Salta al contenuto principale


Ancient Egyptian Flatness


Making a truly flat surface is a modern engineering feat, and not a small one. Even making something straight without reference tools that are already straight is a challenge. However, the ancient Egyptians apparently made very straight, very flat stone work. How did they do it? Probably not alien-supplied CNC machines. [IntoTheMap] explains why it is important and how they may have done it in a recent video you can see below.

The first step is to define flatness, and modern mechanical engineers have taken care of that. If you use 3D printers, you know how hard it is to even get your bed and nozzle “flat” with respect to each other. You’ll almost always have at least a 100 micron variation in the bed distances. The video shows how different levels of flatness require different measurement techniques.

The Great Pyramid’s casing stones have joints measuring 0.5 mm, which is incredible to achieve on such large stones with no modern tools. A stone box in the Pyramid of Seostris II is especially well done and extremely flat, although we can make things flatter today.

The main problem with creating a flat surface is that to do a good job, you need some flat things to start with. However, there is a method from the 19th century that uses three plates and multiple lapping steps to create three very flat plates. In modern times, we use a blue material to indicate raised areas, much as a dentist makes you chomp on a piece of paper to place a crown. There are traces of red ochre on Egyptian stonework that probably served the same purpose.

Lapping large pieces is still a challenge, but moving giant stones at scale appears to have been a solved problem for the Egyptians. Was this the method they used? We don’t know, of course. But it certainly makes sense.

It would be a long time before modern people could make things as flat. While we can do even better now, we also have better measuring tools.

youtube.com/embed/vhv8fAqN1cw?…


hackaday.com/2026/01/24/ancien…



Reviewing Tweezers for Microsoldering and SMD Work


[nanofix] and his assortment of tweezers

Attributed to Picasso was the notion that when art critics get together they talk about content, style, trend, and meaning; but that when painters get together they talk about where to get the best turpentine. We can extend that sentiment into the digital age by saying that when philosophers get together they talk about ideas, theory, and meaning; but when hackers get together they talk about where to get the best tweezers.

In this video [nanofix] runs us through his collection of tweezers talking about what he likes and doesn’t like for each. If you’re just getting into microsoldering this video will have some tips about where you should start, and if you’ve been soldering tiny stuff for a while you might find some ideas for a helpful new bit of kit, or two.

If you’re interested in tweezers and novel applications you might want to check out “smart” tweezers, which can read capacitance and resistance values on the fly. Or read about a suction based SMD tool, which can securely hold SMD components with less risk of them flying across the bench and disappearing forever into the carpet on the floor.

youtube.com/embed/gt9MdfWkz1k?…


hackaday.com/2026/01/24/review…


Cybersecurity & cyberwarfare ha ricondiviso questo.


Security Affairs #newsletter Round 560 by Pierluigi Paganini – INTERNATIONAL EDITION
securityaffairs.com/187290/bre…
#securityaffairs #hacking #malware

Cybersecurity & cyberwarfare ha ricondiviso questo.


BitLocker: chiavi fuori dal cloud. Guida alla crittografia di Windows, passo per passo
#tech
spcnet.it/bitlocker-chiavi-fuo…
@informatica


BitLocker: chiavi fuori dal cloud. Guida alla crittografia di Windows, passo per passo


Dopo il caso Forbes di pochi giorni fa, tra i social si notano discussioni e confusione su come viene gestita la crittografia di Microsoft, con BitLocker, quando si sceglie di proteggere il proprio device. Questa breve guida vuole essere un passo semplice e divulgativo, per risolvere alcuni dubbi che possono emergere in utenti poco esperti su questo aspetto e che si trovano a dover installare un nuovo dispositivo Windows, con applicazione della crittografia. Alcuni semplici accorgimenti che possono proteggere la nostra privacy, perchè spesso, in sistemi come quelli Microsoft, le scelte di default non sono sempre le migliori.
Il caso di Forbes

Cosa è successo e perché è importante


Forbes ha rivelato che, in un’indagine su una frode legata ai fondi Covid a Guam, l’FBI ha chiesto a Microsoft le chiavi di recupero BitLocker di tre laptop; Microsoft le ha fornite perché quelle chiavi erano state salvate nel cloud associato agli account Microsoft degli utenti. L’azienda ha confermato che, quando ha accesso alle chiavi di BitLocker e riceve un’ordinanza valida, le consegna alle autorità, in media una ventina di volte l’anno.

Il motivo tecnico è semplice: nelle installazioni moderne di Windows 11, soprattutto su PC consumer, l’utente viene spinto a usare un account Microsoft online; quando attiva la crittografia del dispositivo o BitLocker, la chiave di recupero viene caricata automaticamente sull’account, “per sicurezza” e per evitare che l’utente la perda. Il risultato è che l’utente crede di avere cifratura forte “contro chiunque”, mentre in realtà ha delegato a Microsoft la custodia di una copia della chiave.


La guida a BitLocker, semplificata


Quando un utente installa Windows oggi, spesso non si rende conto di firmare un contratto implicito con Microsoft sulla gestione delle chiavi che cifrano il suo disco. Il recente report di Forbes su un’inchiesta dell’FBI a Guam, in cui Microsoft ha consegnato le chiavi di recupero BitLocker di alcuni laptop, non rivela una backdoor tecnica, ma mette in luce una scelta di design che molti utenti accettano senza capirla: se la chiave di recupero finisce nel cloud dell’account Microsoft, Microsoft può fornirla alle autorità quando riceve un ordine del giudice. Il problema non è BitLocker in sé, che resta un motore di cifratura robusto, ma il fatto che, per comodità, Windows tende a legare la crittografia al proprio account online, trasformando la protezione del dispositivo in un servizio di “surrender as a service” per chiunque abbia accesso legale alle chiavi.

Separare crittografia e account Microsoft


Per chi vuole davvero controllare i propri dati, la strada più coerente è separare due cose che Microsoft spinge a confondere: l’uso dell’account Microsoft per servizi cloud e la crittografia del disco locale. Il punto di partenza è chiaro: se durante la prima installazione di Windows 11 si sceglie subito un account Microsoft online, il sistema può attivare automaticamente la “Device Encryption”, una modalità semplificata che in pratica abilita BitLocker sul disco di sistema e su quelli fissi, con la chiave di recupero salvata nel cloud associato all’account. Questo è il comportamento che ha permesso a Microsoft di fornire le chiavi all’FBI nel caso di Guam, perché in quel contesto la chiave era stata espressamente salvata nel cloud dell’account utente e non solo conservata localmente.

Passo 1: installare Windows con account locale


Per evitare di cadere in questa configurazione “pre‑impostata”, la prima mossa è installare Windows usando un account locale, cioè un profilo creato direttamente sul PC senza passare da Outlook, Hotmail o simili. Su molte installazioni recenti, l’interfaccia cerca di dissuadere da questa scelta, ma è ancora possibile ottenere un account offline disconnettendo il PC da Internet durante la configurazione iniziale o sfruttando le opzioni avanzate che permettono di inserire nome utente e password senza un account Microsoft. L’obiettivo non è demonizzare l’account online, ma semplicemente rimandare la sua introduzione a un momento successivo, dopo aver impostato la crittografia in modo consapevole e aver salvato le chiavi in un luogo sotto il controllo diretto dell’utente.

Passo 2: abilitare BitLocker sulle unità disco


Una volta dentro con un account locale amministratore, è il momento di affrontare BitLocker “vero”, non la versione semplificata di Device Encryption. Su Windows 11 Pro o Enterprise, BitLocker è accessibile dal Pannello di controllo, sotto Sistema e sicurezza → Crittografia unità BitLocker, oppure dalle Impostazioni di sicurezza, dove appare come funzione distinta dalla generica crittografia del dispositivo. Qui l’utente può scegliere di cifrare esplicitamente l’unità di sistema e, se vuole, anche altri dischi interni o esterni, con BitLocker To Go per le chiavette USB. Questa granularità è importante perché permette di decidere esattamente quali volumi cifrare e come gestire le chiavi, anziché affidarsi a un wrapper automatico che si attiva e si nasconde da solo.

Durante l’attivazione di BitLocker, Windows chiede come proteggere il disco all’avvio: la modalità più comune su PC moderni è quella che usa il TPM (Trusted Platform Module), un chip dedicato che custodisce la chiave principale e permette al sistema di avviarsi senza chiedere alcun codice, a patto che l’ambiente di boot non sia stato alterato. È possibile però innalzare il livello di sicurezza richiedendo un PIN pre‑boot o una chiave su USB, scelte che rendono più difficile l’accesso a chiunque abbia solo il disco fisico in mano. La guida può spiegare che il TPM non è una backdoor, ma un componente hardware progettato per proteggere le chiavi da estrazione diretta, e che la vera vulnerabilità nasce quando una copia della chiave viene esposta a terzi, come nel caso del backup nel cloud.

Passo 3: salvare le chiavi di recupero offline


Il momento decisivo è la schermata “Come vuoi eseguire il backup della chiave di ripristino?”, che appare sia durante l’attivazione di BitLocker sia quando si chiede un backup a posteriori. Le opzioni tipiche sono: salvare la chiave in un file, stamparla su carta, salvarla su un’unità USB oppure, se si è loggati con un account Microsoft, caricarla nel cloud associato all’account. È proprio questa ultima opzione che trasforma la crittografia in un sistema in cui Microsoft può diventare un punto di accesso legale, perché la chiave diventa un dato che l’azienda può consegnare quando riceve un ordine del giudice.

La strategia che conviene adottare è semplice ma richiede disciplina: ignorare l’opzione “Salva nel tuo account Microsoft” e scegliere invece una o più soluzioni offline. Un file su una chiavetta USB dedicata, una stampa su carta conservata in un luogo sicuro, magari una copia in un archivio di password protetto da una passphrase forte, ma mai lasciata sul disco cifrato stesso. È utile spiegare ai lettori che la chiave di recupero è l’equivalente digitale di un master key: se la si perde, i dati possono diventare irrecuperabili, ma se la si lascia in giro o nel cloud, si annulla gran parte del valore della cifratura. Per ogni unità cifrata, BitLocker genera una chiave distinta, che va etichettata e archiviata con cura, ad esempio “Notebook‑Ufficio‑C:” o “SSD‑Backup‑E:”, per evitare confusione in caso di emergenza.

Passo 4: solo dopo, associare l’account Microsoft


Solo dopo aver completato questo passaggio, con tutte le unità crittografate e le chiavi di recupero al sicuro in forma offline, l’utente può decidere se associare il PC al proprio account Microsoft per sfruttare OneDrive, Store e altri servizi. Questa operazione, che può avvenire trasformando l’account locale in account Microsoft o aggiungendone uno come account aggiuntivo, non modifica retroattivamente il metodo con cui sono state salvate le chiavi di BitLocker. La guida può sottolineare che, a quel punto, l’account online serve per la sincronizzazione e l’accesso ai servizi, non per la custodia delle chiavi di cifratura del disco.

Per chi vuole spingere il livello di privacy ancora oltre, è possibile mantenere un profilo di sola cifratura locale, usando l’account Microsoft solo via browser o app dedicate, senza mai legarlo direttamente al profilo di sistema. In ogni caso, è consigliabile verificare periodicamente la pagina online dove Microsoft elenca le chiavi BitLocker associate all’account, per assicurarsi che non compaiano recuperi inattesi per dispositivi che si ritenevano “air‑gapped” dal punto di vista delle chiavi. Questo controllo è particolarmente importante dopo un aggiornamento di Windows o un cambio di hardware, che potrebbero innescare nuovi salvataggi automatici se non si presta attenzione.


Dal punto di vista teorico, la lezione da estrarre da questa storia è che la cifratura è solo una parte del problema; l’altra parte è la gestione delle chiavi. BitLocker, come sistema crittografico, non è stato compromesso, ma il suo modello di backup “conveniente” nel cloud ha creato un punto di accesso che le autorità possono sfruttare. La differenza tra password di accesso a Windows e chiave di recupero BitLocker è cruciale: la prima è solo un lucchetto all’account, mentre la seconda è ciò che consente di decifrare materialmente il contenuto del disco, rendendola un obiettivo privilegiato per chiunque voglia accedere ai dati.

L’invito qui è quello di trattare la crittografia come un processo consapevole, non come un’opzione che si accende e si dimentica. Installare Windows con un account locale, cifrare esplicitamente le unità con BitLocker, salvare le chiavi di recupero offline e solo dopo associare l’account Microsoft è un flusso che preserva sia la comodità dei servizi cloud sia il controllo effettivo sui dati.

In un mondo in cui le chiavi possono essere richieste a un terzo da un tribunale, la vera sicurezza sta nel decidere chi, oltre a noi, può avere accesso a quelle chiavi, e nel fare in modo che quella lista sia il più breve possibile.




Crazy Old Machines


Al and I were talking about the IBM 9020 FAA Air Traffic Control computer system on the podcast. It’s a strange machine, made up of a bunch of IBM System 360 mainframes connected together to a common memory unit, with all sorts of custom peripherals to support keeping track of airplanes in the sky. Absolutely go read the in-depth article on that machine if it sparks your curiosity.

It got me thinking about how strange computers were in the early days, and how boringly similar they’ve all become. Just looking at the word sizes of old machines is a great example. Over the last, say, 40 years, things that do computing have had 4, 8, 16, 32, or even 64-bit words. You noticed the powers-of-two trend going on here, right? Basically starting with the lowly Intel 4004, it’s been round numbers ever since.

Harvard Mark I, by [Topory]On the other side of the timeline, though, you get strange beasts. The classic PDP-8 had 12-bit words, while its predecessors the PDP-6 and PDP-1 had 36 bits and 18 bits respectively. (Factors of six?) There’s a string of military guidance computers that had 27-bit words, while the Apollo Guidance computer ran 15-bit words. UNIVAC III had 25-bit words, putting the 23-bit Harvard Mark I to shame.

I wasn’t there, but it gives you the feeling that each computer is a unique, almost hand-crafted machine. Some must have made their odd architectural choices to suit particular functions, others because some designer had a cleaver idea. I’m not a computer historian, but I’m sure that the word lengths must tell a number of interesting stories.

On the whole, though, it gives the impression of a time when each computer was it’s own unique machine, before the convergence of everything to roughly the same architectural ideas. A much more hackery time, for lack of a better word. We still see echoes of this in the people who make their own “retro” computers these days, either virtually, on a breadboard, or emulated in the fabric of an FPGA. It’s not just nostalgia, though, but a return to a time when there was more creative freedom: a time before 64 bits took over.

This article is part of the Hackaday.com newsletter, delivered every seven days for each of the last 200+ weeks. It also includes our favorite articles from the last seven days that you can see on the web version of the newsletter. Want this type of article to hit your inbox every Friday morning? You should sign up!


hackaday.com/2026/01/24/crazy-…



Isolated AC/DC Power Supply and Testing Station for 230 V Devices


When you’re testing or debugging some mains-powered gear, plugging it directly into the outlet can often be an exciting proposition. If such excitement is not really your thing, you can opt for an isolation transformer and other types of safeties. In the case of [Michał Słomkowski], he opted to take a few steps further by modding a vintage East-German isolating variac with a broken amp meter into an isolated AC/DC power supply and testing station.

The core is formed by the isolated variable transformer, to which a configurable DC output section, a current limiter and digital voltage and current read-outs were added. This enables a variable AC output of 0 – 330 VAC and 0 – 450 VDC on their respective terminals, with the incandescent light bulb providing an optional current limiter.

In its final configuration [Michał] has been using the device for the past four years now for a range of tasks, including the simulating of various undesirable mains power conditions, varying the speed of an old Soviet-era drill, powering vacuum tube devices, capacitor reforming and of course running 100-120 VAC devices from e.g. the US.

As far as feature set goes, we have to admit that it is an impressive device, indeed. Although some parts of it are clearly playing it fast and loose with best practices, with [Michał] admitting to not being an electrician, it was clearly engineered well enough to survive a few years of use, something which cannot be said for even professional laboratory equipment these days.


hackaday.com/2026/01/24/isolat…


Cybersecurity & cyberwarfare ha ricondiviso questo.


#Osiris #ransomware emerges, leveraging BYOVD technique to kill security tools
securityaffairs.com/187279/sec…
#securityaffairs #hacking

Cybersecurity & cyberwarfare ha ricondiviso questo.


Scuola, Sicurezza e Capacità Nazionale: perché il 2026 è prigioniero dei problemi del 1960

📌 Link all'articolo : redhotcyber.com/post/scuola-si…

#redhotcyber #news #educazione #scuola #capacitanazionale #crisedemografica #minaccecyber #rigoreeducativo





Cybersecurity & cyberwarfare ha ricondiviso questo.


Boycott #MilanoCortina! L'ICE in Italia per la "sicurezza" delle Olimpiadi: “Aiutiamo il servizio di sicurezza Usa affiancando la vostra polizia”

Invece che bandirla come organizzazione terroristica, l'abbiamo invitata a casa nostra per gestire la sicurezza in tutto il periodo delle #Olimpiadi e #Paralimpiadi invernali di Milano-Cortina, dal 6 febbraio al 15 marzo. Ed è già presente nella sede di Roma!

Il post di @smaurizi sul #FattoQuotidiano

@politica

ilfattoquotidiano.it/in-edicol… (PAYWALL)

in reply to informapirata ⁂

non è una notizia verificata. Qualcuno forse parla della ipotesi che la delegazione USA possa portate la propria sicurezza, ma nel caso non sarebbe una cosa organizzata dall'Italia.
in reply to Andrea Bontempi

@andreabont
Piantedosi non smentisce: «“Non risulta”, ha detto, precisando che ogni delegazione protegge i propri partecipanti come ritiene opportuno. Ha sottolineato che, in caso di arrivo, gli agenti americani si coordinerebbero con le forze italiane, una prassi definita normale e non un’ingerenza. Piantedosi ha inoltre ricordato che simili misure di sicurezza sono comuni durante visite di alti rappresentanti stranieri.»
tv.alanews.it/2026/01/24/milan…

reshared this

in reply to emama

@emama @andreabont Ok, la sicurezza, ma perchè proprio l'ICE? non bastavano normali agenti?

reshared this

in reply to m3nhir

Credo dipenda dal diverso potere che il Presidente americano ha su i corpi di polizia. Le Agenzie federali dipendono dal Presidente. Altri corpi di polizia invece sono dipendenti dai rispettivi Stati. Non dobbiamo dimenticare che gli USA sono una federazione di Stati che mantengono una considerevole indipendenza.

it.wikipedia.org/wiki/Forze_di…

Questa voce è stata modificata (3 settimane fa)
in reply to emama

@emama @andreabont OK. Però... prima dell'ICE cosa usavano? Questi sono una banda di balordi....

in reply to Claudia

tazza splendida !!! poi sullo sfondo una copia del Kernigham & Ritchie 2nd edition.. 🤓 👍
in reply to victor

@victor_59 ..e non hai visto il resto della libreria.

Custodisco gelosamente una copia del manuale MS-DOS del mio primo computer, arrivato dopo C64 e Amiga.

/feelsold


Cybersecurity & cyberwarfare ha ricondiviso questo.


Un browser funzionante creato con l’AI con 3 milioni di righe di codice: svolta o illusione?

📌 Link all'articolo : redhotcyber.com/post/un-browse…

#redhotcyber #news #svilupposoftware #browser #gpt5 #intelligenzaartificiale #rust #javascript #webdevelopment #programmazione



Environmental Monitoring on the Cheap


If there is one thing we took from [azwankhairul345’s] environmental monitor project, it is this: sensors and computing power for such a project are a solved problem. What’s left is how to package it. The solution, in this case, was using recycled plastic containers, and it looks surprisingly effective.

A Raspberry Pi Pico W has the processing capability and connectivity for a project like this. A large power bank battery provides the power. Off-the-shelf sensors for magnetic field (to measure anemometer spins), air quality, temperature, and humidity are easy to acquire. The plastic tub that protects everything also has PVC pipe and plastic covers for the sensors. Those covers look suspiciously like the tops of drink bottles.

We noted that the battery bank inside the instrument doesn’t have a provision for recharging. That means the device will go about two days before needing some sort of maintenance. Depending on your needs, this could be workable, or you might have to come up with an alternative power supply.

This probably won’t perform as well as a Hoffman box-style container, and we’ve seen those crop up, too. There are a number of ways of sealing things against the elements.


hackaday.com/2026/01/24/enviro…


Cybersecurity & cyberwarfare ha ricondiviso questo.


Kimwolf: la botnet IoT che si muove silenziosa tra reti aziendali e governative

📌 Link all'articolo : redhotcyber.com/post/kimwolf-l…

#redhotcyber #news #cybersecurity #hacking #iot #malware #botnet #sicurezzainformatica #minacceinformatica #proxyresidenziali




Cybersecurity & cyberwarfare ha ricondiviso questo.


CISA Aggiorna Catalogo Vulnerabilità: Nuove Minacce per la Cybersecurity

📌 Link all'articolo : redhotcyber.com/post/cisa-aggi…

#redhotcyber #news #cybersecurity #hacking #vulnerabilita #cisa #versaconcerto #cve202534026 #sicurezzainformatica #minacceinformatiche


Cybersecurity & cyberwarfare ha ricondiviso questo.


207 – Molti pensano di aver capito cos’è l’Intelligenza Artificiale camisanicalzolari.it/207-molti…


Cyber, perché Trump si affiderà alle aziende private. Report Nyt


@Informatica (Italy e non Italy 😁)
Il presidente Usa sta valutando un cambiamento sostanziale nella sua strategia informatica, anche ricorrendo all'aiuto di aziende private per gli attacchi informatici offensivi. L'articolo del New York Times

L'articolo proviene dalla sezione #Cybersecurity di #StartMag la


Cybersecurity & cyberwarfare ha ricondiviso questo.


RE: flipboard.com/@wireditalia/wir…

Apprezzata review di #Metropolis di Lucia Tedesco; uno dei film preferiti di papà.

Metropolis non nasce dal nulla: Lang prende un filo già teso e lo trasforma in un cavo d’alta tensione. La macchina come centro (e padrone) dell’attività umana è un’ossessione che attraversa il cinema quasi fin dall’inizio, poi esplode dopo di lui.
Già nel cinema muto la macchina è ambigua: promessa di progresso e minaccia disumanizzante (profetico, vero?).

In "A Trip to the Moon” (1902, di Méliès) la macchina è ancora giocattolo e meraviglia. Razzi, ingranaggi, leve: la tecnologia è fantasia,è l’infanzia del mito tecnologico che tutti abbiamo sognato!

Lo straordinario corto "The Electric Hotel” (1908, di Segundo de Chomón) vede valigie che si disfano da sole, spazzole automatiche, letti meccanici. È una satira purissima dell’automazione. La macchina come servitore… che sfugge di mano (anche di questa tematica il cinema ne ha lodato l'imperfezione).

E poi c'è "Homunculus” (1916, grnuino Otto Rippert) che è poco conosciuto ma cruciale: un uomo artificiale, creato in laboratorio, "vive" alienato, incapace di empatia. Qui la macchina (o l’uomo-macchina) è già allo stadio di tragedia morale.

Il tema industriale torna anche in "Algol” (1920, di Hans Werckmeister) dove lo scenario è in pratica l'utopia dell'energia infinita, il potere industriale, alienazione (che torna ad essere tratto dominante del futuro immaginato). Anticipa Metropolis in modo sorprendente: il controllo delle masse passa attraverso il controllo della tecnologia.

Tutti questi film preparano il terreno, ma Lang fa il grande salto: la macchina non è più un oggetto narrativo, è l’architettura stessa della società. E dopo l'uscita, il cinema non torna più indietro. La macchina diventa sistema, ideologia, destino.

Da vedere assolutamente: "Modern Times” (1936, di Chaplin) che fornisce una risposta umanista alla catena di montaggio che divora l’uomo. Satira, sì, ma lucidissima dove l’essere umano viene ridotto a ingranaggio intercambiabile (un po' come in "Elysium").
Adorabile è "Things to Come” (1936, di William Menzies), tratto da H.G. Wells: la macchina come "possibile" salvezza tecnocratica. Un ottimismo quasi inquietante, con l’ordine meccanico contro il caos umano.
"2001: A Space Odyssey” (1968, capolavoro di Kubrick) segna il punto di non ritorno: HAL 9000 non è più una macchina che serve l'uomo: lo valuta (concetto ripreso in "Alien").
"THX 1138” (1971, di George Lucas) vede la macchina come sistema di controllo totale. Non solo hardware, ma burocrazia, farmaci, sorveglianza. Metropolis senza cattedrali, solo corridoi, insomma.
E poi "Blade Runner” (1982, di Ridley Scott).. Qui la domanda si ribalta: se la macchina prova emozioni, cos’è l’uomo? La centralità non è più la macchina industriale, ma quella ontologica. Il concetto viene poi ampliato, in un'ottica più introspettiva in "Blade Runner: 2049".
Con "The Matrix” (1999, dei fratelli - ora sorelle - Wachowski) è la perfetta chiusura del cerchio: l’uomo è letteralmente una batteria. La macchina non organizza il lavoro umano, lo coltiva per alimentarsi (concetto visto anche in "Soylent Green").
Lang, alla fine, non ha inventato il tema; paradossalmente ha fatto di peggio (o di meglio): lo ha reso inevitabile.


Metropolis di Fritz Lang e la previsione di una società costruita sull’architettura della disuguaglianza ambientata nel 2026
https://www.wired.it/article/metropolis-film-fritz-lang-previsione-2026-societa-architettura-disuguaglianza/?utm_source=flipboard&utm_medium=activitypub

Pubblicato su Wired Italia @wired-italia-WiredItalia


in reply to Claudia

Grazie per aver condiviso questo interessantissimo post, i film più vecchi non li ho visti, credo che andrò alla ricerca di "THX 1138", per poi andare indietro saltando 2001 che ho visto un sacco di volte (capolavoro).
Tra l'altro ho scoperto solo recentemente che il libro di "2001: A Space Odyssey" ha svariati seguiti (se non ricordo male altri 4 libri) dove HAL torna alla ribalta... devo procurarmeli 😍
in reply to Allanon 🇮🇹

@allanon se ti piace il genere, te li consiglio, tranne ovviamente i più mainstream.

Stavo meditando di aggiungere una rubrica sul cinema alle mie pubblicazioni, tipo "Signorina racconta il Cinema", sullo stile del mio unico ed inimitabile eroe: Federico Buffa ♥️



Beer Keg Plumbing for a Liquid Rocket


When you think of a high performance liquid rocket, what do you think of? Beer kegs? No? Well, when [Ryan] from the YouTube channel “Project KegRocket” saw a beer keg, the first thing he and his friends saw was a pressurized rocket body.

You wouldn’t be crazy if the first thing you thought of was something designed by a massive company or university. Liquid rockets are far from simple to develop, with Keg Rocket being no exception. Liquid oxygen and alcohol is the oxidizer/fuel mixture of choice. Liquid oxygen in particular is a problem with its cryogenic temperatures and tendency to do what rocket fuel does best, burn. This problem causes a large amount of work to simply connect the pipes. Traditional O-rings have no chance at surviving, along with most other non-metallic solutions.

Even with all these problems, the group creating the piece of art is more than capable, having experience creating similar rockets in the past. As of currently, the pumping has been pressure and leak checked. We will be watching this project closely for updates and an eventual launch.

For more rocketry science, be sure to check out aerospike engines for the most efficient engines around. If you want efficiency in your pizzas and beer kegs, check out this keg pizza oven instead!

youtube.com/embed/TzWWWmHvjkI?…


hackaday.com/2026/01/23/beer-k…


Cybersecurity & cyberwarfare ha ricondiviso questo.


RE: infosec.exchange/@lorenzofb/11…

La vita dell'hacker non è un film.

@informatica


Update to this. 25 days later, White Date is still down.

And Martha Root, the hacker, explained their motivations here, but not any technical details, which they promise are coming soon.

"No, this didn’t happen live on stage. And no it wasn’t a moment straight out of a hacker movie. It was mostly timing, a bit of performance and things that were already unfolding."

youtube.com/watch?v=lJsS8lqCpw…

elk.zone/infosec.exchange/@lor…




Polymer Skins That Change Color and Texture When Exposed to Water


Researchers at Stanford University recently came up with an interesting way (Phys.org summary) to create patterns and colors that emerge when a polymer is exposed to water. Although the paper itself is sadly paywalled with no preprint available, it’s fairly easily summarized and illustrated with details from the Supplementary Data section. The polymer used is poly(3,4-ethylenedioxythiophene) polystyrene sulfonate (PEDOT:PSS), which when exposed to an electron beam (electron-beam lithography) undergoes certain changes that become apparent when said water is added.

The polymer is hygroscopic, but the electron beam modifies the extent to which a specific area swells up, thus making it possible to create patterns that depend on the amount of electron beam exposure. In order to ‘colorize’ the polymer, complex cavities are created that modify the angular distribution of light, as illustrated in the top image from the Supplemental Data docx file.

By varying the concentration of IPA versus water, the intermediate swelling states can be controlled. Although this sounds pretty advanced, if you look at the supplementary videos that are already sped up a lot, you can see that it is a very slow process. Compared to an octopus and kin whose ability to alter their own skin texture and coloring is legendary and directly controlled by their nervous system, this isn’t quite in the same ballpark yet, even if it’s pretty cool to watch.


hackaday.com/2026/01/23/polyme…



Lead Acid Battery Upgraded to Lithium Iron Phosphate


Lithium batteries have taken over as the primary battery chemistry from applications ranging from consumer electronics to electric vehicles and all kinds of other things in between. But the standard lithium ion battery has a few downsides, namely issues operating at temperature extremes. Lead acid solves some of these problems but has much lower energy density, and if you want to split the difference with your own battery you’ll need to build your own lithium iron phosphate (LiFePO4) pack.

[Well Done Tips] is building this specific type of battery because the lead acid battery in his electric ATV is on the decline. He’s using cylindrical cells that resemble an 18650 battery but are much larger. Beyond the size, though, many of the design principles from building 18650 battery packs are similar, with the exception that these have screw terminals so that bus bars can be easily attached and don’t require spot welding.

With the pack assembled using 3D printed parts, a battery management system is installed with the balance wires cleverly routed through the prints and attached to the bus bars. The only problem [Well Done Tips] had was not realizing that LiFePO4 batteries’ voltages settle a bit after being fully charged, which meant that he didn’t properly calculate the final voltage of his pack and had to add a cell, bringing his original 15S1P battery up to 16S1P and the correct 54V at full charge.

LiFePO4 has a few other upsides compared to lithium ion as well, including that it delivers almost full power until it’s at about 20% charge. It’s not quite as energy dense but compared to the lead-acid battery he was using is a huge improvement, and is one of the reasons we’ve seen them taking over various other EV conversions as well.

youtube.com/embed/l-nkiqVb0J8?…


hackaday.com/2026/01/23/lead-a…



PLA Mold To Plaster Bust, No Silicone Needed


[Denny] removing a plaster bust from a microwave-softened mold

3D printing is wonderful, but sometimes you just don’t want to look at a plastic peice. Beethoven’s bust wouldn’t look quite right in front of your secret door if it was bright orange PLA, after all. [Denny] over at “Shake the Future” on YouTube is taking a break from metal casting to show off a quick-and-easy plaster casting method— but don’t worry, he still uses a microwave.

Most people, when they’re casting something non-metallic from a 3D print are going to reach for castable silicone and create a mold, first. It works for chocolate just as easily as it does plaster, and it does work well. The problem is that it’s an extra step and extra materials, and who can afford the time and money that takes these days?

[Denny]’s proposal is simple: make the mold out of PLA. He’s using a resin slicer to get the negative shape for the mold, and exporting the STL to slice in PrusaSlicer, but Blender, Meshmixer and we’re pretty sure Cura should all work as well. [Denny] takes care when arranging his print to avoid needing supports inside the mold, but that’s not strictly necessary as long as you’re willing to clean them out. After that, it’s just a matter of mixing up the plaster, pouring it into the PLA, mold, and waiting.

Waiting, but not too long. Rather than let the plaster fully set up, [Denny] only waits about an hour. The mold is still quite ‘wet’ at this point, but that’s a good thing. When [Denny] tosses it in his beloved microwave, the moisture remaining in the plaster gets everything hot, softening the PLA so it can be easily cut with scissors and peeled off.

Yeah, this technique is single-use as presented, which might be one advantage to silicone, if you need multiple copies of a cast. Reusing silicone molds is often doable with a little forethought. On the other hand, by removing the plaster half-cured, smoothing out layer lines becomes a simple matter of buffing with a wet rag, which is certainly an advantage to this technique.

Some of you may be going “well, duh,” so check out [Denny]’s cast-iron benchy if his plasterwork doesn’t impress. We’ve long been impressed with the microwave crucibles shown off on “Shake the Future”, but it’s great to have options. Maybe metal is the material, or perhaps plain plastic is perfect– but if not, perchance Plaster of Paris can play a part in your play.

youtube.com/embed/2j9BSms_avc?…


hackaday.com/2026/01/23/pla-mo…


Cybersecurity & cyberwarfare ha ricondiviso questo.


11-Year-Old critical telnetd flaw found in GNU InetUtils (CVE-2026-24061)
securityaffairs.com/187255/sec…
#securityaffairs #hacking


Hackaday Podcast Episode 354: Firearms, Sky Driving, and Dumpster Diving


Hackaday Editors Elliot Williams and Al Williams took a break to talk about their favorite hacks last week. You can drop in to hear about articulated mirrors, triacs, and even continuous 3D-printing modifications.

Flying on an airplane this weekend? Maybe wait until you get back to read about how the air traffic control works. Back home, you can order a pizza on a Wii or run classic Basic games on a calculator.

For the can’t miss articles, the guys talked about very low Earth orbit satellites and talked about readers who dumpster dive.

Check out the links below if you want to follow along, and don’t be shy. Tell us what you think about this episode in the comments!

html5-player.libsyn.com/embed/…

As always, this episode is available in DRM-free MP3.

Where to Follow Hackaday Podcast

Places to follow Hackaday podcasts:



Episode 354 Show Notes:

What’s that Sound?


  • Congratulations to [Spybob42], who guessed last week’s sound. Come back next week to take your shot at a coveted Hackaday Podcast T-Shirt.


News



Interesting Hacks of the Week:



Quick Hacks:



Can’t-Miss Articles:



hackaday.com/2026/01/23/hackad…



Wired to Wireless: ESP32 Gives Your USB Keyboard Bluetooth


ESP32 BTE Keyboard

Few things rival the usability and speed of a full-sized keyboard for text input. For decades, though, keyboards were mostly wired, which can limit where you use your favorite one. To address this, [KoStard]’s latest project uses an ESP32 to bridge a USB keyboard to BLE devices.

The ESP32-S3 packs a ton of fantastic functionality into its small size and low price—including USB-OTG support, which is key here. Taking advantage of this, [KoStard] programmed an ESP32-S3 to host a keyboard over its USB port while connecting via BLE to devices like cellphones.

There are some slick tricks baked in, too: you can pair with up to three devices and switch between them using a key combo. Some of you might be wondering how you can just plug a microcontroller into a keyboard and have it work. The truth is, it doesn’t without extra hardware. Both the keyboard and ESP32-S3 need power. The simplest fix is a powered USB hub: it can be battery-powered for a truly mobile setup, or use a wired 5V supply so you never have to charge batteries.

We love seeing a simple, affordable microcontroller extend the usefulness of gear you already have. Let us know in the comments about other hacks you’ve used to connect keyboards to devices never designed for them.

youtube.com/embed/dVUMYTfJw0s?…


hackaday.com/2026/01/23/wired-…



Size (and Units) Really Do Matter


We miss the slide rule. It isn’t so much that we liked getting an inexact answer using a physical moving object. But to successfully use a slide rule, you need to be able to roughly estimate the order of magnitude of your result. The slide rule’s computation of 2.2 divided by 8 is the same as it is for 22/8 or 220/0.08. You have to interpret the answer based on your sense of where the true answer lies. If you’ve ever had some kid at a fast food place enter the wrong numbers into a register and then hand you a ridiculous amount of change, you know what we mean.

Recent press reports highlighted a paper from Nvidia that claimed a data center consuming a gigawatt of power could require half a million tons of copper. If you aren’t an expert on datacenter power distribution and copper, you could take that number at face value. But as [Adam Button] reports, you should probably be suspicious of this number. It is almost certainly a typo. We wouldn’t be surprised if you click on the link and find it fixed, but it caused a big news splash before anyone noticed.

Thought Process


Best estimates of the total copper on the entire planet are about 6.3 billion metric tons. We’ve actually only found a fraction of that and mined even less. Of the 700 million metric tons of copper we actually have in circulation, there is a demand for about 28 million tons a year (some of which is met with recycling, so even less new copper is produced annually).

Simple math tells us that a single data center could, in a year, consume 1.7% of the global copper output. While that could be true, it seems suspicious on its face.

Digging further in, you’ll find the paper mentions 200kg per megawatt. So a gigawatt should be 200,000kg, which is, actually, only 200 metric tons. That’s a far cry from 500,000 tons. We suspect they were rounding up from the 440,000 pounds in 200 metric tons to “up to a half a million pounds,” and then flipped pounds to tons.

Glass Houses


We get it. We are infamous for making typos. It is inevitable with any sort of writing at scale and on a tight schedule. After all, the Lincoln Memorial has a typo set in stone, and Webster’s dictionary misprinted an editor’s note that “D or d” could stand for density, and coined a new word: dord.

So we aren’t here to shame Nvidia. People in glass houses, and all that. But it is amazing that so much of the press took the numbers without any critical thinking about whether they made sense.

Innumeracy


We’ve noticed many people glaze over numbers and take them at face value. The same goes for charts. We once saw a chart that was basically a straight line except for one point, which was way out of line. No one bothered to ask for a long time. Finally, someone spoke up and asked. Turns out it was a major issue, but no one wanted to be the one to ask “the dumb question.”

You don’t have to look far to find examples of innumeracy: a phrase coined by [Douglas Hofstadter] and made famous by [John Allen Paulos]. One of our favorites is when a hamburger chain rolled out a “1/3 pound hamburger,” which flopped because customers thought that since three is less than four, they were getting more meat with a “1/4 pound hamburger” at the competitor’s restaurant.

This is all part of the same issue. If you are an electronics or computer person, you probably have a good command of math. You may just not realize how much better your math is than the average person’s.

Gimli Glider

Air Canada 143 after landing” from the FAA
Even so, people who should know better still make mistakes with units and scale. NASA has had at least one famous case of unit issues losing an unmanned probe. In another famous incident, an Air Canada flight ran out of fuel in 1983. Why?

The plane’s fuel sensors were inoperative, so the ground crew manually checked the fuel load with a dipstick. The dipstick read in centimeters. The navigation computer expected fuel to be in kg. Unfortunately, the fuel’s datasheet posted density in pounds/liter. This incorrect conversion happened twice.

Unsurprisingly, the plane was out of fuel and had to glide to an emergency landing on a racetrack that had once been a Royal Canadian Air Force training base. Luckily, Captain Pearson was an experienced glider pilot. With reduced control and few instruments, the Captain brought the 767 down as if it were a huge glider with 61 people onboard. Although the landing gear collapsed and caused some damage, no one on the plane or the ground were seriously hurt.

What’s the Answer?


Sadly, math answers are much easier to get than social answers. Kids routinely complain that they’ll never need math once they leave school. (OK, not kids like we were, but normal kids.) But we all know that is simply not true. Even if your job doesn’t directly involve math, understanding your own finances, making decisions about purchases, or even evaluating political positions often requires that you can see through math nonsense, both intentional and unintentional.

[Antoine de Saint-Exupéry] was a French author, and his 1948 book Citadelle has an interesting passage that may hold part of the answer. If you translate the French directly, it is a bit wordy, but the quote is commonly paraphrased: “If you want to build a ship, don’t herd people together to collect wood and don’t assign them tasks and work, but rather teach them to long for the endless immensity of the sea.”

We learned math because we understood it was the key to building radios, or rockets, or computer games, or whatever it was that you longed to build. We need to teach kids math in a way that makes them anxious to learn the math that will enable their dreams.

How do we do that? We don’t know. Great teachers help. Inspiring technology like moon landings helps. What do you think? Tell us in the comments. Now with 285% more comment goodness. Honest.

We still think slide rules made you better at math. Just like not having GPS made you better at navigation.


hackaday.com/2026/01/23/size-a…

Claudia reshared this.



The Defunct Scooter Company, and the Default Key


Äike were an Estonian scooter company, which sadly went bust last year. [Rasmus Moorats] has one, and since the app and cloud service the scooter depends on have lost functionality, he decided to reverse engineer it. Along the way he achieved his goal, but found a vulnerability that unlocks all Äike scooters.

The write-up is a tale of app and Bluetooth reverse engineering, ending with the startling revelation of a hardcoded key that’s simply “ffffffffffffffff”. From that he can unlock and interact with any Äike scooter, except for a subset that were used as hire scooters and didn’t have Bluetooth. Perhaps of more legitimate use is the reverse engineering of the scooter functionality.

What do you do when you find a vulnerability in a product whose manufacturer has gone? He reported to the vendor of the IoT module inside the scooter, who responded that the key was a default value that should have been changed by the Äike developers. Good luck, should you own one of these machines.

Meanwhile, scooter hacking is very much a thing for other manufacturers too.


hackaday.com/2026/01/23/the-de…

Sabrina Web 📎 reshared this.



Embedded TPM: Watch Out!


Today’s PCs are locked up with Trusted Platform Module (TPM) devices so much so that modern Windows versions insist on having a recent TPM to even install. These have become so prevalent that even larger embedded boards now have TPM and, of course, if you are repurposing consumer hardware, you’ll have to deal with it, too. [Sigma Star] has just the primer for you. It explains what TPM does, how it applies to embedded devices, and where the pitfalls are.

The TPM is sometimes a chip or sometimes secure firmware that is difficult to tamper with. They provide secret storage and can store boot signatures to detect if something has changed how a computer starts up. The TPM can also “sign off” that the system configuration is the same to a remote entity. This allows, for example, a network to prevent a hacked or rogue computer from communicating with other computers.

Embedded systems, usually, aren’t like PCs. A weather station at a remote location may have strangers poking at it without anyone noticing. Also, that remote computer might be expected to be working for many more years than a typical laptop or desktop computer.

This leads to a variety of security concerns that TPM 2.0 attempts to mitigate. For example, it is unreasonable to think a typical attacker might connect a logic analyzer to your PC, but for an embedded system, it is easier to imagine. There is a session-based encryption to protect against someone simply snooping traffic off the communication bus. According to the post, not all implementations use this encryption, however.

Motherboard has a slot for TPM, but no board? We’ve seen people build their own TPM boards.


Title image by [Raimond Spekking] CC BY-SA-4.0


hackaday.com/2026/01/23/embedd…

Joe Vinegar reshared this.




Agenda di Ricerca e Innovazione 2026: così l’Italia si prepara alle nuove sfide cyber


@Informatica (Italy e non Italy 😁)
L’Agenda di Ricerca e Innovazione per la cybersicurezza 2023-2026 si rinnova e si espande, grazie all’aggiornamento appena uscito. Nella sua complessità emerge un quadro rafforzato nel suo impianto trasversale. Molteplici sono stati gli


Cybersecurity & cyberwarfare ha ricondiviso questo.


A wonderful twist on being an open source maintainer is when the person engaging poorly and violating the CoC is a security reporter with some valid observations.

You now have conflicting responsibilities to users' security and to your and your community's safety.

in reply to Filippo Valsorda

Hey, just to be clear - a bunch of people are replying to this post as though you had sought advice. Are you seeking advice here at all? If so, happy to talk about my perspective on this. Otherwise: yeah, this is pretty bleccchhh and you have my sympathies!
in reply to Sumana Harihareswara

@brainwane I was indeed just venting about an annoying but manageable situation, thank you for the offer and for picking up on the intention 😀
Unknown parent

mastodon - Collegamento all'originale
Filippo Valsorda
@ohno @rafaelmartins What if the maintainer we are replying to with unsolicited opinions was actually just venting about an annoying but manageable situation, of which we know next to nothing?

Cybersecurity & cyberwarfare ha ricondiviso questo.


La cosa bella di una relazione è ridere.
Insieme.
E poi baciarsi con cosi tanta passione, che Klimt ci farebbe un dipinto!


Cybersecurity & cyberwarfare ha ricondiviso questo.


#Fortinet warns of active #FortiCloud SSO bypass affecting updated devices
securityaffairs.com/187250/sec…
#securityaffairs #hacking