.
Pandoraâs Box is Open!
In the ancient Greek legend, Pandora opened a sealed box, permanently releasing all troubles into the world. There was no putting them back inside.That is exactly where we stand with the debate around 3D printed firearms and gun control laws.
Lawmakers want tech companies to build digital blocks into additive manufacturing firmware to stop specific shapes from being created. But they are trying to close a box that has been wide open for years. Digital locks are built to be broken.
Think about it: people jailbreak smartphones every day to bypass factory restrictions. 3D printers are no different. They run on basic mechanical G-code, and anyone with a laptop can easily wipe a restriction or download open source programming. Once a digital blueprint drops online, it escapes into the decentralized tech ecosystem permanently.
Peer-reviewed research in Policing and Society confirms this shift. Blueprints exist as borderless, shared data files. Trying to police, recall, or delete that data globally is functionally impossible. The lid is off.
Heavy-handed software bans completely miss the target. Instead of stopping criminals, they bury legitimate aftermarket companies and 3D printing hobbyists in red tape. Lawful businesses making plastic gun accessoriesâlike an ergonomic vertical foregrip or a rugged Back-Up Iron Sight (BUIS) - face unfair liability for simple geometric shapes.
Criminological data in the Journal of Forensic Sciences proves that bad actors ignore retail compliance completely. They use offline machines and unregulated parts kits to build items outside the commercial supply chain.
Heavy regulations only squeeze law-abiding citizens. Legal scholars at UC Law San Francisco argue that restricting the tool itself is just a regulatory distraction. Effective public safety means focusing on criminal enforcement, not punishing a lawful tech industry or choking innovation.
The box is open. We canât close it.
#3DPrinting
#TechNews
#OpenSource
#CyberSecurity
#DigitalRights
Iâve spent the last year obsessed with a project called HYDRAmeter: a highly modular, open-source multimeter. After finishing Version 1 (and taking it to @hackaday supercon), Iâm officially moving into V2.ïżŒ If youâre into hardware dev or PCB design, come hang out in my Discord (link in bio) #engineering #design #electronics #hydrameter #multimeter
day one.
five messages a day, scrolling on a small screen on my desk in the hague.
written by strangers. picked by me.
you can be one, write deskfamous in the comments. #deskfamous #dotmatrix #ledart #lilygo #esp32
A cyberdeck is a custom-built portable computer you assemble yourself.
No manufacturer. No warranty. No spec sheet that matches anyone elseâs.
The concept traces back to William Gibsonâs Neuromancer in 1984 â hackers jacking into cyberspace on chunky, industrial, handbuilt machines. Forty years later, Gen Z is actually building them.
Raspberry Pi as the brain. Thrifted enclosures. Mechanical keyboards. 3D-printed cases. Pelican cases turned into rugged field computers. Vintage CRT TVs turned into terminals. Steampunk clutch bags that boot Linux. The builds are completely unhinged. Thatâs the whole point.
Because hereâs what this is really about: in a world of sealed aluminium laptops, subscription software and devices youâre not allowed to open â building something from scratch, with your own hands, that runs exactly the way you want it to run, is almost a political act.
r/cyberDeck has over 100,000 builders sharing designs. TikTok build logs are racking up millions of views. Hackaday features a new deck every week.
This isnât a niche. Itâs a movement.
â Swipe through for the full breakdown â and some of the wildest builds weâve found.
Save this. Drop your build or your dream deck in the comments.
â
Shuffle Culture Club is a cultural platform for music, art, design, and the things worth paying attention to across Asia.
whatâs yours is ours đ
.
This workflow demonstrates reading, storing and writing of NFC data.
.
Common payment cards, club cards and tap to pay systems store user/account information locally (on the card). When tapped, it acts like a key/pathway to that account and any information linked to it. Those data packets are stored on a remote server.
.
The user taps their card, the system identifies the user, and any stored value or authorized payment method. Transaction runs.
.
When we copy this data, itâs the same as copying the already authorized key.
The remote system does not know the difference.
.
Giving us access to utilize the account just as though we are the original user.
.
Because the pathway is stored in the cloud, any account changes including payment methods and stored value will always be carried over to the copied key.
.
The only way to prevent further use of the account is to close it completely.
.
Because this method exists, itâs best to carry any tap to pay or tap to unlock key cards in a faraday enclosure or RFID blocking wallet.
.
#themoreyouknow #nfc #flipperzero #hacktheplanet #igreelschallenge