Reverse-Engineering Human Cognition And Decision Making In A Modern Age

Cognitive processes are not something that we generally pay much attention to until something goes wrong, but they cover the entire scope of us ingesting sensory information, the processing and recalling thereof, as well as any resulting decisions made based on such internal deliberation.

Within that context there has also long been a struggle between those who feel that it’s fine for humans to rely on available technologies to make tasks like information recall and calculations easier, and those who insist that a human should be perfectly capable of doing such tasks without any assistance. Plato argued that reading and writing hurt our ability to memorize, and for the longest time it was deemed inappropriate for students to even consider taking one of those newfangled digital calculators into an exam, while now we have many arguing that using an ‘AI’ is the equivalent of using a calculator.

At the root of this conundrum lies the distinction between that which enhances and that which hampers human cognition. When does one merely offload tasks to a device or object, and when does one harm one’s own cognition?

Continue reading “Reverse-Engineering Human Cognition And Decision Making In A Modern Age”

Hackaday Links Column Banner

Hackaday Links: April 12, 2026

At this point, we’ll assume you already know that four humans took a sightseeing trip around the Moon and made their triumphant return to Earth on Friday. Even if you somehow avoided hearing about it through mainstream channels, we kept a running account of the mission’s highlights stuck to the front page of the site for the ten days that the crew was in space.

On the assumption that you might be a bit burned out with space news at this point, we won’t bring up it up in this post… other than to point out that excitement for the lunar flyby has driven the number of simultaneous players of Kerbal Space Program to its highest count ever — nearly 20,000 armchair astronauts spent this weekend trying to cobble together their own rocket in honor of the Artemis II mission.

With so many folks focused on the Moon it would be the perfect time for a company to sneak out some bad news, which is perhaps why Amazon picked this week to announce they would be dropping support for Kindles released before 2012. Presumably there aren’t too many first and second generation Kindles still out there in the wild, but the 2012 cutoff does mean the first iteration of the Paperwhite will be one of the devices being put out to pasture come May 20th.

Continue reading “Hackaday Links: April 12, 2026”

What’s Your Favorite Kind Of Hack?

Talking with [Tom Nardi] on the podcast this week, he mentioned his favorite kind of hack: the community-developed open-source firmware that can be flashed into a commercial product that has crappy firmware, thus saving it. The example, just for the record, is the CrossPoint open e-book reader firmware that turns a mediocre cheap e-book into something that you can do anything you want with. Very nice!

And that got me thinking about “kinds of hacks” in general. Do we have a classification scheme for the hacks that we see here on Hackaday? For instance, the obvious precursor to many of Tom’s favorite hacks is the breaking-into-the-locked-firmware hack, where a device that didn’t want you loading your own firmware on it is convinced to let you do so. Junk-hacking is probably also a category of its own, where instead of finding your prey on AliExpress, you find it on eBay, or in the alleyway. And the save-it-from-the-landfill repair and renovation hacks are close relatives.

The doing-too-much-with-too-little hacks are maybe my personal favorite. I just love to see when someone manages to get DOOM running in Linux on a computer made with only 8-pin microcontrollers. Because of the nature of the game, these often also include a handful of abusing-a-component-to-do-something-it’s-not-meant-to-do hacks. Heck, we even had a challenge for just exactly those kind of hacks.

Then there are fine-art-hacks, where the aesthetic outcome is as important as the technical, or games-hacks where fun is the end result.

What other broad categories of hacks are we missing? And which are your favorite?

Hackaday Podcast Episode 365: Early 3DP Engineering, A New CAD Interface, And Flying Around The Moon

Humans flew around the Moon this week, but Hackaday Editors Elliot Williams and Tom Nardi were stuck on Earth — luckily, there was no shortage of stories and hacks to keep them occupied. From the news that Linux might be putting the i486 out to pasture, to the fascinating potential of the threadless ball screw and connecting Bluetooth calipers up to FreeCAD.

You’ll hear about the latest in Internet via high-altitude balloon, the zen of organizing your parts bins, all the problems with Markdown files, and a deep-dive into making a convincing LED fire effect. The episode wraps up with some polarizing opinions on long term data storage, and a freewheeling discussion about the importance of literal moonshots.

Check out the links below if you want to follow along, and as always, tell us what you think about this episode in the comments!

Flying around the Moon? Download this episode in DRM-free MP3 so you’ll have something to listen to.

Continue reading “Hackaday Podcast Episode 365: Early 3DP Engineering, A New CAD Interface, And Flying Around The Moon”

This Week In Security: Flatpak Fixes, Android Malware, And SCADA Was IOT Before IOT Was Cool

Rowhammer attacks have been around since 2014, and mitigations are in place in most modern systems, but the team at gddr6.fail has found ways to apply the attack to current-generation GPUs.

Rowhammer attacks attach the electrical characteristics of RAM, using manipulation of the contents of RAM to cause changes in the contents of adjacent memory cells. Bit values are just voltage levels, after all, and if a little charge leaks across from one row to the next, you can potentially pull a bit high by writing repeatedly to its physical neighbors.

The attack was used to allow privilege escalation by manipulating the RAM defining the user data, and later, to allow reading and manipulation of any page in ram by modifying the system page table that maps memory and memory permissions. By 2015 researchers refined the attack to run in pure JavaScript against browsers, and in 2016 mobile devices were shown to be vulnerable. Mitigations have been put in place in physical memory design, CPU design, and in software. However, new attack vectors are still discovered regularly, with DDR4 and DDR5 RAM as well as AMD and RISC-V CPUs being vulnerable.

The GDDR6-Fail attack targets the video ram of modern graphics cards, and is able to trigger similar vulnerabilities in the graphics card itself, culminating in accessing and changing the memory of the PC via the PCI bus and bypassing protections.

For users who fear they are at risk — most likely larger AI customers or shared hosting environments where the code running on the GPU may belong to untrusted users — enabling error correcting (ECC) mode in the GPU reduces the amount of available RAM, but adds protection by performing checksums on the memory to detect corruption or bit flipping. For the average home user, your mileage may vary – there’s certainly easier ways to execute arbitrary code on your PC – like whatever application is running graphics in the first place!

Continue reading “This Week In Security: Flatpak Fixes, Android Malware, And SCADA Was IOT Before IOT Was Cool”

2026 Hackaday Europe: First Round Of Speakers Announced!

Hackaday Europe is the continental version of the Ultimate Hardware Conference, taking place May 16th and 17th, and you need to be there! We’ll continue to announce speakers and workshops over the next couple weeks, because we got so many more great talks than we had anticipated that we’re negotiating for extra time.

This year, we’re moving to a new venue in Lecco, Italy, and it’s sure to be fantastic. Get your tickets now before it’s too late. And stay tuned for another round of talk reveals next week!

Continue reading “2026 Hackaday Europe: First Round Of Speakers Announced!”

In Space (Probably) Everyone Can Hear You.. Well, You Know

The news is full of reports from the moon-bound Integrity, otherwise known as Artemis II. Mostly, the news is good, but there has been one “Houston, we have a problem…” moment. The space toilet, otherwise known as the Universal Waste Management System or UWMS is making a burning smell while in use. While we would love to be astronauts, we really don’t want to go ten days without using the can, and it made us wonder how, exactly, the astronauts answered the call of nature.

The Old Days

Back in the Apollo-era, going to the bathroom was a messy business. The capsule wasn’t that big, and there were no women on board. So you simply strapped an adhesive-rimmed bag or tube to yourself and answered nature’s call with your two closest coworkers right there.

Space Shuttle facilities (by [Svobodat] CC BY-SA 3.0)
To add insult to injury, the “#2 bags” needed some packet mixed in to keep it from going bad in the bag before it could return to Earth for — no kidding — scientific study.

The system was far from perfect. Apollo 8 and Apollo 10 both had to do some housekeeping due to leaky bags.

Astronaut Ken Mattingly reportedly said, “Man, one of the feats of my existence the other day was, in 42 minutes, I strapped on a bag, went out of both ends, and ate lunch…. I used to want to be the first man to Mars. This has convinced me that, if we got to go on Apollo, I ain’t interested.”

Still, it was better than the first Mercury launch, where Alan Shepard famously relieved himself in his spacesuit while sitting on the pad for over eight hours. Later missions used hoses.

Things got slightly better with Skylab, where there was more room. The Shuttle also had a toilet. You got a curtain for privacy, but you couldn’t go #1 and #2 at the same time. Also, apparently, the contraptions were not easily workable for females.

Continue reading “In Space (Probably) Everyone Can Hear You.. Well, You Know”