securityaffairs.com/187761/sec…
#securityaffairs #hacking
Attackers abuse SolarWinds Web Help Desk to install Zoho agents and Velociraptor - Security Affairs
Huntress confirmed active SolarWinds Web Help Desk exploits, where attackers installed Zoho tools for persistence.Pierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
youtube.com/watch?v=hSLE5Psfs6…
Il Muppet Show come ragione di vita, sempre!
W l'analogico e l'animazione tradizionale!
- YouTube
Profitez des vidéos et de la musique que vous aimez, mettez en ligne des contenus originaux, et partagez-les avec vos amis, vos proches et le monde entier.www.youtube.com
Cybersecurity & cyberwarfare reshared this.
Non puoi riavviare la tua mente. Eppure la stai lasciando senza patch
📌 Link all'articolo : redhotcyber.com/post/non-puoi-…
Passiamo ore a ottimizzare il nostro lavoro, i nostri tool e i nostri #processi, ma abbiamo dimenticato di proteggere l’unico #sistema operativo che non possiamo riavviare: la nostra mente. Il problema non è la #tecnologia, è la velocità.
Abbiamo eliminato ogni attrito, rendendo l’accesso alle distrazioni istantaneo. Senza latenza, non siamo più i progettisti della nostra vita: siamo automi che rispondono a impulsi esterni.
A cura di Daniela Farina
#redhotcyber #news #gestionedeltempo #produttivita #distrazioni #autocontrollo #impulsivita #gestionestress #benesserementale #salutementale #resilienza #mindfulness #selfcare #crescitaspersonale
Non puoi riavviare la tua mente. Eppure la stai lasciando senza patch
Scopri come proteggere la tua mente dalle distrazioni e riprendere il controllo della tua attenzione con il protocollo Lag. Impara a gestire la velocità e la tecnologia per vivere una vita più consapevole.Daniela Farina (Red Hot Cyber)
reshared this
Ma anche senza tanti richiami alla tecnologia...è davvero così passato di moda il termine "meditare". O riflettere. O il pensiero che spesso è nell'otium che ti viene un colpo di genio, un'idea interessante ecc. ?
Non siamo computer, funzioniamo in maniera totalmente diversa (grazie al cielo). I tempi umani non sono quelli di un PC, nè di una AI.
Il nostro cervello non è in grado di gestire un flusso continuo di informazioni traendone un qualche profitto.
Chiunque voglia uomini / lavoratori "automi", superuomini ecc. non ha proprio idea di cosa sia un essere umano evidentemente.
Il dramma è che tali persone tendono a dominare il mondo. Andando avanti a droghe magari....🤦♂️
Il 64% delle applicazioni web accede a dati sensibili senza autorizzazione
@Informatica (Italy e non Italy)
Lo sostiene una ricerca pubblicata dall’azienda di cyber security Reflectiz che, riconoscendo nell’accesso non autorizzato a dati sensibili una tendenza strutturale, evidenzia un deficit delle applicazioni web
L'articolo Il 64% delle applicazioni web accede a dati sensibili senza autorizzazione
Auster likes this.
Informatica (Italy e non Italy) reshared this.
Il referrer è un dato sensibile
Il referrer è generico, ma ovviamente può essere utilizzato come tecnologia di tracciamento. Tuttavia non rappresenta un dato sensibile in sé.
Informatica (Italy e non Italy) reshared this.
A New and Strangely Strong Kind of Plastic
As anyone who extrudes plastic noodles knows, the glass transition temperature of a material is a bit misleading; polymers gradually transition between a glass and a liquid across a range of temperatures, and calling any particular point in that range the glass transition temperature is a bit arbitrary. As a general rule, the shorter the glass transition range is, the weaker it is in the glassy state, and vice-versa. A surprising demonstration of this is provided by compleximers, a class of polymers recently discovered by researchers from Wageningen University, and the first organic polymers known to form strong ionic glasses (open-access article).
When a material transforms from a glass — a hard, non-ordered solid — to a liquid, it goes through various relaxation processes. Alpha relaxations are molecular rearrangements, and are the main relaxation process involved in melting. The progress of alpha relaxation can be described by the Kohlrausch-Williams-Watts equation, which can be exponential or non-exponential. The closer the formula for a given material is to being exponential, the more uniformly its molecules relax, which leads to a gradual glass transition and a strong glass. In this case, however, the ionic compleximers were highly non-exponential, but nevertheless had long transition ranges and formed strong glasses.
The compleximers themselves are based on acrylate and methacrylate backbones modified with ionic groups. To prevent water from infiltrating the structure and altering its properties, it was also modified with hydrophobic groups. The final glass was solvent-resistant and easy to process, with a glass transition range of more than 60 °C, but was still strong at room temperature. As the researchers demonstrated, it can be softened with a hot air gun and reshaped, after which it cools into a hard, non-malleable solid.
The authors note that these are the first known organic molecules to form strong glasses stabilized by ionic interactions, and it’s still not clear what uses there may be for such materials, though they hope that compleximers could be used to make more easily-repairable objects. The interesting glass-transition process of compleximers makes us wonder whether their material aging may be reversible.
📣 ISCRIVITI AL WEBINAR GRATUITO DEL CORSO "CYBER OFFENSIVE FUNDAMENTALS" – LIVELLO BASE 🚀
📅 Data Webinar: Martedì 17 Febbraio
🕕 Orario: 18:00
🖥️ Google Meet
🔗 Programma: redhotcyber.com/linksSk2L/cybe…
🎥 Intro del prof: youtube.com/watch?v=0y4GYsJMoX…
Attraverso laboratori isolati e replicabili, potrai sperimentare:
✅Ricognizione e analisi delle vulnerabilità
✅Exploitation controllata e post-exploitation in sicurezza
✅Uso professionale di strumenti come Nmap, Metasploit, BloodHound e Nessus
Per ricevere il link al webinar e per iscrizioni: 📞 379 163 8765 ✉️ formazione@redhotcyber.com
#redhotcyber #formazione #pentesting #pentest #formazioneonline #ethicalhacking #cybersecurity #penetrationtesting #cti #cybercrime #infosec #corsi #liveclass #hackerhood #pentesting
Cyber Offensive Fundamentals - Corso ethical hacking, penetration test
Corso in Live Class di Cyber Offensive Fundamentals: scopri penetration testing, vulnerabilità e strumenti pratici per la sicurezza informatica offensiva.Red Hot Cyber
reshared this
-SmarterTools hacked via its own product
-Dutch DPA and European Commission hacked via Ivanti zero-days
-Senegal held for ransom
-state actor behind Signal phishing campaign in Germany
-Flickr 3rd party breach
-China executes scam compound execs
-DDoSer arrested in Poland
-Northwestern hacker pleads guilty
-Nigerian scammer gets 8 years
-17% of OpenClaw skills are malicious
-ClawHub to scan skills using VT
Podcast: risky.biz/RBNEWS523/
Newsletter: news.risky.biz/risky-bulletin-…
Risky Bulletin: SmarterTools hacked via its own product
In other news: Dutch DPA and European Commission hacked via Ivanti zero-days; Senegal held for ransom; state actor behind Signal phishing campaign in Germany.Catalin Cimpanu (Risky.Biz)
reshared this
-DKIM replay attacks in the wild
-Rise of violent threats on social media
-NGOs warn EU against weakening regulation
-Rise of violent threats on social media
-NGOs warn EU against weakening regulation
-People aren't paying Clop anymore
-Salt Typhoon hacked Norway
-APT reports on Vortex Werewolf, ScarCruft
-Claude found 500 bugs in FOSS projects
-Zscaler buys SquareX
-Guardsquare buys Verimatrix's XTD
Catalin Cimpanu reshared this.
La CISA ordina alle agenzie statunitensi di rafforzare la sicurezza dei dispositivi edge
📌 Link all'articolo : redhotcyber.com/post/la-cisa-o…
#redhotcyber #news #cybersecurity #sicurezzainformatica #vulnerabilita #malware #hacking #ransomware
La CISA ordina alle agenzie statunitensi di rafforzare la sicurezza dei dispositivi edge
La CISA impone alle agenzie civili statunitensi di rafforzare la sicurezza dei dispositivi edge, sostituendo quelli obsoleti entro 12-18 mesi.Redazione RHC (Red Hot Cyber)
reshared this
securityaffairs.com/187736/cyb…
#securityaffairs #hacking
Romania’s national oil pipeline firm Conpet reports cyberattack
Romania’s national oil pipeline operator Conpet said a cyberattack disrupted its business systems and temporarily knocked its website offline.Pierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
Pendulum Powered Battery
While the average person would use a standard charger to top off their phone, [Tom Stanton] is no average man. Instead, he put mind to matter with an entire pendulum battery system.
Using the inductive effects of magnets on copper coils, [Tom] found the ability to power small components. With that in mind, the only path was forward with a much larger pendulum. A simple diode rectifier and capacitors allow for a smoother voltage output. The scale of the device is still too small to power anything insane, even the phone charging test is difficult. One thing the device can do is juice up the electromagnetic launcher he put together a couple years back to hurl an RC plane into the air.
The useful applications of pendulum power storage might not be found in nationwide infrastructure, but the application on this scale is certainly a fun demonstration. [Tom] has a particular fascination with similar projects where practical application comes second to novelty. For a perfect example of this, check out his work with air powered planes!
youtube.com/embed/uqmT1GzRXWI?…
223 - Spesso usano “AI Open Source” per ingannarci - Marco Camisani Calzolari
Spesso usano “AI Open Source” per ingannarci. La verità spiegata in modo facile. “Open source” nell’Intelligenza Artificiale è una parola usata come ombrello per dire: “guarda che noi siamo aperti, puoi controllare”.Web Staff MCC (Marco Camisani Calzolari)
Cybersecurity & cyberwarfare reshared this.
TikTok sotto accusa dalla Commissione europea: il punto di vista del MOIGE
📌 Link all'articolo : redhotcyber.com/post/tiktok-so…
#redhotcyber #news #TikTok #DigitalServicesAct #CommissioneEuropea #MOIGE #SicurezzaOnline
TikTok sotto accusa dalla Commissione europea: il punto di vista del MOIGE
La Commissione europea avvia indagini su TikTok per violazioni del Digital Services Act, MOIGE plaude e rilancia la class action per proteggere i minori dai rischi dei social media.Stefano Gazzella (Red Hot Cyber)
reshared this
Attenzione alla truffa Apple Pay: come evitare di cadere nella trappola
📌 Link all'articolo : redhotcyber.com/post/attenzion…
#redhotcyber #news #truffeonline #sicurezzainformatica #applepay #phishing #truffeapple #protezionedatidigitali
Attenzione alla truffa Apple Pay: come evitare di cadere nella trappola
Una nuova truffa sofisticata sta colpendendo utenti di Apple Pay in tutto il mondo. Scopri come funziona e come proteggerti.Redazione RHC (Red Hot Cyber)
lauseta likes this.
Cybersecurity & cyberwarfare reshared this.
Non è l’attacco informatico a farti cadere. È solo l’abitudine!
📌 Link all'articolo : redhotcyber.com/post/non-e-lat…
#redhotcyber #news #guerraibride #sicurezzanazionale #zonegrigie #degradosociale #normalità #allert
Non è l’attacco informatico a farti cadere. È solo l’abitudine!
La zona grigia della cybersecurity: come riconoscere e prevenire le minacce silenziose che sfruttano le abitudini e la mancanza di attenzione nelle organizzazioni.Roberto Villani (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
Il gioco è gratis, il malware no (e lo stai pagando carissimo)
📌 Link all'articolo : redhotcyber.com/post/il-gioco-…
Un gioco gratuito può rivelarsi l’acquisto più costoso quando si trasforma in un #accesso al computer. I #ricercatori di sicurezza #informatica mettono in guardia da una campagna che si nasconde nei programmi di #installazione di giochi piratati e rilascia silenziosamente un malware chiamato RenEngine, che altro non è che un loader per PC.
A cura di Carolina Vivianti
#redhotcyber #news #malware #cybersecurity #sicurezzainformatica #hacking #minacceinformatiche #renengine #unloaderpc #malwaregratuito #giochipiratati #sicurezzadigital #protezionevirus #malwareanalisi
Il gioco è gratis, il malware no (e lo stai pagando carissimo)
Un malware chiamato RenEngine Loader viene distribuito tramite giochi piratati e può rubare informazioni sensibili. Scopri come difenderti.Carolina Vivianti (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
Kodak MC3: Everything But a Phone In 2001
One of the constants in consumer electronics is that designers will try to put as many features into a single device as possible, whether it’s a Walkman with a radio tuner or a new class of devices that crams a photo and video camera in the same enclosure as a music player. At the time that the Kodak MC3 was released this made it a rather unique device, with it in hindsight being basically a smartphone without the phone, as [Tech Tangents] aptly notes in his recent video on the device.
Six years before Apple’s iPhone would be announced, and eight years before the first iPod with a video camera, the Kodak MC3 was in many respects bleeding edge technology targeted straight at tech enthusiasts. For less than $300 you got VGA-quality images, CompactFlash storage, and MP3 playback capability. The videos it produced were 320×240 resolution, h.263 encoded MOVs with a maximum length of 4 seconds at 20 FPS, or 4 minutes with a 64 MB CF card.
The unit that [Tech Tangents] got used came with a 128 MB CF card, but couldn’t use a 2 GB CF card, which is a shame. The screen on it got a lot of flak for not not having a backlight, but this was common for the era, as were the poor viewing angles. Ditto for the poor video quality, as anyone who invested in consumer digital cameras in the early 2000s can attest to. In that respect this Kodak device was probably a bit too ambitious with its features for the era, maybe to compensate for it completely missing the boat on the rise of digital camera technology around the time.
youtube.com/embed/dq2KLhKRH6Q?…
Hackaday Links: February 8, 2026
We start this week with a bit of a good news/bad news situation. On February 6th, the Relativistic Heavy Ion Collider (RHIC) was shut down after 25 years of operation. Located at Brookhaven National Laboratory in Upton, New York, the RHIC was the only operating particle collider in the United States, and along with the Large Hadron Collider (LHC), was one of only two heavy-ion colliders in existence.
So that’s the bad news. The good news is that the RHIC is going dark so that the Electron-Ion Collider (EIC) can take its place. Planned for activation in the mid-2030s, the EIC will occupy the same tunnel as the RHIC and reuse much of the same hardware. As the name implies, it will be used to collide electrons.
Switching gears (no pun intended) to the world of self-driving cars, Waymo’s chief safety officer, Dr. Mauricio Peña, made a surprising admission this week during a U.S. Senate hearing. When asked what his company’s vehicles do when they are presented with a situation that their on-board systems can’t resolve, Dr. Peña explained that they would contact a human “remote assistance operator.” He further clarified that these individuals, located both in the US and the Philippines, don’t literally drive the car remotely. Still, Senator Ed Markey of Massachusetts questioned not only the company’s transparency on the issue of remote assistance, but the idea that individuals overseas could be making decisions on how vehicles should operate on US roadways.
While on the subject of a hyped-up technology that hasn’t quite delivered, CNN posed an interesting question — in an article titled “No, but seriously: What’s going on with bitcoin?“, David Goldman pointed out that the cryptocurrency recently dropped below $63,000 USD for the first time in over a year and a half (as of today, it has rebounded slightly to just under $71,000). He goes on to explain that global uncertainty and rapidly improving AI technology are partly to blame, although we’re honestly not quite sure how that second one works. But more importantly, he theorizes that the market is returning to where it was before the 2024 presidential election. Then candidate Trump embraced the digital currency and promised to remove restrictions he claimed were holding it back. This naturally caused a bump in Bitcoin value after he won the White House, but as those changes have yet to materialize, the excitement is apparently wearing off.
In software news, the remaining Windows users who still haven’t been beaten into submission by Microsoft will have another feature taken away from them; as of February, the operating system’s integrated 3D Viewer is officially being deprecated. The tool allows users to inspect various types of 3D files, including STLs, and was added to Windows back when Microsoft was convinced “mixed reality” was going to be a thing. Anyone who has 3D Viewer installed will still be able to use it, but it will no longer be available for download officially from Microsoft. On the bright side, the web-based alternative that Microsoft recommends seems pretty slick.
Those holding out hope for life on the Red Planet will be excited to read the recent report from NASA which claims that the organic compounds discovered on Mars by the Curiosity rover can’t be fully explained by non-biological processes. In other words, while there are geological processes that could have produced some of the molecules detected, and some could have been deposited on the planet by meteorites, none of the possibilities studied could account for them all. The researchers caution that this doesn’t mean there is current or active life on the Martian surface, however, as we still don’t fully understand the timescales required to break these molecules down. Curiosity might have sniffed out the signs of life, but that life could still have died off billions of years ago.
On the subject of space, a recent post about the number of satellites in low-Earth orbit by mathematician John Cook got some debate going. He runs the numbers and argues that given the current number of LEO satellites (~12,500), and the area of space that they operate in, each bird has roughly 100,000,000 km³ to itself. Not exactly the close quarters flying that we’ve been hearing so much about recently with the proliferation of satellite constellations such as SpaceX’s Starlink. That said, others were quick to point out that his math only really works out if all the satellites were evenly distributed, which is obviously not the case in the real world. So while his estimate is probably a bit too generous, it still helps put into context just how mind-bogglingly big space actually is.
Finally, for those who would prefer to scroll endlessly through something a bit more intellectually stimulating than social media, check out Xikipedia. This open source project takes the content from the Simple English Wikipedia and turns it into a never ending feed that you can browse, complete with an algorithm that will suggest articles to you based on your personal interests. What do you call the opposite of doomscrolling — maybe knowledgescrolling?
See something interesting that you think would be a good fit for our weekly Links column? Drop us a line, we’ve love to hear about it.
L'intelligenza artificiale rende la parte facile più facile e quella difficile più difficile
Un mio amico ha recentemente partecipato a un dibattito pubblico su come le organizzazioni di ingegneria possano supportare al meglio i propri ingegneri. I temi emersi non sono stati una sorpresa:Sacrificare la qualità rende difficile sentirsi orgogliosi del proprio lavoro. Nessun riconoscimento della velocità attuale. Se corriamo per raggiungere un obiettivo, l'aspettativa diventa quella di continuare a correre, per sempre.
reshared this
Cambiamenti nell'uso dei social media negli Stati Uniti, 2020-2024: declino, frammentazione e polarizzazione persistente
Utilizzando dati rappresentativi a livello nazionale tratti dagli studi elettorali nazionali americani (ANES) del 2020 e del 2024, questo articolo traccia il cambiamento del panorama dei social media negli Stati Uniti a seconda delle piattaforme, dei dati demografici e delle politiche.
Shifts in U.S. Social Media Use, 2020-2024: Decline, Fragmentation, and Enduring Polarization
Using nationally representative data from the 2020 and 2024 American National Election Studies (ANES), this paper traces how the U.S. social media landscape has shifted across platforms, demographics, and politics.arXiv.org
like this
reshared this
Perché dovresti smettere di usare Face ID subito
I blocchi biometrici come il riconoscimento facciale sono facili da impostare, ma grazie a una scappatoia legale, sono più facili da aggirare per le forze dell'ordine rispetto a un codice di accesso.
reshared this
@mau ormai quando mi sveglio la mattina e mi guardo con i segni sul cuscino mi riconosco a fatica anche io 🤣
Privacy Pride reshared this.
securityaffairs.com/187753/hac…
#securityaffairs #hacking
Flickr moves to contain data exposure, warns users of phishing
Flickr says a flaw at a third-party email provider may have exposed users’ names, email addresses, IPs, and account activity.Pierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
Wooden Case Makes a 2026 TV Stylish
The middle of the 20th century produced a revolution in understated stylish consumer design, some of which lives on today. The reality of living in a 1950s or ’60s house was probably to be surrounded by the usual mess of possessions from many past decades, but the promise was of a beautiful sleek and futuristic living space. Central to this in most homes would have been the TV set, and manufacturers followed the trends of the age with cases that are now iconic. Here in 2026 we put up with black rectangles, but fortunately there’s Cordova Woodworking with a modern take on a retro TV cabinet.
We’ve put the build video below, and it’s a wonderfully watchable piece of workshop titillation in a fully-equipped modern shop. While we appreciate they’ve put the design up for sale, we think many Hackaday readers could come up with their own having already been inspired. One thing we notice over the originals is that they use “proper” wood for their case, when we know the ’60s version would have had veneer-faced ply or chipboard.
The result is a piece of furniture which nicely contains the modern TV and accessories, but doesn’t weigh a ton or dominate the room in the way one of the originals would have, much less emit that evocative phenolic hot-electronics smell. We’d have one in our living room right now. Meanwhile if you’d like a wallow in mid-century TV, we have you covered.
youtube.com/embed/5RI6_DHBPfM?…
Habit Detection For Home Assistant
Computers are very good at doing exactly what they’re told. They’re still not very good at coming up with helpful suggestions of their own. They’re very much more about following instructions than using intuition; we still don’t have a digital version of Jeeves to aid our bumbling Wooster selves. [Sherrin] has developed something a little bit intelligent, though, in the form of a habit detector for use with Home Assistant.
In [Sherrin]’s smart home setup, there are lots of things that they wanted to fully automate, but they never got around to implementing proper automations in Home Assistant. Their wife also wanted to automate things without having to get into writing YAML directly. Thus, they implemented a sidecar which watches the actions taken in Home Assistant.
The resulting tool is named TaraHome. When it detects repetitive actions that happen with a certain regularity, it pops up and suggests automating the task. For example, if it detects lights always being dimmed when media is playing, or doors always being locked at night, it will ask if that task should be set to happen automatically and can whip up YAML to suit. The system is hosted on the local Home Assistant instance. It can be paired with an LLM to handle more complicated automations or specific requests, though this does require inviting cloud services into the equation.
We’ve featured lots of great Home Assistant hacks over the years, like this project that bridges 433 MHz gear to the smart home system. If you’ve found your own ways to make your DIY smart home more intelligent, don’t hesitate to notify the tipsline!
Oggi la concentrazione di certe persone è crollata a livelli così drammatici che non riescono a finire un discorso neanche se c'è qualcuno che
reshared this
@DigiDavidex sì, aiuta molto 😂
Immagini, video divertenti e altre simpatiche guasconate reshared this.
Container, cloud, blockchain, intelligenza artificiale: è sempre la solita vecchia storia, afferma il veterano Red Hatter
Il vero avversario della sovranità digitale è il marketing "IT aziendale", secondo un ingegnere di Red Hat che si è scagliato in modo divertente contro le ripetute ondate di sciocchezze che il ciclo di hype del settore emette.
theregister.com/2026/02/08/wav…
Containers, cloud, blockchain, AI – it's all the same old BS, says veteran Red Hatter
Opinion: After decades in the trenches, this engineer is done with hype cyclesLiam Proven (The Register)
like this
reshared this
Sì, ormai è il mio mantra.
Le aziende che non offrono al mercato servizi digitali probabilmente non hanno bisogno di nessuna di queste tecnologie.
Ma poi, come Cassandra (e il vero @calamarim non me ne voglia!) vengo guardato con un sorriso di compatimento. E magicamente nessuno si ricorda che qualcuno aveva ragione e l'aveva detto.
Io spero per il meglio e mi preparo sempre al peggio.
reshared this
>
> Container, cloud, blockchain, intelligenza artificiale: è sempre la solita vecchia storia, afferma il veterano Red Hatter
Potremmo aggiungere "devops" alla lista? 😅
Ciao!
C.
reshared this
Software libero: il vantaggio competitivo nell’era cloud e AI
Il software FOSS offre vantaggi economici e strategici alle aziende nell’era cloud e intelligenza artificiale. L’analisi del TCO dimostra superiorità rispetto alle soluzioni proprietarie. Flessibilità multi-cloud, autonomia tecnologica e sostenibilità ambientale rendono l’open source la scelta vincente
agendadigitale.eu/industry-4-0…
Software libero: il vantaggio competitivo nell'era cloud e AI - Agenda Digitale
Software FOSS: vantaggi economici e strategici per aziende. TCO inferiore, flessibilità cloud e IA, indipendenza tecnologica. Analisi completa.Italo Vignoli (Agenda Digitale)
reshared this
Investigating the Science Claims Behind the Donut Solid State Battery
Earlier this year Donut Lab caused quite the furore when they unveiled what they claimed was the world’s first production-ready solid state battery, featuring some pretty stellar specifications. Since then many experts and enthusiasts in the battery space have raised concerns that this claimed battery may not be real, or even possible at all. After seeing the battery demonstrated at CES’26 and having his own concerns, [Ziroth] decided to do some investigating on what part of the stated claims actually hold up when subjected to known science.
On paper, the Donut Lab battery sounds amazing: full charge in less than 10 minutes, 400 Wh/kg energy density, 100,000 charge cycles, extremely safe and low cost. Basically it ticks every single box on a battery wish list, yet the problem is that this is all based on Donut’s own claims. Even aside from the concerns also raised in the video about the company itself, pinning down what internal chemistry and configuration would enable this feature set proves to be basically impossible.
In this summary of research done on Donut’s claimed battery as well as current battery research, a number of options were considered, including carbon nanotube-based super capacitors. Yet although this features 418 Wh/kg capacity, this pertains only to the basic material, not the entire battery which would hit something closer to 50 Wh/kg.
Other options include surface-redox sodium-ion chemistry with titanium oxide. This too would allow for fast charging and high endurance, but Donut has already come out to state that their battery is not capacitor-based and uses no lithium, so that gets shot down too.
Combined with the ‘cheap’ and ‘scalable’ claims this effectively shoots down any potential battery chemistry and architecture. Barring some amazing breakthrough this thus raises many red flags, especially when you consider Donut Lab’s major promises for investors that should make any reasonable person feel skittish about pouring money into the venture.
Sadly, it seems that this one too will not be the battery breakthrough that we’re all waiting for. Even new chemistries like sodium-ion are struggling to make much of inroads, although lithium-titanate shows real promise. Albeit it not with amazing power density increases that would make it better than plain lithium-ion for portable applications.
youtube.com/embed/V8mkD6g9Ujc?…
Parrhesepstein: piattaforma AI open source per analizzare i file Epstein. Grazie a @nagaye per la segnalazione!
9 agenti investigativi autonomi, ricerca semantica su migliaia di documenti declassificati, mappa dei voli, grafi delle connessioni e analisi delle reti di influenza. Uno strumento costruito per esercitare la parrhesia: dire la verità al potere... perché la libertà non è un’opinione, è un dovere epistemologico.
reshared this
reshared this
reshared this
@costafrancesco94 quello infatti è l'utilizzo più praticato nella comunità scientifica. In quei casi la tecnologia degli llm è utile per consentire ai sistemi di analisi di cogliere eventi espressi in linguaggio naturale
Intelligenza Artificiale reshared this.
Intelligenza Artificiale reshared this.
vabbè, Faggin ha evidentemente scritto il suo ultimo libro sotto l'effetto del prosecco
reshared this
securityaffairs.com/187732/mal…
#securityaffairs #hacking
SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 83
Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscapePierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
securityaffairs.com/187727/sec…
#securityaffairs #hacking
Security Affairs newsletter Round 562 by Pierluigi Paganini – INTERNATIONAL EDITION
A new round of the weekly Security Affairs newsletter has arrived! Every week, the best security articles from Security Affairs.Pierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
Upgrading The E-mu Audity 20 Years After Factory Support Ended
If you purchased an E-mu Audity 2000 ROMpler back in 1998, you almost certainly got a rig with the 1.00 firmware. It was fine, if a little limited, particularly where upgradability was concerned. E-mu would later offer firmware upgrades over MIDI with the 2.00 firmware, but to get the 2.00 firmware, you needed to ship the box back to E-mu. Or you did… until now.
Realizing that E-mu is long gone and they weren’t going to handle any further firmware upgrades, [Ray Bellis] set about finding another way to help aggrieved operators with gear stuck on v1.00. [Ray] had managed to lay hands on a Audity 2000 service manual as well as the official 2.00 upgrade kit in an estate sale, and set about reverse engineering it to help the community. It turned out that upgrading from 1.00 to 2.00 required the use of a special boot ROM and a flash device containing the upgraded firmware image. Booting from the special ROM required the use of a jumper, and when engaged, the ROM would copy the updated image to the device itself.
[Ray] didn’t want to duplicate the standard upgrade device, as that seemed a little difficult what with parts availability in 2026. Instead, he crafted his own ROM that, with compression, contained the necessary firmware upgrade image and could all be stuffed inside a single 512 KB chip. All you need to do is flash the custom upgrade ROM to an AM29F040B PLCC32 NOR flash chip, pop it in the empty PLCC32 socket on the mainboard, and away you go. This will get you a machine upgraded to the final v2.01 firmware delivered by E-mu before its demise.
It’s a finicky bit of work, but it’s a great way to get new functionality out of an old Audity 2000. We’ve featured similar work before regarding aging Yamaha synths, too. If you’ve got your own backdoor methods for giving older music hardware a new lease on life, don’t hesitate to notify the tipsline.
I've always wanted better tools to read and navigate—not edit!—source code.
For example, it's incredible to me that there is no iPad app that does LSP features plus bookmarks, navigation tree, etc.
Maybe now that LLMs made it more people's job to read code, we'll get good code reading tools?
Cybersecurity & cyberwarfare reshared this.
I feel like people who haven't experienced codesearch simply cannot understand why you would want something other than your IDE.
I'm with you though I wish I had open source codesearch and more.
I always loved the Smalltalk ClassBrowser. No files, directories…only navigate through classes, messages, senders, objects
I miss that nowadays.
securityaffairs.com/187716/hac…
#securityaffairs #hacking #linux #malware
DKnife toolkit abuses routers to spy and deliver malware since 2019
DKnife is a Linux toolkit used since 2019 to hijack router traffic and deliver malware in cyber-espionage attacks.Pierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
Upgrading An Old Macbook With an Old Processor
The Core Duo processor from Intel may not have been the first multi-core processor available to consumers, but it was arguably the one that brought it to the masses. Unfortunately, the first Core Duo chips were limited to 32-bit at a time when the industry was shifting toward 64-bit. The Core 2 Duo eventually filled this gap, and [dosdude1] recently completed an upgrade to a Macbook Pro that he had always wanted to do by replacing the Core Duo processor it had originally with a Core 2 Duo from a dead motherboard.
The upgrade does require a bit more tooling than many of us may have access too, but the process isn’t completely out of reach, and centers around desoldering the donor processor and making sure the new motherboard gets heated appropriately when removing the old chip and installing the new one. These motherboards had an issue of moisture ingress which adds a pre-heating step that had been the cause of [dosdude1]’s failures in previous attempts. But with the new chip cleaned up, prepared with solder balls, and placed on the new motherboard it was ready to solder into its new home.
Upon booting the upgraded machine, the only hiccup seemed to be that the system isn’t correctly identifying the clock speed. A firmware update solved this problem, though, and the machine is ready for use. For those who may be wondering why one would do something like this given the obsolete hardware, we’d note that beyond the satisfaction of doing it for its own sake these older Macbooks are among the few machines that can run free and open firmware, and also that Macbooks that are a decade or older can easily make excellent Linux machines even given their hardware limitations.
youtube.com/embed/-bEsigp_oG4?…
E se oggi ricevessi 2.000 Bitcoin in regalo? Su Bithumb è successo davvero
📌 Link all'articolo : redhotcyber.com/post/e-se-oggi…
#redhotcyber #news #erroreumano #bithumb #flashcrash #cryptovalute #bitcoin #scambicriptovalute #erroreinformatico #cybersecurity #hacking
E se oggi ricevessi 2.000 Bitcoin in regalo? Su Bithumb è successo davvero
Un errore interno su Bithumb causa l'accredito di migliaia di Bitcoin a 695 clienti, per un valore di 44 miliardi di dollari.Carolina Vivianti (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
222 - Come ci rubano l’account WhatsApp - Marco Camisani Calzolari
Come ci rubano l’account WhatsApp. Spiegato facile e per tutti. Se mi state a sentire e mi seguite, vi salvo: questa truffa continua a funzionare su persone normalissime.Web Staff MCC (Marco Camisani Calzolari)
reshared this
Lanciato Claude Opus 4.6: 500 0day scoperti nei test dagli ingegneri di Anthropic
📌 Link all'articolo : redhotcyber.com/post/lanciato-…
#redhotcyber #news #intelligenzaartificiale #linguaggiodimacchina #cybersecurity #sicurezzainformatica #vulnerabilita #progettiopensource
Lanciato Claude Opus 4.6: 500 0day scoperti nei test dagli ingegneri di Anthropic
Il nuovo modello di linguaggio Claude Opus 4.6 di Anthropic è capace di individuare oltre 500 vulnerabilità sconosciute in progetti open source.Redazione RHC (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
Oggi compie 40 anni la “Dichiarazione di indipendenza del Cyberspazio”.
📌 Link all'articolo : redhotcyber.com/post/la-dichia…
#redhotcyber #news #storiadiinternet #ciberindipendenza #hacking #cyberspazio #libertadigital #internet #indipendenzadelcyberspazio #tecnologia
La "Dichiarazione di indipendenza del Cyberspazio"
Sono passati più di 10 anni dalla pubblicazione del famoso saggio "The Hacker Manifesto" o "The Conscience of a Hacker" scritto da Loyd Blankenship, pubblicato l'8 gennaio 1986,Massimiliano Brolli (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
555-Based Square-Wave and Triangle-Wave Function Generator Build for Beginners
Over on YouTube [Andrew Neal] has a Function Generator Build for Beginners.
As beginner videos go this one is fairly comprehensive. [Andrew] shows us how to build a square-wave generator on a breadboard using a 555 timer, explaining how its internal flip-flop is controlled by added resistance and capacitance to become a relaxation oscillator. He shows how to couple a potentiometer to vary the frequency.
He then adds an integrator built from a TL082 dual op amp to convert the circuit to a triangle-wave generator, using its second op amp to build a binary inverter. He notes that a binary inverter is usually implemented with a comparator, but he uses the op amp because it was spare and could be put to good use. Again, potentiometers are added for frequency control, in this case a 1 MΩ pot for coarse control and a 10 kΩ pot for fine control. He ends with a challenge to the viewer: how can this circuit be modified to be a sine-wave generator? Sound off in the comments if you have some ideas!
If you’re interested to know more about function generators check out A Function Generator From The Past and Budget Brilliance: DHO800 Function Generator.
youtube.com/embed/KfFmZIZ67MM?…
Allanon 🇮🇹
in reply to Claudia • • •Claudia
in reply to Allanon 🇮🇹 • • •