Home hackadayTagged

Hackaday

@hackaday

🔧 The best hacks served in daily bytes. ❀ Get featured: [email protected] Articles: Hackaday.com Community: Hackaday.io
Followers
173k
Following
49
Account Insight
Score
45.85%
Index
Health Rate
%
Users Ratio
3540:1
Weeks posts
. Pandora’s Box is Open! In the ancient Greek legend, Pandora opened a sealed box, permanently releasing all troubles into the world. There was no putting them back inside.That is exactly where we stand with the debate around 3D printed firearms and gun control laws. Lawmakers want tech companies to build digital blocks into additive manufacturing firmware to stop specific shapes from being created. But they are trying to close a box that has been wide open for years. Digital locks are built to be broken. Think about it: people jailbreak smartphones every day to bypass factory restrictions. 3D printers are no different. They run on basic mechanical G-code, and anyone with a laptop can easily wipe a restriction or download open source programming. Once a digital blueprint drops online, it escapes into the decentralized tech ecosystem permanently. Peer-reviewed research in Policing and Society confirms this shift. Blueprints exist as borderless, shared data files. Trying to police, recall, or delete that data globally is functionally impossible. The lid is off. Heavy-handed software bans completely miss the target. Instead of stopping criminals, they bury legitimate aftermarket companies and 3D printing hobbyists in red tape. Lawful businesses making plastic gun accessories—like an ergonomic vertical foregrip or a rugged Back-Up Iron Sight (BUIS) - face unfair liability for simple geometric shapes. Criminological data in the Journal of Forensic Sciences proves that bad actors ignore retail compliance completely. They use offline machines and unregulated parts kits to build items outside the commercial supply chain. Heavy regulations only squeeze law-abiding citizens. Legal scholars at UC Law San Francisco argue that restricting the tool itself is just a regulatory distraction. Effective public safety means focusing on criminal enforcement, not punishing a lawful tech industry or choking innovation. The box is open. We can’t close it. #3DPrinting #TechNews #OpenSource #CyberSecurity #DigitalRights
18
0
I’ve spent the last year obsessed with a project called HYDRAmeter: a highly modular, open-source multimeter. After finishing Version 1 (and taking it to @hackaday supercon), I’m officially moving into V2.ïżŒ If you’re into hardware dev or PCB design, come hang out in my Discord (link in bio) #engineering #design #electronics #hydrameter #multimeter
5
1
Hackaday Europe 2026
6
0
#SAO #blinky at @hackaday #europe 2026
4
0
#hackaday #lecco Exciting vibe onsite. One more day to go
49
1
👋 @hackaday #lecco
12
0
day one. five messages a day, scrolling on a small screen on my desk in the hague. written by strangers. picked by me. you can be one, write deskfamous in the comments. #deskfamous #dotmatrix #ledart #lilygo #esp32
0
0
#ce #safety #maker #makersgonnamake
4
0
A cyberdeck is a custom-built portable computer you assemble yourself. No manufacturer. No warranty. No spec sheet that matches anyone else’s. The concept traces back to William Gibson’s Neuromancer in 1984 — hackers jacking into cyberspace on chunky, industrial, handbuilt machines. Forty years later, Gen Z is actually building them. Raspberry Pi as the brain. Thrifted enclosures. Mechanical keyboards. 3D-printed cases. Pelican cases turned into rugged field computers. Vintage CRT TVs turned into terminals. Steampunk clutch bags that boot Linux. The builds are completely unhinged. That’s the whole point. Because here’s what this is really about: in a world of sealed aluminium laptops, subscription software and devices you’re not allowed to open — building something from scratch, with your own hands, that runs exactly the way you want it to run, is almost a political act. r/cyberDeck has over 100,000 builders sharing designs. TikTok build logs are racking up millions of views. Hackaday features a new deck every week. This isn’t a niche. It’s a movement. ↓ Swipe through for the full breakdown — and some of the wildest builds we’ve found. Save this. Drop your build or your dream deck in the comments. — Shuffle Culture Club is a cultural platform for music, art, design, and the things worth paying attention to across Asia.
33
3
Artigo completo em .br/2025/08/minimalista-turntable-um-toca-discos.html (link na bio) 💡 Ideia inicial do projeto Minimalista Turntable Eu queria aproveitar a pickup desse aparelho, porque rĂĄdio, auxiliar e tape deck eu tenho no Sony FH-G33AV, alĂ©m do CD player. Bem no inĂ­cio, pensei em usar a prĂłpria madeira do gabinete para montar o mĂłvel do toca discos, cheguei atĂ© mesmo a remover o revestimento preto pra reaproveitar, mas como a madeira estava bastante esfarelada, mudei de ideia, me inclinando para algo mais original e minimalista. Nascia a assim o conceito que deu origem a essa - digamos assim - releitura de um aparelho Frahm da dĂ©cada de 1990 que se transformou em uma peça Ășnica, com design contemporĂąneo e simplista. A pickup foi completamente desmontada, limpa, lubrificada e remontada com troca da fiação original, mantendo somente o cabo blindado da cĂĄpsula por estar em boas condiçÔes de uso e por ser preto, promovendo uma instalação mais discreta em vista do design ser aparente. Fiz um suporte metĂĄlico de quatro pontos que apoiam a pickup sobre as molas da suspensĂŁo e um design flutuante muito bonito foi criado, em contraste com os tons da madeira de base e da prĂłpria pickup. #turntable #vintage #maker #mod #vitrola
13
2
what’s yours is ours 😈 . This workflow demonstrates reading, storing and writing of NFC data. . Common payment cards, club cards and tap to pay systems store user/account information locally (on the card). When tapped, it acts like a key/pathway to that account and any information linked to it. Those data packets are stored on a remote server. . The user taps their card, the system identifies the user, and any stored value or authorized payment method. Transaction runs. . When we copy this data, it’s the same as copying the already authorized key. The remote system does not know the difference. . Giving us access to utilize the account just as though we are the original user. . Because the pathway is stored in the cloud, any account changes including payment methods and stored value will always be carried over to the copied key. . The only way to prevent further use of the account is to close it completely. . Because this method exists, it’s best to carry any tap to pay or tap to unlock key cards in a faraday enclosure or RFID blocking wallet. . #themoreyouknow #nfc #flipperzero #hacktheplanet #igreelschallenge
83
15