TikTok sotto accusa dalla Commissione europea: il punto di vista del MOIGE
📌 Link all'articolo : redhotcyber.com/post/tiktok-so…
#redhotcyber #news #TikTok #DigitalServicesAct #CommissioneEuropea #MOIGE #SicurezzaOnline
TikTok sotto accusa dalla Commissione europea: il punto di vista del MOIGE
La Commissione europea avvia indagini su TikTok per violazioni del Digital Services Act, MOIGE plaude e rilancia la class action per proteggere i minori dai rischi dei social media.Stefano Gazzella (Red Hot Cyber)
reshared this
Attenzione alla truffa Apple Pay: come evitare di cadere nella trappola
📌 Link all'articolo : redhotcyber.com/post/attenzion…
#redhotcyber #news #truffeonline #sicurezzainformatica #applepay #phishing #truffeapple #protezionedatidigitali
Attenzione alla truffa Apple Pay: come evitare di cadere nella trappola
Una nuova truffa sofisticata sta colpendendo utenti di Apple Pay in tutto il mondo. Scopri come funziona e come proteggerti.Redazione RHC (Red Hot Cyber)
lauseta likes this.
Cybersecurity & cyberwarfare reshared this.
Non è l’attacco informatico a farti cadere. È solo l’abitudine!
📌 Link all'articolo : redhotcyber.com/post/non-e-lat…
#redhotcyber #news #guerraibride #sicurezzanazionale #zonegrigie #degradosociale #normalità #allert
Non è l’attacco informatico a farti cadere. È solo l’abitudine!
La zona grigia della cybersecurity: come riconoscere e prevenire le minacce silenziose che sfruttano le abitudini e la mancanza di attenzione nelle organizzazioni.Roberto Villani (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
Il gioco è gratis, il malware no (e lo stai pagando carissimo)
📌 Link all'articolo : redhotcyber.com/post/il-gioco-…
Un gioco gratuito può rivelarsi l’acquisto più costoso quando si trasforma in un #accesso al computer. I #ricercatori di sicurezza #informatica mettono in guardia da una campagna che si nasconde nei programmi di #installazione di giochi piratati e rilascia silenziosamente un malware chiamato RenEngine, che altro non è che un loader per PC.
A cura di Carolina Vivianti
#redhotcyber #news #malware #cybersecurity #sicurezzainformatica #hacking #minacceinformatiche #renengine #unloaderpc #malwaregratuito #giochipiratati #sicurezzadigital #protezionevirus #malwareanalisi
Il gioco è gratis, il malware no (e lo stai pagando carissimo)
Un malware chiamato RenEngine Loader viene distribuito tramite giochi piratati e può rubare informazioni sensibili. Scopri come difenderti.Carolina Vivianti (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
Kodak MC3: Everything But a Phone In 2001
One of the constants in consumer electronics is that designers will try to put as many features into a single device as possible, whether it’s a Walkman with a radio tuner or a new class of devices that crams a photo and video camera in the same enclosure as a music player. At the time that the Kodak MC3 was released this made it a rather unique device, with it in hindsight being basically a smartphone without the phone, as [Tech Tangents] aptly notes in his recent video on the device.
Six years before Apple’s iPhone would be announced, and eight years before the first iPod with a video camera, the Kodak MC3 was in many respects bleeding edge technology targeted straight at tech enthusiasts. For less than $300 you got VGA-quality images, CompactFlash storage, and MP3 playback capability. The videos it produced were 320×240 resolution, h.263 encoded MOVs with a maximum length of 4 seconds at 20 FPS, or 4 minutes with a 64 MB CF card.
The unit that [Tech Tangents] got used came with a 128 MB CF card, but couldn’t use a 2 GB CF card, which is a shame. The screen on it got a lot of flak for not not having a backlight, but this was common for the era, as were the poor viewing angles. Ditto for the poor video quality, as anyone who invested in consumer digital cameras in the early 2000s can attest to. In that respect this Kodak device was probably a bit too ambitious with its features for the era, maybe to compensate for it completely missing the boat on the rise of digital camera technology around the time.
youtube.com/embed/dq2KLhKRH6Q?…
Hackaday Links: February 8, 2026
We start this week with a bit of a good news/bad news situation. On February 6th, the Relativistic Heavy Ion Collider (RHIC) was shut down after 25 years of operation. Located at Brookhaven National Laboratory in Upton, New York, the RHIC was the only operating particle collider in the United States, and along with the Large Hadron Collider (LHC), was one of only two heavy-ion colliders in existence.
So that’s the bad news. The good news is that the RHIC is going dark so that the Electron-Ion Collider (EIC) can take its place. Planned for activation in the mid-2030s, the EIC will occupy the same tunnel as the RHIC and reuse much of the same hardware. As the name implies, it will be used to collide electrons.
Switching gears (no pun intended) to the world of self-driving cars, Waymo’s chief safety officer, Dr. Mauricio Peña, made a surprising admission this week during a U.S. Senate hearing. When asked what his company’s vehicles do when they are presented with a situation that their on-board systems can’t resolve, Dr. Peña explained that they would contact a human “remote assistance operator.” He further clarified that these individuals, located both in the US and the Philippines, don’t literally drive the car remotely. Still, Senator Ed Markey of Massachusetts questioned not only the company’s transparency on the issue of remote assistance, but the idea that individuals overseas could be making decisions on how vehicles should operate on US roadways.
While on the subject of a hyped-up technology that hasn’t quite delivered, CNN posed an interesting question — in an article titled “No, but seriously: What’s going on with bitcoin?“, David Goldman pointed out that the cryptocurrency recently dropped below $63,000 USD for the first time in over a year and a half (as of today, it has rebounded slightly to just under $71,000). He goes on to explain that global uncertainty and rapidly improving AI technology are partly to blame, although we’re honestly not quite sure how that second one works. But more importantly, he theorizes that the market is returning to where it was before the 2024 presidential election. Then candidate Trump embraced the digital currency and promised to remove restrictions he claimed were holding it back. This naturally caused a bump in Bitcoin value after he won the White House, but as those changes have yet to materialize, the excitement is apparently wearing off.
In software news, the remaining Windows users who still haven’t been beaten into submission by Microsoft will have another feature taken away from them; as of February, the operating system’s integrated 3D Viewer is officially being deprecated. The tool allows users to inspect various types of 3D files, including STLs, and was added to Windows back when Microsoft was convinced “mixed reality” was going to be a thing. Anyone who has 3D Viewer installed will still be able to use it, but it will no longer be available for download officially from Microsoft. On the bright side, the web-based alternative that Microsoft recommends seems pretty slick.
Those holding out hope for life on the Red Planet will be excited to read the recent report from NASA which claims that the organic compounds discovered on Mars by the Curiosity rover can’t be fully explained by non-biological processes. In other words, while there are geological processes that could have produced some of the molecules detected, and some could have been deposited on the planet by meteorites, none of the possibilities studied could account for them all. The researchers caution that this doesn’t mean there is current or active life on the Martian surface, however, as we still don’t fully understand the timescales required to break these molecules down. Curiosity might have sniffed out the signs of life, but that life could still have died off billions of years ago.
On the subject of space, a recent post about the number of satellites in low-Earth orbit by mathematician John Cook got some debate going. He runs the numbers and argues that given the current number of LEO satellites (~12,500), and the area of space that they operate in, each bird has roughly 100,000,000 km³ to itself. Not exactly the close quarters flying that we’ve been hearing so much about recently with the proliferation of satellite constellations such as SpaceX’s Starlink. That said, others were quick to point out that his math only really works out if all the satellites were evenly distributed, which is obviously not the case in the real world. So while his estimate is probably a bit too generous, it still helps put into context just how mind-bogglingly big space actually is.
Finally, for those who would prefer to scroll endlessly through something a bit more intellectually stimulating than social media, check out Xikipedia. This open source project takes the content from the Simple English Wikipedia and turns it into a never ending feed that you can browse, complete with an algorithm that will suggest articles to you based on your personal interests. What do you call the opposite of doomscrolling — maybe knowledgescrolling?
See something interesting that you think would be a good fit for our weekly Links column? Drop us a line, we’ve love to hear about it.
L'intelligenza artificiale rende la parte facile più facile e quella difficile più difficile
Un mio amico ha recentemente partecipato a un dibattito pubblico su come le organizzazioni di ingegneria possano supportare al meglio i propri ingegneri. I temi emersi non sono stati una sorpresa:Sacrificare la qualità rende difficile sentirsi orgogliosi del proprio lavoro. Nessun riconoscimento della velocità attuale. Se corriamo per raggiungere un obiettivo, l'aspettativa diventa quella di continuare a correre, per sempre.
reshared this
Cambiamenti nell'uso dei social media negli Stati Uniti, 2020-2024: declino, frammentazione e polarizzazione persistente
Utilizzando dati rappresentativi a livello nazionale tratti dagli studi elettorali nazionali americani (ANES) del 2020 e del 2024, questo articolo traccia il cambiamento del panorama dei social media negli Stati Uniti a seconda delle piattaforme, dei dati demografici e delle politiche.
Shifts in U.S. Social Media Use, 2020-2024: Decline, Fragmentation, and Enduring Polarization
Using nationally representative data from the 2020 and 2024 American National Election Studies (ANES), this paper traces how the U.S. social media landscape has shifted across platforms, demographics, and politics.arXiv.org
like this
reshared this
Perché dovresti smettere di usare Face ID subito
I blocchi biometrici come il riconoscimento facciale sono facili da impostare, ma grazie a una scappatoia legale, sono più facili da aggirare per le forze dell'ordine rispetto a un codice di accesso.
reshared this
securityaffairs.com/187753/hac…
#securityaffairs #hacking
Flickr moves to contain data exposure, warns users of phishing
Flickr says a flaw at a third-party email provider may have exposed users’ names, email addresses, IPs, and account activity.Pierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
Wooden Case Makes a 2026 TV Stylish
The middle of the 20th century produced a revolution in understated stylish consumer design, some of which lives on today. The reality of living in a 1950s or ’60s house was probably to be surrounded by the usual mess of possessions from many past decades, but the promise was of a beautiful sleek and futuristic living space. Central to this in most homes would have been the TV set, and manufacturers followed the trends of the age with cases that are now iconic. Here in 2026 we put up with black rectangles, but fortunately there’s Cordova Woodworking with a modern take on a retro TV cabinet.
We’ve put the build video below, and it’s a wonderfully watchable piece of workshop titillation in a fully-equipped modern shop. While we appreciate they’ve put the design up for sale, we think many Hackaday readers could come up with their own having already been inspired. One thing we notice over the originals is that they use “proper” wood for their case, when we know the ’60s version would have had veneer-faced ply or chipboard.
The result is a piece of furniture which nicely contains the modern TV and accessories, but doesn’t weigh a ton or dominate the room in the way one of the originals would have, much less emit that evocative phenolic hot-electronics smell. We’d have one in our living room right now. Meanwhile if you’d like a wallow in mid-century TV, we have you covered.
youtube.com/embed/5RI6_DHBPfM?…
Habit Detection For Home Assistant
Computers are very good at doing exactly what they’re told. They’re still not very good at coming up with helpful suggestions of their own. They’re very much more about following instructions than using intuition; we still don’t have a digital version of Jeeves to aid our bumbling Wooster selves. [Sherrin] has developed something a little bit intelligent, though, in the form of a habit detector for use with Home Assistant.
In [Sherrin]’s smart home setup, there are lots of things that they wanted to fully automate, but they never got around to implementing proper automations in Home Assistant. Their wife also wanted to automate things without having to get into writing YAML directly. Thus, they implemented a sidecar which watches the actions taken in Home Assistant.
The resulting tool is named TaraHome. When it detects repetitive actions that happen with a certain regularity, it pops up and suggests automating the task. For example, if it detects lights always being dimmed when media is playing, or doors always being locked at night, it will ask if that task should be set to happen automatically and can whip up YAML to suit. The system is hosted on the local Home Assistant instance. It can be paired with an LLM to handle more complicated automations or specific requests, though this does require inviting cloud services into the equation.
We’ve featured lots of great Home Assistant hacks over the years, like this project that bridges 433 MHz gear to the smart home system. If you’ve found your own ways to make your DIY smart home more intelligent, don’t hesitate to notify the tipsline!
Oggi la concentrazione di certe persone è crollata a livelli così drammatici che non riescono a finire un discorso neanche se c'è qualcuno che
reshared this
@DigiDavidex sì, aiuta molto 😂
Immagini, video divertenti e altre simpatiche guasconate reshared this.
Container, cloud, blockchain, intelligenza artificiale: è sempre la solita vecchia storia, afferma il veterano Red Hatter
Il vero avversario della sovranità digitale è il marketing "IT aziendale", secondo un ingegnere di Red Hat che si è scagliato in modo divertente contro le ripetute ondate di sciocchezze che il ciclo di hype del settore emette.
theregister.com/2026/02/08/wav…
Containers, cloud, blockchain, AI – it's all the same old BS, says veteran Red Hatter
Opinion: After decades in the trenches, this engineer is done with hype cyclesLiam Proven (The Register)
like this
reshared this
Sì, ormai è il mio mantra.
Le aziende che non offrono al mercato servizi digitali probabilmente non hanno bisogno di nessuna di queste tecnologie.
Ma poi, come Cassandra (e il vero @calamarim non me ne voglia!) vengo guardato con un sorriso di compatimento. E magicamente nessuno si ricorda che qualcuno aveva ragione e l'aveva detto.
Io spero per il meglio e mi preparo sempre al peggio.
reshared this
>
> Container, cloud, blockchain, intelligenza artificiale: è sempre la solita vecchia storia, afferma il veterano Red Hatter
Potremmo aggiungere "devops" alla lista? 😅
Ciao!
C.
reshared this
Software libero: il vantaggio competitivo nell’era cloud e AI
Il software FOSS offre vantaggi economici e strategici alle aziende nell’era cloud e intelligenza artificiale. L’analisi del TCO dimostra superiorità rispetto alle soluzioni proprietarie. Flessibilità multi-cloud, autonomia tecnologica e sostenibilità ambientale rendono l’open source la scelta vincente
agendadigitale.eu/industry-4-0…
Software libero: il vantaggio competitivo nell'era cloud e AI - Agenda Digitale
Software FOSS: vantaggi economici e strategici per aziende. TCO inferiore, flessibilità cloud e IA, indipendenza tecnologica. Analisi completa.Italo Vignoli (Agenda Digitale)
reshared this
EU Commission discloses an attempted cyberattack on its MDM system
ec.europa.eu/commission/pressc…
Commission responds to cyber-attack on its central mobile infrastructure
On 30 January, the European Commission\'s central infrastructure managing mobile devices identified traces of a cyber-attack, which may have resulted in access to staff names and mobile numbers of someEuropean Commission - European Commission
reshared this
I may have fallen to the weirdly worded presser here.
Seems the attackers likely breached an Ivanti EPMM server, but there was no access to official "mobile devices"
The Green Blood group is holding Senegal's government for ransom.
It claims to have stolen 139TB of data from the country's Department for the Automation of Records (DAF), which holds extremely sensitive information on all the country's population.
reshared this
Investigating the Science Claims Behind the Donut Solid State Battery
Earlier this year Donut Lab caused quite the furore when they unveiled what they claimed was the world’s first production-ready solid state battery, featuring some pretty stellar specifications. Since then many experts and enthusiasts in the battery space have raised concerns that this claimed battery may not be real, or even possible at all. After seeing the battery demonstrated at CES’26 and having his own concerns, [Ziroth] decided to do some investigating on what part of the stated claims actually hold up when subjected to known science.
On paper, the Donut Lab battery sounds amazing: full charge in less than 10 minutes, 400 Wh/kg energy density, 100,000 charge cycles, extremely safe and low cost. Basically it ticks every single box on a battery wish list, yet the problem is that this is all based on Donut’s own claims. Even aside from the concerns also raised in the video about the company itself, pinning down what internal chemistry and configuration would enable this feature set proves to be basically impossible.
In this summary of research done on Donut’s claimed battery as well as current battery research, a number of options were considered, including carbon nanotube-based super capacitors. Yet although this features 418 Wh/kg capacity, this pertains only to the basic material, not the entire battery which would hit something closer to 50 Wh/kg.
Other options include surface-redox sodium-ion chemistry with titanium oxide. This too would allow for fast charging and high endurance, but Donut has already come out to state that their battery is not capacitor-based and uses no lithium, so that gets shot down too.
Combined with the ‘cheap’ and ‘scalable’ claims this effectively shoots down any potential battery chemistry and architecture. Barring some amazing breakthrough this thus raises many red flags, especially when you consider Donut Lab’s major promises for investors that should make any reasonable person feel skittish about pouring money into the venture.
Sadly, it seems that this one too will not be the battery breakthrough that we’re all waiting for. Even new chemistries like sodium-ion are struggling to make much of inroads, although lithium-titanate shows real promise. Albeit it not with amazing power density increases that would make it better than plain lithium-ion for portable applications.
youtube.com/embed/V8mkD6g9Ujc?…
Parrhesepstein: piattaforma AI open source per analizzare i file Epstein. Grazie a @nagaye per la segnalazione!
9 agenti investigativi autonomi, ricerca semantica su migliaia di documenti declassificati, mappa dei voli, grafi delle connessioni e analisi delle reti di influenza. Uno strumento costruito per esercitare la parrhesia: dire la verità al potere... perché la libertà non è un’opinione, è un dovere epistemologico.
reshared this
reshared this
reshared this
@costafrancesco94 quello infatti è l'utilizzo più praticato nella comunità scientifica. In quei casi la tecnologia degli llm è utile per consentire ai sistemi di analisi di cogliere eventi espressi in linguaggio naturale
Intelligenza Artificiale reshared this.
Intelligenza Artificiale reshared this.
vabbè, Faggin ha evidentemente scritto il suo ultimo libro sotto l'effetto del prosecco
reshared this
securityaffairs.com/187732/mal…
#securityaffairs #hacking
SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 83
Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscapePierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
securityaffairs.com/187727/sec…
#securityaffairs #hacking
Security Affairs newsletter Round 562 by Pierluigi Paganini – INTERNATIONAL EDITION
A new round of the weekly Security Affairs newsletter has arrived! Every week, the best security articles from Security Affairs.Pierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
Upgrading The E-mu Audity 20 Years After Factory Support Ended
If you purchased an E-mu Audity 2000 ROMpler back in 1998, you almost certainly got a rig with the 1.00 firmware. It was fine, if a little limited, particularly where upgradability was concerned. E-mu would later offer firmware upgrades over MIDI with the 2.00 firmware, but to get the 2.00 firmware, you needed to ship the box back to E-mu. Or you did… until now.
Realizing that E-mu is long gone and they weren’t going to handle any further firmware upgrades, [Ray Bellis] set about finding another way to help aggrieved operators with gear stuck on v1.00. [Ray] had managed to lay hands on a Audity 2000 service manual as well as the official 2.00 upgrade kit in an estate sale, and set about reverse engineering it to help the community. It turned out that upgrading from 1.00 to 2.00 required the use of a special boot ROM and a flash device containing the upgraded firmware image. Booting from the special ROM required the use of a jumper, and when engaged, the ROM would copy the updated image to the device itself.
[Ray] didn’t want to duplicate the standard upgrade device, as that seemed a little difficult what with parts availability in 2026. Instead, he crafted his own ROM that, with compression, contained the necessary firmware upgrade image and could all be stuffed inside a single 512 KB chip. All you need to do is flash the custom upgrade ROM to an AM29F040B PLCC32 NOR flash chip, pop it in the empty PLCC32 socket on the mainboard, and away you go. This will get you a machine upgraded to the final v2.01 firmware delivered by E-mu before its demise.
It’s a finicky bit of work, but it’s a great way to get new functionality out of an old Audity 2000. We’ve featured similar work before regarding aging Yamaha synths, too. If you’ve got your own backdoor methods for giving older music hardware a new lease on life, don’t hesitate to notify the tipsline.
Microsoft held an AMA session and updated its guide to help sysadmins safely replace Secure Boot certificates that are set to expire this June.
techcommunity.microsoft.com/ev…
techcommunity.microsoft.com/bl…
Secure Boot playbook for certificates expiring in 2026
Ask Microsoft Anything (AMA) about Secure Boot - February 5 - 8:00 AM PST The first set of tools and steps are now available to help you proactively update your Secure Boot certificates before they start expiring in June of 2026.Ashis_Chatterjee (TECHCOMMUNITY.MICROSOFT.COM)
reshared this
I've always wanted better tools to read and navigate—not edit!—source code.
For example, it's incredible to me that there is no iPad app that does LSP features plus bookmarks, navigation tree, etc.
Maybe now that LLMs made it more people's job to read code, we'll get good code reading tools?
Cybersecurity & cyberwarfare reshared this.
I feel like people who haven't experienced codesearch simply cannot understand why you would want something other than your IDE.
I'm with you though I wish I had open source codesearch and more.
I always loved the Smalltalk ClassBrowser. No files, directories…only navigate through classes, messages, senders, objects
I miss that nowadays.
securityaffairs.com/187716/hac…
#securityaffairs #hacking #linux #malware
DKnife toolkit abuses routers to spy and deliver malware since 2019
DKnife is a Linux toolkit used since 2019 to hijack router traffic and deliver malware in cyber-espionage attacks.Pierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
Upgrading An Old Macbook With an Old Processor
The Core Duo processor from Intel may not have been the first multi-core processor available to consumers, but it was arguably the one that brought it to the masses. Unfortunately, the first Core Duo chips were limited to 32-bit at a time when the industry was shifting toward 64-bit. The Core 2 Duo eventually filled this gap, and [dosdude1] recently completed an upgrade to a Macbook Pro that he had always wanted to do by replacing the Core Duo processor it had originally with a Core 2 Duo from a dead motherboard.
The upgrade does require a bit more tooling than many of us may have access too, but the process isn’t completely out of reach, and centers around desoldering the donor processor and making sure the new motherboard gets heated appropriately when removing the old chip and installing the new one. These motherboards had an issue of moisture ingress which adds a pre-heating step that had been the cause of [dosdude1]’s failures in previous attempts. But with the new chip cleaned up, prepared with solder balls, and placed on the new motherboard it was ready to solder into its new home.
Upon booting the upgraded machine, the only hiccup seemed to be that the system isn’t correctly identifying the clock speed. A firmware update solved this problem, though, and the machine is ready for use. For those who may be wondering why one would do something like this given the obsolete hardware, we’d note that beyond the satisfaction of doing it for its own sake these older Macbooks are among the few machines that can run free and open firmware, and also that Macbooks that are a decade or older can easily make excellent Linux machines even given their hardware limitations.
youtube.com/embed/-bEsigp_oG4?…
E se oggi ricevessi 2.000 Bitcoin in regalo? Su Bithumb è successo davvero
📌 Link all'articolo : redhotcyber.com/post/e-se-oggi…
#redhotcyber #news #erroreumano #bithumb #flashcrash #cryptovalute #bitcoin #scambicriptovalute #erroreinformatico #cybersecurity #hacking
E se oggi ricevessi 2.000 Bitcoin in regalo? Su Bithumb è successo davvero
Un errore interno su Bithumb causa l'accredito di migliaia di Bitcoin a 695 clienti, per un valore di 44 miliardi di dollari.Carolina Vivianti (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
222 - Come ci rubano l’account WhatsApp - Marco Camisani Calzolari
Come ci rubano l’account WhatsApp. Spiegato facile e per tutti. Se mi state a sentire e mi seguite, vi salvo: questa truffa continua a funzionare su persone normalissime.Web Staff MCC (Marco Camisani Calzolari)
reshared this
Lanciato Claude Opus 4.6: 500 0day scoperti nei test dagli ingegneri di Anthropic
📌 Link all'articolo : redhotcyber.com/post/lanciato-…
#redhotcyber #news #intelligenzaartificiale #linguaggiodimacchina #cybersecurity #sicurezzainformatica #vulnerabilita #progettiopensource
Lanciato Claude Opus 4.6: 500 0day scoperti nei test dagli ingegneri di Anthropic
Il nuovo modello di linguaggio Claude Opus 4.6 di Anthropic è capace di individuare oltre 500 vulnerabilità sconosciute in progetti open source.Redazione RHC (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
Oggi compie 40 anni la “Dichiarazione di indipendenza del Cyberspazio”.
📌 Link all'articolo : redhotcyber.com/post/la-dichia…
#redhotcyber #news #storiadiinternet #ciberindipendenza #hacking #cyberspazio #libertadigital #internet #indipendenzadelcyberspazio #tecnologia
La "Dichiarazione di indipendenza del Cyberspazio"
Sono passati più di 10 anni dalla pubblicazione del famoso saggio "The Hacker Manifesto" o "The Conscience of a Hacker" scritto da Loyd Blankenship, pubblicato l'8 gennaio 1986,Massimiliano Brolli (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
555-Based Square-Wave and Triangle-Wave Function Generator Build for Beginners
Over on YouTube [Andrew Neal] has a Function Generator Build for Beginners.
As beginner videos go this one is fairly comprehensive. [Andrew] shows us how to build a square-wave generator on a breadboard using a 555 timer, explaining how its internal flip-flop is controlled by added resistance and capacitance to become a relaxation oscillator. He shows how to couple a potentiometer to vary the frequency.
He then adds an integrator built from a TL082 dual op amp to convert the circuit to a triangle-wave generator, using its second op amp to build a binary inverter. He notes that a binary inverter is usually implemented with a comparator, but he uses the op amp because it was spare and could be put to good use. Again, potentiometers are added for frequency control, in this case a 1 MΩ pot for coarse control and a 10 kΩ pot for fine control. He ends with a challenge to the viewer: how can this circuit be modified to be a sine-wave generator? Sound off in the comments if you have some ideas!
If you’re interested to know more about function generators check out A Function Generator From The Past and Budget Brilliance: DHO800 Function Generator.
youtube.com/embed/KfFmZIZ67MM?…
A Simple Desktop Pomodoro Timer
Pomodoro timers are a simple productivity tool. They help you work in dedicated chunks of time, usually 25 minutes in a sitting, before taking a short break and then beginning again. [Clovis Fritzen] built just such a timer of his own, and added a few bonus features to fill out its functionality.
The timer is based around the popular ESP32-S2 microcontroller, which has the benefit of onboard WiFi connectivity. This allows the project to query the Internet for things like time and date updates via NTP, as well as weather conditions, and the value of the Brazilian Real versus the American dollar. The microcontroller is paired with an SHT21 sensor for displaying temperature and humidity in the immediate environment, and an e-paper display for showing timer status and other relevant information. A button on top of the device allows cycling between 15, 30, 45, and 60 minute Pomodoro cycles, and there’s a buzzer to audibly call time. It’s all wrapped up in a cardboard housing that somehow pairs rather nicely with the e-paper display aesthetic.
If Pomodoro is your chosen method of productivity hacking, a project like this could suit you very well. We’ve featured a few similar builds before, too.
youtube.com/embed/SVaGj3V3i5E?…
A state-sponsored threat actor is targeting the Signal users in Germany in a complex phishing campaign
According to Germany's cybersecurity agency, targets include high-ranking politicians, the military, and investigative journalists
reshared this
When Clever Hardware Hacks Bite Back: A Password Keeper Device Autopsy
Sometimes you have this project idea in your mind that seems so simple and straightforward, and which feels just so right that you have to roll with it. Then, years later you stumble across the sad remnants of the tearful saga and the dismal failure that it portrays. Do you put it away again, like an unpleasant memory, or write it up in an article, as a tearful confession of past sins? After some coaxing by a friend, [Alessandro] worked up the courage to detail how he set about making a hardware-only password keeper, and why it failed.
The idea was so simple: the device would pretend to be a keyboard and type the passwords for you. This is not that unusual, as hardware devices like the Mooltipass do something similar. Even better, it’d be constructed only out of parts lying around, including an ATtiny85 and an HD44780 display, with bit-banged USB connectivity.Prototyping the hardware on a breadboard.
Overcoming the challenge of driving the LC display with one pin on the MCU required adding a 74HC595 demultiplexer and careful timing, which sort of worked when the stars aligned just right. Good enough, but what about adding new passwords?
This is where things quickly skidded off the tracks in the most slapstick way possible, as [Alessandro] solved the problem of USB keyboard HID devices being technically ‘output-only’, by abusing the indicator statuses for Caps Lock, Num Lock, and Scroll Lock. By driving these from the host PC in just the right way you can use them as a sort of serial protocol. This incidentally turned out to be the most reliable part of the project.
Where the project finally tripped and fell down the proverbial flight of stairs was when it came to making the bit-banged USB work reliably. As it turns out, USB is very unforgiving with its timing unlike PS/2, making for an infuriating user experience. After tossing the prototype hardware into a box, this is where the project gathered dust for the past years.
If you want to give it a try yourself, maybe using an MCU that has more GPIO and perhaps even a USB hardware peripheral like the STM32F103, ESP32-S3 or something fruit-flavored, you can take a gander at the project files in the GitHub repository.
We’re always happy to see projects that (ab)use the Lock status indicators, it’s always been one of our favorite keyboard hacks.
180 Shots on a Roll with the Little Stupid Camera
If you want to play with the coolest kids on the block when it comes to photography, you have to shoot film. Or so say the people who shoot film, anyway. It is very true though that the chemical medium has its own quirks and needs a bit of effort in a way digital cameras don’t, so it can be a lot of fun to play with.
It’s expensive though — film ain’t cheap, and if you don’t develop yourself there’s an extra load of cash. What if you could get more photos on a roll? It’s something [Japhy Riddle] took to extremes, creating a fifth-frame 35mm camera in which each shot is a fifth the size of the full frame.We’re slightly worried about that much sticky tape next to the shutter, but hey.
Standard 35mm still film has a 24x36mm frame, in modern terms not far off the size of a full-size SD card. A standard roll of film gives you 36 exposures. There are half-frame cameras that split that frame vertically to give 72 exposures, but what he’s done is make a quarter-frame camera.
It’s a simple enough hack, electrical tape masking the frame except for a vertical strip in the middle, but perhaps the most interesting part is how he winds the film along by a quarter frame. 35mm cameras have a take-up reel, you wind the film out of the cartridge bit by bit into it with each shot, and then rewind the whole lot back into the cartridge at the end. He’s wound the film into the take-up reel and it winding it back a quarter frame at a time using the rewind handle, for which we are guessing he also needs a means to cock the shutter that doesn’t involve the frame advance lever.
We like the hack, though we would be worried about adhesive tape anywhere near the shutter blind on an SLR camera. It delivers glorious widescreen at the cost of a bit of resolution, but as an experimental camera it’s in the best tradition. This is one to hack into an unloved 1970s snapshot camera for the Shitty Camera Challenge!
youtube.com/embed/_SCyquRGmqk?…
A Failed SwitchBot Plug Mini and Cooking Electrolytics
Poorly designed PCBs and enclosures that slowly cook the electrolytic capacitors within are a common failure scenario in general, but they seem especially prevalent in so-called Internet-of-Things devices. The SwitchBot Plug Mini that [Denki Otaku] took a look at after many reports of them failing is one such example.The location of the failed electrolytic cap in the SwitchBot Plug Mini. (Credit: Denki Otaku, YouTube)
These Mini Plugs are ‘smart’ plugs that fit into a regular outlet and then allow you to control them remotely, albeit not integrated into a wall or such like the Shelly 2.5 smart relay that also began dying in droves. Yet whereas with the Shelly relays this always seemed to take a few years to show up, generally in the form of WiFi connectivity issues, these SwitchBot plugs sometimes failed within weeks or start constantly switching the relay on and off.
After SwitchBot started an exchange program for these plugs, [Denki Otaku] decided to examine these failed devices from affected users. Inside a dead unit the secondary side’s 680 µF capacitor was clearly bulging and had cooked off its electrolyte as a teardown of a dead capacitor confirmed. After replacing this one capacitor a formerly unresponsive plug sprung back to life.
This failed capacitor is important as it serves as the buffer for the 3.3 V rail, which otherwise sags below the operational range of the microcontroller during power-hungry WiFi operations, causing it to reset. As for the question of why this failure happened, there are two possibilities: one involves the B- or C-tier capacitor – for which no datasheet could be found – being unsuitable for dealing with the ripple current it was exposed to, the other being the high temperatures in that section of the PCB.Thermal image of the electrolytic capacitor area in the SwitchBot Plug Mini. (Credit: Denki Otaku, YouTube)
As a thermal image of the working PCB shows, the voltage regulator and switching circuitry present on the PCB – right below where the failed capacitor is located – reach a temperature of up to about 50°C, without taking into account the sealed enclosure that the PCB is located in.
The WiFi module that is located next to the capacitor and sticking up vertically from the PCB also reached a similar high temperature, making sure to bake the affected capacitor from below and the side. Even in open air the capacitor reached a temperature of about 43°C.
While a higher-quality capacitor will very likely cope with ripple current better, ultimately it’s pretty much just an unnecessarily stressful environment for electrolytic capacitors. While investigating two newer batches of these Plug Minis that are not subject to recall, the older unit still had the same flawed capacitor, while the new unit had replaced it with what looks like a polymer capacitor with the same ratings.
Interestingly, one of the failed plugs that [Denki Otaku] got sent did use one of these polymer capacitors, but appears to have another fault that wasn’t further investigated. Either way, the use of a polymer capacitor seems to help with the longevity to get it at least past the warranty period, but without a redesign these units seem doomed to fail due to rapid capacitor aging.
youtube.com/embed/YkI5GK734eI?…
Dutch data protection agency was hacked via the two recent Ivanti zero-days disclosed earlier this month
reshared this
Making a DIY Refrigerated Vest With Battery and Solar Power
Keeping a cool head is difficult at the best of times, least of all when it’s summer and merely thinking of touching bare skin to the pavement already gets you a second-degree burn. Unfortunately, it’s not possible to spend all summer in an air-conditioned room, but what if you took said room with you? Introducing [Hyperspace Pirate]’s air-conditioned vest.
Following on from last time’s adventures with a battery-powered air-conditioner that merely blew cold air onto one’s overheating body, this time the same compressor is used for a more compact build.
Since obviously using your body as part of the condenser would be uncomfortable, instead a heat exchanger was used that transfers the delicious frosty cold to water-filled tubing, zip-tied inside a very fashionable vest.
The basic unit runs on a couple of LiPo packs, but a solar-powered circuit was also built and tested using two small-ish panels. Of course, the requisite backpack-sized setup for that configuration is somewhat bulky, but at least the panels can also provide shade in addition to power for the compressor, hitting two fiery birds with one frosty stone.
Compared to one of those solar-powered caps with a built-in fan, this unit with some refinement could actually be an improvement, as well as keeping you a lot chillier. We’re looking forward to [Hyperspace]’s trial runs in the upcoming Floridian summer, as well as future chilling adventures.
youtube.com/embed/qv0IJM3BV9Y?…
Robots Talking to Robots
Although there are a few robots on the market that can make life a bit easier, plenty of them have closed-source software or smartphone apps required for control that may phone home and send any amount of data from the user’s LAN back to some unknown server. Many people will block off Internet access for these types of devices, if they buy them at all, but that can restrict the abilities of the robots in some situations. [Max]’s robot vacuum has this problem, but he was able to keep it offline while retaining its functionality by using an interesting approach.
Home Assistant, a popular open source home automation system, has a few options for voice commands, and can also be set up to transmit voice commands as well. This robotic vacuum can accept voice commands in lieu of commands from its proprietary smartphone app, so to bypass this [Max] set up a system of automations in Home Assistant that would command the robot over voice. His software is called jacadi and is built in Go, which uses text-to-speech to command the vacuum using a USB speaker, keeping it usable while still offline.
Integrating a voice-controlled appliance like this robotic vacuum cleaner allows things like scheduled cleanings and other commands to be sent to the vacuum even when [Max] isn’t home. There are still a few limitations though, largely that communication is only one way to the vacuum and the Home Assistant server can’t know when it’s finished or exactly when to send new commands to the device. But it’s still an excellent way to keep something like this offline without having to rewrite its control software entirely.
He’s a Wrapper (Wire Wrapper, That Is)
Before PCBs, wiring electronic circuits was a major challenge in electronics production. A skilled person could make beautiful wire connections between terminal strips and components with a soldering iron, but it was labor-intensive and expensive. One answer that was very popular was wire wrapping, and [Sawdust & Circuits] shows off an old-fashioned wire wrap gun in the video below.
The idea was to use a spinning tool to tightly wrap solid wire on square pins. A proper wrap was a stable alternative to soldering. It required less skill, no heat, and was easy to unwrap (using a different tool) if you changed your mind. The tech started out as wiring telephone switchboards but quickly spread.
Not all tools were guns or electric. Some used a mechanical handle, and others were like pencils — you simply rotated them by hand. You could specify levels for sockets and terminals to get a certain pin length. A three-level pin could accept three wire wrap connections on a single pin, for example. There were also automated machines that could mass-produce wire-wrapped circuits.
The wire often had thin insulation, and tools usually had a slot made to strip the insulation on the tiny wires. Some guns created a “modified wrap” that left insulation at the top one or two wraps to relieve stress on the wire as it exited the post. If you can find the right tools, wires, and sockets, this is still a viable way to make circuits.
Want to know more about wire wrapping? Ask [Bil Herd].
youtube.com/embed/TzlM8yZR5RI?…
effeindi
in reply to informapirata ⁂ • • •ma questo cavillo legale esiste anche in Europa / Italia?
Non che non ci siano altri motivi per non usare i blocchi biometrici, ma è una curiosità che ho da un po'.
reshared this
Privacy Pride e informapirata ⁂ reshared this.
.mau.
in reply to informapirata ⁂ • • •reshared this
Privacy Pride e informapirata ⁂ reshared this.
informapirata ⁂
in reply to .mau. • • •@mau ormai quando mi sveglio la mattina e mi guardo con i segni sul cuscino mi riconosco a fatica anche io 🤣
@privacypride
Privacy Pride reshared this.