome Wirewound Power Resistor


The media in this post is not displayed to visitors. To view it, please log in.

Although not really a cost-effective or a required skill unless you have some very specific needs not met by off-the-shelf power resistor options, making your own own wirewound power resistor is definitely educational, as well as a fascinating look at a common part that few people spare a thought on. Cue [TheElectronBench]’s video tutorial on how to make one of these components from scratch.

The resistance value is determined by the length of nichrome wire, which is an alloy of nickel and chromium (NiCr) with a resistivity of around 1.12 µΩ/m. It’s also extremely durable when heated, as it forms a protective outer layer of chromium oxide. This makes it suitable for very high power levels, but also requires the rest of the power resistor assembly to be able to take a similar punishment.

For the inner tube of this DIY power resistor a tube of alumina ceramic was used, around which the nichrome wire is wound. This resistor targets 15 Ohm at a maximum load of 50 Watt, this means a current of about 1.83 A is expected at 27.4 V. The used nichrome wire has a measured resistance of 10.4 Ohm, ergo 1.44 meter has to be cut and wound.

This entire assembly is then embedded in refractory cement (fireproof cement), as this will keep the wire in place, while also able to take the intense temperature cycling during operation. As a bonus this will prevent toasting the surrounding environment too much, never mind lighting things on fire as the nichrome wire heats up.

As explained in the video, this is hardly the only way to create such a power resistor, with multiple types of alternative alloys available, different cores to wind around and various options to embed the assembly. The demonstrated method is however one that should give solid results and be well within the capabilities and budget of a hobbyist.

An important point with nichrome is that you cannot really solder to it, so you’ll need something along the lines of a mechanical (crimping) connection. There are also different winding methods that can affect the inductance of the resistor, since this type of resistor is by its design also a coil. This is however not covered in the video as for most applications it’s not an issue.

Overall, this video tutorial would seem to be a solid introduction to nichrome power resistors, including coverage of many issues you may encounter along the way. Feel free to sound off in the comment section with your own experiences with power resistors, especially if you made them as well.


hackaday.com/2026/03/28/making…

Cybersecurity & cyberwarfare ha ricondiviso questo.

U.S. #CISA adds a flaw in F5 BIG-IP AMP to its Known Exploited Vulnerabilities catalog
securityaffairs.com/190076/unc…
#securityaffairs #hacking
Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

L’hack dell’account email del direttore FBI è una falla nella sicurezza nazionale

📌 Link all'articolo : redhotcyber.com/post/lhack-del…

A cura di Chiara Nardini

#redhotcyber #news #cybersecurity #hacking #fbi #hackerato #handala #kashpatel #datipersonali

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

267 – Attenzione alle carte fedeltà e alle assicurazioni sanitarie! camisanicalzolari.it/267-atten…
Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Bruxelles sotto attacco: hacker rubano 350 GB di dati alla Commissione Europea

📌 Link all'articolo : redhotcyber.com/post/bruxelles…

A cura di Luca Stivali del gruppo DarkLab

#redhotcyber #news #cybersecurity #hacking #malware #ransomware #amazon #cloudsecurity #commissioneeuropea

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Abbiamo solo 3 anni per salvare Internet! Google Anticipa il Q-Day al 2029

📌 Link all'articolo : redhotcyber.com/post/abbiamo-s…

#redhotcyber #news #google #crittografia #sicurezzainformatica #informaticaquantistica #qday #cybersecurity

reshared this

SEGA Music to MODfile, (Semi)Automatically


The media in this post is not displayed to visitors. To view it, please log in.

One thing SEGA’s MegaDrive/Genisis and the Commodore Amiga had in common was–aside from the Motorola 68000 processor– being known for excellent music in games. As [reassembler] continues his quest to de-assemble Sonic: The Hedgehog and re-assemble the code to run on Amiga, getting the music right is a key challenge. Rather than pull MIDI info or recreate the sound by ear, [reassembler] has written a program called Sonic2MOD to automatically take the assembly file music from the MegaDrive catridge and turn it into an Amiga-style MODfile. He’s also made a video about it that you’ll find embedded below.

Of course how music gets made differs widly on the two systems. Amiga, famously has Paula, a custom ASIC designed for sampling, allowing you to play four eight-bit voices. The Sega, of course, has that glorious FM-synthesis chip from Yamaha synthesizing five channels of CD-quality sound and one channel of sample. It’s not as well known, but the Sega also has a bonus TI-compatible programmable sound chip (PSG) that can handle 3 square-wave tone channels and one noise channel. That’s ten total channels to the Amiga’s four, and CD-quality to 8-bit voices. Knowing all that, we were very curious how close to SEGA’s original music [reassembler] could get on the Amiga.

Before he could show us, [reassembler] needed to decode the SMPS files used on Sonic: The Hedgehog and many other MegaDrive games. Presumably he could have gotten a MIDI file online somewhere– there are oodles– but the goal was to reverse engineer Sonic from its cartridge for the Amiga, not download a lot of resources from the web. SMPS is a sort of programing language for sound, telling the Yamaha and PSG chips what to do.

In some ways, it’s not unlike the Amiga’s MOD format, which programmatically specifies how to play the sampled voices also stored in the file. Translating from one to another is a matter of reading the SMPS files, extracting the timing, volume, vibrato, et cetera, and translate that into a form the MOD file can use. Then [reassembler] needed to generate samples, which was an added hiccup because the Amiga can only handle 3 octaves vs the seven of the SEGA’s FM synthesizer. He’s able to solve this simply by generating multiple samples to span the Yamaha chip’s range, though, again, at only 8-bit fidelity. It doesn’t sound half bad.

What about the four-channel limit? That’s where a bit of artistry comes in; the automated tool produces MOD files with more voices, which MOD trackers can handle at increased computational load. Computational load you don’t need when trying to play a game. Scaling down the soundtrack to the Amiga’s limits is something [reassembler] already has practice with from his famous OutRun port, though, so we’re sure he’ll get it done.

All of this effort just to match the Mega Drive makes us appreciate what a capable little computer the Sega console was; why, you can even check your stocks with it! We’ve already featured [reassembler]’s Sonic port once before, but this music tool was interesting enough we couldn’t help ourselves coming back to it. The ability to play MOD files were pretty impressive when the Amiga came out, but nowadays all you need is a ten-cent microcontroller.

youtube.com/embed/E4dZzJFroAY?…


hackaday.com/2026/03/27/sega-m…

Using FireWire on a Raspberry Pi Before Linux Drops Support


The media in this post is not displayed to visitors. To view it, please log in.

Once the premium option for data transfers and remote control for high-end audiovisual and other devices, FireWire (IEEE 1394) has been dying a slow death ever since Apple and Sony switched over to USB. Recently Apple correspondingly dropped support for it in MacOS 26, and Linux will follow in 2029. The bright side of this when you’re someone like [Jeff Geerling] is that this means three more years of Linux support for one’s FireWire gear, including on the Raspberry Pi with prosumer gear from 1999.

If you’re not concerned about running the latest and greatest – and supported – software, then using an old or modern Mac or PC is of course an option, but with Linux support still available [Jeff] really wanted to get it working on Linux. Particularly on a Raspberry Pi in order to stay on brand.

Adding a FireWire port to a Raspberry Pi SBC is easy enough with an RPi 5 board as you can put a Mini PCIe HAT on it into which you slot a mini PCIe to Firewire adapter. At this point lspci shows the new device, but to use it you need to recompile the Linux kernel with Firewire support. On the Raspberry Pi you then also need to enable it in the device tree overlay, as shown in the article.

With this you now have FireWire 400 support right off the bat, but to use the FireWire 800 port you need to also connect external power to the adapter, which [Jeff]’s Canon GL1 video camera with its FW400 port does not require, so he didn’t bother with that.

Capturing the video from the GL1 via FW400 was done using the DVgrab utility, with a subsequent capture attempt successful. This means that at least until 2029 [Jeff] will be happily using his GL1 camera this way.

Meanwhile over on the Dark Side, you can still happily install FireWire drivers made for older Windows versions on Windows 10 and 11, which is great news for e.g. people who have expensive DAW gear kicking around. Perhaps the demise of FireWire is still a long while off as long as you’re not too picky about the OS you’re running.

youtube.com/embed/BuKeW45OL-g?…


hackaday.com/2026/03/27/using-…

Water Cooling the MacBook Neo Laptop to Double Gaming Performance


The media in this post is not displayed to visitors. To view it, please log in.

Recently [ETA Prime] felt a bit underwhelmed by the raw performance of his MacBook Neo when it came to running for extended periods under full load, such as when gaming. Thus the obvious solution is to mildly over-engineer a cooling solution that takes care of issues like thermal throttling.

The Apple MacBook Neo with its repurposed iPhone 16 SoC seems to have leaned hard into answering the question whether a smartphone can be a good general purpose personal computer. Ignoring the lack of I/O, it’s overall not a bad SoC for a laptop, but like when you try to push the CPU and GPU on a smartphone, they do get pretty toasty. Due to the minimalistic cooling solution in the MacBook Neo it’ll easily hit the 105°C thermal throttle limit.

Technically the ‘heatsink’ for this laptop is the aluminium case, as the SoC is coupled via a thermal pad to the case. This doesn’t leave a lot of space and the case will heat soak pretty fast, while also making retrofitting a cooling solution a challenge.

Amusingly, replacing the existing thermal pad with a thin copper plate already massively reduced the thermal throttling of the A18 Pro SoC by about 20 degrees. In Geekbench 6 this bumped multi-core scores up by 9.7% and single-core by 15.2%. Definitely a promising glimpse at how much performance could still be extracted from this SoC.

For the next step a thermo-electric cooler (TEC) with built-in water cooling loop was used, which happened to be one of those overkill smartphone cooling systems that you’d stick to the back of the phone. Here the cooler was attached similarly, directly to the bottom aluminium of the case.

With this solution in place Geekbench 6 results mostly showed a solid bump for single-core results, while multi-core results showed diminishing returns. For Cinebench results this gave a 19% increase over stock cooling in multi-core and 23.5% for single-core.

Perhaps most interesting of all was that playing a video game for a while without thermal throttling meant framerates of over 80 FPS instead of hitting that thermal wall with 30 FPS. This shows just how much performance is left on the table due to the cooling choices for the system, even with this still rather inefficient cooling solution.

That said, this probably isn’t some kind of nefarious scheme by Apple, but rather the result of designing the thermal solution to not heat the case up to temperatures that are deemed to be unsafe or uncomfortable for the user. After all, if the case if the heatsink, then you don’t want to feel like you’re literally handling one. This is sadly the compromise when venting out hot air is deemed to be an unacceptable solution.

youtube.com/embed/lswbpVtAhrc?…


hackaday.com/2026/03/27/water-…

Cybersecurity & cyberwarfare ha ricondiviso questo.

The #European #Commission confirmed a cyberattack affecting part of its cloud systems
securityaffairs.com/190067/dat…
#securityaffairs #hacking
Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

🚨 Resta sempre aggiornato sulla cybersecurity

📌 Segui RHC su Google Discover: share.google/GOhPTverA7qkgtbkF
➡️ Scrolla fino in basso e clicca su “SEGUI”

#RedHotCyber #cybersecurity #infosec #threatintelligence #hacking #RedHotCyber #securitynews #cyberthreats

Laser Welding Helps YouTuber Get Ahead with Aluminum Sheet


The media in this post is not displayed to visitors. To view it, please log in.

Laser Welding is apparently the new hotness, in part because these sci-fi rayguns masquerading as tools are really cool. They cut! They weld! They Julienne Fry! Well, maybe not that last one. In any case, perhaps feeling the need to cancel out that coolness as quickly as he possibly could, YouTuber [Wesley Treat] decided to make a giant version of his own head.

[Wesely] had previously been 3D scanned as part of the maker scans project, which you can find over on Printables. Those of you who really hate YouTubers, take note: finally you have something to take your frustrations out on. [Wesely] takes that model into Blender to decimate and decapitate– fans of the band Tyr may wonder if the model questioned his sword–before feeding that head through an online papercraft tool called PaperMaker to generate cut files for his CNC. There are also a lot of welding montages interspersed there as he practices with the new tool. [Wesely] did first try out his new raygun on steel in a previous video, but even knowing that, he makes the learning curve on these lasers look quite scalable.

While we’re not likely to follow in [Wesely]’s footsteps and create our own low-poly Zardoz– Zardozes? Zardii?– using a papercraft toolchain and CNC equipment with sheet aluminum is absolutely a great idea worth stealing. It’s very similar to what another hacker did with PCBs— though that project was perhaps more reasonable in scale and ego.

We are no strangers to papercrafts that use actual paper here, either, having featured everything from model retrocomputers to fully-mobile strandbeasts.

youtube.com/embed/eKwoDYrec4U?…


hackaday.com/2026/03/27/laser-…

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

The U.S. State Department has announced a reward of up to $10 million for information leading to the identification of Iranian-linked cybercriminals. #CyberSecurity #IranThreat

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

Telnyx package compromised on PyPI
L: github.com/team-telnyx/telnyx-…
C: news.ycombinator.com/item?id=4…
posted on 2026.03.27 at 04:57:02 (c=18, p=5)

reshared this

Use a Gap-Cap to Embed Hardware In Your Next 3D Print


The media in this post is not displayed to visitors. To view it, please log in.

Embedding fasteners or other hardware into 3D prints is a useful technique, but it can bring challenges when applied to large or non-flat objects. The solution? Use a gap-cap.

The gap-cap technique is essentially a 3D printed lid. One pauses a print, inserts hardware, then covers it with a lid before resuming the print. The lid — or gap-cap — does three things. It seals in the part, it fills in empty space left above the component, and it provides a nice flat surface for subsequent layers which makes the whole process much cleaner and more reliable.

This whole technique is a bit reminiscent of the idea of manual supports, except that the inserted piece is intended to be sealed into the print along with the embedded hardware under it.

If you have never inserted anything larger than a nut or small magnet into a 3D print, you may wonder why one needs to bother with a gap-cap at all. The short version is that what works for printing over small bits doesn’t reliably carry over to big, odd-shaped bits.

For one thing, filament generally doesn’t like to stick to embedded hardware. As the size of the inserted object increases, especially if it isn’t flat, it increasingly complicates the printer’s ability to seal it in cleanly. Because most nuts are small, even if the printer gets a little messy it probably doesn’t matter much. But what works for small nuts won’t work for something like an LED strip mounted on its side, as shown here.
Cross-section of a print with an embedded LED strip. The print pauses (A), LED strip is inserted and capped with a gap-cap (B, C), then printing resumes and completes (D).
In cases like these a gap-cap is ideal. By pre-printing a form-fitting cap that covers the inserted hardware, one provides a smooth and flat surface that both seals the component in snugly while providing an ideal surface upon which to resume printing.

If needed, a bit of glue can help ensure a gap-cap doesn’t shift and cause trouble when printing resumes, but we can’t help but recall the pause-and-attach technique of embedding printed elements with the help of a LEGO-like connection. Perhaps a gap-cap designed in such a way would avoid needing any kind of adhesive at all.


hackaday.com/2026/03/27/use-a-…