Ask Hackaday: Wired Or Wireless Headphones?

They say you should never throw out old clothes because they will come back in style one day. Maybe they are right. We noted in a recent BBC post that, apparently, wired headphones are making a comeback. Like many people, we were dismayed when Apple took the headphone jack out of the iPhone and, as [Thomas Germain] notes, even Google eventually ejected the normal headphone jack. (Although, in fairness, most of the Pixel phones we’ve seen come with a pair of USB-C earbuds.)

On the face of it, though, wireless seems to be a good idea. You can get cheap Bluetooth earbuds now, although maybe still not as cheap as wired buds. Sure, they sound terrible, but so do cheap buds. It is a pain to charge them, of course, but not having to untangle wires is a benefit. On the other hand, you never have to charge your wired headphones.

Continue reading “Ask Hackaday: Wired Or Wireless Headphones?”

Hackaday Links Column Banner

Hackaday Links: March 15, 2026

Some days, it feels like we’re getting all the bad parts of cyberpunk and none of the cool stuff. Megacorps and cyber warfare? Check. Flying cars and holograms? Not quite yet. This week, things took a further turn for the dystopian with the news that a woman was hospitalized after an altercation with a humanoid robot in Macau. Police arrived on scene, took the bot into custody, and later told the media they believed this was the first time Chinese authorities had been called to intervene between a robot and a human.

The woman, reportedly in her seventies, was apparently shocked when she realized the robot was standing behind her. After the dust settled, the police determined it was being operated remotely as part of a promotion for a local business. We’ve heard there’s no such thing as bad publicity, but we’re not sure the maxim holds true when you manage to put an old lady into the hospital with your ad campaign.

Continue reading “Hackaday Links: March 15, 2026”

What Is A Computer?

On the podcast, [Tom] and I were talking about the new generation of smartphones which are, at least in terms of RAM and CPU speed, on par with a decent laptop computer. If so, why not just add on a screen, keyboard, and mouse and use it as your daily driver? That was the question posed by [ETA Prime] in a video essay and attempt to do so.

Our consensus was that it’s the Android operating system holding it back. Some of the applications you might want to run just aren’t there, and on the open side of the world, even more are missing. Is the platform usable if you can’t get the software you need to get your work done?

But that’s just the computer-as-a-tool side of the equation. The other thing a computer is, at least to many of our kind of folk, is a playground. It’s a machine for experimenting with, and for having fun just messing around. Android has become way too polished to have fun, and recent changes on the Google side of things actively prevent you from installing arbitrary software. The hardware is similarly too slimmed-down to allow for experimentation.

Looking back, these have been the same stumbling blocks for the last decade. In 2018, I was wondering aloud why we as a community don’t hack on cell phones, and the answer then was the same as it is now – the software is not friendly to our kind. You can write phone apps, and I have tried to do so, but it’s just not fun.

The polar opposites of the smartphone-as-computer are no strangers in our community. I’m thinking of the Linux single-board computers, or even something like a Steam Deck, all of which are significantly less powerful spec-wise than a flagship cell phone, but which are in many ways much more suitable for hacking. Why? Because they make it easy to do the things that we like to do. They’re designed to be fun computers, and so we use them.

So for me, a smartphone isn’t a computer, but oddly enough it’s not because of the hardware. It’s because what I want out of a computer is more than Turing completeness. What I want is the fun and the freedom of computering.

Hackaday Podcast Episode 361: Hackaday Podcast Mailbag, A Phone Is Not A Computer, 3D Printing History Is New Again

Join Hackaday Editors Elliot Williams and Tom Nardi as they cover their favorite hacks and stories from the week. The episode kicks off with some updates about Hackaday Europe and the recently announced Green Power contest, as well as the proposal of a new feature of the podcast where listeners are invited to send in their questions and comments. After the housekeeping is out of the way, the discussion will go from spoofing traffic light control signals and the line between desktop computers and smartphones, all the way to homebrew e-readers and writing code with chocolate candies. You’ll hear about molding replacement transparent parts, a collection of fantastic tutorials on hardware hacking and reverse engineering, and the recent fireball that lit up the skies over Germany. The episode wraps up with a fascinating look at how the developer of Pokemon Go is monetizing the in-game efforts of millions of players.

Check out the links below if you want to follow along, and as always, tell us what you think about this episode in the comments!

Download this episode in DRM-free MP3 so you can listen to it while doing unpaid labor in Pokemon Go.

Continue reading “Hackaday Podcast Episode 361: Hackaday Podcast Mailbag, A Phone Is Not A Computer, 3D Printing History Is New Again”

This Week In Security: Plenty Of Patches, Replacing Old Gear, And Phrack Calls For Papers

When Friday the Thirteenth and Patch Tuesday happen on the same week, we’re surely in for a good time.

Anyone who maintains any sort of Microsoft ecosystem knows by now to brace for impact come Patch Tuesday; March brings the usual batch of “interesting” issues, including:

  • Two high-risk Microsoft Office vulnerabilities (CVE-2026-26110 and CVE-2026-26113), both of which allow execution of arbitrary code with no user interaction other than opening a hostile file. Vulnerabilities like these are especially dangerous in environments where transferring Office documents is considered normal, such as (unsurprisingly) offices, but also for home users who may not be savvy enough to avoid opening hostile files. Arbitrary code execution allows the attacker to run essentially any commands the user would be able to run themselves, typically leveraging it to install remote access or keyboard logging malware.
  • Excel gets a different vulnerability, CVE-2026-26144, which allows leaking of data through a cross-site scripting vulnerability. Coupled with CoPilot Agent, this can be used to leak contents of spreadsheets, again with no direct user interaction.

On the server and container side, this month includes a fairly typical collection of patches for SQL Server, and vulnerabilities in the Microsoft-hosted device pricing and payment orchestrator services, which have been automatically patched by Microsoft. Continue reading “This Week In Security: Plenty Of Patches, Replacing Old Gear, And Phrack Calls For Papers”

Blood Tests Could Provide Early Warning Of Alzheimers Disease

Alzheimer’s disease remains a frustratingly difficult condition to manage for the millions of patients affected worldwide and their families. The cause of the disease is still not properly understood, and by the time memory loss and cognitive decline become apparent, the underlying brain pathology has often been quietly building for decades.

Soon, though it may be possible to diagnose impending Alzheimer’s disease ahead of time, before symptoms have taken hold. New research suggests this could be achieved through a simple blood draw, providing clinicians and patients precious time to manage the condition and plan ahead. Continue reading “Blood Tests Could Provide Early Warning Of Alzheimers Disease”

Ask Hackaday: What Will An LLM Be Good For In The Plateau Of Productivity?

A friend of mine has been a software developer for most of the last five decades, and has worked with everything from 1960s mainframes to the machines of today. She recently tried AI coding tools to see what all the fuss is about, as a helper to her extensive coding experience rather than as a zero-work vibe coding tool. Her reaction stuck with me; she referenced her grandfather who had been born in rural America in the closing years of the nineteenth century, and recalled him describing the first time he saw an automobile.

Après Nous, Le Krach

The Gartner hype cycle graph. Jeremykemp, CC BY-SA 3.0.

We are living amid a wave of AI slop and unreasonable hype so it’s an easy win to dunk on LLMs, but as the whole thing climbs towards the peak of inflated expectations on the Gartner hype cycle perhaps it’s time to look forward. The current AI hype is inevitably going to crash and burn, but what comes afterwards? The long tail of the plateau of productivity will contain those applications in which LLMs are a success, but what will they be? We have yet to hack together a working crystal ball, but perhaps it’s still time to gaze into the future. Continue reading “Ask Hackaday: What Will An LLM Be Good For In The Plateau Of Productivity?”