Ancient Egyptian Flatness
Making a truly flat surface is a modern engineering feat, and not a small one. Even making something straight without reference tools that are already straight is a challenge. However, the ancient Egyptians apparently made very straight, very flat stone work. How did they do it? Probably not alien-supplied CNC machines. [IntoTheMap] explains why it is important and how they may have done it in a recent video you can see below.
The first step is to define flatness, and modern mechanical engineers have taken care of that. If you use 3D printers, you know how hard it is to even get your bed and nozzle “flat” with respect to each other. You’ll almost always have at least a 100 micron variation in the bed distances. The video shows how different levels of flatness require different measurement techniques.
The Great Pyramid’s casing stones have joints measuring 0.5 mm, which is incredible to achieve on such large stones with no modern tools. A stone box in the Pyramid of Seostris II is especially well done and extremely flat, although we can make things flatter today.
The main problem with creating a flat surface is that to do a good job, you need some flat things to start with. However, there is a method from the 19th century that uses three plates and multiple lapping steps to create three very flat plates. In modern times, we use a blue material to indicate raised areas, much as a dentist makes you chomp on a piece of paper to place a crown. There are traces of red ochre on Egyptian stonework that probably served the same purpose.
Lapping large pieces is still a challenge, but moving giant stones at scale appears to have been a solved problem for the Egyptians. Was this the method they used? We don’t know, of course. But it certainly makes sense.
It would be a long time before modern people could make things as flat. While we can do even better now, we also have better measuring tools.
youtube.com/embed/vhv8fAqN1cw?…
Reviewing Tweezers for Microsoldering and SMD Work
Attributed to Picasso was the notion that when art critics get together they talk about content, style, trend, and meaning; but that when painters get together they talk about where to get the best turpentine. We can extend that sentiment into the digital age by saying that when philosophers get together they talk about ideas, theory, and meaning; but when hackers get together they talk about where to get the best tweezers.
In this video [nanofix] runs us through his collection of tweezers talking about what he likes and doesn’t like for each. If you’re just getting into microsoldering this video will have some tips about where you should start, and if you’ve been soldering tiny stuff for a while you might find some ideas for a helpful new bit of kit, or two.
If you’re interested in tweezers and novel applications you might want to check out “smart” tweezers, which can read capacitance and resistance values on the fly. Or read about a suction based SMD tool, which can securely hold SMD components with less risk of them flying across the bench and disappearing forever into the carpet on the floor.
youtube.com/embed/gt9MdfWkz1k?…
securityaffairs.com/187290/bre…
#securityaffairs #hacking #malware
Security Affairs newsletter Round 560 by Pierluigi Paganini – INTERNATIONAL EDITION
A new round of weekly Security Affairs newsletter has arrived! Every week, the best security articles from Security Affairs in your email boxPierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
BitLocker: chiavi fuori dal cloud. Guida alla crittografia di Windows, passo per passo
#tech
spcnet.it/bitlocker-chiavi-fuo…
@informatica
reshared this
Crazy Old Machines
Al and I were talking about the IBM 9020 FAA Air Traffic Control computer system on the podcast. It’s a strange machine, made up of a bunch of IBM System 360 mainframes connected together to a common memory unit, with all sorts of custom peripherals to support keeping track of airplanes in the sky. Absolutely go read the in-depth article on that machine if it sparks your curiosity.
It got me thinking about how strange computers were in the early days, and how boringly similar they’ve all become. Just looking at the word sizes of old machines is a great example. Over the last, say, 40 years, things that do computing have had 4, 8, 16, 32, or even 64-bit words. You noticed the powers-of-two trend going on here, right? Basically starting with the lowly Intel 4004, it’s been round numbers ever since.
Harvard Mark I, by [Topory]On the other side of the timeline, though, you get strange beasts. The classic PDP-8 had 12-bit words, while its predecessors the PDP-6 and PDP-1 had 36 bits and 18 bits respectively. (Factors of six?) There’s a string of military guidance computers that had 27-bit words, while the Apollo Guidance computer ran 15-bit words. UNIVAC III had 25-bit words, putting the 23-bit Harvard Mark I to shame.
I wasn’t there, but it gives you the feeling that each computer is a unique, almost hand-crafted machine. Some must have made their odd architectural choices to suit particular functions, others because some designer had a cleaver idea. I’m not a computer historian, but I’m sure that the word lengths must tell a number of interesting stories.
On the whole, though, it gives the impression of a time when each computer was it’s own unique machine, before the convergence of everything to roughly the same architectural ideas. A much more hackery time, for lack of a better word. We still see echoes of this in the people who make their own “retro” computers these days, either virtually, on a breadboard, or emulated in the fabric of an FPGA. It’s not just nostalgia, though, but a return to a time when there was more creative freedom: a time before 64 bits took over.
This article is part of the Hackaday.com newsletter, delivered every seven days for each of the last 200+ weeks. It also includes our favorite articles from the last seven days that you can see on the web version of the newsletter. Want this type of article to hit your inbox every Friday morning? You should sign up!
Isolated AC/DC Power Supply and Testing Station for 230 V Devices
When you’re testing or debugging some mains-powered gear, plugging it directly into the outlet can often be an exciting proposition. If such excitement is not really your thing, you can opt for an isolation transformer and other types of safeties. In the case of [Michał Słomkowski], he opted to take a few steps further by modding a vintage East-German isolating variac with a broken amp meter into an isolated AC/DC power supply and testing station.
The core is formed by the isolated variable transformer, to which a configurable DC output section, a current limiter and digital voltage and current read-outs were added. This enables a variable AC output of 0 – 330 VAC and 0 – 450 VDC on their respective terminals, with the incandescent light bulb providing an optional current limiter.
In its final configuration [Michał] has been using the device for the past four years now for a range of tasks, including the simulating of various undesirable mains power conditions, varying the speed of an old Soviet-era drill, powering vacuum tube devices, capacitor reforming and of course running 100-120 VAC devices from e.g. the US.
As far as feature set goes, we have to admit that it is an impressive device, indeed. Although some parts of it are clearly playing it fast and loose with best practices, with [Michał] admitting to not being an electrician, it was clearly engineered well enough to survive a few years of use, something which cannot be said for even professional laboratory equipment these days.
securityaffairs.com/187279/sec…
#securityaffairs #hacking
Osiris ransomware emerges, leveraging BYOVD technique to kill security tools
Researchers identified a new Osiris ransomware used in a November 2025 attack, abusing the POORTRY driver via BYOVD to disable security toolsPierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
Scuola, Sicurezza e Capacità Nazionale: perché il 2026 è prigioniero dei problemi del 1960
📌 Link all'articolo : redhotcyber.com/post/scuola-si…
#redhotcyber #news #educazione #scuola #capacitanazionale #crisedemografica #minaccecyber #rigoreeducativo
Scuola, Sicurezza e Capacità Nazionale: perché il 2026 è prigioniero dei problemi del 1960
La scuola italiana nel 2026: come la demografia e la formazione influenzano la capacità nazionale e la sicurezza. Scopri i dati e le strategie per un futuro resiliente.Roberto Villani (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
AGI: i CEO di Google e Anthropic lanciano l’allarme a Davos – il mondo non sarà pronto!
📌 Link all'articolo : redhotcyber.com/post/agi-i-ceo…
#redhotcyber #news #intelligenzaartificiale #deepseek #gemini #claude #ia #worldEconomicForum #forumEconomicoMondiale #DemisHassabis
AGI: i CEO di Google e Anthropic lanciano l’allarme a Davos – il mondo non sarà pronto!
I CEO di Google DeepMind e Anthropic esprimono opinioni diverse sul futuro dell'IA, sui rischi e sull'impatto sulla società.Redazione RHC (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
securityaffairs.com/187267/sec…
#securityaffairs #hacking
U.S. CISA adds a flaw in Broadcom VMware vCenter Server to its Known Exploited Vulnerabilities catalog
The U.S. CISA adds a flaw impacting Broadcom VMware vCenter to its Known Exploited Vulnerabilities catalog.Pierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
Boycott #MilanoCortina! L'ICE in Italia per la "sicurezza" delle Olimpiadi: “Aiutiamo il servizio di sicurezza Usa affiancando la vostra polizia”
Invece che bandirla come organizzazione terroristica, l'abbiamo invitata a casa nostra per gestire la sicurezza in tutto il periodo delle #Olimpiadi e #Paralimpiadi invernali di Milano-Cortina, dal 6 febbraio al 15 marzo. Ed è già presente nella sede di Roma!
Il post di @smaurizi sul #FattoQuotidiano
ilfattoquotidiano.it/in-edicol… (PAYWALL)
Milano-Cortina, la famigerata Ice arriva in Italia per la sicurezza delle Olimpiadi
Altro che spirito olimpicoDall’omicidio di Renee Good in Minnesota fino ai Giochi di Milano-Cortina: “Aiutiamo il servizio di sicurezza Usa affiancando la vostra polizia”Stefania Maurizi (Il Fatto Quotidiano)
like this
reshared this
Un browser funzionante creato con l’AI con 3 milioni di righe di codice: svolta o illusione?
📌 Link all'articolo : redhotcyber.com/post/un-browse…
#redhotcyber #news #svilupposoftware #browser #gpt5 #intelligenzaartificiale #rust #javascript #webdevelopment #programmazione
Un browser funzionante creato con l'AI con 3 milioni di righe di codice: svolta o illusione?
Un team di sviluppatori crea un browser con GPT-5.2, ma gli esperti sono scettici sui risultati. Scopri di più su questo progetto ambizioso.Redazione RHC (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
Environmental Monitoring on the Cheap
If there is one thing we took from [azwankhairul345’s] environmental monitor project, it is this: sensors and computing power for such a project are a solved problem. What’s left is how to package it. The solution, in this case, was using recycled plastic containers, and it looks surprisingly effective.
A Raspberry Pi Pico W has the processing capability and connectivity for a project like this. A large power bank battery provides the power. Off-the-shelf sensors for magnetic field (to measure anemometer spins), air quality, temperature, and humidity are easy to acquire. The plastic tub that protects everything also has PVC pipe and plastic covers for the sensors. Those covers look suspiciously like the tops of drink bottles.
We noted that the battery bank inside the instrument doesn’t have a provision for recharging. That means the device will go about two days before needing some sort of maintenance. Depending on your needs, this could be workable, or you might have to come up with an alternative power supply.
This probably won’t perform as well as a Hoffman box-style container, and we’ve seen those crop up, too. There are a number of ways of sealing things against the elements.
Kimwolf: la botnet IoT che si muove silenziosa tra reti aziendali e governative
📌 Link all'articolo : redhotcyber.com/post/kimwolf-l…
#redhotcyber #news #cybersecurity #hacking #iot #malware #botnet #sicurezzainformatica #minacceinformatica #proxyresidenziali
Kimwolf: la botnet IoT che si muove silenziosa tra reti aziendali e governative
Scopri Kimwolf, la botnet IoT che ha compromesso milioni di dispositivi e rappresenta una minaccia silenziosa per le reti aziendali e governative.Redazione RHC (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
NoName057(16) colpisce l’Italia 487 volte negli ultimi 3 mesi: l’ondata DDoS non si ferma
📌 Link all'articolo : redhotcyber.com/post/noname057…
#redhotcyber #news #cybersecurity #hacking #ddos #attacchidDos #gruppihacktivisti #sicherzainformatica #italiahacktivisti #nome057
NoName057(16) colpisce l’Italia 487 volte negli ultimi 3 mesi: l’ondata DDoS non si ferma
L'Italia è stata colpita da 487 attacchi DDoS tra ottobre 2024 e gennaio 2026, secondo il gruppo hacktivista NoName057(16).Redazione RHC (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
Cavi Sottomarini: allarmi ignorati e processi incerti. La verità sugli incidenti sotto il mare
📌 Link all'articolo : redhotcyber.com/post/cavi-sott…
#redhotcyber #news #taiwan #cavisottomarini #sicurezzamarittima #sorveglianzamarina #leggisottomarine #controlyuan #normativasicurezza
Cavi Sottomarini: allarmi ignorati e processi incerti. La verità sugli incidenti sotto il mare
Taiwan affronta la sfida della protezione dei cavi sottomarini danneggiati, tra tensioni politiche e limiti nella sorveglianza e nella giurisdizione.Redazione RHC (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
CISA Aggiorna Catalogo Vulnerabilità: Nuove Minacce per la Cybersecurity
📌 Link all'articolo : redhotcyber.com/post/cisa-aggi…
#redhotcyber #news #cybersecurity #hacking #vulnerabilita #cisa #versaconcerto #cve202534026 #sicurezzainformatica #minacceinformatiche
CISA Aggiorna Catalogo Vulnerabilità: Nuove Minacce per la Cybersecurity
La CISA aggiorna il catalogo delle vulnerabilità note sfruttate con quattro nuove voci pericolose, minacciando la sicurezza di strumenti di sviluppo e piattaforme aziendali.Redazione RHC (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
207 - Molti pensano di aver capito cos’è l’Intelligenza Artificiale - Marco Camisani Calzolari
Molti pensano di aver capito cos’è l’Intelligenza Artificiale, ma spesso non è così. Qui vi spiego cos’è in modo semplice e per tutti. Molte persone pensano di aver capito cos’è l’AI perché la vedono parlare, scrivere, rispondere.Web Staff MCC (Marco Camisani Calzolari)
Cybersecurity & cyberwarfare reshared this.
Cyber, perché Trump si affiderà alle aziende private. Report Nyt
@Informatica (Italy e non Italy 😁)
Il presidente Usa sta valutando un cambiamento sostanziale nella sua strategia informatica, anche ricorrendo all'aiuto di aziende private per gli attacchi informatici offensivi. L'articolo del New York Times
L'articolo proviene dalla sezione #Cybersecurity di #StartMag la
Informatica (Italy e non Italy) reshared this.
RE: flipboard.com/@wireditalia/wir…
Apprezzata review di #Metropolis di Lucia Tedesco; uno dei film preferiti di papà.
Metropolis non nasce dal nulla: Lang prende un filo già teso e lo trasforma in un cavo d’alta tensione. La macchina come centro (e padrone) dell’attività umana è un’ossessione che attraversa il cinema quasi fin dall’inizio, poi esplode dopo di lui.
Già nel cinema muto la macchina è ambigua: promessa di progresso e minaccia disumanizzante (profetico, vero?).
In "A Trip to the Moon” (1902, di Méliès) la macchina è ancora giocattolo e meraviglia. Razzi, ingranaggi, leve: la tecnologia è fantasia,è l’infanzia del mito tecnologico che tutti abbiamo sognato!
Lo straordinario corto "The Electric Hotel” (1908, di Segundo de Chomón) vede valigie che si disfano da sole, spazzole automatiche, letti meccanici. È una satira purissima dell’automazione. La macchina come servitore… che sfugge di mano (anche di questa tematica il cinema ne ha lodato l'imperfezione).
E poi c'è "Homunculus” (1916, grnuino Otto Rippert) che è poco conosciuto ma cruciale: un uomo artificiale, creato in laboratorio, "vive" alienato, incapace di empatia. Qui la macchina (o l’uomo-macchina) è già allo stadio di tragedia morale.
Il tema industriale torna anche in "Algol” (1920, di Hans Werckmeister) dove lo scenario è in pratica l'utopia dell'energia infinita, il potere industriale, alienazione (che torna ad essere tratto dominante del futuro immaginato). Anticipa Metropolis in modo sorprendente: il controllo delle masse passa attraverso il controllo della tecnologia.
Tutti questi film preparano il terreno, ma Lang fa il grande salto: la macchina non è più un oggetto narrativo, è l’architettura stessa della società. E dopo l'uscita, il cinema non torna più indietro. La macchina diventa sistema, ideologia, destino.
Da vedere assolutamente: "Modern Times” (1936, di Chaplin) che fornisce una risposta umanista alla catena di montaggio che divora l’uomo. Satira, sì, ma lucidissima dove l’essere umano viene ridotto a ingranaggio intercambiabile (un po' come in "Elysium").
Adorabile è "Things to Come” (1936, di William Menzies), tratto da H.G. Wells: la macchina come "possibile" salvezza tecnocratica. Un ottimismo quasi inquietante, con l’ordine meccanico contro il caos umano.
"2001: A Space Odyssey” (1968, capolavoro di Kubrick) segna il punto di non ritorno: HAL 9000 non è più una macchina che serve l'uomo: lo valuta (concetto ripreso in "Alien").
"THX 1138” (1971, di George Lucas) vede la macchina come sistema di controllo totale. Non solo hardware, ma burocrazia, farmaci, sorveglianza. Metropolis senza cattedrali, solo corridoi, insomma.
E poi "Blade Runner” (1982, di Ridley Scott).. Qui la domanda si ribalta: se la macchina prova emozioni, cos’è l’uomo? La centralità non è più la macchina industriale, ma quella ontologica. Il concetto viene poi ampliato, in un'ottica più introspettiva in "Blade Runner: 2049".
Con "The Matrix” (1999, dei fratelli - ora sorelle - Wachowski) è la perfetta chiusura del cerchio: l’uomo è letteralmente una batteria. La macchina non organizza il lavoro umano, lo coltiva per alimentarsi (concetto visto anche in "Soylent Green").
Lang, alla fine, non ha inventato il tema; paradossalmente ha fatto di peggio (o di meglio): lo ha reso inevitabile.
Cybersecurity & cyberwarfare reshared this.
Tra l'altro ho scoperto solo recentemente che il libro di "2001: A Space Odyssey" ha svariati seguiti (se non ricordo male altri 4 libri) dove HAL torna alla ribalta... devo procurarmeli 😍
Beer Keg Plumbing for a Liquid Rocket
When you think of a high performance liquid rocket, what do you think of? Beer kegs? No? Well, when [Ryan] from the YouTube channel “Project KegRocket” saw a beer keg, the first thing he and his friends saw was a pressurized rocket body.
You wouldn’t be crazy if the first thing you thought of was something designed by a massive company or university. Liquid rockets are far from simple to develop, with Keg Rocket being no exception. Liquid oxygen and alcohol is the oxidizer/fuel mixture of choice. Liquid oxygen in particular is a problem with its cryogenic temperatures and tendency to do what rocket fuel does best, burn. This problem causes a large amount of work to simply connect the pipes. Traditional O-rings have no chance at surviving, along with most other non-metallic solutions.
Even with all these problems, the group creating the piece of art is more than capable, having experience creating similar rockets in the past. As of currently, the pumping has been pressure and leak checked. We will be watching this project closely for updates and an eventual launch.
For more rocketry science, be sure to check out aerospike engines for the most efficient engines around. If you want efficiency in your pizzas and beer kegs, check out this keg pizza oven instead!
youtube.com/embed/TzWWWmHvjkI?…
Polymer Skins That Change Color and Texture When Exposed to Water
Researchers at Stanford University recently came up with an interesting way (Phys.org summary) to create patterns and colors that emerge when a polymer is exposed to water. Although the paper itself is sadly paywalled with no preprint available, it’s fairly easily summarized and illustrated with details from the Supplementary Data section. The polymer used is poly(3,4-ethylenedioxythiophene) polystyrene sulfonate (PEDOT:PSS), which when exposed to an electron beam (electron-beam lithography) undergoes certain changes that become apparent when said water is added.
The polymer is hygroscopic, but the electron beam modifies the extent to which a specific area swells up, thus making it possible to create patterns that depend on the amount of electron beam exposure. In order to ‘colorize’ the polymer, complex cavities are created that modify the angular distribution of light, as illustrated in the top image from the Supplemental Data docx file.
By varying the concentration of IPA versus water, the intermediate swelling states can be controlled. Although this sounds pretty advanced, if you look at the supplementary videos that are already sped up a lot, you can see that it is a very slow process. Compared to an octopus and kin whose ability to alter their own skin texture and coloring is legendary and directly controlled by their nervous system, this isn’t quite in the same ballpark yet, even if it’s pretty cool to watch.
Lead Acid Battery Upgraded to Lithium Iron Phosphate
Lithium batteries have taken over as the primary battery chemistry from applications ranging from consumer electronics to electric vehicles and all kinds of other things in between. But the standard lithium ion battery has a few downsides, namely issues operating at temperature extremes. Lead acid solves some of these problems but has much lower energy density, and if you want to split the difference with your own battery you’ll need to build your own lithium iron phosphate (LiFePO4) pack.
[Well Done Tips] is building this specific type of battery because the lead acid battery in his electric ATV is on the decline. He’s using cylindrical cells that resemble an 18650 battery but are much larger. Beyond the size, though, many of the design principles from building 18650 battery packs are similar, with the exception that these have screw terminals so that bus bars can be easily attached and don’t require spot welding.
With the pack assembled using 3D printed parts, a battery management system is installed with the balance wires cleverly routed through the prints and attached to the bus bars. The only problem [Well Done Tips] had was not realizing that LiFePO4 batteries’ voltages settle a bit after being fully charged, which meant that he didn’t properly calculate the final voltage of his pack and had to add a cell, bringing his original 15S1P battery up to 16S1P and the correct 54V at full charge.
LiFePO4 has a few other upsides compared to lithium ion as well, including that it delivers almost full power until it’s at about 20% charge. It’s not quite as energy dense but compared to the lead-acid battery he was using is a huge improvement, and is one of the reasons we’ve seen them taking over various other EV conversions as well.
youtube.com/embed/l-nkiqVb0J8?…
PLA Mold To Plaster Bust, No Silicone Needed
3D printing is wonderful, but sometimes you just don’t want to look at a plastic peice. Beethoven’s bust wouldn’t look quite right in front of your secret door if it was bright orange PLA, after all. [Denny] over at “Shake the Future” on YouTube is taking a break from metal casting to show off a quick-and-easy plaster casting method— but don’t worry, he still uses a microwave.
Most people, when they’re casting something non-metallic from a 3D print are going to reach for castable silicone and create a mold, first. It works for chocolate just as easily as it does plaster, and it does work well. The problem is that it’s an extra step and extra materials, and who can afford the time and money that takes these days?
[Denny]’s proposal is simple: make the mold out of PLA. He’s using a resin slicer to get the negative shape for the mold, and exporting the STL to slice in PrusaSlicer, but Blender, Meshmixer and we’re pretty sure Cura should all work as well. [Denny] takes care when arranging his print to avoid needing supports inside the mold, but that’s not strictly necessary as long as you’re willing to clean them out. After that, it’s just a matter of mixing up the plaster, pouring it into the PLA, mold, and waiting.
Waiting, but not too long. Rather than let the plaster fully set up, [Denny] only waits about an hour. The mold is still quite ‘wet’ at this point, but that’s a good thing. When [Denny] tosses it in his beloved microwave, the moisture remaining in the plaster gets everything hot, softening the PLA so it can be easily cut with scissors and peeled off.
Yeah, this technique is single-use as presented, which might be one advantage to silicone, if you need multiple copies of a cast. Reusing silicone molds is often doable with a little forethought. On the other hand, by removing the plaster half-cured, smoothing out layer lines becomes a simple matter of buffing with a wet rag, which is certainly an advantage to this technique.
Some of you may be going “well, duh,” so check out [Denny]’s cast-iron benchy if his plasterwork doesn’t impress. We’ve long been impressed with the microwave crucibles shown off on “Shake the Future”, but it’s great to have options. Maybe metal is the material, or perhaps plain plastic is perfect– but if not, perchance Plaster of Paris can play a part in your play.
youtube.com/embed/2j9BSms_avc?…
securityaffairs.com/187255/sec…
#securityaffairs #hacking
11-Year-Old critical telnetd flaw found in GNU InetUtils (CVE-2026-24061)
Critical telnetd flaw CVE-2026-24061 (CVSS 9.8) affects all GNU InetUtils versions 1.9.3–2.7 and went unnoticed for nearly 11 years.Pierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
Hackaday Podcast Episode 354: Firearms, Sky Driving, and Dumpster Diving
Hackaday Editors Elliot Williams and Al Williams took a break to talk about their favorite hacks last week. You can drop in to hear about articulated mirrors, triacs, and even continuous 3D-printing modifications.
Flying on an airplane this weekend? Maybe wait until you get back to read about how the air traffic control works. Back home, you can order a pizza on a Wii or run classic Basic games on a calculator.
For the can’t miss articles, the guys talked about very low Earth orbit satellites and talked about readers who dumpster dive.
Check out the links below if you want to follow along, and don’t be shy. Tell us what you think about this episode in the comments!
html5-player.libsyn.com/embed/…
As always, this episode is available in DRM-free MP3.
Where to Follow Hackaday Podcast
Places to follow Hackaday podcasts:
Episode 354 Show Notes:
What’s that Sound?
- Congratulations to [Spybob42], who guessed last week’s sound. Come back next week to take your shot at a coveted Hackaday Podcast T-Shirt.
News
Interesting Hacks of the Week:
- How To Use Tiny Open Loop Actuators For A Living Mirror
- A Guide To Using Triacs For Switching AC
- Testing A Continuous Printing Mod For The Bambu Lab A1 Mini
- Accurately Aiming Audio With An Ultrasonic Array
- Acoustic Mirrors: How To Find Planes Without RADAR
- A Phased-Array Ultrasonic 3D Scanner From Scratch
- Supercon 2024: Killing Mosquitoes With Freaking Drones, And Sonar
- Build A Parametric Speaker Of Your Own
- Self-Powered Top Spins For Hours
- Inside Air Traffic Control
Quick Hacks:
- Elliot’s Picks:
- The Windows Interface You Didn’t Like, For Linux
- Binary And Digital Gradients For Telling Time
- Ordering Pizza On The Nintendo Wii (Again)
- Al’s Picks:
- BASIC On A Calculator Again
- Robot Sees Light With No CPU
- Flux And Solder Paste Dispenser Looks Good While Doing It
- BASIC On A Calculator Again
Can’t-Miss Articles:
hackaday.com/2026/01/23/hackad…
Wired to Wireless: ESP32 Gives Your USB Keyboard Bluetooth
Few things rival the usability and speed of a full-sized keyboard for text input. For decades, though, keyboards were mostly wired, which can limit where you use your favorite one. To address this, [KoStard]’s latest project uses an ESP32 to bridge a USB keyboard to BLE devices.
The ESP32-S3 packs a ton of fantastic functionality into its small size and low price—including USB-OTG support, which is key here. Taking advantage of this, [KoStard] programmed an ESP32-S3 to host a keyboard over its USB port while connecting via BLE to devices like cellphones.
There are some slick tricks baked in, too: you can pair with up to three devices and switch between them using a key combo. Some of you might be wondering how you can just plug a microcontroller into a keyboard and have it work. The truth is, it doesn’t without extra hardware. Both the keyboard and ESP32-S3 need power. The simplest fix is a powered USB hub: it can be battery-powered for a truly mobile setup, or use a wired 5V supply so you never have to charge batteries.
We love seeing a simple, affordable microcontroller extend the usefulness of gear you already have. Let us know in the comments about other hacks you’ve used to connect keyboards to devices never designed for them.
youtube.com/embed/dVUMYTfJw0s?…
Size (and Units) Really Do Matter
We miss the slide rule. It isn’t so much that we liked getting an inexact answer using a physical moving object. But to successfully use a slide rule, you need to be able to roughly estimate the order of magnitude of your result. The slide rule’s computation of 2.2 divided by 8 is the same as it is for 22/8 or 220/0.08. You have to interpret the answer based on your sense of where the true answer lies. If you’ve ever had some kid at a fast food place enter the wrong numbers into a register and then hand you a ridiculous amount of change, you know what we mean.
Recent press reports highlighted a paper from Nvidia that claimed a data center consuming a gigawatt of power could require half a million tons of copper. If you aren’t an expert on datacenter power distribution and copper, you could take that number at face value. But as [Adam Button] reports, you should probably be suspicious of this number. It is almost certainly a typo. We wouldn’t be surprised if you click on the link and find it fixed, but it caused a big news splash before anyone noticed.
Thought Process
Best estimates of the total copper on the entire planet are about 6.3 billion metric tons. We’ve actually only found a fraction of that and mined even less. Of the 700 million metric tons of copper we actually have in circulation, there is a demand for about 28 million tons a year (some of which is met with recycling, so even less new copper is produced annually).
Simple math tells us that a single data center could, in a year, consume 1.7% of the global copper output. While that could be true, it seems suspicious on its face.
Digging further in, you’ll find the paper mentions 200kg per megawatt. So a gigawatt should be 200,000kg, which is, actually, only 200 metric tons. That’s a far cry from 500,000 tons. We suspect they were rounding up from the 440,000 pounds in 200 metric tons to “up to a half a million pounds,” and then flipped pounds to tons.
Glass Houses
We get it. We are infamous for making typos. It is inevitable with any sort of writing at scale and on a tight schedule. After all, the Lincoln Memorial has a typo set in stone, and Webster’s dictionary misprinted an editor’s note that “D or d” could stand for density, and coined a new word: dord.
So we aren’t here to shame Nvidia. People in glass houses, and all that. But it is amazing that so much of the press took the numbers without any critical thinking about whether they made sense.
Innumeracy
We’ve noticed many people glaze over numbers and take them at face value. The same goes for charts. We once saw a chart that was basically a straight line except for one point, which was way out of line. No one bothered to ask for a long time. Finally, someone spoke up and asked. Turns out it was a major issue, but no one wanted to be the one to ask “the dumb question.”
You don’t have to look far to find examples of innumeracy: a phrase coined by [Douglas Hofstadter] and made famous by [John Allen Paulos]. One of our favorites is when a hamburger chain rolled out a “1/3 pound hamburger,” which flopped because customers thought that since three is less than four, they were getting more meat with a “1/4 pound hamburger” at the competitor’s restaurant.
This is all part of the same issue. If you are an electronics or computer person, you probably have a good command of math. You may just not realize how much better your math is than the average person’s.
Gimli Glider
“Air Canada 143 after landing” from the FAA
Even so, people who should know better still make mistakes with units and scale. NASA has had at least one famous case of unit issues losing an unmanned probe. In another famous incident, an Air Canada flight ran out of fuel in 1983. Why?
The plane’s fuel sensors were inoperative, so the ground crew manually checked the fuel load with a dipstick. The dipstick read in centimeters. The navigation computer expected fuel to be in kg. Unfortunately, the fuel’s datasheet posted density in pounds/liter. This incorrect conversion happened twice.
Unsurprisingly, the plane was out of fuel and had to glide to an emergency landing on a racetrack that had once been a Royal Canadian Air Force training base. Luckily, Captain Pearson was an experienced glider pilot. With reduced control and few instruments, the Captain brought the 767 down as if it were a huge glider with 61 people onboard. Although the landing gear collapsed and caused some damage, no one on the plane or the ground were seriously hurt.
What’s the Answer?
Sadly, math answers are much easier to get than social answers. Kids routinely complain that they’ll never need math once they leave school. (OK, not kids like we were, but normal kids.) But we all know that is simply not true. Even if your job doesn’t directly involve math, understanding your own finances, making decisions about purchases, or even evaluating political positions often requires that you can see through math nonsense, both intentional and unintentional.
[Antoine de Saint-Exupéry] was a French author, and his 1948 book Citadelle has an interesting passage that may hold part of the answer. If you translate the French directly, it is a bit wordy, but the quote is commonly paraphrased: “If you want to build a ship, don’t herd people together to collect wood and don’t assign them tasks and work, but rather teach them to long for the endless immensity of the sea.”
We learned math because we understood it was the key to building radios, or rockets, or computer games, or whatever it was that you longed to build. We need to teach kids math in a way that makes them anxious to learn the math that will enable their dreams.
How do we do that? We don’t know. Great teachers help. Inspiring technology like moon landings helps. What do you think? Tell us in the comments. Now with 285% more comment goodness. Honest.
We still think slide rules made you better at math. Just like not having GPS made you better at navigation.
Claudia reshared this.
The Defunct Scooter Company, and the Default Key
Äike were an Estonian scooter company, which sadly went bust last year. [Rasmus Moorats] has one, and since the app and cloud service the scooter depends on have lost functionality, he decided to reverse engineer it. Along the way he achieved his goal, but found a vulnerability that unlocks all Äike scooters.
The write-up is a tale of app and Bluetooth reverse engineering, ending with the startling revelation of a hardcoded key that’s simply “ffffffffffffffff”. From that he can unlock and interact with any Äike scooter, except for a subset that were used as hire scooters and didn’t have Bluetooth. Perhaps of more legitimate use is the reverse engineering of the scooter functionality.
What do you do when you find a vulnerability in a product whose manufacturer has gone? He reported to the vendor of the IoT module inside the scooter, who responded that the key was a default value that should have been changed by the Äike developers. Good luck, should you own one of these machines.
Meanwhile, scooter hacking is very much a thing for other manufacturers too.
Sabrina Web 📎 reshared this.
Embedded TPM: Watch Out!
Today’s PCs are locked up with Trusted Platform Module (TPM) devices so much so that modern Windows versions insist on having a recent TPM to even install. These have become so prevalent that even larger embedded boards now have TPM and, of course, if you are repurposing consumer hardware, you’ll have to deal with it, too. [Sigma Star] has just the primer for you. It explains what TPM does, how it applies to embedded devices, and where the pitfalls are.
The TPM is sometimes a chip or sometimes secure firmware that is difficult to tamper with. They provide secret storage and can store boot signatures to detect if something has changed how a computer starts up. The TPM can also “sign off” that the system configuration is the same to a remote entity. This allows, for example, a network to prevent a hacked or rogue computer from communicating with other computers.
Embedded systems, usually, aren’t like PCs. A weather station at a remote location may have strangers poking at it without anyone noticing. Also, that remote computer might be expected to be working for many more years than a typical laptop or desktop computer.
This leads to a variety of security concerns that TPM 2.0 attempts to mitigate. For example, it is unreasonable to think a typical attacker might connect a logic analyzer to your PC, but for an embedded system, it is easier to imagine. There is a session-based encryption to protect against someone simply snooping traffic off the communication bus. According to the post, not all implementations use this encryption, however.
Motherboard has a slot for TPM, but no board? We’ve seen people build their own TPM boards.
Title image by [Raimond Spekking] CC BY-SA-4.0
Joe Vinegar reshared this.
Agenda di Ricerca e Innovazione 2026: così l’Italia si prepara alle nuove sfide cyber
@Informatica (Italy e non Italy 😁)
L’Agenda di Ricerca e Innovazione per la cybersicurezza 2023-2026 si rinnova e si espande, grazie all’aggiornamento appena uscito. Nella sua complessità emerge un quadro rafforzato nel suo impianto trasversale. Molteplici sono stati gli
Informatica (Italy e non Italy) reshared this.
A wonderful twist on being an open source maintainer is when the person engaging poorly and violating the CoC is a security reporter with some valid observations.
You now have conflicting responsibilities to users' security and to your and your community's safety.
Cybersecurity & cyberwarfare reshared this.
NexPhone: tre sistemi operativi in tasca! Il telefono che sfida il concetto stesso di PC
📌 Link all'articolo : redhotcyber.com/post/nexphone-…
#redhotcyber #news #sistemioperativi #multisistema #android #debianlinux #windows11 #smartphone #computer #tecnologia #informatica
NexPhone: tre sistemi operativi in tasca! Il telefono che sfida il concetto stesso di PC
NexPhone integra Android, Debian Linux e Windows 11 in un unico dispositivo, offrendo una soluzione multisistema.Redazione RHC (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
securityaffairs.com/187250/sec…
#securityaffairs #hacking
Fortinet warns of active FortiCloud SSO bypass affecting updated devices
Fortinet confirmed attacks are bypassing FortiCloud SSO authentication, affecting even fully patched devices, similar to recent SSO flaws.Pierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
BlueNoroff: il gruppo di hacker che sta rivoluzionando la criminalità informatica
📌 Link all'articolo : redhotcyber.com/post/bluenorof…
#redhotcyber #news #cybersecurity #hacking #malware #ransomware #cryptovalute #gruppodihacker #lazarus #bluenoroff #criminalitàinformatica
BlueNoroff: il gruppo di hacker che sta rivoluzionando la criminalità informatica
Scopri come il gruppo di hacker BlueNoroff sta cambiando la faccia della criminalità informatica con attacchi sempre più sofisticati e mirati.Redazione RHC (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
TiTiNoNero
in reply to informapirata ⁂ • • •Sembra che sia quasi diventato un nuovo fenomeno di costume. Già lo sto sentendo:
«Mi faccio il selfie con l'ICE, ma quanto sono tosti!?»
Diverrà la nuova frontiera della tostaggine, dopo i Marines, gli Spetsnaz, Chuck Norris e il Krav Maga israeliano... e su di noi - povere mezzeseghe italiche - queste cose fanno una enorme presa...
@politica
reshared this
informapirata ⁂ reshared this.
informapirata ⁂
in reply to TiTiNoNero • • •@77nn mediamente dal punto di vista professionale l'ICE è monnezza e addirittura fa molto più schifo rispetto alle stesse forze di polizia USA (e tieni conto che i poliziotti delle città sono poco più che vigili urbani con le pistole e il loro addestramento non è neanche minimamente paragonabile a quello dei nostri poliziotti e carabinieri)...
Quindi diciamo che questo rischio non lo vedo concreto, ma magari è meglio che non mi metta a fare previsioni 😂
@smaurizi @politica
informapirata ⁂
Unknown parent • • •@OhSeitan lungi da me difendere la sora Fascia, ma il governo Meloni ha fatto quello che avrebbe fatto qualunque governo: @smaurizi spiega bene che gli accordi dei paesi europei sono con il DHS, Department of Homeland Security, l’agenzia creata dopo l’11/9 da Bush Sr per proteggere FRONTIERE e PATRIO SUOLO e l’ICE fa parte del DHS
@politica
reshared this
Politica interna, europea e internazionale reshared this.
GioSeve
in reply to informapirata ⁂ • • •informapirata ⁂
in reply to GioSeve • • •@Gioseve20 no, già nel 2006 durante i mondiali di calcio in Germania il Department of Homeland Security ha aiutato la Germania a mettere in sicurezza il Campionato mondiale dal rischio del terrorismo: i funzionari dell’ICE in quel caso hanno lavorando dentro i centri operativi. Ma si trattava di personale diverso e selezionato, non delle squadracce che abbiamo visto in questi giorni.
Spero in una interrogazione parlamentare
@smaurizi @politica
informapirata ⁂
in reply to informapirata ⁂ • • •@Gioseve20 naturalmente in Italia non verranno gli scappati di casa che vediamo per le strade USA, ma i funzionari di alto livello. Il problema è che oggi l'ICE dovrebbe essere messa al bando dall'ONU, non invitata in giro per il mondo
@smaurizi @politica
GioSeve
in reply to informapirata ⁂ • • •Eh?!?
in reply to informapirata ⁂ • • •Seconda domanda: gli accordi "impongono" la collaborazione o stavolta qualcuno del governo italiano avrebbe potuto dire "non ci serve niente, grazie."?
m3nhir
in reply to informapirata ⁂ • • •Politica interna, europea e internazionale reshared this.
informapirata ⁂
in reply to Eh?!? • • •@Eh__tweet questo tipo di accordi di solito non impone nulla, ma è chiaro che se il governo italiano dicesse "non ci serve niente, grazie." sarebbe uno sgarbo che va giutsificato con una narrativa credibile.
E sinceramente, non ce lo vedi un governo di mezze tacche che hanno costruito il loro consenso vomitando odio contro gli immigrati e facendo i cosplay di Balbo e Galbiati che dice "no, non vogliamo collaborare con chi deporta gli immigrati e ha comportamenti fascisti!"
[AF]2050
in reply to informapirata ⁂ • • •Io non
PORCO SCHIFO GLI ICE
Devo fare di tutto per evitare di guardare queste olimpiadi, per una volta devo provare a supplicare i miei genitori a non guardarli
reshared this
Politica interna, europea e internazionale, informapirata ⁂ e Ciccio dell’Oca reshared this.
Gazzetta del Cadavere
in reply to informapirata ⁂ • • •Politica interna, europea e internazionale reshared this.
informapirata ⁂
in reply to Gazzetta del Cadavere • • •@gazzettadelcadavere ehm... Quella cinese, in realtà, l'abbiamo invitata già e dispone anche di qualche sede sparsa qua e là.
Quanto alla Russia, abbiamo fatto entrare l'armata rossa a Bergamo durante il Covid...
Quando si tratta di fare la figura dei servi, in Italia siamo sempre in prima linea 🤣
@smaurizi @politica
Politica interna, europea e internazionale reshared this.
Gazzetta del Cadavere
in reply to informapirata ⁂ • • •reshared this
Politica interna, europea e internazionale e informapirata ⁂ reshared this.
Andrea Bontempi
in reply to informapirata ⁂ • • •Politica interna, europea e internazionale reshared this.
emama
in reply to Andrea Bontempi • • •Piantedosi non smentisce: «“Non risulta”, ha detto, precisando che ogni delegazione protegge i propri partecipanti come ritiene opportuno. Ha sottolineato che, in caso di arrivo, gli agenti americani si coordinerebbero con le forze italiane, una prassi definita normale e non un’ingerenza. Piantedosi ha inoltre ricordato che simili misure di sicurezza sono comuni durante visite di alti rappresentanti stranieri.»
tv.alanews.it/2026/01/24/milan…
Milano-Cortina, Piantedosi: “Presenza Ice non confermata, prassi normale per la sicurezza” - alanews TV | Ultime notizie in tempo reale dall'Italia e dal mondo
Redazione (alanews TV | Ultime notizie in tempo reale dall'Italia e dal mondo)reshared this
Politica interna, europea e internazionale e informapirata ⁂ reshared this.
m3nhir
in reply to emama • • •reshared this
Politica interna, europea e internazionale e informapirata ⁂ reshared this.
emama
in reply to m3nhir • • •Credo dipenda dal diverso potere che il Presidente americano ha su i corpi di polizia. Le Agenzie federali dipendono dal Presidente. Altri corpi di polizia invece sono dipendenti dai rispettivi Stati. Non dobbiamo dimenticare che gli USA sono una federazione di Stati che mantengono una considerevole indipendenza.
it.wikipedia.org/wiki/Forze_di…
componente principale del sistema USA di giustizia criminale
Contributori ai progetti Wikimedia (Wikimedia Foundation, Inc.)Politica interna, europea e internazionale reshared this.
m3nhir
in reply to emama • • •Politica interna, europea e internazionale reshared this.
emama
in reply to m3nhir • • •Cosa usavano ed usano è nel link del messaggio precedente
Politica interna, europea e internazionale reshared this.
kuro
in reply to informapirata ⁂ • • •