Il momento straussiano
Palantir è il nuovo potere della sorveglianza globale. Anche i Servizi Segreti francesi hanno ammesso di usarne tecnologia e capacità di analisi. E lo fanno pure la Ferrari, Stellantis, il Policlinico Gemelli in Italia.
I software di Palantir sono in uso anche all’esercito israeliano. Il suo board nel 2024 ha tenuto una seduta del consiglio di amministrazione a Tel Aviv in segno di solidarietà dopo l’attacco terroristico del 7 ottobre 2023.
Ma che cos’è Palantir? Palantir è la nuova macchina del potere americano creata da Peter Thiel, il magnate che ha fondato l’azienda prendendone il nome dalla saga del Signore degli Anelli. Palantir è l’occhio che tutto vede e che nella saga consente ai cattivi di intimidire, trovare e punire, non i cattivi, ma i buoni della storia, cioè la famosa compagnia dell’Anello.
Nella prospettiva di Thiel e di Alex Karp, attuale Ceo di Palantir, però è tutto rovesciato. L’occhio che tutto vede, cioè i suoi software Gotham e Foundry, potenziati dal coordinamento di una terza piattaforma, Apollo, e dall’intelligenza artificiale IAP, sono gli strumenti della nuova sorveglianza che sovrintende alla macchina da guerra americana e degli eserciti che se lo possono permettere. Come quello di Israele.
Palantir è una macchina indifferente all’etica e alla morale occidentale e illuministica.
Dopo alcuni servizi giornalistici sappiamo che Palantir, vende dati per fare la guerra. E poi li usa per foraggiare il suo spin off, Anduril, azienda dedicata alla produzione di IA e droni da combattimento.
Ma è solo nel libro «Il momento straussiano» che capiamo perché Peter Thiel, tecnologo, gay, cattolico, conservatore, con Palantir si sia definitivamente sganciato dalla retorica di benessere, progresso e uguaglianza prodotta dall’immaginifica
industria della Silicon Valley negli ultimi 30 anni fino a farla ribaltare nelle sue convinzioni più profonde, un tempo basate sul «don’t be evil» (non fare il male).
Nel libro Thiel lo spiega. E quello che dice fa venire i brividi, affermando che l’Occidente deve farsi rispettare usando la violenza e la deterrenza quali elementi attivi di civilizzazione e di difesa della sua missione teleologica e salvifica del mondo.
Usando cioè i mezzi contrari alla cultura occidentale dei diritti che essa dovrebbero affermare e perseguire.
«Peter Thiel, Il momento straussiano. A cura di Andrea Venanzoni. Liberilibri 2025»
Il ransomware non blocca i server. Blocca il credito: il lato finanziario della cybersecurity
📌 Link all'articolo : redhotcyber.com/post/il-ransom…
C’è questa idea sbagliata, un po’ romantica volendo, per cui il #ransomware è “roba da IT”: qualche #server in crisi, due notti in bianco, poi si riparte e fine…
La realtà, soprattutto per un’azienda quotata o con linee di credito bancarie, è più semplice e più crudele: il #ransomware non cifra solo i file, cifra la fiducia. Quando la fiducia cala, il credito diventa più costoso, più corto e più “capriccioso”.
A cura di Antonio Piovesan
#redhotcyber #news #ransomware #cybersecurity #sicurezzainformatica #malware #attacchinformatici #creditobancario #meritoCreditizio #gestionedelrischio #aziendequotate #banche #finanza #sicurezzadigital
Il ransomware non blocca i server. Blocca il credito: il lato finanziario della cybersecurity
Un attacco ransomware può bloccare i server, ma soprattutto il cash flow. Banche, covenant e rating: ecco l’impatto reale sul credito.Antonio Piovesan (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
securityaffairs.com/187367/mal…
#securityaffairs #hacking
Amnesia RAT deployed in multi-stage phishing attacks against Russian users
A multi-stage phishing campaign targets users in Russia with ransomware and Amnesia RAT using fake business documents as lures.Pierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
L’AI non è affidabile come credi: i rischi nascosti dei LLM senza una buona governance
📌 Link all'articolo : redhotcyber.com/post/lai-non-e…
#redhotcyber #news #intelligenzaartificiale #modellilinguistici #cybersecurity #sicurezzainformatica #governancedellai
L’AI non è affidabile come credi: i rischi nascosti dei LLM senza una buona governance
L'adozione di modelli linguistici di grandi dimensioni senza controlli adeguati può esporre a danni legali, finanziari e di reputazione.Silvia Felici (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
🔥 SONO UFFICIALMENTE APERTE LE ISCRIZIONI! 🔥
Sta per partire la Settima Live Class del corso "𝗗𝗔𝗥𝗞 𝗪𝗘𝗕 𝗘 𝗖𝗬𝗕𝗘𝗥 𝗧𝗛𝗥𝗘𝗔𝗧 𝗜𝗡𝗧𝗘𝗟𝗟𝗜𝗚𝗘𝗡𝗖𝗘" – livello intermedio 🚀
📌 Inizio: Domenica 8 Marzo 2026
📌 Posti super limitati (max 14 partecipanti)
✅ Pagina del corso: redhotcyber.com/linksSk2L/acad…
✅ Presentazione del corso del prof. Pietro Melillo : youtube.com/watch?v=9VaQUnTz4J…
✅ Webinar introduttivo di presentazione al corso : youtube.com/watch?v=ExZhKqjuwf…
Per info e iscrizioni: 📱 💬 379 163 8765 ✉️ formazione@redhotcyber.com
#redhotcyber #formazione #cybersecurity #darkweb #cyberthreatintelligence #ethicalhacking #infosec #intelligence #liveclass #corsi #cybercrime
Live Class Dark Web e Cyber Threat Intelligence - Red Hot Cyber
Vuoi conoscere il darkweb e disporre degli strumenti per accedervi in sicurezza, effettuare ricerche e comprendere i concetti di cyber threat intelligence (CTI)? Questo corso fa per te.Red Hot Cyber
Ricardo Antonio Piana likes this.
Cybersecurity & cyberwarfare reshared this.
Difesa attiva e hack back: il labirinto legale della cybersecurity
📌 Link all'articolo : redhotcyber.com/post/difesa-at…
#redhotcyber #news #cybersecurity #sicurezzainformatica #legittimadifesa #attacchiinformatici #contrattacco
Difesa attiva e hack back: il labirinto legale della cybersecurity
La difesa attiva contro i cyber attacchi può trasformarsi in reato. Analisi dei rischi penali dell’hack back, della legittima difesa digitalePaolo Galdieri (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
The History of Tandem Computers
If you are interested in historical big computers, you probably think of IBM, with maybe a little thought of Sperry Rand or, if you go smaller, HP, DEC, and companies like Data General. But you may not have heard of Tandem Computers unless you have dealt with systems where downtime was unacceptable. Printing bills or payroll checks can afford some downtime while you reboot or replace a bad board. But if your computer services ATM machines, cash registers, or a factory, that’s another type of operation altogether. That was where Tandem computers made their mark, and [Asianometry] recounts their history in a recent video that you can watch below.
When IBM was king, your best bet for having a computer running nonstop was to have more than one computer. But that’s pricey. Computers might have some redundancy, but it is difficult to avoid single points of failure. For example, if you have two computers with a single network connection and a single disk drive. Then failures in the network connection or the disk drive will take the system down.
The idea started with an HP engineer, but HP wasn’t interested. Tandem was founded on the idea of building a computer that would run continuously. In fact, the name was “the non-stop.” The idea was that smaller computer systems could be combined to equal the performance of a big computer, while any single constituent system failing would still allow the computer to function. It was simply slower. Even the bus that tied the computers together was redundant. Power supplies had batteries so the machines would keep working even through short power failures.
Not only does this guard against failures, but it also allows you to take a single computer down for repair or maintenance without stopping the system. You could also scale performance by simply adding more computers.
Citibank was the first customer, and the ATM industry widely adopted the system. The only issue was that Tandem programs required special handling to leverage the hardware redundancy. Competitors were able to eat market share by providing hardware-only solutions.
The changing computer landscape didn’t help Tandem, either. Tandem was formed at a time when computer hardware was expensive, so using a mostly software solution to a problem made sense. But over time, hardware became both more reliable and less expensive. Software, meanwhile, got more expensive. You can see where this is going.
The company flailed and eventually would try to reinvent itself as a software company. Before that transition could work or fail, Compaq bought the company in 1997. Compaq, of course, would also buy DEC, and then it was all bought up by HP — oddly enough, where the idea for Tandem all started.
There’s a lot of detail in the video, and if you fondly remember Tandem, you’ll enjoy all the photos and details on the company. If you need redundancy down at the component level, you’ll probably need voting.
youtube.com/embed/SSSB7ZTSXH4?…
210 - Self-made. La parola che fa sparire i vantaggi - Marco Camisani Calzolari
Self-made. La parola che fa sparire i vantaggi. Il sogno americano. Uno parte da solo, ha una buona idea, poi arrivano i miliardi. Quante volte abbiamo visto le porte dei garage di Apple, Google, Amazon, Disney, Mattel.Web Staff MCC (Marco Camisani Calzolari)
Cybersecurity & cyberwarfare reshared this.
E che il phishing abbia inizio! Microsoft corre ai ripari per una zero-day già sfruttata in Office
📌 Link all'articolo : redhotcyber.com/post/e-che-il-…
#redhotcyber #news #microsoft #office #vulnerabilita #zeroday #patch #aggiornamento #sicurezza #cybersecurity
E che il phishing abbia inizio! Microsoft corre ai ripari per una zero-day già sfruttata in Office
Microsoft rilascia patch non programmate per Microsoft Office per risolvere una vulnerabilità zero-day già sfruttata in attacchi informatici.Redazione RHC (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
securityaffairs.com/187354/hac…
#securityaffairs #hacking
Dormakaba flaws allow to access major organizations’ doors
Researchers found over 20 flaws in Dormakaba access systems that could let attackers remotely unlock doors at major organizations.Pierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
33.000 tonnellate di ferro… e un’indagine dove AIS e log sono trappole da cyber intelligence
📌 Link all'articolo : redhotcyber.com/post/33-000-to…
#redhotcyber #news #guardiaDifinanza #sanzioni #materialeFerroso #trafficoIllegale #agenziaDelleDogane
33.000 tonnellate di ferro… e un’indagine dove AIS e log sono trappole da cyber intelligence
Operazione Guardia di Finanza a Brindisi: come l'uso di fonti aperte e dati tecnici sostiene il contrasto alla criminalità organizzata e al terrorismo.Roberto Villani (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
ServiceNow sotto attacco: come un’email può spalancare le porte della tua azienda
📌 Link all'articolo : redhotcyber.com/post/serviceno…
#redhotcyber #news #cybersecurity #hacking #servicenow #intelligenzaartificiale #vulnerabilita #furtoinformazioni
ServiceNow sotto attacco: come un’email può spalancare le porte della tua azienda
Scoperta una vulnerabilità critica nella piattaforma AI di ServiceNow che permette agli aggressori di impersonare utenti e manipolare agenti AI.Redazione RHC (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
One Hundred Years Of Telly
Today marks an auspicious anniversary which might have passed us by had it not been for [Diamond Geezer], who reminds us that it’s a hundred years since the first public demonstration of television by John Logie Baird. In a room above what is today a rather famous Italian coffee shop in London’s Soho, he had assembled a complete mechanical TV system that he demonstrated to journalists.
Television is one of those inventions that owes its genesis to more than a single person, so while Baird was by no means the only one inventing in the field, he was the first to demonstrate a working system. With mechanical scanning and just 30 lines, it’s hardly HD or 4K, but it does have the advantage of being within the reach of the constructor.
Perhaps the saddest thing about Baird and his system is that while he was able to attract the interest of the BBC in it, when the time came for dedicated transmissions at a higher resolution, his by then partly mechanical system could not compete and he faded into relative obscurity. Brits instead received EMI’s 405 line system, which persisted until the very start of the 1980s, and eventually the German PAL colour system in the late 1960s.
So head on down to Bar Italia if you can to raise a coffee to his memory, and should you wish to have a go at Baird-style TV for yourself, then you may need to print yourself a disk.
Header image: Matt Brown, CC BY 2.0.
Create a Tiny Telephone Exchange with an Analog Telephone Adapter
An analog telephone adapter (ATA), or FXS gateway, is a device that allows traditional analog phones to be connected to a digital voice-over-IP (VoIP) network. In addition to this, you can even create a local phone exchange using just analog phones without connecting to a network as [Playful Technology] demonstrates in a recent video.
The ATA used in the video is the Grandstream HT802, which features one 10/100 Mbps Ethernet port and two RJ11 FXS ports for two POTS phones, allowing for two phones to be directly connected and configured using their own profiles.
By using a multi-FXS port ATA in this manner, you essentially can set up your own mini telephone exchange, with a long run of Cat-3 possible between an individual phone and the ATA. Use of the Ethernet port is necessary just once to configure the ATA, as demonstrated in the video. The IP address of the ATA is amusingly obtained by dialing *** on a connected phone and picking 02 as menu option after which a synthetic voice reads out the number. This IP address gets you into the administration interface.
To configure the ATA as an exchange, the local loopback address is used, along with a dial alias configured in the ‘Dial Plan’ section. This way dialing e.g. 102 gets internally converted to dial the other FXS port. By setting up a similar plan on the other FXS port both phones can call each other, but it’s also possible to auto-dial when you lift the handset off the hook.
The rather hacky configuration ought to make clear that the ATA was not designed to be used in this manner, but if your use case involves this kind of scenario, it’s probably one of the cheaper ways to set up a basic, small phone exchange. There are even ATA models that have more than two ports, opening up more possibilities. Just keep in mind that not every ATA may support this kind of tweaking.
youtube.com/embed/-dD4Xepac8o?…
Restoring a 1924 Frigidaire B-9 Refrigerator Back to Working Condition
Before the refrigerator became a normal part of any kitchen, those with enough money to throw around could get an icebox, which used melting ice to cool food and drinks in a second compartment. As refrigerators became available for sale in the 1920s, this created somewhat awkward transition models, like the 1924 Frigidaire B-9 that [David Allen] recently got offered for a restoration. This was part of the restoration of a 1926 house, which foresaw putting this venerable unit back into operation.
As [David] explains, this refrigerator was still in use until about 1970 when it broke down, and repairs proved tricky. Clearly, the fault wasn’t that severe as [David] got it working again after a number of small repairs and a lot of maintenance. The running unit with its basic elements can be seen purring away in the completion video, with the journey to get there covered in a video series starting with the first episode.
What’s fascinating is that during this aforementioned transition period, the vapor compression electric cooling system was an optional extra, meaning that the basic layout is still that of an icebox. Correspondingly, instead of ice in the ice compartment, you find the low-side float evaporator, with the basement section containing the condensing unit, motor, and compressor. The temperature sensor is also a miracle of simplicity, using bellows that respond to the temperature and thus volume of the evaporator coolant, which trigger a switch that turns on the compressor.
Despite a hundred years having passed since this refrigerator was constructed, at its core it works exactly the same as the unit we have in our kitchens today, albeit with higher efficiency, more electronics, and with the sulfur dioxide refrigerant replaced with something less toxic to us humans.
youtube.com/embed/lieog1_yNCo?…
youtube.com/embed/xICtNFbvEH0?…
Keebin’ with Kristina: the One with the Split with the Num Pad
I love, love, love Saturn by [Rain2], which comes in two versions. The first, which is notably more complex, is shown here with its rings-of-Saturn thumb clusters.
Image by [Rain2] via redditSo what was the impetus for this keyboard? It’s simple: a friend mentioned that ergo keyboards are a no-go if you need a num pad really bad.
Saturn has one built right in. The basic idea was to add a num pad while keeping the total number of keys to a minimum. Thanks to a mod key, this area can be many things, including but not limited to a num pad.
As far as the far-out shape goes, and I love that the curvature covers the thumb cluster and the index finger, [Rain2] wanted to get away from the traditional thumb cluster design. Be sure to check out the back of the boards in the image gallery.
Unfortunately, this version is too complicated to make, so v2 does not have the cool collision shapes going for it. But it is still an excellent keyboard, and perhaps will be open source someday.
Phanny Kicks Butt
Say hello to Phanny, a custom 52-key wireless split from [SfBattleBeagle]. This interestingly-named board has a custom splay that they designed from the ground up along with PCBWay, who sponsored the PCBs in the first place.
Image by [SfBattleBeagle] via GitHubI personally think the thumb keys go a little too far inward for my taste, but I’m certain that [SfBattleBeagle]’s hands must be different. Probably doesn’t have these stubby little thumbs.
While Ergogen is all the rage, [SfBattleBeagle] still opts to use Fusion and KiCad, preferring the UI of the average CAD program. If you’re wondering about the lack of palm rests, the main reason is that [SfBattleBeagle] tends to bounce between screens, as well as moving between the split and the num pad. To that end, they are currently designing a pair of sliding wrist skates that I would love to hear more about.
Be sure to check out the GitHub repo for all the details and a nice build guide. [SfBattleBeagle] says this is a fun project and results in a very comfy board.
The Centerfold: Mantis WIP is Captivating
Image by [luckybipedal] via redditI love it when I can provide a lovely centerfold that’s also got a lot of story behind it. This is Mantis, a work-in-progress by [luckybipedal] aka [Felix Kühling]. You can read a lot more on GitHub, and the reasoning behind the design choices in [Felix]’s write-up over on KBD News. [Felix] expects to build the first prototypes in March or April, and publish a final design and build guide later this spring.
Via reddit
Do you rock a sweet set of peripherals on a screamin’ desk pad? Send me a picture along with your handle and all the gory details, and you could be featured here!
Historical Clackers: the Masspro
I must say, the Antikey Chop doesn’t have much to say about the Masspro typewriter, and for good reason.Image via The Antikey Chop
But here’s what we know: the Masspro was invented by a George Francis Rose, who was the son of Frank S. Rose, inventor of the Standard Folding Typewriter. That machine was the predecessor to the Corona No. 3.
Frank died right as the Rose Typewriter Co. was starting to get somewhere. George took over, but then it needed financing pretty badly.
Angel investor and congressman Bill Conger took over the company, relocated, and renamed it the Standard Folding Typewriter Co. According to the Antikey Chop, “selling his father’s company was arguably George’s greatest contribution to typewriter history”.
George Rose was an engineer like his father, but he was not very original when it came to typewriters. The Masspro is familiar yet foreign, and resembles the Corona Four. Although the patent was issued in 1925, production didn’t begin until 1932, and likely ended within to years.Image via Oz Typewriter
Why? It was the wrong machine at the wrong time. Plus, it was poorly built, and bore a double-shift keyboard which was outdated by this time. And, oh yeah, the company was started during the Depression.
But I like the Masspro. I think my favorite part, aside from the open keyboard, is the logo, which looks either like hieroglyphics or letters chiseled into a stone tablet.
I also like the textured firewall area where the logo is stamped. The Antikey Chop calls this a crinkle finish. Apparently, they came in black, blue, green, and red. The red isn’t candy apple, it’s more of an ox-blood red, and that’s just fine with me. I’d love to see the blue and green, though. Oh, here’s the green.
Finally, a Trackball Mouse With Nice Switches
Okay, so Keychron’s new Nape Pro mouse is pretty darn cool, and this is the best picture I could find that actually shows how you’re supposed to implement this thing on your desk. Otherwise, it looks like some kind of presentation remote.Image via Yanko Design
So the idea here is to never take your hands off the keyboard to mouse, although you can use it off to the side like a regular trackball if you want. I say the ability to leave your fingers on the home row is even better.
There are plenty of keyboards with trackpads and other mousing functions that let you do this. But maybe you’re not ready to go that far. This mouse is a nice, easy first step.
The ball is pretty small at 25 mm. For comparison, the M575 uses a 34 mm ball, which is pretty common for trackball mice. Under those six buttons are quiet Huano micro switches, which makes sense, but I personally think loud-ish mice are nice enough.
I’ve never given it much thought, but the switches on my Logitech M575 are nice and clicky. I wonder how these compare, but I don’t see a sound sample. If the Nape Pro switches sound anything like this, then wowsers, that is quiet.Image via Yanko Design
The super-cool part here is the software and orientation system, which they call OctaShift. The thing knows how it’s positioned and can remap its functions to match. M1 and M2 are meant to be your primary mouse buttons, and they are reported to be comfortable to reach in any position.
Inside you’ll find a Realtek chip with a 1 kHz polling rate along with a PixArt PAW3222 sensor, which puts this mouse in the realm of decent wireless gaming mice. But the connectivity choice is yours between dongle, Bluetooth, and USB-C cable.
And check this out: the firmware is ZMK, and Keychron plans to release the case STLs. Finally, it seems the mouse world is catching up with the keyboard world a bit.
Got a hot tip that has like, anything to do with keyboards? Help me out by sending in a link or two. Don’t want all the Hackaday scribes to see it? Feel free to email me directly.
When Digital Sovereignty got real
IT'S MONDAY, AND THIS IS DIGITAL POLITICS. I'm Mark Scott, and will be speaking on a webinar hosted by the Knight Georgetown Institute on Jan 28. The topic: how to improve access to social media data to support greater transparency and accountability. You can sign up here (the webinar starts at 11am ET / 5pm CET / 4pm UK).
— Even some of the United States' closest allies are re-evaluating their ties to American tech amid growing concerns about Washington's worldview.
— It's official. ByteDance sold off its US TikTok unit. But does the fire sale actually solve the underlying national security and privacy concerns?
— Many teenagers are OK with a smartphone ban at school. They are less keen on their devices being taken away forever.
Let's get started:
Astronomy Live on Twitch
Although there are a few hobbies that have low-cost entry points, amateur astronomy is not generally among them. A tabletop Dobsonian might cost a few hundred dollars, and that is just the entry point for an ever-increasing set of telescopes, mounts, trackers, lasers, and other pieces of equipment that it’s possible to build or buy. [Thomas] is deep into astronomy now, has a high-quality, remotely controllable telescope, and wanted to make it more accessible to his friends and others, so he built a system that lets the telescope stream on Twitch and lets his Twitch viewers control what it’s looking at.
The project began with overcoming the $4000 telescope’s practical limitations, most notably an annoyingly short Wi-Fi range and closed software. [Thomas] built a wireless bridge with a Raspberry Pi to extend connectivity, and then built a headless streaming system using OBS Studio inside a Proxmox container. This was a major hurdle as OBS doesn’t have particularly good support for headless operation.
The next step was reverse engineering the proprietary software the telescope uses for control. [Thomas] was able to probe network traffic on the Android app and uncovered undocumented REST and WebSocket APIs. From there, he gained full control over targeting, parking, initialization, and image capture. This allowed him to automate telescope behavior through Python scripts rather than relying on the official Android app.
To make the telescope interactive, he built a Twitch-integrated control system that enables viewers to vote on celestial targets, issue commands, and view live telemetry, including stacking progress, exposure data, and target coordinates. A custom HTML/CSS/JavaScript overlay displays real-time status, and there’s a custom loading screen when the telescope is moving to a new target. He also added ambient music and atmospheric effects, so the stream isn’t silent.
If [Thomas]’s stream is your first entry point into astronomy and you find that you need to explore it more on your own, there are plenty of paths to build your way into the hobby, especially with Dobsonian telescopes, which can be built by hand, including the mirrors.
The cURL Project Drops Bug Bounties Due To AI Slop
Over the past years, the author of the cURL project, [Daniel Stenberg], has repeatedly complained about the increasingly poor quality of bug reports filed due to LLM chatbot-induced confabulations, also known as ‘AI slop’. This has now led the project to suspend its bug bounty program starting February 1, 2026.
Examples of such slop are provided by [Daniel] in a GitHub gist, which covers a wide range of very intimidating-looking vulnerabilities and seemingly clear exploits. Except that none of them are vulnerabilities when actually examined by a knowledgeable developer. Each is a lengthy word salad that an LLM churned out in seconds, yet which takes a human significantly longer to parse before dealing with the typical diatribe from the submitter.
Although there are undoubtedly still valid reports coming in, the truth of the matter is that the ease with which bogus reports can be generated by anyone who has access to an LLM chatbot and some spare time has completely flooded the bug bounty system and is overwhelming the very human developers who have to dig through the proverbial midden to find that one diamond ring.
We have mentioned before how troubled bounty programs are for open source, and how projects like Mesa have already had to fight off AI slop incidents from people with zero understanding of software development.
reshared this
Does Carbon Fiber PLA Make Sense?
Carbon fiber (CF) has attained somewhat of a near-mystical appeal in consumer marketing, with it being praised for being stronger than steel while simultaneously being extremely lightweight. This mostly refers to weaved fibers combined with resin into a composite material that is used for everything from car bodies to bike frames. This CF look is so sexy that the typical carbon-fiber composite weave pattern and coloring have been added to products as a purely cosmetic accent.
More recently, chopped carbon fiber (CCF) has been added to the thermoplastics we extrude from our 3D printers. Despite lacking clear evidence of this providing material improvements, the same kind of mysticism persists here as well. Even as evidence emerges of poor integration of these chopped fibers into the thermoplastic matrix, the marketing claims continue unabated.
As with most things, there’s a right way and a wrong way to do it. A recent paper by Sameh Dabees et al. in Composites for example covered the CF surface modifications required for thermoplastic integration with CF.
Carbon Fibers
There are a number of ways to produce CF, often using polyacrylonitrile, rayon, or pitch as the feedstock. After spinning this precursor into a suitable filament, heating induces carbonization and produces the carbon fiber.Schematic representation of carbon fiber preparation from polyacrylonitrile.
A 6 μm diameter carbon filament, compared to 50 μm diameter human hair. (Source: Wikimedia)
Following this process, the CF is typically in the form of a few micrometer-thick fiber that is essentially pure carbon. To create a structural interface between the CF and the polymer of a composite material, some kind of process has to take place that creates this interface.
The fundamental difference between thermoset and thermoplastic polymers is that thermoset polymers are reacting in the mold as it sets, providing an environment in which the epoxy precursor and hardener can interact with the normally not chemically very reactive CF to form covalent bonds.
In comparison, thermoplastic polymers are already finalized, with covalent bonds between thermoplastics and CF unlikely. This means that the focus with CF-reinforced thermoplastics is mostly on weaker, non-covalent interactions, such as Van der Waals forces, pi-interactions and hydrogen bonds. Each of these interactions is further dependent on whether the thermoplastic is compatible, such as the presence of aromatic rings for pi-interactions.
Making It Stick
With those challenges in mind, how can thermoplastics be coaxed into forming a significant interface with CF? As noted in the earlier cited work by Sameh Dabees et al., there is no single surface treatment for CF that would work for every thermoplastic polymer, as a logical result of the limitations imposed by the available non-covalent interactions.Carbon fiber in PLA after FDM printing, showing clear voids. (Credit: I built a thing, YouTube)
One way to prepare the CF is by applying a coating to the fiber, called a sizing. By applying a sizing to the fiber that is compatible with the target thermoplastic, the interface with the bulk material is expected to improve. In one cited study involving a polyamide-acid sizing for polyimide bulk material, this coating created an approximately 85 nm interface, with an interfacial shear strength increased by 32.3%. In another study targeting CF-PEEK, this had a polyimide-based, water-soluble sizing applied that also significantly improved the shear strength.
Of course, this sizing has to actually adhere to the CF, lest it simply vanishes into the bulk thermoplastic material. This is a problem that is easily observable in FDM-printed thermoplastic polymers as distinct voids around the CF where the bulk polymer pulled away during crystallization, and no interface formed. Obviously, these voids create a weak point instead of strengthening the material.
Fiber Modding
Although CF is often confused with carbon nanotubes, it does not have the rigidly ordered structure that they do. Instead it has a graphite structure, owing to the way that they are produced, meaning sheets of graphite placed together in a disordered fashion. Despite this, the external surface is still smooth, which is where the chemical inertness comes from. Combined with the lack of reactivity from the side of thermoplastics, this highlights the need for something to bridge the gap.Various carbon fiber surface modification methods. (Credit: Dabees et al., 2025, Composites)
The review paper by Dabees et al. covers the most common types of surface treatments, with the above graphic providing a summary of the methods. Perhaps one of the most straightforward methods is the coating of the CF with an epoxy, thus shifting the interface from CF-thermoplastic to thermoset-thermoplastic. This kind of hybrid approach shows promising results, but is also cumbersome and not a universal fix.
Note that virtually all research here is focused on thermoplastic polymers like polycarbonate and PEEK, as these are most commonly used in industrial and medical settings. Yet even within that more limited scope the understanding of the exact effects of these modifications remains poorly investigated. Much of this is due to how hard it is to characterize the effects of one treatment when you take all other variables into account.
Perhaps most frustrating of all is how hard it is to research this topic considering the scale of the CF surface and the miniscule thickness of the CF-polymer interface. Relying on purely mechanical tests to quantify the impact is then tempting, but ultimately leaves us without a real understanding of why one method seems to work better than another.
Vibes Vs Science
The overall conclusion that we draw from this particular review paper is that although we know that composite materials can often provide improvements, in the case of thermoplastic-CF composites we realize that our understanding of the fundamentals is still rather lacking.
Outside of the less mainstream world of industrial and medical settings, CF is now widely being added to thermoplastic polymers, primarily in the form of filaments for FDM 3D printers. Without detailed information on whether the manufacturers of these filaments perform any kind of CF surface modification, it is very hard to even compare different CF-polymer filaments like this, even before taking into account individual FDM printer configurations and testing scenarios.
Considering that CF has for a few years now been identified as a potential carcinogen akin to asbestos, this raises the question of whether we really want to put CF and particularly the very small chopped carbon fibers into everything around us and thermoplastics in particular. When the empirical evidence available to us today shows that any mechanical improvements are not due to a solid CF-polymer interface, and any potential carcinogenic risks still years into the future of becoming clear, then the logical choice would be to hold back on CF-thermoplastics until we gain a better understanding of the benefits and risks.
Augmented Reality Project Utilizes the Nintendo DSi
[Bhaskar Das] has been tinkering with one of Nintendo’s more obscure handhelds, the DSi. The old-school console has been given a new job as part of an augmented reality app called AetherShell.
The concept is straightforward enough. The Nintendo DSi runs a small homebrew app which lets you use the stylus to make simple line drawings on the lower touchscreen. These drawings are then trucked out wirelessly as raw touch data via UDP packets, and fed into a Gemini tool which transforms them into animation frames. These are then sent to an iPhone app, which uses ARKit APIs and the phone’s camera to display the animations embedded into the surrounding environment via augmented reality.
One might question the utility of this project, given that the iPhone itself has a touch screen you can draw on, too. It’s a fair question, and one without a real answer, beyond the fact that sometimes it’s really fun to play with an old console and do weird things with it. Plus, there just isn’t enough DSi homebrew out in the world. We love to see more.
youtube.com/embed/I389PbAJmVE?…
LLM-Generated Newspaper Provides Ultimate in Niche Publications
If you’re reading this, you probably have some fondness for human-crafted language. After all, you’ve taken the time to navigate to Hackaday and read this, rather than ask your favoured LLM to trawl the web and summarize what it finds for you. Perhaps you have no such pro-biological bias, and you just don’t know how to set up the stochastic parrot feed. If that’s the case, buckle up, because [Rafael Ben-Ari] has an article on how you can replace us with a suite of LLM agents.The AI-focused paper has a more serious aesthetic, but it’s still seriously retro.
He actually has two: a tech news feed, focused on the AI industry, and a retrocomputing paper based on SimCity 2000’s internal newspaper. Everything in both those papers is AI-generated; specifically, he’s using opencode to manage a whole dogpen of AI agents that serve as both reporters and editors, each in their own little sandbox.
Using opencode like this lets him vary the model by agent, potentially handing some tasks to small, locally-run models to save tokens for the more computationally-intensive tasks. It also allows each task to be assigned to a different model if so desired. With the right prompting, you could produce a niche publication with exactly the topics that interest you, and none of the ones that don’t. In theory, you could take this toolkit — the implementation of which [Rafael] has shared on GitHub — to replace your daily dose of Hackaday, but we really hope you don’t. We’d miss you.
That’s news covered, and we’ve already seen the weather reported by “AI”— now we just need an agenetic sports section and some AI-generated funny papers. That’d be the whole newspaper. If only you could trust it.
Story via reddit.
securityaffairs.com/187349/hac…
#securityaffairs #hacking
Emergency Microsoft update fixes in-the-wild Office zero-day
Microsoft issued emergency updates to fix an actively exploited Office zero-day affecting Office 2016–2024 and Microsoft 365 Apps.Pierluigi Paganini (Security Affairs)
reshared this
Data Act, c’è un aggiornamento delle FAQ: cosa cambia per aziende e utenti
@Informatica (Italy e non Italy 😁)
La Commissione Europea aggiorna le FAQ sul Data Act, fornendo chiarimenti pratici su accesso e uso dei dati, interoperabilità dei servizi digitali e rispetto delle norme UE, tra cui il GDPR, per supportare aziende e professionisti nella compliance e nella
Informatica (Italy e non Italy) reshared this.
securityaffairs.com/187340/dat…
#securityaffairs #hacking
ShinyHunters claims 2 Million Crunchbase records; company confirms breach
Crunchbase confirms a data breach after cybercrime group ShinyHunters claims to have stolen over 2 million personal records.Pierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
Gli utenti di TikTok subiscono interruzioni dopo l'accordo con gli Stati Uniti
TikTok ha riscontrato diffusi problemi tecnici durante il primo fine settimana dopo la vendita delle sue attività negli Stati Uniti, con utenti che hanno segnalato errori di accesso, caricamenti interrotti, pagine "Per te" reimpostate e commenti mancanti.
1003thepeak.iheart.com/content…
TikTok Users Experience Outages After U.S. Deal | 100.3 The Peak
TikTok experienced widespread technical issues during the first weekend after selling its U.S. operations, with users reporting login failures, broken uploads, reset For You Pages, and missing comments.100.3 The Peak
reshared this
Scoperta Shock su Instagram: Post Privati Accessibili Senza Login!
📌 Link all'articolo : redhotcyber.com/post/scoperta-…
#redhotcyber #news #cybersecurity #hacking #instagram #vulnerabilita #privacy #sicurezzainformatica #protezioneonline #datipersonali #accessoai
Scoperta Shock su Instagram: Post Privati Accessibili Senza Login!
Scopri come una vulnerabilità su Instagram ha messo a rischio i post privati degli utenti. Leggi la storia della scoperta e della correzione del bug.Redazione RHC (Red Hot Cyber)
reshared this
Vertice Ue‑India a Nuova Delhi: accordo di libero scambio “più vicino che mai”
L’Europa, dopo il Mercosur, punta così a rafforzare le relazioni economiche con un partner di scala globale, guardando a oriente
reshared this
RE: wetdry.world/@16af93/115961732…
Because not using AI tools for what they excel at will produce less secure code.
For example, they are great at debugging (words.filippo.io/claude-debugg…), they can find real issues in code review, they know more math than me or most of my colleagues, and they can write static analyzers I would have never had the time to write myself.
Claude Code Can Debug Low-level Cryptography
Surprisingly (to me) Claude Code debugged my new ML-DSA implementation faster than I would have, finding the non-obvious low-level issue that was making Verify fail.words.filippo.io
Cybersecurity & cyberwarfare reshared this.
Using AI to generate test cases for my current project, and it's just so valuable. Would have never done that on my own. Especially because the cost of setting up the entire testing pipeline is often quite high for me (remembering or learning a testing framework).
I use QuickCheck for Haskell, i.e., I test invariants on my code with random inputs. It's so nice to describe the expected invariants in natural language and have them almost ready to test.
Great idea. I've been doing a lot more Go with Claude at work recently.
We're trying to solve exactly these kinds of context engineering problems. This blog post is from one of our Go engineers and explains what we're doing. May be of interest. 🙏
tessl.io/blog/making-claude-go…
Making Claude good at Go using Context Engineering with Tessl
Discover how Tessl's context engineering boosts Claude's Go skills, achieving 100% success and cutting costs. Learn to optimize coding agents now!Tessl
149 Milioni di Account Esposti: Il Database Che Nessuno Doveva Vedere
📌 Link all'articolo : redhotcyber.com/post/149-milio…
#redhotcyber #news #cybersecurity #hacking #malware #leakdidati #violazionididati #sicurezzainformatica #databreach #protezionedidati
149 Milioni di Account Esposti: Il Database Che Nessuno Doveva Vedere
Una massiccia violazione dei dati ha esposto online 149 milioni di credenziali di accesso rubate. Scopri come proteggerti da questo attacco informatico.Redazione RHC (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
securityaffairs.com/187332/cyb…
#securityaffairs #hacking
Energy sector targeted in multi-stage phishing and BEC campaign using SharePoint
Microsoft warns of a multi-stage phishing and BEC campaign hitting energy firms, abusing SharePoint links.Pierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
securityaffairs.com/187317/apt…
#securityaffairs #hacking
North Korea–linked KONNI uses AI to build stealthy malware tooling
Check Point links an active phishing campaign to North Korea–aligned KONNI, using an AI-written PowerShell backdoor.Pierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
Sicurezza email sotto pressione: raddoppiano i kit di phishing nel 2025
📌 Link all'articolo : redhotcyber.com/post/sicurezza…
#redhotcyber #news #phishing #cybersecurity #intelligenzaartificiale #malware #kitdiattacchi #servizidiphishing #attacchimalevoli
Sicurezza email sotto pressione: raddoppiano i kit di phishing nel 2025
Nel 2025 il numero di kit di phishing-as-a-service è raddoppiato, con tecniche sempre più elusive e ingegnose.Redazione RHC (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
❌ SE PENSI CHE UN FIREWALL BASTI, QUESTO CORSO NON FA PER TE. ❌
Se invece vuoi capire:
• come ragiona un attaccante
• perché certi sistemi cadono sempre
• cosa c’è prima del pentest
allora sei nel posto giusto.
🔥 Cyber Offensive Fundamentals – Live Class
40 ore. Live. Niente scorciatoie.
🔗 Programma: redhotcyber.com/linksSk2L/cybe…
🎥 Intro del prof: youtube.com/watch?v=0y4GYsJMoX…
💎 Prima edizione = prezzo irripetibile
⛔ Numero chiuso
Per info e iscrizioni: 📞 379 163 8765 ✉️ formazione@redhotcyber.com
#redhotcyber #formazione #pentesting #pentest #formazionelive #ethicalhacking #hacking #cybersecurity #penetrationtesting #cti #cybercrime #infosec #corsi #liveclass #hackerhood #pentesting
Cyber Offensive Fundamentals - Corso ethical hacking, penetration test
Corso in Live Class di Cyber Offensive Fundamentals: scopri penetration testing, vulnerabilità e strumenti pratici per la sicurezza informatica offensiva.Red Hot Cyber
Cybersecurity & cyberwarfare reshared this.
209 - Robot che imparano a fare tutto guardando i nostri video - Marco Camisani Calzolari
Robot umanoidi che imparano a fare tutto guardando i nostri video. Seguitemi, perché pochi spiegano gli effetti di questa “svolta”, che cambierà il lavoro molto più in fretta di quanto si sente dire in giro.Web Staff MCC (Marco Camisani Calzolari)
Cybersecurity & cyberwarfare reshared this.
🤖 Tracking strings detected and removed!
🔗 Clean URL(s):
camisanicalzolari.it/209-robot…
❌ Removed parts:
?utm_source=dlvr.it&utm_medium=mastodon
209 - Robot che imparano a fare tutto guardando i nostri video - Marco Camisani Calzolari
Robot umanoidi che imparano a fare tutto guardando i nostri video. Seguitemi, perché pochi spiegano gli effetti di questa “svolta”, che cambierà il lavoro molto più in fretta di quanto si sente dire in giro.Web Staff MCC (Marco Camisani Calzolari)
securityaffairs.com/187309/bre…
#securityaffairs #hacking
Russia-linked Sandworm APT implicated in major cyber attack on Poland’s power grid - Security Affairs
Russia-linked APT Sandworm launched what was described as the largest cyber attack on Poland’s power grid in Dec 2025.Pierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
Quando il Malware si Nasconde nei Video! La Tecnica PixelCode Smonta le Regole
📌 Link all'articolo : redhotcyber.com/post/quando-il…
#redhotcyber #news #pixelcode #steganografia #crittografia #sicurezzainformatica #hacking #malware #cybersecurity #informatica #codicebinario
Quando il Malware si Nasconde nei Video! La Tecnica PixelCode Smonta le Regole
Scopri come i ricercatori hanno sviluppato una tecnica per nascondere dati binari all'interno di immagini e video, sfruttando i pixel per veicolare malware.Redazione RHC (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
Come un semplice file di Visual Studio Code può diventare una backdoor per hacker statali
📌 Link all'articolo : redhotcyber.com/post/come-un-s…
#redhotcyber #news #cybersecurity #hacking #malware #git #visualstudiocode #sicurezzainformatica #minacceinformatiche #evoluzione
Come un semplice file di Visual Studio Code può diventare una backdoor per hacker statali
La Corea del Nord utilizza Visual Studio Code per attacchi informatici tramite repository GitHub e ingegneria sociale.Redazione RHC (Red Hot Cyber)
reshared this
Tracking Token Disrespector
in reply to Marco Camisani Calzolari • • •🤖 Tracking strings detected and removed!
🔗 Clean URL(s):
camisanicalzolari.it/210-self-…
❌ Removed parts:
?utm_source=dlvr.it&utm_medium=mastodon
210 - Self-made. La parola che fa sparire i vantaggi - Marco Camisani Calzolari
Web Staff MCC (Marco Camisani Calzolari)