78 Followers
207 Following
74 Posts
-"When the going gets weird, the weird turn pro..."
Websitehttps://modrobert.org
PGP0x09208346d9245e65
Location:Bangkok
Bitcoinbc1qtxmtnc225p767x78k0xwcnhr0u64r655kqvc69
GitHubhttps://github.com/modrobert
Experimental Websitehttps://modrobert.ddns.net/

ok, remember the jug crushing robot I didn't get finished? well, I got it working. There are some details to having it technically "finished"

big media! https://bsky.app/profile/ruenahcmohr.bsky.social/post/3mlzoli2ya222

Rue Mohr (@ruenahcmohr.bsky.social)

ok, remember the jug crushing robot I didn't get finished? well, I got it working. There are some details to having it technically "finished"

Bluesky Social
SEG electronics market in Shenzhen is amazing.
Shenzhen

The last baby was just born! The #BabyGoatCountdown for 2026 is complete! (But don't worry, there will be loads more super cute photos)

13 babies from 8 mamas.

OK, this is funny...

"X user tricks Grok into sending them $200,000 in crypto using morse code":

https://www.dexerto.com/entertainment/x-user-tricks-grok-into-sending-them-200000-in-crypto-using-morse-code-3361036/

X user tricks Grok into sending them $200,000 in crypto using morse code

An X user managed to trick AI chatbot Grok into sending around $200,000 worth of crypto after exploiting its link with an automated trading bot.

Dexerto

NEW: Kaspersky says hackers planted and activated a backdoor in the popular Windows disk imaging app Daemon Tools a month ago, infecting thousands of computers around the world in a n ongoing, "widespread" attack.

The attack appears to be ongoing. A representative for Disc Soft, which makes Daemon Tools, said it was aware of Kaspersky's report and was investigating.

This is the latest supply chain attack targeting software used by a large number of people.

https://techcrunch.com/2026/05/05/kaspersky-suspects-chinese-hackers-planted-a-backdoor-into-daemon-tools-in-widespread-attack/

Kaspersky suspects Chinese hackers planted a backdoor into Daemon Tools in 'widespread' attack | TechCrunch

The cybersecurity company says it's seen thousands of infection attempts, and at least a dozen successful hacks after users installed malicious versions of the popular Windows software.

TechCrunch
You can now use a finger to point at random instructions in @radareorg

Very exciting discovery in Velasco Labs right now!

People keep sending me links to that German feminist hacker collective that made wild clay PCBs, and while i think that's pretty cool, the way they applied the conductive traces felt a little like a cheat to me because they were sort of painted on.

Last night after someone linked me to it again, i suddenly remembered my experiments with adding copper powder to ceramics glazes, and how, by smothering the red-hot ceramics in sawdust, i was able to reduce the copper oxides into something that looked like metallic copper. That got me pondering.

So, i applied some tinning flux meant for plumbing to a small spot on this test piece from last year and hit it with my soldering iron. Sure enough, it tinned the copper, and with that, i was able to solder a piece of wire to it.

Your eyes to not deceive you. This is copper wire soldered to a piece of ceramic pottery and it is firmly attached.

Why Leaded Fuel Is Still A Thing

Leaded fuel is considered one of the greatest environmental failures in modern human history. Adding tetraethyl lead to gasoline reduced knock in internal combustion engines, which was widely consi…

Hackaday

The coreutils Rust rewrite story is pretty funny.

Coreutils are tools like rm, mv, mkdir, etc. Unlike binutils, this isn't a fertile ground for memory safety bugs. But, the rewrite was completed, and in the spirit of progress, Canonical decided to switch.

But do you know what coreutils are a fertile ground for? Race conditions around file creation, deletion, permission setting, and so on. The original code accounted for decades of hard-learned lessons in that space. The Rust rewrite did not:

https://seclists.org/oss-sec/2026/q2/332

PS. I'm not dunking on Rust. It's just that... starting over from scratch has its hidden costs.

oss-sec: uutils coreutils CVEs