What About the Droid Attack on the Repos?


The media in this post is not displayed to visitors. To view it, please log in.

A grim reaper knocking on a door labelled "open source"

You might not have noticed, but we here at Hackaday are pretty big fans of Open Source — software, hardware, you name it. We’ve also spilled our fair share of electronic ink on things people are doing with AI. So naturally when [Jeff Greerling] declares on his blog (and in a video embedded below) that AI is destroying open source, well, we had to take a look.

[Jeff]’s article highlights a problem he and many others who manage open source projects have noticed: they’re getting flooded with agenetic slop pull requests (PRs). It’s now to the point that GitHub will let you turn off PRs completely, at which point you’ve given up a key piece of the ‘hub’s functionality. That ability to share openly with everyone seemed like a big source of strength for open source projects, but [Jeff] here is joining his voice with others like [Daniel Stenberg] of curl fame, who has dropped bug bounties over a flood of spurious AI-generated PRs.

It’s a problem for maintainers, to be sure, but it’s as much a human problem as an AI one. After all, someone set up that AI agent and pointed at your PRs. While changing the incentive structure– like removing bug bounties– might discourage such actions, [Jeff] has no bounties and the same problem. Ultimately it may be necessary for open source projects to become a little less open, only allowing invited collaborators to submit PRs, which is also now an option on GitHub.

Combine invitation-only access with a strong policy against agenetic AI and LLM code, and you can still run a quality project. The cost of such actions is that the random user with no connection to the project can no longer find and squash bugs. As unlikely as that sounds, it happens! Rather, it did. If the random user is just going to throw their AI agent at the problem, it’s not doing anybody any good.

First they came for our RAM, now they’re here for our repos. If it wasn’t for getting distracted by the cute cat pictures we might just start to think vibe coding could kill open source. Extra bugs was bad enough, but now we can’t even trust the PRs to help us squash them!

youtube.com/embed/bZJ7A1QoUEI?…


hackaday.com/2026/02/22/what-a…

Recreating Mega Man’s Mega Buster


The media in this post is not displayed to visitors. To view it, please log in.

Mega Man is a popular video game character who is perhaps most notable for having a sort of lasery-type blaster for an arm. A real hand cannon, if you will. It’s officially called the Mega Buster, and [Arnov Sharma] recently recreated it for cosplay purposes.

Key to any good cosplay build is getting the visuals right, and [Arnov] achieved that well. The Mega Buster was first recreated in Fusion 360, scaled to an appropriate size to fit [Arnov]’s arm. It was 3D printed in several sections, with the body including a grab handle and fire button inside, and the side panel and blaster nozzle having provision for installing LEDs. The former is the blaster’s “power meter” which shows how many shots it has left until it runs out of energy, with the blaster able to fire six times before needing to cooldown. A Raspberry Pi Pico controls the LEDs and provides sound effects with the aid of a PAM8403 class D amplifier module and a small speaker.

The 3D files are available on Instructables for the curious. Perhaps by virtue of its arm-mounted nature, this build reminds us of the venerable Pip Boy from Fallout, of which we’ve seen many grand recreations before. Video after the break.

youtube.com/embed/CMXTvWcF8Cg?…


hackaday.com/2026/02/22/recrea…

Cybersecurity & cyberwarfare ha ricondiviso questo.

SECURITY AFFAIRS #MALWARE #NEWSLETTER ROUND 85
securityaffairs.com/188337/mal…
#securityaffairs #hacking
Cybersecurity & cyberwarfare ha ricondiviso questo.

Security Affairs #newsletter Round 564 by Pierluigi Paganini – INTERNATIONAL EDITION
securityaffairs.com/188332/bre…
#securityaffairs #hacking

Inside a Compact Intel 3000 W Water-Cooled Power Supply


The media in this post is not displayed to visitors. To view it, please log in.

Recently [ElecrArc240] got his paws on an Intel-branded 3 kW power supply that apparently had been designed as a reference PSU for servers. At 3 kW in such a compact package air cooling would be rather challenging, so it has a big water block sandwiched between the two beefy PCBs. In the full teardown and analysis video of the PSU we can see the many design decisions made to optimize efficiency and minimize losses to hit its 80 Plus Platinum rating.

For the power input you’d obviously need to provide it with 240 VAC at sufficient amps, which get converted into 12 VDC at a maximum of 250 A. This also highlights why 48 VDC is becoming more common in server applications, as the same amount of power would take only 62.5 A at that higher voltage.

The reverse-engineered schematic shows it using an interleaved totem-pole PFC design with 600 V-rated TI LMG3422 600V GaN FETs in the power stages. After the PFC section we find a phase-shifted full bridge rectifier with OnSemi’s SiC UF3C065030K4S Power N-Channel JFETs.

There were a few oddities in the design, such as the Kelvin source of the SiC JFET being tied into the source, which renders that feature useless. Sadly the performance of the PSU was not characterized before it was torn apart which might have provided some clues here.

Schematic diagram of the AC-DC circuit in the 3 kW, 12VDC power supply. (Credit: ElectrArc240, YouTube)Schematic diagram of the AC-DC circuit in the 3 kW, 12VDC power supply. (Credit: ElectrArc240, YouTube)
youtube.com/embed/da9GwXX-0Zs?…


hackaday.com/2026/02/22/inside…

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Cloudflare cade ancora, per la terza volta: il bug banale che ha isolato mezzo internet

📌 Link all'articolo : redhotcyber.com/post/cloudflar…

#redhotcyber #news #cloudflare #interruzionediservizio #incidentedisicurezza #gestioneindirizziip

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Robot cinesi con mitragliatrici: realtà o AI? La verità che spaventa il mondo

📌 Link all'articolo : redhotcyber.com/post/robot-cin…

#redhotcyber #news #robotica #intelligenzaartificiale #guerraautonoma #eticanellarobotica #regolamentazionerobot

reshared this

Exclamation Point Indicates Worthy Notifications


The media in this post is not displayed to visitors. To view it, please log in.

As far as punctuation goes, the exclamation mark is perhaps the most eye-catching of the bunch. That’s why [Conrad Farnsworth] thought this form would be perfect for his Home Assistant notifier build.

The key to this build is the large bi-color printed housing in the shape of an exclamation mark. It makes for an attractive wall-hanging, but it also perfectly serves the purpose [Conrad] had in mind. Inside the enclosure is an ESP32, hooked up to a string of 16×8 LED matrixes which are commanded over I2C. These sit behind a white panel in the enclosure to nicely diffuse the light and make their output more readable. The ESP32 displays notifications on the LEDs that are fed from Home Assistant, such as when the mailbox sensor is triggered or if a vehicle is detected in the driveway. There’s also a bell on the unit to provide audible notifications, which us dinged with a solenoid fired via a 2N2222 transistor switching a 12-volt supply from a boost converter.

It’s a neat build that fits nicely into [Conrad]’s daily life and appears to have some genuine utility. If you’re looking for other ways to neatly display notifications where you can see them, you might consider whipping yourself up a smart mirror. Video after the break.

youtube.com/embed/C5UuRmCwZ78?…


hackaday.com/2026/02/22/exclam…

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

233 – Il gratis sull’AI è una finzione, e spesso ti sta fregando camisanicalzolari.it/233-il-gr…
in reply to kanedatux

@kanedatux senza cedere i dati? Come fai a fare lavorare una ai suoi tuoi dati senza farglieli vedere? La privacy policy cosa dice? Vengono conservati? Per quanto tempo? Addestrano la ai? Vengono ceduti? Io volevo usare una ai a pagamento ma la privacy policy prevedeva la cessione dei miei dati. Ammesso che non lo faccia, ti fideresti? Quante malpractice ricorrenti ci sono già state in passato?
Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

React2Shell ci minaccia: ecco come ILovePoop sta scansionando il mondo

📌 Link all'articolo : redhotcyber.com/post/react2she…

#redhotcyber #news #cybersecurity #hacking #malware #ransomware #vulnerabilita #react2shell #ilovepoop

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Gli hacker violano oltre 600 firewall in 55 Paesi sfruttando l’Intelligenza Artificiale

📌 Link all'articolo : redhotcyber.com/post/gli-hacke…

#redhotcyber #news #cybersecurity #hacking #intelligenzaartificiale #criminalitàinformatica #attacchinformatici

reshared this

Why Chains are Still Better for Bicycles than Belts


The media in this post is not displayed to visitors. To view it, please log in.

Theoretically a belt drive makes for a great upgrade to a bicycle, as it replaces the heavier, noisy and relatively maintenance-heavy roller chain with a zero-maintenance, whisper-quiet and extremely reliable belt that’s rated at an amazing 20-30,000 km before needing a replacement. Of course, that’s the glossy marketing brochure version of reality, which differed significantly from what [Tristan Ridley] experienced whilst cycling around the globe.

Although initially he was rather happy with his bike, its sealed car-like Pinion gearbox and Gates carbon belt drive system, while out in the wilds of Utah he had a breakdown when the belt snapped. When the spare belt that he had carried with him for the past months also snapped minutes later after fitting it on, it made him decide to switch back to the traditional bush roller chain.

Despite this type of chain drive tracing its roots all the way back to Leonardo da Vinci, they actually offer many advantages over the fancy carbon-fiber-reinforced polyurethane belt. Although with the Pinion gearbox the inability to use a derailleur gearing system is no big deal, [Tristan] found that the ‘zero maintenance’ part of the belt was not true for less hospitable roads

Anyone up for some tasty peanut butter? (Credit: Tristan Ridley, YouTube)Anyone up for some tasty peanut butter? (Credit: Tristan Ridley, YouTube)
A big issue was that of abrasive dust, which created a very noisy coating on the belt that’d have to be regularly cleaned off with precious water, or by having silicone lubricant sprayed on the belt. Even with all that care he found that the belt would snap after about 8,000 km, well below the rated endurance.

When it came to super-sticky mud, called peanut butter mud for good reasons, he found that chains also cope much better with this, as the mud will just squeeze out of the chain and be forced off the sprocket, whereas the belt will happily keep compacting the mud onto the contact surfaces, increasing belt tension and requiring constant cleaning to not become hopelessly stuck.

The Utah breakdown also showed why these belts are actually very fragile: the replacement belt had been packed away folded-up for a few months at that point in the luggage, and during storage the carbon fibers had become compromised to the point where the belt just snapped after a few minutes of use. A metal chain will happily be stored away for as long as you can keep it away from corrosion, and fold up very compactly.

Another awesome feature of roller chains is that they’re super-modular, allowing you to carry spare links and such with you for in-the-field repairs, while even the most remote bicycle store in any country can help you out with maintenance and repairs, unlike the special and highly custom belts that need to be shipped in by courier.

Of all the bicycle technologies that [Tristan] has used, it seems that only this drive belt has been an outright disappointment. The sealed gearbox would seem to be a massive improvement over finicky derailleurs, and hydraulic brakes are reliable and common enough that they haven’t been an issue so far.

His conclusion is that bicycle drive belts are fine if you do city driving, where they probably will last the rated kilometers, but they rapidly fall apart in even slightly adverse conditions.

youtube.com/embed/nx5nN3kyx5k?…


hackaday.com/2026/02/21/why-ch…

Quieting Noisy Resistors


The media in this post is not displayed to visitors. To view it, please log in.

[Hans Rosenberg] has a new video talking about a nasty side effect of using resistors: noise. If you watch the video below, you’ll learn that there are two sources of resistor noise: Johnson noise, which doesn’t depend on the construction of the resistor, and 1/f noise, which does vary depending on the material and construction of the resistor.

In simple terms, some resistors use materials that cause electron flow to take different paths through the resistor. That means that different parts of the signal experience slightly different resistance values. In simple applications, it won’t matter much, but in places where noise is an important factor, the 1/f or excess noise contributes more to errors than the Johnson noise at low frequencies.

[Hans] doesn’t just talk the math. He also built a simple test rig that lets him measure the 1/f noise with some limitations. While you might pretend that all resistors are the same, the test shows that thick film resistors produce much more noise than other types.

The video shows some rule-of-thumb lists indicating which resistors have better noise figures than others. Of course, resistors are only one source of noise in circuits. But they are so common that it is easy to forget they aren’t as perfect as we pretend in our schematics.

Want to learn more about noise? We can help. On the other hand, noise isn’t always a bad thing.

youtube.com/embed/omn_Lh0MLA4?…


hackaday.com/2026/02/21/quieti…

How the Intel 8087 FPU Knows Which Instructions to Execute


The media in this post is not displayed to visitors. To view it, please log in.

An interesting detail about the Intel 8087 floating point processor (FPU) is that it’s a co-processor that shares a bus with the 8086 or 8088 CPU and system memory, which means that somehow both the CPU and FPU need to know which instructions are intended for the FPU. Key to this are eight so-called ESCAPE opcodes that are assigned to the co-processor, as explained in a recent article by [Ken Shirriff].

The 8087 thus waits to see whether it sees these opcodes, but since it doesn’t have access to the CPU’s registers, sharing data has to occur via system memory. The address for this is calculated by the CPU and read from by the CPU, with this address registered by the FPU and stores for later use in its BIU register. From there the instruction can be fully decoded and executed.

This decoding is mostly done by the microcode engine, with conditional instructions like cos featuring circuitry that sprawls all over the IC. Explained in the article is how the microcode engine even knows how to begin this decoding process, considering the complexity of these instructions. The biggest limitation at the time was that even a 2 kB ROM was already quite large, which resulted in the 8087 using only 22 microcode entry points, using a combination of logic gates and PLAs to fully implement the entire ROM.

Only some instructions are directly implemented in hardware at the bus interface (BIU), which means that a lot depends on this microcode engine and the ROM for things to work half-way efficiently. This need to solve problems like e.g. fetching constants resulted in a similarly complex-but-transistor-saving approach for such cases.

Even if the 8087 architecture is convoluted and the ISA not well-regarded today, you absolutely have to respect the sheer engineering skills and out-of-the-box thinking of the 8087 project’s engineers.


hackaday.com/2026/02/21/how-th…

Cybersecurity & cyberwarfare ha ricondiviso questo.

"Stiamo assistendo alla caduta di un Paese sotto la dittatura quasi senza alcuna resistenza"

La Guerra Fredda? Un gioco da ragazzi rispetto a ciò che ci aspetta, secondo lo storico statunitense Robert Kagan. Trump, dice, sta guidando il mondo verso l'era più pericolosa dal 1945.

spiegel.de/international/world…

@politica

Cybersecurity & cyberwarfare ha ricondiviso questo.

PayPal rivela una violazione dei dati che ha esposto le informazioni degli utenti per 6 mesi

L'incidente ha interessato l' app di prestito PayPal Working Capital (PPWC), che fornisce alle piccole imprese un rapido accesso ai finanziamenti.

bleepingcomputer.com/news/secu…

@informatica

Miranda’s Unlikely Ocean Has Us Asking If There’s Life Clinging On Around Uranus


The media in this post is not displayed to visitors. To view it, please log in.

Miranda, as imaged by Voyager 2 on Jan. 24, 1986.

If you’re interested in extraterrestrial life, these past few years have given an embarrassment of places to look, even in our own solar system. Mars has been an obvious choice since before the Space Age; in the orbit of Jupiter, Europa’s oceans have been of interest since Voyager’s day; the geysers of Enceladus give Saturn two moons of interest, if you count the possibility of a methane-based chemistry on Titan. Even faraway Neptune’s giant moon Triton probably has an ocean layer deep inside. Now the planet Uranus is getting in on the act, offering its moon Miranda for consideration in a kinda-recent study in the Planetary Science Journal.

Miranda and Uranus, the new hot spot for life-hunters.
Photomontage credit NASA.
Even if you’re into astronomy, it may seem like this is coming out of left field. “Miranda, really? What new data could we possibly have on a moon of Neptune nobody’s visited since the 1980s?” Well, none, really. This study relies on reexamining the data collected during the Voyager 2 encounter and trying to make sense of the chaotic, icy world that the space probe revealed.

The faults and other features on Miranda indicated it was geologically active at some point; this study tries to recreate the moon’s history through computer modelling to find that Miranda probably had a ≥100 km thick ocean sometime in the last 100-500 million years, and that while some of it has likely frozen since, tidal heating could very well keep a layer of liquid water within the moon’s interior. Since the moon itself is only 470 km (290 mi) in diameter, a 100km deep ocean layer would actually be a huge proportion of its volume.
The model is a fairly simple one, with the ocean sandwiched between two layers of ice and a rocky core. Image from Caleb Strom et al 2024 Planet. Sci. J. 5 226
Right now, the over-optimistic thinking is that “water means life”, since that’s how it seems to work on Earth. It remains to be seen if Miranda, or indeed any of the icy moons, ever evolved so much as a microbe. Aside from the supposed presence of liquid dihydrogen monoxide, there’s nothing to suggest they have. Finding out is going to take a while: even with boots — er, robots — on the ground, Mars isn’t giving up that secret easily. Still, if we’re able to discover irrefutable evidence for such extraterrestrial life, it will provide an important constraint on one term of The Drake Equation: what fraction of worlds develop life. That by itself won’t tell us “are we alone,” but it will be interesting.

Of course, even if all these worlds are barren now, they might not be for long, once our probes start visiting.

Story via Earth.com

Header image: Miranda, imaged by Voyager 2. Credit NASA/JPL-Caltech


hackaday.com/2026/02/21/mirand…

Cybersecurity & cyberwarfare ha ricondiviso questo.

LibreOffice critica il "falso open source" OnlyOffice per aver collaborato con Microsoft per bloccare gli utenti

LibreOffice sta ampliando la sua linea di attacco, prendendo di mira ora OnlyOffice, il suo rivale, accusandolo di essere "partner di Microsoft in una strategia per bloccare gli utenti".

neowin.net/news/libreoffice-bl…

@informatica

Cybersecurity & cyberwarfare ha ricondiviso questo.

Il team #Microsoft crea un sistema di archiviazione dati "rivoluzionario" che dura millenni

I ricercatori utilizzano mini-esplosioni di plasma per codificare l'equivalente di due milioni di libri in un dispositivo delle dimensioni di un sottobicchiere. Il metodo potrebbe preservare i dati di ricerca per millenni con costi di archiviazione minimi.

nature.com/articles/d41586-026…

@informatica

Cybersecurity & cyberwarfare ha ricondiviso questo.

La #IntelligenzaArtificiale utilizzata da #Meta sta rendendo la vita impossibile ad alcuni clienti inserzionisti?

«Siamo, secondo qualsiasi definizione ragionevole, un cliente di alto valore.
Eppure, negli ultimi mesi, Meta ci ha trattato come se non esistessimo.
È davvero una delle cose più assurde che abbiamo sperimentato nella gestione di un'agenzia negli ultimi due decenni.»

mojodojo.io/blog/meta-is-syste…

@aitech

Retrotechtacular: Bleeding-Edge Memory Devices of 1959


The media in this post is not displayed to visitors. To view it, please log in.

Although digital computers are – much like their human computer counterparts – about performing calculations, another crucial element is that of memory. After all, you need to fetch values from somewhere and store them afterwards. Sometimes values need to be stored for long periods of time, making memory one of the most important elements, yet also one of the most difficult ones. Back in the 1950s the storage options were especially limited, with a 1959 Bell Labs film reel that [Connections Museum] digitized running through the bleeding edge of 1950s storage technology.

After running through the basics of binary representation and the difference between sequential and random access methods, we’re first taking a look at punch cards, which can be read at a blistering 200 cards/minute, before moving onto punched tape, which comes in a variety of shapes to fit different applications.

Electromechanical storage in the form of relays are popular in e.g. telephone exchanges, as they’re very fast. These use two-out-of-five code to represent the phone numbers and corresponding five relay packs, allowing the crossbar switch to be properly configured.

Twistor memory demonstration. (Credit: Bell Labs, 1959)Twistor memory demonstration. (Credit: Bell Labs, 1959)
After these types of memory, we move on to magnetic memory, in the form of well-known magnetic tape that provide mass storage in relatively little space. There is also the magnetic drum, which is much like a very short and very fast tape and provides e.g. working memory. This is what e.g. the Bendix G-15 uses for its clock signal and working memory, while magnetic tape and punched tape are used for application and data storage.

Next we cover magnetic-core memory, which stores a magnetic orientation in its ferrite rings or on a ferrite plate. This is non-volatile memory, but has low bit density and performs destructive reads, preventing its use beyond the 1970s. Today’s NAND Flash memory has significant overlap with core memory in its operating principles, both in its advantages and disadvantages.

An interesting variation on core memory is Twistor memory, which saw brief use during the late 1960s and early 1970s. Invented by Bell Labs, it was supposed to make for cheaper core-like memory, but semiconductor memory wiped out its business case, along with the similar bubble memory. An interesting feature of Twistor memory was the ability to add write-inhibit cards containing permanent magnets.

Fascinatingly, a kind of crude mask ROM is also demonstrated, before we move on to the old chestnut of vacuum tubes. Demonstrated is a barrier-grid tube, which uses electrons to create an electrostatic charge on a mica surface. This electron beam is also used to read the value, which is naturally destructive, making it somewhat similar to core memory in its speed and functionality.

Finally, we get the flying-spot store system, which is a type of optical digital memory. This is reminiscent of optical disc systems like the Compact Disc, and a reminder of all the amazing breakthroughs that we’d be seeing over the next decades.

Perhaps the best part about this video is that it shows the world as it sidled still mostly unaware towards these big changes. Memory storage was still the realm of largely hand-assembled, macro-sized devices, vacuum tubes and chunky electromechanical relays. Only a few years after this video was released, we’d see semiconductor technology turn the macro into micro, by the 1970s nerds would be fighting over who had the most RAM in their home computers, and CD-ROMs would set the world of computer storage and home game consoles ablaze by the 1990s with literally hundreds of MBs of storage per very cheap disc.

youtube.com/embed/Px9ZfLyeAWU?…


hackaday.com/2026/02/21/retrot…

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Red Card 2.0: Colpo grosso al cybercrime! 651 truffatori arrestati nella maxi operazione internazionale

📌 Link all'articolo : redhotcyber.com/post/red-card-…

#redhotcyber #news #cybersecurity #hacking #truffeonline #sicurezzainformatica #operazioneRedCard #criminalitainformatica

In Praise of the Proof of Concept


The media in this post is not displayed to visitors. To view it, please log in.

Your project doesn’t necessarily have to be a refined masterpiece to have an impact on the global hacker hivemind. Case in point: this great demo of using a 64-point time-of-flight ranging sensor. [Henrique] took three modules, plugged them into a breadboard, and wrote some very interactive Python code that let him put them all through their paces. The result? I now absolutely want to set up a similar rig and expand on it.

That’s the power of a strong proof of concept, and maybe a nice video presentation of it in action. What in particular makes [Henrique]’s POC work is that he’s written the software to give him a number of sliders, switches, and interaction that let him tweak things in real time and explore some of the possibilities. This exploratory software not only helped him map out what directions to go, but they also work in demo mode, when he’s showing us what he has learned.

But the other thing that [Henrique]’s video does nicely is to point out the limitations of his current POC. Instantly, the hacker mind goes “I could work that out”. Was it strategic incompleteness? Either way, I’ve been nerd-sniped.

So are those the features of a good POC? It’s the bare minimum to convey the idea, presented in a way that demonstrates a wide range of possibilities, and leaving that last little bit tantalizingly on the table?

This article is part of the Hackaday.com newsletter, delivered every seven days for each of the last 200+ weeks. It also includes our favorite articles from the last seven days that you can see on the web version of the newsletter. Want this type of article to hit your inbox every Friday morning? You should sign up!


hackaday.com/2026/02/21/in-pra…

Love Complex Automata? Don’t Miss The Archer


The media in this post is not displayed to visitors. To view it, please log in.

[Oliver Pett] loves creating automata; pieces of art whose physicality and motion come together to deliver something unique. [Oliver] also has a mission, and that mission is to complete the most complex automata he has ever attempted: The Archer. This automaton is a fully articulated figure designed to draw arrows from a quiver, nock them in a bow, draw back, and fire — all with recognizable technique and believable motions. Shoot for the moon, we say!

He’s documenting the process of creating The Archer in a series of videos, the latest of which dives deep into just how intricate and complex of a challenge it truly is as he designs the intricate cams required.

A digital, kinematic twin in Rhino 3D helps [Oliver] to choose key points and determine the cam profiles required to effect them smoothly.In simple automata rotational movement can be converted by linkages to create the required motions. But for more complicated automata (like the pen-wielding Maillardet Automaton), cams provide a way to turn rotational movement into something much more nuanced. While creating the automaton and designing appropriate joints and actuators is one thing, designing the cams — never mind coordinating them with one another — is quite another. It’s a task that rapidly cascades in complexity, especially in something as intricate as this.

[Oliver] turned to modern CAD software and after making a digital twin of The Archer he’s been using it to mathematically generate the cam paths required to create the desired movements and transitions, instead of relying on trial and error. This also lets him identify potential collisions or other errors before any metal is cut. The cams are aluminum, so the fewer false starts and dead ends, the better!

Not only is The Archer itself a beautiful piece of work-in-progress, seeing an automaton’s movements planned out in this way is a pretty interesting way to tackle the problem. We can’t wait to see the final result.

Thanks [Stephen] for the tip!


hackaday.com/2026/02/21/love-c…

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

L’AI trova bug nascosti nel codice prima degli hacker! La promessa di Claude Code for Security

📌 Link all'articolo : redhotcyber.com/post/lai-trova…

#redhotcyber #news #sicurezzadelsoftware #intelligenzaartificiale #vulnerabilita #cybersecurity #hacking #malware #ransomware

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Archivi sicuri oggi, vulnerabili domani? La minaccia invisibile che cresce nel tempo

📌 Link all'articolo : redhotcyber.com/post/archivi-s…

#redhotcyber #news #quantumcomputing #sicurezzainformatica #cifratura #riservatezza #lungotermine #difesasicurezza #informazionipubbliche

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

🚀 ULTIMI POSTI DISPONIBILI PER IL CORSO "𝗖𝗬𝗕𝗘𝗥 𝗢𝗙𝗙𝗘𝗡𝗦𝗜𝗩𝗘 𝗙𝗨𝗡𝗗𝗔𝗠𝗘𝗡𝗧𝗔𝗟𝗦" 🚀

Per info e iscrizioni: 📞 379 163 8765 ✉️ formazione@redhotcyber.com
👉 redhotcyber.com/linksSk2L/cybe…

#redhotcyber #formazione #pentesting #pentest #formazionelive #ethicalhacking #hacking #cybersecurity

Cybersecurity & cyberwarfare ha ricondiviso questo.

U.S. CISA adds RoundCube Webmail flaws to its Known Exploited Vulnerabilities catalog
securityaffairs.com/188324/sec…
#securityaffairs #hacking
Cybersecurity & cyberwarfare ha ricondiviso questo.

La battaglia contro l'IA è in pieno svolgimento e tutti aspettano Liang Wenfeng

In questo momento gli dei hanno preso posizione.
I giganti di Internet si stanno dando da fare per sedersi al tavolo delle trattative, e le loro ambizioni sono chiare: vogliono tutti che i propri modelli di intelligenza artificiale diventino i punti di ingresso privilegiati.

eu.36kr.com/en/p/3683997437063…

@aitech

Cybersecurity & cyberwarfare ha ricondiviso questo.

Nuovi partner in arrivo per #UfficioZero per offrire sempre più servizi liberi ed etici, anche decentralizzati

Prossimamente la platea di servizi di @ufficiozero si amplierà, in modo graduale su ogni release.

Cosa dovrete fare per usufruirne? Semplicemente tenere il vostro sistema operativo aggiornato. In questo modo i nuovi aggiornamenti rilasciati, verranno installati sul vostro pc.

ufficiozero.org/index.php?alia…

@gnulinuxitalia

MicroGPT Lets You Peek with Your Browser


The media in this post is not displayed to visitors. To view it, please log in.

Regardless of what you think of GPT and the associated AI hype, you have to admit that it is probably here to stay, at least in some form. But how, exactly, does it work? Well, MicroGPT will show you a very stripped-down model in your browser. But it isn’t just another chatbot, it exposes all of its internal computations as it works.

The whole thing, of course, is highly simplified since you don’t want billions of parameters in your browser’s user interface. There is a tutorial, and we’d suggest starting with that. The output resembles names by understanding things like common starting letters and consonant-vowel alternation.

At the start of the tutorial, the GPT spits out random characters. Then you click the train button. You’ll see a step counter go towards 500, and the loss drops as the model learns. After 500 or so passes, the results are somewhat less random. You can click on any block in the right pane to see an explanation of how it works and its current state. You can also adjust parameters such as the number of layers and other settings.

Of course, the more training you do, the better the results, but you might also want to adjust the parameters to see how things get better or worse. The main page also proposes questions such as “What does a cell in the weight heatmap mean?” If you open the question, you’ll see the answer.

Overall, this is a great study aid. If you want a deeper dive than the normal hand-waving about how GPTs work, we still like the paper from [Stephen Wolfram], which is detailed enough to be worth reading, but not so detailed that you have to commit a few years to studying it.

We’ve seen a fairly complex GPT in a spreadsheet, if that is better for you.


hackaday.com/2026/02/21/microg…

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Un Mac retrò nel palmo di una mano: l’hack con Raspberry Pi che ricrea un classico Apple

📌 Link all'articolo : redhotcyber.com/post/un-mac-re…

#redhotcyber #news #raspberrypi #macmini #svga #rpi #piOS #sistemoperativo #maclock #macintosh #progettodicosto #diy #tecnologia

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

232 – Arriva l’Intelligenza Artificiale che sfida Dio… ma io non ci credo camisanicalzolari.it/232-arriv…
in reply to Marco Camisani Calzolari

🤖 Tracking strings detected and removed!

🔗 Clean URL(s):
camisanicalzolari.it/232-arriv…

❌ Removed parts:
?utm_source=dlvr.it&utm_medium=mastodon

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Palo Alto Networks ammorbidisce i toni sulle responsabilità della Cina in una campagna hacker

📌 Link all'articolo : redhotcyber.com/post/palo-alto…

#redhotcyber #news #cyberspionaggio #sicurezzainformatica #rete #ciberattacchi #hacking #pirateriainformatica #malware #minacceinformatiche

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Quando gli utenti installano il malware da soli! La nuova ondata di attacchi ClickFix

📌 Link all'articolo : redhotcyber.com/post/quando-gl…

#redhotcyber #news #cybersecurity #hacking #malware #ingegneriasociale #sicurezzainformatica #minacceinformatiche #phishing

Electric Jeep With Modified Prius Hardware


The media in this post is not displayed to visitors. To view it, please log in.

On the list of cars widely regarded as the most reliable vehicles ever built, up there with the Toyota Land Cruiser, the Honda Civic, and the Mercedes W123 diesels, is the unassuming Toyota Prius. Although it adds a bit of complexity with its hybrid drivetrain, its design eliminates a number of common wear items and also tunes it for extreme efficiency, lengthening its life and causing minimal mechanical stress. The Prius has a number of other tricks up its sleeve as well, which is why parts of its hybrid systems are often used in EV conversions like [Jeremy]’s electric CJ-5 Jeep.

Inside the Prius inverter is a buck/boost converter used for stepping up the battery voltage to power the inverter and supply power to the electric motor. [Jeremy]’s battery is much higher voltage than the stock Prius battery pack, though, which means he can bypass the converter and supply energy from his battery directly to the inverter. Since the buck/boost converter isn’t being used, he can put it to work doing other things. In this case, he’s using it as a charger. Sending the AC from a standard EV charging cord through a rectifier and then to this converter allows the Prius hardware to charge the Jeep’s battery, without adding much in the way of extra expensive electronics.

There are some other modifications to the Prius equipment in this Jeep, though, namely that [Jeremy] is using an open-source controller as the brain of this conversion. Although this video only goes into detail on some of the quirks of the Prius hardware, he has a number of other videos documenting his journey to convert this antique Jeep over to a useful electric farm vehicle which are worth checking out as well. There are plenty of other useful things that equipment from hybrid and electric vehicles can do beyond EV conversions as well, like being used for DIY powerwalls.

youtube.com/embed/O7S5r0X_gto?…


hackaday.com/2026/02/20/electr…

Displaying the Rainbow


The media in this post is not displayed to visitors. To view it, please log in.

True or false? Your green laser pointer is more powerful than your red one. The answer is almost certainly false. They are, most likely, the same power, but your eye is far more sensitive to green, so it seems stronger. [Brandon Li] was thinking about how to best represent colors on computer screens and fell down the rabbit hole of what colors look like when arranged in a spectrum. Spoiler alert: almost all the images you see of the spectrum are incorrect in some way. The problem isn’t in our understanding of the physics, but more in the understanding of how humans perceive color.

Perception may start with physics, but it also extends to the biology of your eye and the psychology of your brain. What follows is a lot of math that finally winds up with the CIE 1931 color space diagram and the CIE 2012 system.

Some people obsess about fonts, and some about colors. If you are in the latter camp, this is probably old hat for you. However, if you want a glimpse into just how complicated it is to accurately represent colors, this is a fascinating read. You can learn about the Bezold-Brücke shift, the Helmholtz-Kohlrausch effect, and the Abney effect. Maybe that’ll help you win a bar bet one day.

The post winds up in the strangest place: spectroscopy. So if you want to see how color representation applies to analyzing blue sky, neon tubes, and a MacBook display, you’ll want to skip to the end.

We’ve nerded out on color spaces before. In some cases, the right representation is everything.


hackaday.com/2026/02/20/displa…

Panoramic Film Camera Made from 3D Printed Parts


The media in this post is not displayed to visitors. To view it, please log in.

Even though digital cameras have lowered the barrier of entry to photography dramatically, as well as made it much easier for professionals and amateurs alike to capture stunning images without the burden of developing film, the technology behind them is considerably more complex than their analog counterparts. In fact, an analog film camera (not counting the lens) can be as simple as a lightproof box and a way to activate a shutter. Knowing that, any kind of film camera could be built for any number of applications, like this 3D-printed panoramic camera from [Denis Aminev].

The custom-built camera works by taking a standard roll of 35mm film, which is standardized to take 36 pictures, and exposing a wider section of the film to create a panorama. This reduces the number of pictures on the roll to 19. This is the fifth version of this camera, called the Infidex 176 V, and has everything a standard film camera would have, from an exposure counter, pressure plate for the film, a winder, interchangable lenses, a viewfinder, and a tripod mounting point. It does take a bit of work to assemble, as shown in the video linked below, but the final result is impressive and delivers a custom finished product not easily found or reproducible in off-the-shelf cameras.

The path to creating this camera was interesting as well, as [Denis]’s first custom film camera was a pinhole camera. From there he moved on to disassembling an SLR camera and attempting to reproduce all of its parts with 3D printed ones. With that in hand, he was able to modify this design into this panoramic camera which he likes because it reproduces the feel of widescreen movies. Although this camera reproduces all of the bells and whistles of a high quality analog camera, not all of these features are strictly necessary for taking pictures on film. Have a look at this minimum viable camera as well.

youtube.com/embed/zv_Ho8Yjjiw?…


hackaday.com/2026/02/20/panora…

Cybersecurity & cyberwarfare ha ricondiviso questo.

#PayPal discloses extended data leak linked to Loan App glitch
securityaffairs.com/188309/sec…
#securityaffairs #hacking

Porting Super Mario 64 To the Original Nintendo DS


The media in this post is not displayed to visitors. To view it, please log in.

Considering that the Nintendo DS already has its own remake of Super Mario 64, one might be tempted to think that porting the original Nintendo 64 version would be a snap. Why you’d want to do this is left as an exercise to the reader, but whether due to nostalgia or out of sheer spite, the question of how easy this would be remains. Correspondingly, [Tobi] figured that he’d give it a shake, with interesting results.

Of note that is someone else already ported SM64 to the DSi, which is a later version of the DS with more processing power, more RAM and other changes. The reason why the 16 MB of RAM of the DSi is required, is because it needs to load the entire game into RAM, rather than do on-demand reads from the cartridge. This is why the N64 made do with just 4 MB of RAM, which is as much RAM as the ND has. Ergo it can be made to work.

The key here is NitroFS, which allows you to implement a similar kind of segmented loading as the N64 uses. Using this the [Hydr8gon] DSi port could be taken as the basis and crammed into NitroFS, enabling the game to mostly run smoothly on the original DS.

There are still some ongoing issues before the project will be released, mostly related to sound support and general stability. If you have a flash cartridge for the DS this means that soon you too should be able to play the original SM64 on real hardware as though it’s a quaint portable N64.

youtube.com/embed/k1qQSgDAo0I?…


hackaday.com/2026/02/20/portin…