The Raspberry Pi 4 With 3 GB RAM Is No Joke

Raspberry Pi 5 price increases. (Credit: Jeff Geerling)
Raspberry Pi 5 price increases. (Credit: Jeff Geerling)

Although easily dismissed by some as another cruel April Fools joke, Raspberry Pi’s announcement of a new 3 GB model of the Raspberry Pi 4 along with (more) price increases for other models was no joke. Courtesy of the ongoing RAMpocalypse, supplies of LPDDR4 and LPDDR5 are massively affected, leading to this new RPi 4 model with two 1.5 GB LPDDR4 chips, as these are apparently cheaper to source.

Affected in this latest price increase across RP’s product range are RPi 4 and 5 models with 4 or more GB of RAM, with price bumps ranging from $25 on the low end to $150 for the Raspberry Pi 500+. If you wanted a Raspberry Pi 5 with 16 GB of RAM, you’re now paying $300 for the privilege.

Obviously, this news has got people like [Jeff Geerling] rather down in the dumps, essentially stating that using SBCs like the RPi is now beyond the means of many hobbyists. While you can still use SBCs that use e.g. LPDDR2 RAM, such as the older RPi Zero, 2 and 3 models, [Jeff] himself is now moving more towards wrangling with snakes on MCUs, as these boards are so far not significantly affected in terms of price.

With current projections in the RAM market being that this year will still see more price increases, it remains hard to tell exactly how ‘temporary’ this situation will be. That said, using readily available, powerful and cheap MCUs like the ESP32 variants for projects isn’t a bad idea if you really don’t need to be running more than perhaps FreeRTOS.

Continue reading “The Raspberry Pi 4 With 3 GB RAM Is No Joke”

Spy Tech: Conflicts Bring A New Number Station

If you know much about radios and espionage, you’ve probably encountered number stations. These are mysterious stations that read out groups of numbers or otherwise encoded messages to… well… someone. Most of the time, we don’t know who is receiving the messages. You’d be excused for thinking that this is an old technology. After all, satellite phones, the Internet, and a plethora of options now exist to allow the home base to send spies secret instructions. However, the current-day global conflict has seen at least one new number station appear, apparently associated with the United States and, presumably, targeting some recipients in Iran, according to priyom.org.

As you might expect, these stations don’t identify themselves, but the Enigma Control List names this one as V32. It broadcasts two two-hour blocks a day at 0200 UTC and a repeat at 1800 UTC. Each message starts with the Farsi word for “attention” followed by what is assumed to be some header information as two 5-digit groups. Then there is a set of 181 five-digit groups. Each message is padded out to take 20 minutes, and there are six messages in each transmission.

Continue reading “Spy Tech: Conflicts Bring A New Number Station”

US FCC Prohibits Approval Of New Foreign-Made Consumer Routers

The US Federal Communications Commission (FCC) is tasked with regulating both wired and wireless communications, which also includes a national security component. This is how previously the FCC tossed networking gear made by Huawei and foreign-manufactured drones onto its Covered List, effectively banning it from sale in the US. Now foreign-made consumer routers have been added to this list, barring explicit conditional approval on said list that would exempt them during a ‘transition phase’.

As per the FCC fact sheet, this follows after determination by an interagency body that such routers “pose unacceptable risks to the national security of the United States [..]”. This document points us to the National Security Determination PDF, which attempts to lay out the reasoning. In it is noted that routers are an integral part of every day life, and compromised routers are a major risk factor, ergo it follows that only US-manufactured routers are to be trusted.

These – so far fictional – US-manufactured consumer routers would have to feature ‘trusted supply chains’, which would seem to imply onshoring a large industrial base, though without specifying how deep this would have to go it’s hard to say what would be involved. The ‘supporting evidence’ section also only talks about firmware-related vulnerabilities, which would imply that US firmware developers do not produce CVEs.

Continue reading “US FCC Prohibits Approval Of New Foreign-Made Consumer Routers”

Slug Algorithm For On-GPU Rendering Of Fonts With Bézier Curves Now In Public Domain

The Slug Algorithm has been around for a decade now, mostly quietly rendering fonts and later entire GUIs using Bézier curves directly on the GPU for games and other types of software, but due to its proprietary nature it didn’t see much adoption outside of commercial settings. This has now changed with its author, [Eric Lengyel], releasing it to the public domain without any limitations.

Originally [Eric] had received a software patent in 2019 for the algorithm that would have prevented anyone else from implementing it until the patent’s expiration in 2038. Since 2016 [Eric] and his business have however had in his eyes sufficient benefit from the patent, making it unnecessary to hold on to it any longer and retain such exclusivity.

To help anyone with implementing their own version of the algorithm, there is a GitHub repository containing reference shader implementations with plenty of inline comments that should help anyone with some shader experience get started.

Although pretty niche in the eyes of the average person, the benefits of using on-GPU rendering of elements like fonts are obvious in terms of rendering optimization. With this change open source rendering engines for games and more can finally also use it as well.

Thanks to [Footleg] for the tip.

German Fireball’s 15 Minutes Of Fame

Sunday night, around 7:00 PM local time, a bright fireball streaked across the western German sky, exploded, and rained chunks of space rock down on the region around Koblenz. One of the largest known chunks put a soccer-ball-sized hole in someone’s roof, landing in their bedroom. Fortunately, nobody was hurt. But given the apparent size of the explosion, there must be many more pieces out there for the finding, and a wave of hopeful meteorite hunters has descended upon the region.

But if you wanted a piece of the action, where exactly would you start looking? How do scientists find meteorites anyway? And what should you do if you happen to see a similar fireball in the night sky?

Citizen Science

Meteorite video-bombs a boring parking lot in Heerlen, NL.

In the age of always-on dashboard cameras, ubiquitous smartphones, and other video recording devices, it’s hard for a shy meteorite to find a quiet spot out of the public eye. That makes them a lot easier to find than they were in the past. Indeed, the International Meteor Organization, which aggregates amateur meteor observations, received more than 3,200 reports of this one, including several with video documentation. Some are stunning, and others may not even be of the event at all.

By collecting reports from many locations, they can hope to piece together the meteorite’s trajectory. However, if you look at the individual reports, it’s clear that this is a difficult task. Nobody is expecting a bright fireball to streak across the night sky, so many of the reports are reasonably vague on the details and heavy on the awe.

This report from [Sophie Z], for instance, is typical. She records where she was and roughly the location in the night sky where the meteorite passed, along with the comment “I’ve never seen anything so amazing and large before in my life.” Other amateur observers are more precise. [David C] (“I have a Ph.D in physics”) managed to record the start and the end heading of the meteorite to a couple of decimal places. He must have had a camera.

Continue reading “German Fireball’s 15 Minutes Of Fame”

The Quarterhorse 2.1, looking fast even on the ground.

Quarterhorse Vs Blackbird: Hermeus’ Flight Puts Them One Step Closer To Record

You’ve got to be ambitious to target a legend. If there’s one thing the folks at Hermeus Aerospace are, though, it’s ambitious: not only do they plan on their Quarterhorse unmanned aerial vehicle (UAV) to outfly the SR-71 blackbird, they’re hoping to do it in record time. They took one big step closer to that goal in March 2026, when Quarterhorse 2.1 took off for the first time from Spaceport America.

The F-16-sized prototype is actually the second first flight Hermeus can brag of in the past year– version one first flew in May 2025. They’re iterating fast. Version 2.1 is hoped to prove a key part of the engine design for v2.2, which is the plane Humerus hopes to use to break the SR-71’s air-breathing speed record of Mach 3.3 from 1976. They’re hoping the next prototype can actually hit mach 5, which would be amazing if they pulled it off. Of course when exactly v2.2 will fly will depend largely on how this current model does in its test envelope.

This Quarterhorse hasn’t yet broken the sound barrier, but it certainly will. With the same F100 engine as the F-15 and F-16 fighters, it’s got the thrust, and one look tells you it has the aerodynamics. Of course an F100 can’t fly at Mach 5 — not on its own — but the F100 isn’t purely stock. It’s actually a component in Hermeus’ Chimera engine, which combines the F100 with a pre-chiller to actively cool the incoming supersonic air so the engine doesn’t melt at high speeds, and a ramjet stage that bypasses the engine entirely. That would make the Chimera a turboramjet engine; starting with an old and well-known turbine stage seems like a good move and is arguably a hack.

It would work like this: the engine takes off on turbine, the chiller kicks in when the aircraft goes supersonic, and the turbine is bypassed completely at high mach. This is how they hope to break the SR-71’s record: as well-designed as the J-58 engine was in that plane, it only pushed bleed air into the afterburner, rather than bypassing its turbine stage entirely, so was limited by the need to not melt said turbines. In some ways, the Chimera reminds us of a cheaper, simpler SABER engine. Of course as ambitious as breaking a 50 year old speed record might be, Hermeus’ goals are downright humble compared to the single-stage-to-orbit dreams the SABRE was meant to allow.

It remains to be seen just how fast Quarterhorse 2.1 will be able to go. Notably, at least as it was first unveiled, the aircraft doesn’t have any kind of shock cone on the inlet. It’s unlikely that the pre-chiller makes that unnecessary; it is more likely that either 2.1 is going to be restricted to low mach numbers where such things aren’t necessary, or it will be fitted later. Either way, we look forward to following the test program, at least as much as it is made public. Check out footage from the test flight in the video embedded below.

Continue reading “Quarterhorse Vs Blackbird: Hermeus’ Flight Puts Them One Step Closer To Record”

California’s Problematic Attempt To Add Age-Verification To Software

Last year California’s Digital Age Assurance Act (AB 1043) was signed into law, requiring among other things that operating system providers implement an API for age verification purposes. With the implementation date of January 1, 2027 slowly encroaching this now has people understandably agitated. So what are the requirements, and what will its impact be, as it affects not only OS developers but also application stores and developers?

The required features for OS developers include an interface at account setup during which the person indicates which of the four age brackets they fit into. This age category then has to be used by application developers and application stores to filter access to the software. Penalties for non-compliance go up to $2,500 per affected child if the cause is neglect and up to $7,500 if the violation was intentional.

As noted in the Tom’s Hardware article, CA governor Newsom issued a statement when signing the unanimously passed bill, saying that he hopes the bill gets amended due to how problematic it would be to implement and unintended effects. Of course, the bigger question is whether this change requires more than adding a few input fields and checkboxes to an OS’ account setup and an API call or two.

Continue reading “California’s Problematic Attempt To Add Age-Verification To Software”