Cheap Smart Ring Becomes MIDI Controller


The media in this post is not displayed to visitors. To view it, please log in.

The Colmi R02 is one of the cheapest smart rings on the market. It costs about $20, and is remarkably easy to hack. [Floyd Steinberg] took advantage of this to turn it into a rather unique MIDI controller.

What makes the Colmi R02 somewhat unique is that the manufacturer did not try to lock out users from uploading their own firmware. You don’t even really need to “hack” it, since there is no code signing or encryption. You can just whip up your own firmware to make it do whatever you want.

To that end, [Floyd] set up the ring to act as a device for musical expression. When connected to a computer over Bluetooth, data from the ring’s accelerometer is converted into MIDI CC commands via a simple web app. The app allows the MIDI messages to be configured so they can control whatever parameter is desired. [Floyd] demonstrates the ring by using it to control filter cutoff frequencies on an outboard synthesizer, with great effect.

You could theoretically just strap an accelerometer to your hand with a microcontroller and achieve similar operation. However, the magic of this is that it costs only $20 and it’s already in a form factor that’s optimized for wearing on your finger. It’s hard to beat that.

Files are on GitHub for those eager to experiment. We’ve previously featured some hacks of this particular smart ring, too, with [Aaron Christophel’s] efforts directly inspiring this work.

youtube.com/embed/0aNxuAbEwvM?…


hackaday.com/2026/01/31/cheap-…

Secret Ingredients


The media in this post is not displayed to visitors. To view it, please log in.

We were talking on the podcast about rope. But not just any rope – especially non-stretchy rope for using in a mechanical context. The hack in question was a bicycle wheel that swapped out normal metal spokes for lighter and stronger high-density polypropylene weave, and if you can tension up a bike wheel and ride it around, you know it’s not your garden-variety twine.

Now, it just so happens that I’ve got basically the same stuff in my parts drawer: some 1 mm diamaeter Dyneema-brand rope. This is an amazing material. It’s rated to a breaking strength of 195 kg (430 lbs) yet it weighs just under one gram per meter, and if you buy the pre-stretched variant, it’s guaranteed to stretch less than 1% of its length under load. It’s flexible, wears well, and is basically in every way superior to braided steel wire.

It’s nearly magical, and it’s just what you need if you’re making a cable robot or anything where the extreme strength and non-elongation characteristic are important. It’s one of those things that there’s just no substitute for when you need it, and that’s why I have some in my secret-ingredients drawer. What else is in there? Some high-temperature tape, low-temperature solder, and ultra-light-weight M3 PEEK screws for airplane building.

But our conversation got me thinking about the parts, materials, and products that are unique: for which there is just no reasonable substitute. I’m sure the list gets longer the more interesting projects or disciplines that you’re into. What are your secret ingredients, and what’s the specific niche that they fit into?

This article is part of the Hackaday.com newsletter, delivered every seven days for each of the last 200+ weeks. It also includes our favorite articles from the last seven days that you can see on the web version of the newsletter. Want this type of article to hit your inbox every Friday morning? You should sign up!


hackaday.com/2026/01/31/secret…

Playing YouTube From The Command Line


The media in this post is not displayed to visitors. To view it, please log in.

Generally, one opens a web browser or an app to use YouTube. However, if you’re looking to just listen to the audio, you can actually do that right from the terminal. You just need Shellbeats from [lalo-space].

Shellbeats is primarily intended for playing music from YouTube, and is well equipped for this task. It allows searching YouTube directly from the terminal, as well as streaming tracks or entire playlists from the command line interface. You can also make and edit playlists from within the tool, and even download the whole lot as MP3s if so desired. It’s all keyboard-operated and nicely lightweight. The overall experience isn’t dissimilar from operating a simple LCD-based MP3 player from 20 years ago.

There’s plenty of other fun stuff you can do in the terminal, too, as we’ve explored previously. If you’re working on your own media player hacks, be sure to notify us on the tipsline!


hackaday.com/2026/01/31/playin…

Surviving the RAM Price Squeeze With Linux In-Kernel Memory Compression


The media in this post is not displayed to visitors. To view it, please log in.

Swissbit 2GB PC2-5300U-555

You’ve probably heard — we’re currently experiencing very high RAM prices due mostly to increased demand from AI data centers.

RAM prices gone up four times

If you’ve been priced out of new RAM you are going to want to get as much value out of the RAM you already have as possible, and that’s where today’s hack comes in: if you’re on a Debian system read about ZRam for how to install and configure zram-tools to enable and manage the Linux kernel facilities that enable compressed RAM by integrating with the swap-enabled virtual memory system. We’ve seen it done with the Raspberry Pi, and the concept is the same.

Ubuntu users should check out systemd-zram-generator instead, and be aware that zram might already be installed and configured by default on your Ubuntu Desktop system.

If you’re interested in the history of in-kernel memory compression LWN.net has an old article covering the technology as it was gestating back in 2013: In-kernel Memory Compression. For those trying to get a grip on what has happened with RAM prices in recent history, a good place to track memory prices is memory.net and if you swing by you can see that a lot of RAM has gone up as much as four times in the last three or four months.

If you have any tips or hacks for memory compression on other platforms we would love to hear from you in the comments section!


hackaday.com/2026/01/31/surviv…

Cybersecurity & cyberwarfare ha ricondiviso questo.

DOJ release details alleged talented hacker working for Jeffrey #Epstein
securityaffairs.com/187515/law… #hacking
Cybersecurity & cyberwarfare ha ricondiviso questo.

DK 10x19_ - Post-americani (La versione di Carney). Puntatona di @DataKnightmare

Quando un uomo dell'establishment come Mark Carne, PM del Canada, va a Davos a dire cose che sentivi al massimo in qualche facoltà di Scienze Politiche, vuol dire che l'era post-americana è cominciata. Sarà un viaggio.

spreaker.com/episode/dk-10x19-…

@informatica

in reply to filippodb ⁂

@filippodb Questa è una schermata di un'interfaccia di chat che mostra una conversazione. In alto si vede un utente chiamato "dansup" con un timestamp "11:21". Sotto, c'è una sezione di risposta: “In risposta a” (in italiano “In risposta a”), seguito da “Ricardo Ferrer Rivero”. Ricardo Ferrer Rivero è un nome utente, e dansup chiede “per quanto tempo sarà spento il processo di importazione di Instagram?”. La risposta afferma: “Instagram ha cambiato nuovamente il formato di esportazione, quindi sto lavorando per aggiornare la logica di importazione in modo da poterla ripristinare, e anche rifattorizzarla per renderla più facile da importare tutto in una volta”. L'interfaccia ha uno sfondo scuro con avatar degli utenti accanto ai nomi.

Fornito da @altbot, generato localmente e privatamente utilizzando Qwen3-Vl:30b

🌱 Energia utilizzata: 0.105 Wh

in reply to filippodb ⁂

@filippodb @amministratore @dajelinux e scriverlo nelle faq/help?

Si vede che nessuno ha più interesse a mantenere un progetto del genere.
Peccato, non solo per l'import - che cmq, pure usando un vecchio export (2024) non va - ma anche per la cura e l'attenzione.

Se se ne fregano loro, figurati io.
Chiuso tutto e buonanotte.

in reply to Claudia

So che non può essere una giustificazione, ma qui si tratta di software tenuto in piedi da sviluppatori indipendenti, per di più con eventuali ulteriori criticità in base alla specifica istanza.

Sicuramente Mastodon è più maturo di Pixelfed, ma non si può pretendere di arrivare ai livelli delle grandi software house.

Per quello che vedo io (ma la mia visione può essere opinabile, o parzialmente "di parte"), in generale vengono offerti servizi forse imperfetti, ma "umani".

in reply to Giacomo Tesio

@giacomo @dajelinux certo, potrei aprire istanze diverse da sola, amministrarle e gestirle.

Ho però un lavoro che mi assorbe molto e non sarei in grado di mantenere lo standard che mi piacerebbe trovare altrove, subappaltando a persone che non starebbero dietro come vorrei.
Quindi mi rivolgo a chi fornisce già un servizio, a chi ha più esperienza di me in questo campo (management delle istanze) e a chi ha già un'infrastruttura collaudata.

Però è un'idea, Giacomo.
Ne parlo a Fabio, magari ne facciamo una ad hoc, l'istanza "longevity matters" 😉

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

🚨 La sicurezza “temporanea” 🚨

#redhotcyber #online #it #web #ai #hacking #privacy #cybersecurity #cybercrime #intelligence #intelligenzaartificiale

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

I tool per di Red team si evolvono: l’open source entra in una nuova fase

📌 Link all'articolo : redhotcyber.com/post/i-tool-pe…

#redhotcyber #news #penetrationtesting #sicurezzainformatica #cybersecurity #testingdisicurezza

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Ok, non ho resistito.. ho reinstallato ClawdBot e ho fatto iscrivere il mio agent a MoltBook.

È come la versione Ghost In the Shell del Tamagotchi, solo che funziona da solo e potrebbe parlare male di te.

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Addio a NTLM! Microsoft verso una nuova era di autenticazione con kerberos

📌 Link all'articolo : redhotcyber.com/post/addio-a-n…

Per oltre tre decenni è stato una colonna silenziosa dell’ecosistema Windows. Ora però il tempo di NTLM sembra definitivamente scaduto.

Microsoft ha deciso di avviare una transizione profonda che segna la fine di un’era e l’inizio di un nuovo #modello di #autenticazione più sicuro. NTLM, acronimo di New Technology #LAN Manager, nasce nel 1993 come uno dei primi #sistemi di #autenticazione basati su password sviluppati da #Microsoft.

A cura di Silvia Felici

#redhotcyber #news #microsoft #ntlm #sicurezzainformatica #protocollodiautenticazione #password #cybersecurity #hacking #malware #ransomware #sicurezzadigital #transizioneinformatica #protezionedeidati

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

❌ SE PENSI CHE UN FIREWALL BASTI, QUESTO CORSO NON FA PER TE. ❌

Se invece vuoi capire:
✅ come ragiona un attaccante
✅ perché certi sistemi cadono sempre
✅ cosa c’è prima del pentest
allora sei nel posto giusto.

🔥 Cyber Offensive Fundamentals – Live Class

40 ore. Live. Niente scorciatoie.

🔗 Programma: redhotcyber.com/linksSk2L/cybe…
🎥 Intro del prof: youtube.com/watch?v=0y4GYsJMoX…

💎 Prima edizione = prezzo irripetibile
⛔ Numero chiuso

Per info e iscrizioni: 📞 379 163 8765 ✉️ formazione@redhotcyber.com

#redhotcyber #formazione #pentesting #pentest #formazionelive #ethicalhacking #hacking #cybersecurity #penetrationtesting #cti #cybercrime #infosec #corsi #liveclass #hackerhood #pentesting

Cybersecurity & cyberwarfare ha ricondiviso questo.

Cyberattacks Disrupt Communications at Wind, Solar, and Heat Facilities in Poland
securityaffairs.com/187503/apt…
#securityaffairs #hacking #Poland #Rusia

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

🚨 WalutaTu car valuation platform hit by data breach

Italian car valuation platform WalutaTu suffered a data breach with customer data allegedly exposed on dark web forums.

#ransomNews #databreach #automotive

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Azienda italiana all’asta nel Dark Web: bastano 1.500 dollari per il controllo totale

📌 Link all'articolo : redhotcyber.com/post/azienda-i…

#redhotcyber #news #cybercrime #mercatonero #trasformazionedigitale #cybersecurity #hacking #ransomware

Cybersecurity & cyberwarfare ha ricondiviso questo.

🔎 The AI social network risk nobody is watching

AI-driven social networks amplify manipulation, data harvesting and behavioral profiling. Algorithmic feedback loops, opaque models and weak governance could turn AI platforms into large-scale influence and surveillance systems.

We’ve dissected a bit, over the rising #ClawBot phenomenon: ransomnews.online/blog/theaiso…

#ransomNews #ai #socialmedia

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Sistemi SCADA a rischio: perché la sicurezza del file system conta più che mai

📌 Link all'articolo : redhotcyber.com/post/sistemi-s…

#redhotcyber #news #sicurezzainformatica #cybersecurity #vulnerabilita #scadasicurezza #iconicsvulnerabilità

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Vulnerabilità critica in Apache bRPC: esecuzione di comandi arbitrari sul server

📌 Link all'articolo : redhotcyber.com/post/vulnerabi…

Un team di ricerca di #CyberArk Labs ha individuato una falla critica nel diffuso #framework Apache bRPC, che permette l’esecuzione remota di comandi su un #server. Il problema di #sicurezza è stato classificato con l’identificatore CVE-2025-60021 e un livello di gravità pari a 9,8 secondo la scala #CVSS.

A cura di Bajram Zeqiri

#redhotcyber #news #cyberattack #cybersecurity #hacking #vulnerabilita #apache #brpc #sicurezzainformatica #ciberattacchi #vulnerabilitaapertura #protezioneinformatica #safetyinformatica #malware

Crouching Typewriter, Hidden PC


The media in this post is not displayed to visitors. To view it, please log in.

The finished product

Go back a couple of generations, and rather than a laptop or a luggable, the office accessory of choice was a portable typewriter. As the 20th century wore on, the typewriter became electric before eventually being eclipsed by luggable and laptop computers. On YouTube, [Prototype] is turning back the clock, by turning an old Smith-Corona electric typewriter into a luggable computer– with a stretch goal of still being able to type.

Yeah, just gutting the typewriter and shoving an SBC inside wasn’t ambitious enough for [Prototype]: his goal is a working typewriter and an x86 gaming PC. To facilitate this, he guts the Smith-Corona keyboard, and 3D-prints a new top plate to add a little more vertical space in the old typewriter. The new top does recreate the original layout and the Corona switches get printed adapters to fit them to mechanical switches [Prototype] is using with a vibe-coded Arduino. Why one would bother with ChatGPT when QMK is right there, we could not say, but feel free to skip 6:20 to 15:00 if you’re watching the video but want to avoid that side quest.

Unfortunately, the “get the keyboard working” side-quest is either faked or deferred to video part II, which has not been posted yet. In this video he demonstrates that he can actuate a single hammer with a servo, but that’s a far cry from a working typewriter so, we’re really hoping he comes through on that promise in Part Two. Even if the build stops with just one hammer, that would give the tactile sound-and-feel that other builds turn to solenoids for. Squeezing a small-form-factor motherboard and graphics card into the old Smith-Corona is also going to be an interesting challenge. It’s certainly going to be a step up from using the keyboard as a terminal.

If you like this project but balk at the idea of destroying a working piece of vintage office equipment, it is possible to turn a typewriter into a USB keyboard non-invasively.

If you like this project at all, join us in thanking [Katie] for the tip. Not your cup of tea? Tell us what is, with a tip of your own.

youtube.com/embed/Bgk944awGcQ?…


hackaday.com/2026/01/30/crouch…

Writing an Optimizing Tensor Compiler from Scratch


The media in this post is not displayed to visitors. To view it, please log in.

Not everyone will write their own optimizing compiler from scratch, but those who do sometimes roll into it during the course of ever-growing project scope creep. People like [Michael Moroz], who wrote up a long and detailed article on the why and how. Specifically, a ‘small library’ involving a few matrix operations for a Unity-based project turned into a static optimizing tensor compiler, called TensorFrost, with a Python front-end and a shader-like syntax, all of which is available on GitHub.

The Python-based front-end implements low-level NumPy-like operations, with development still ongoing. As for why Yet Another Tensor Library had be developed, the reasons were that most of existing libraries are heavily focused on machine learning tasks and scale poorly otherwise, dynamic flow control is hard to implement, and the requirement of writing custom kernels in e.g. CUDA.

Above all [Michael] wanted to use a high-level language instead of pure shader code, and have something that can output graphical data in real-time. Taking the gamble, and leaning on LLVM for some parts, there is now a functional implementation, albeit with still a lot of work ahead.


hackaday.com/2026/01/30/writin…

Need a Curved Plastic Mesh? Print Flat, Curve Later


The media in this post is not displayed to visitors. To view it, please log in.

Need a plastic mesh in a custom pattern? 3D print it, no problem. But what if one needs a curved plastic mesh? That’s considerably harder to 3D print, but [Uncle Jessy]’s figured out a simple approach: 3D print the mesh flat, then break out a mold and a heat gun.

Of course, there are a few gotchas, but [Uncle Jessy] shares his tips for getting the most reliable results. The important part is to design and 3D print a mold that represents the final desired shape. Then print the mesh, and fit it into a frame. Heat things up with a heat gun, and press into the mold to deform the mesh while it’s still soft. It’s much easier seen than explained, so take a few moments to check out the video, embedded below the page break.
Custom eye inserts become a breeze.
Because the plastic in a mesh is so thin, [Uncle Jessy] says to keep the heat low and slow. The goal is to have the mesh stretch and deform, not melt.

Speaking of heat, when thermoforming, one usually needs to make the mold out of heat-resistant material. But the thermal mass of a mesh is so small that it really doesn’t matter much — there just isn’t enough heat trapped in the mesh to really damage a mold. As long as the mold is reasonably dense, there’s no need to go overboard with making it heat resistant.

The whole process takes a little practice, but since the meshes are so fast to print and use so little plastic it’s easy to experiment a little.

As for the meshes themselves, a simple way to print a mesh is just to print a disc with no top or bottom layers, only infill. Set the infill pattern to honeycomb, for example, for an easy hexagon mesh. We’ve seen a variant of this “exposed infill” idea used to create a desiccant container, and using it to print a mesh pattern easily is a neat trick, too.

Why might one need to reshape a mesh into a curve? Perhaps to custom-fit a costume piece, or make custom eye inserts for masks, as shown here. In any case, it’s a good technique to keep in the back of one’s mind, and if you put it to good use, drop us a tip!

youtube.com/embed/TsG89NgZJO8?…


hackaday.com/2026/01/30/need-a…

Ordering Pizza On Your Sega Dreamcast Is Very Clunky Indeed


The media in this post is not displayed to visitors. To view it, please log in.

If you’re ordering pizza these days, you’re probably using a smartphone app or perhaps still making a regular old phone call. If you’re creative and a little bit tricky, though, you can order pizza right from your Sega Dreamcast. You just need to jump through a few hoops, as demonstrated by [Delux] and [The Dreamcast Junkyard] in the recent past.

You used to be able to order pizza on the Dreamcast natively, all the way back in 1999. However, the modern Domino’s website doesn’t really work on the ancient Dreamcast browser anymore. The simple fact is that web technology has advanced a long way in the last couple of decades, and Sega didn’t exactly spend a lot of time maintaining a browser on a console that died mere months after its rivals hit the market.

Thus, to place a pizza order on the Dreamcast these days, you need to work within its limitations. [Delux] uses the Dreamcast with the Broadband Adapter to access a PC on the local network via the XDP web browser. That PC is hosting Web Rendering Proxy, a tool which converts complicated modern websites into something a simpler machine can parse. From there, it’s a matter of connecting to the Domino’s website, and slowly clicking through the online ordering pages. Between the proxy delay, the Dreamcast’s glacial processing speed, and the clunky Domino’s ordering interface, it takes ages. Never before has adding coupons felt like such a hassle. Still, after 15 minutes of fuss, the order is completed… and a short time later, a hot fresh pizza arrives.

It’s a fun hack, but really it’s the PC running the proxy that’s doing the heavy lifting. In 2026, it’s far more elegant to order a pizza from your Nintendo Wii.

youtube.com/embed/dEMqq7-8K5s?…


hackaday.com/2026/01/30/orderi…

Do Expensive Filaments Make 3D Printed Wrenches Better?


The media in this post is not displayed to visitors. To view it, please log in.

What filament is strongest? The real answer is “it depends”, but sometimes you have a simple question and you just want a simple answer. Like, which material makes the best 3D printed wrench? [My Tech Fun] printed a bunch of options to find out — including some expensive filaments — and got some interesting insights in the process.

His setup is simple: he printed a bunch of 13 mm open-end wrenches, and tested each one to failure by cranking on a clamped digital torque meter until the wrench failed by breaking, or skipping.

[My Tech Fun] tested a total of eighteen filaments, from regular basic PLA, PETG, ABS and ASA, and a variety of carbon fiber-infused filaments including PPA-CF. TPU is included for fun, and there’s also a wrench printed with continuous carbon fiber, which requires a special printer. More on that in a moment. First, let’s get to the results!
PETG wrench reinforced with continuous carbon fiber. The result is extremely stiff compared to without.
Unsurprisingly, TPU fared the worst at 0.8 nM which is roughly “unscrewing the cap of a water bottle” territory. Top performers included the wrench printed with continuous carbon fiber reinforcement (failing at 3.7 nM) and a couple printed in expensive PPA-CF (high-temperature nylon filament with carbon fiber) topped the list at 4.3 nM. Everything else landed somewhere in between, with plain PLA surprisingly outperforming some CF blends.

The continuous carbon fiber wrench was printed on a FibreSeeker printer, which reinforces a print with solid fibers embedded into the plastic instead of chopped particles, and such prints are noticeably more resistant to bending. Check out our earlier coverage for a closer look at what the FibreSeeker does.

This is a good time to mention that the wrench 3D model used is not at all optimized for best results with 3D printing. But that’s okay; this is really about the filaments, not the wrench.

The wrench model is just a way to test things in a familiar and highly visual, relatable way. You can see each one in action in the video below, and seeing [My Tech Fun] turn the wrenches gives a very good idea of just how much force is involved, with a relatable display of just how strong the different filaments are.

youtube.com/embed/b2a1h-bc2Zw?…


hackaday.com/2026/01/30/do-exp…

Cybersecurity & cyberwarfare ha ricondiviso questo.

Ex alleato avverte che il declino di Trump è "significativo" dopo il discorso disastroso

L'ex avvocato della Casa Bianca Ty Cobb ha affermato che il declino cognitivo di Donald Trump è "palpabile".

newrepublic.com/post/205474/do…

@politica

Cybersecurity & cyberwarfare ha ricondiviso questo.

Secondo un rapporto, gli hacker russi hanno violato la rete elettrica polacca a causa della scarsa sicurezza.

Venerdì, il Computer Emergency Response Team (CERT) polacco, che fa parte del Ministero degli Affari Digitali, ha pubblicato un rapporto tecnico su un incidente avvenuto alla fine dello scorso anno, in cui presunti hacker del governo russo hanno hackerato parchi eolici e solari e una centrale termoelettrica.

techcrunch.com/2026/01/30/russ…

@informatica

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

Sei senatori accusano il vice procuratore generale di un conflitto “evidente” sulle criptovalute, citando l’indagine di ProPublica

I senatori hanno presentato una lettera chiedendo al funzionario di alto livello del Dipartimento di Giustizia, Todd Blanche, di chiarire la legalità delle sue azioni, facendo riferimento al rapporto di ProPublica secondo cui possedeva almeno 159.000 dollari in asset correlati quando ha chiuso le indagini sulle criptovalute.

propublica.org/article/todd-bl…

@politica

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

Le aziende dell'euro devono abbandonare il cloud dello Zio Sam e diventare native dell'UE

Nell'era di Trump-redux del 2026, le aziende europee stanno finalmente prendendo sul serio i dati, e questo significa fare i bagagli da Redmond a Seattle e trasferire i carichi di lavoro più sensibili a casa. Non si tratta solo di una messa in scena di conformità; è una vera e propria messa in scena di sicurezza economica nazionale.

theregister.com/2026/01/30/eur…

@politica

Questa voce è stata modificata (2 mesi fa)
Cybersecurity & cyberwarfare ha ricondiviso questo.

L'EFF chiuderà venerdì in solidarietà con la chiusura nazionale

@eff rimarrà chiusa venerdì 30 gennaio nell'ambito della chiusura nazionale in segno di protesta contro ICE e CBP e contro la brutalità e il terrore che loro e altre agenzie federali continuano a infliggere alle comunità di immigrati e a chiunque si schieri con loro.

«Non prendiamo questa decisione alla leggera, ma non resteremo in silenzio.»

eff.org/deeplinks/2026/01/eff-…

@politica

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

NEW: An informant told the FBI in 2017 that Jeffrey Epstein had a "personal hacker," according to a document released today.

The document does not name the hacker, but says he is Italian, developed and sold zero-days (iOS and Blackberry) to governments such as the U.K. and the United States, and even Hezbollah, which paid him with “a trunk of cash.”

techcrunch.com/2026/01/30/info…

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

I just bought a whole new server for the Geomys transparency services (CT log, tlog witness with SLA, more soon) using “PayPal Check out” and for some reason it was extremely funny to me.

Hackaday Podcast Episode 355: Person Detectors, Walkie Talkies, Open Smartphones, and a WiFi Traffic Light


The media in this post is not displayed to visitors. To view it, please log in.

Another chilly evening in Western Europe, as Elliot Williams is joined this week by Jenny List to chew the fat over the week’s hacks.

It’s been an auspicious week for anniversaries, with the hundredth since the first demonstration of a working television system in a room above a London coffee shop. John Logie Baird’s mechanically-scanned TV may have ultimately been a dead-end superseded by the all-electronic systems we all know, but the importance of television for the later half of the 20th century and further is beyond question.

The standout hacks of the week include a very clever use of the ESP32’s WiFi API to detect people moving through a WiFi field, a promising open-source smartphone, another ESP32 project in a comms system for cyclists, more cycling on tensegrity spokes, a clever way to smooth plaster casts, and a light sculpture reflecting Wi-Fi traffic. Then there are a slew of hacks including 3D printed PCBs and gem-cut dichroic prisms, before we move to the can’t-miss articles. There we’re looking at document preservation, and a wallow in internet history with a look at the Netscape brand.

As usual all the links you need can be found below, so listen, and enjoy!

html5-player.libsyn.com/embed/…

Or download the podcast old-school, with a direct link to the MP3 file in question.

Where to Follow Hackaday Podcast

Places to follow Hackaday podcasts:



Episode 354 Show Notes:

What’s that Sound?



News



Interesting Hacks of the Week:



Quick Hacks:



Can’t-Miss Articles:



hackaday.com/2026/01/30/hackad…

Whipping Up A Quick Adapter To Hack The Xbox 360


The media in this post is not displayed to visitors. To view it, please log in.

[Androxilogin] had a problem. An Xbox 360 Slim had shown up in the post, but failed to give much more than a beep when turned on. Disassembly revealed some missing components, but replacing them failed to breathe life into the beleaguered console. Deeper repair was needed, and that would require a special adapter which [Androxilogin] was able to whip up from scratch.

When it comes to the Corona models of the Xbox 360, it’s often necessary to use something called a “post-fix adapter” to do certain diagnostic and repair tasks. These adapters consist of a bracket which wraps around the CPU, and probes the solder ball for the POST_OUT signal which is otherwise difficult to access on the motherboard itself. Adapters are readily available online, and are usually manufactured as a PCB with a protruding contact to make a connection.

For [Androxilogin], though, time was short. Rather than wait for adapters to ship, it was quicker to whip up a custom piece to do the same job. This was achieved with a 3D print which was able to clamp around the CPU, while snugly holding a piece of tinned 30 AWG wire to poke the critical point beneath the chip. After a couple of attempts to get the sizing just right, [Androxilogin] was able to make the necessary connection which enabled installing Xell Loader on to the machine to bring it back to life.

If you’re eager to make your own post-fix adapter, files are available on Printables, with more details over on Reddit to boot. While the Xbox 360 is starting to suffer some awkward symptoms of age. we nevertheless still see a steady stream of hacks come in for this vintage machine. If you’re tackling your own retro console mods, be sure to notify the tipsline.


hackaday.com/2026/01/30/whippi…

Building Natural Seawalls To Fight Off The Rising Tide


The media in this post is not displayed to visitors. To view it, please log in.

These days, the conversation around climate change so often focuses on matters of soaring temperatures and extreme weather events. While they no longer dominate the discourse, rising sea levels will nonetheless still be a major issue to face as global average temperatures continue to rise.

This poses unique challenges in coastal areas. Municipalities must figure out how to defend their shorelines, or decide which areas they’re willing to lose. The City of Palo Alto is facing just this challenge, and is building a natural kind of seawall to keep the rising tides at bay.

Seawalls That Breathe


The traditional way to fight back against the sea is with seawalls. These typically consist of steep slopes constructed on the shoreline, which are designed to reflect wave energy back to the sea and stop it from eating away at the land. They are normally built using rocks, steel, or concrete walls to dissipate the energy of incoming waves. They are typically simple to design and construct, and prove relatively effective at staving off erosion. However, they can also be quite imposing and unsightly, and often do very little to support native fauna and flora.
The horizontal levee design (left) compared to a traditional rock-based seawall (right). The latter is simpler and quicker to construct, but is far less visually appealing and does little to support the local ecosystem. Credit: City of Palo Alto
The City of Palo Alto is taking an altogether different approach by building a horizontal levee to protect the shore of Harbor Marsh. It eschews the usual steeply sloped seawall concept entirely. Instead, the coast is to be given a gentle gradient constructed of earth, creating a so-called “ecotone slope”—a long, sloping habitat down to the water line. Where the tide meets the shore, native plantings will support a tidal marsh, transitioning to a freshwater marsh with different plants farther up the slope, with volunteers planting 35 species in all. It’s hoped that restoring these habitats in the area will provide support to species like the Ridgway’s rail and the salt marsh harvest mouse.
Wastewater is used to support the growth of native plant species, helping to create the transition between the freshwater marsh and the tidal marsh along the “ecotone slope.” Credit: City of Palo Alto
Furthermore, from the top of the horizontal levee, wastewater will be fed in to support the growth of native plants, which will work with the soil to filter out pollutants as it makes its way to the sea in a process referred to as “polishing treatment”. It’s not intended to remove heavy pollutants from the water; this work is handled at existing municipal water treatment facilities. What the levee can handle is soaking up some of the nitrogen and phosphorous content to support plants on the slope. This reduces the amount of these nutrients that gets released out into the bay, which can cause fish die-offs, algal blooms, and other undesirable consequences.
Volunteers came together to plant native species on the horizontal levee. Construction is expected to be completed by summer this year. Credit: City of Palo Alto
Due to its limited size, the horizontal levee will only handle 100,000 gallons of wastewater per day, which isn’t much against the 20 million gallons that currently flows out into the bay. Ultimately, that’s because the work at Harbor Marsh is a pilot project for the City of Palo Alto. Ideally, it will prove effective in both limiting coastal erosion as well as supporting native plants and animals. If it proves successful, it could become a strategy used elsewhere along the San Francisco coastline and beyond. The Bay Area as a whole needs to be protected against rising sea levels, as the name implies, so projects like this are a key focus as authorities plan for the future.

As it stands, large artificial seawalls probably aren’t going anywhere. It’s very straightforward to build massive concrete and steel structures to defend a piece of coastline. The engineering involved is well understood, and the construction process does not require particular finesse in the selection of plants or the maintenance of native habitats. However, in areas where it’s desirable to slow erosion in a greener fashion, horizontal levees could become popular. After all, it’s a lot nicer to stroll on a path alongside a burgeoning native marshland than it is to feel the sun bouncing off acres of harsh concrete. If the Harbor Marsh experiment works, expect to see similar projects take off in coastal areas around the world.


hackaday.com/2026/01/30/buildi…

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Aperti i battenti del primo negozio di robot umanoidi al mondo in Cina. Saremo pronti?

📌 Link all'articolo : redhotcyber.com/post/aperti-i-…

#redhotcyber #news #robotumanoidi #negozidelfuturo #assistenzarobot #intrattenimentorobot #wuhan

Cybersecurity & cyberwarfare ha ricondiviso questo.

NEW: Russian government hackers were able to break into parts of Poland's energy infrastructure thanks to default usernames and passwords and no multi-factor authentication, the Polish government said in a report.

facepalm.gif

techcrunch.com/2026/01/30/russ…

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

Gli Stati Uniti hanno indagato sulle affermazioni secondo cui le chat di WhatsApp non sono private

Secondo alcune interviste e il rapporto di un agente visionati da Bloomberg News, le forze dell'ordine statunitensi stanno indagando sulle accuse mosse da ex collaboratori di Meta Platforms Inc. secondo cui il personale di Meta potrebbe accedere ai messaggi di WhatsApp, nonostante l'azienda abbia dichiarato che il servizio di chat è privato e crittografato.

finance.yahoo.com/news/us-inve…

@informatica

in reply to informapirata ⁂

chat private quelle di whatsapp? Per fortuna non sono più su meta (facebook) e uso WA solo per comunicazioni spicce con persone poco tecnologiche. Ma guarda caso anni fa ogni volta che partecipavo a una podistica, arrivavano sempre su meta pubblicità di attrezzature per la corsa. Secondo te da dove le pigliavano visto che su facebook non ho praticamente mai condiviso cosa come dove quando di sport? Mi sono risposta da sola pensando a whatsapp.
Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Azienda automotive italiana nel mirino degli hacker: in vendita l’accesso per 5.000 dollari

📌 Link all'articolo : redhotcyber.com/post/azienda-a…

#redhotcyber #news #cybersecurity #hacking #automotive #sicurezzainformatica #venditaaccesso

Comprehensive Power Management for the Raspberry Pi


The media in this post is not displayed to visitors. To view it, please log in.

The Raspberry Pi has been a revolutionary computer in the maker space, providing a full Linux environment, GUI, and tons of GPIO and other interfacing protocols at a considerably low price. This wasn’t its original intended goal, though. Back in the early 2010s it was supposed to be an educational tool for students first, not necessarily a go-to for every electronics project imaginable. As such there are a few issues with the platform when being used this way, and [Vin] addresses his problems with its power management in his latest project.

[Vin]’s main issue is that, unlike a microcontroller, the Raspberry Pi doesn’t have a deep sleep function. That means that even when the operating system is shut down the computer is still drawing an appreciable amount of current, which will quickly drain some batteries. We’ve covered [Vin]’s farm and his use case for the Raspberry Pi in the past, but a quick summary is that these boards are being used in a very rugged environment where utility power isn’t as reliable as he would like.

In [Vin]’s post he not only outlines his design for the board but goes through his design process, starting by using discrete logic components and then trying out various microcontrollers until settling on an ATmega88. The microcontroller communicates with the Raspberry Pi over I2C where the Pi can request a power-down as well as a time for future power-on. A latching relay controlled by the microcontroller ensures the Pi doesn’t drain any battery while the ATmega can put itself into actual sleep in the meantime.

The build for this project goes into an impressive amount of detail, and not only are the designs and code available on the project’s GitHub page but [Vin] also wrote another blog post which uses this project to go over his design philosophy more broadly.


hackaday.com/2026/01/30/compre…