Hackaday Podcast Episode 346: Melting Metal In The Microwave, Unlocking Car Brakes And Washing Machines, And A Series Of Tubes

Wait, what? Is it time for the podcast again? Seems like only yesterday that Dan joined Elliot for the weekly rundown of the choicest hacks for the last 1/52 of a year. but here we are. We had quite a bit of news to talk about, including the winners of the Component Abuse Challenge — warning, some components were actually abused for this challenge. They’re also a trillion pages deep over at the Internet Archive, a milestone that seems worth celebrating.

As for projects, both of us kicked things off with “Right to repair”-adjacent topics, first with a washing machine that gave up its secrets with IR and then with a car that refused to let its owner fix the brakes. We heated things up with a microwave foundry capable of melting cast iron — watch your toes! — and looked at a tiny ESP32 dev board with ludicrously small components. We saw surveyors go to war, watched a Lego sorting machine go through its paces, and learned about radar by spinning up a sonar set from first principles.

Finally, we wrapped things up with another Al Williams signature “Can’t Miss Articles” section, with his deep dive into the fun hackers can have with the now-deprecated US penny, and his nostalgic look at pneumatic tube systems.

Download this 100% GMO-free MP3.

Continue reading “Hackaday Podcast Episode 346: Melting Metal In The Microwave, Unlocking Car Brakes And Washing Machines, And A Series Of Tubes”

This Week In Security: Cloudflare Wasn’t DNS, BADAUDIO, And Not A Vuln

You may have noticed that large pieces of the Internet were down on Tuesday. It was a problem at Cloudflare, and for once, it wasn’t DNS. This time it was database management, combined with a safety limit that failed unsafe when exceeded.

Cloudflare’s blog post on the matter has the gritty details. It started with an update to how Cloudflare’s ClickHouse distributed database was responding to queries. A query of system columns was previously only returning data from the default database. As a part of related work, that system was changed so that this query now returned all the databases the given user had access to. In retrospect it seems obvious that this could cause problems, but it wasn’t predicted to cause problems. The result was that a database query to look up bot-management features returned the same features multiple times.

That featurelist is used to feed the Cloudflare bot classification system. That system uses some AI smarts, and runs in the core proxy system. There are actually two versions of the core proxy, and they behaved a bit differently when the featurelist exceeded the 200 item limit. When the older version failed, it classified all traffic as a bot. The real trouble was the newer Rust code. That version of the core proxy threw an error in response, leading to 5XX HTTP errors, and the Internet-wide fallout. Continue reading “This Week In Security: Cloudflare Wasn’t DNS, BADAUDIO, And Not A Vuln”

So Long, Firefox, Part One

It’s likely that Hackaday readers have among them a greater than average number of people who can name one special thing they did on September 23rd, 2002. On that day a new web browser was released, Phoenix version 0.1, and it was a lightweight browser-only derivative of the hugely bloated Mozilla suite. Renamed a few times to become Firefox, it rose to challenge the once-mighty Microsoft Internet Explorer, only to in turn be overtaken by Google’s Chrome.

Now in 2025 it’s a minority browser with an estimated market share just over 2%, and it’s safe to say that Mozilla’s take on AI and the use of advertising data has put them at odds with many of us who’ve kept the faith since that September day 23 years ago. Over the last few months I’ve been actively chasing alternatives, and it’s with sadness that in November 2025, I can finally say I’m Firefox-free.

Continue reading “So Long, Firefox, Part One”

FLOSS Weekly Episode 855: Get In The Minecart, Loser!

This week Jonathan chats with Kevin, Colin, and Curtis about Cataclysm: Dark Days Ahead! It’s a rogue-like post-apocalyptic survival game that you can play in the terminal, over SSH if you really want to! Part of the story is a Kickstarter that resulted in a graphics tile-set. And then there’s the mods!

Continue reading “FLOSS Weekly Episode 855: Get In The Minecart, Loser!”

Hackers Can’t Spend A Penny

We aren’t here to praise the penny, but rather, to bury it. The penny, and its counterparts, have been vanishing all around the world as the cost of minting one far outweighs its value. But hackers had already lost a big asset: real copper pennies, and now even the cheaply made ones are doomed to extinction.

If you check your pockets and find a pre-1982 penny, it’s almost all copper. Well, 95% of its slightly-more-than-3-gram heft is pure copper. Since then, the copper penny’s been a fraud, weighing 2.5 g and containing only a 2.5% copper plate over a zinc core. During WWII, they did make some oddball steel pennies, but that was just a temporary measure.

Continue reading “Hackers Can’t Spend A Penny”

Congratulations To The 2025 Component Abuse Challenge Winners

For the Component Abuse Challenge, we asked you to do the wrong thing with electrical parts, but nonetheless come out with the right result. It’s probably the most Hackaday challenge we have run in a long time, and you all delivered! The judging was tight, but in the end three projects rose up to the top, and will each be taking home a $150 DigiKey gift certificate, but that doesn’t mean you shouldn’t give all of the projects a look.

So without further ado, let’s check out the winners and all the others that tickled the hacky regions of our judges’ brains. Continue reading “Congratulations To The 2025 Component Abuse Challenge Winners”

Illustrated Kristina with an IBM Model M keyboard floating between her hands.

Keebin’ With Kristina: The One With The Cipher-Capable Typewriter

I must confess that my mouth froze in an O when I saw [Jeff]’s Typeframe PX-88 Portable Computing System, and I continue to stare in slack-jawed wonder as I find the words to share it with you. Let me give it a shot.

[Jeff] tells us that he designed Typeframe for his spouse to use as a writer deck. That’s good spousing, if you ask me. Amazingly, this is [Jeff]’s first project of this type and scope, and somehow it’s an elegant, yet easy build that’s quite well documented to boot. Whatever Typeframe’s design may borrow, it seems to give back in spades.

The Typeframe PX-88 Portable Computing System.
Image by [Jeff] via Typeframe.net
Use Typeframe for what you will — cyberdeck, writer deck, travel PC — this baby can handle whatever you throw at it. And of course, it’s open source from front to back.

This Raspberry Pi 4B-based productivity machine has all sorts of neat features. The touch screen flips upward at an angle, so you don’t have to hunch over it or carry a mouse around. Want to sit back a bit while you work? The aesthetically spot-on keyboard is detachable. Yeah.

If that’s not enough to get you interested, Typeframe is designed for simple construction with minimal soldering, and the sliding panels make maintenance a breeze.

A little more about that keyboard — this is Keebin’, after all. It’s an MK Point 65, which boasts hot-swap sockets under those DSA Dolch keycaps. See? Minimal soldering. In fact, the only things you have to solder to make the Typeframe your own are the power switch and the status light. Incredible.

Continue reading “Keebin’ With Kristina: The One With The Cipher-Capable Typewriter”