Category: Hackaday Columns

DeepSeek has captured the world’s attention this week, with an unexpected release of the more-open AI model from China, for a reported mere $5 million training cost. While there’s lots of buzz about DeepSeek, here we’re interested in security. And DeepSeek has made waves there, in the form of a ClickHouse database unintentionally opened to […]
Hey, you know that guy in accounting, Marco? If you want to find out more about him, you’d probably go surf LinkedIn or maybe a social media site. Inside a company, you might look on instant messaging for a profile and even find out if he is at his desk or away. But back in […]
This week, Jonathan Bennett, Doc Searls, and Jeff Massie talk about Deepseek, technical solutions to Terms of Service abuse, and more! Did you know you can watch the live recording of the show right on our YouTube Channel? Have someone you’d like us to interview? Let us know, or contact the guest and have them […]
r/keebgirlies Is Totally a Thing Now When [coral-bells] posted her first build to r/mechanicalkeyboards, she likely felt some trepidation. After all this is reddit we’re talking about, so right away you’ve got two layers of male-domination hobby. Image by [coral-bells] via reddit What she likely didn’t expect was to be upvoted into the tens of […]
Over the last decade we have brought you frequent reports not from the coolest of hackerspaces or the most bleeding edge of engineering in California or China, but from the rolling prairies of the American Midwest. Those endless fields of cropland waving in the breeze have been the theatre for an unlikely battle over right […]
Disappointing news this week for those longing for same-hour Amazon delivery as the retail giant tapped the brakes on its Prime Air drone deliveries. The pause is partially blamed on a December incident at the company’s Pendleton, Oregon test facility, where two MK30 delivery drones collided in midair during light rain conditions. A Bloomberg report […]
Do they teach networking history classes yet? Or is it still too soon? I was reading [Al]’s first installment of the Forgotten Internet series, on UUCP. The short summary is that it was a system for sending files across computers that were connected, intermittently, by point-to-point phone lines. Each computer knew the phone numbers of […]
This week, Hackaday’s Elliot Williams and Kristina Panos joined forces and Wonder-Twin rings to bring you the latest news, mystery sound, and of course, a big bunch of hacks from the previous week. First up in the news: Big boo to Bambu Labs, who have tried to clarify their new authentication scheme and probably only […]
Cisco’s ClamAV has a heap-based buffer overflow in its OLE2 file scanning. That’s a big deal, because ClamAV is used to scan file attachments on incoming emails. All it takes to trigger the vulnerability is to send a malicious file through an email system that uses ClamAV. The exact vulnerability is a string termination check […]
This week, Jonathan Bennett and Dan Lynch chat with Stefano Zacchiroli about Debian and Software Heritage! https://www.softwareheritage.org/ https://upsilon.cc/~zack/ Did you know you can watch the live recording of the show right on our YouTube Channel? Have someone you’d like us to interview? Let us know, or contact the guest and have them contact us! Take […]