-
15 votes
-
Hackable/moddable electronics?
I recently came across a cool video on youtube. https://www.youtube.com/watch?v=dxj8JwdQ7Lk&feature=youtu.be - The guy added a 4g connector to his rc plane and I think some extra batteries and...
I recently came across a cool video on youtube. https://www.youtube.com/watch?v=dxj8JwdQ7Lk&feature=youtu.be - The guy added a 4g connector to his rc plane and I think some extra batteries and managed to fly to the next island over.
I love stuff like this. Do you guys know any other current electronics that can be modded like this? Sadly it seems like most new consumer electronics come with their own small walled garden and often enough stuff just stops working once the seller goes bankrupt.
Other things that come to mind are:
Raspberry Pi
Arduino
ESP
But do you guys know whole systems that are moddable like this?
The Ryze Tello is a programmable drone, which is pretty cool as well.
I also saw some people modding 3d printers to laser cutters7 votes -
The massive Twitter hack could be a global security crisis
20 votes -
Apple, Elon Musk, Kanye West, and other accounts are tweeting a bitcoin scam in giant Twitter hack
49 votes -
Twitter is removing images of an internal tool sources say enables account takeover
11 votes -
Moroccan journalist targeted with network injection attacks using NSO Group’s tools
2 votes -
Cyber-attack Australia: Sophisticated attacks from ‘state-based actor’, PM says
7 votes -
Prime Minister Scott Morrison says Australian organisations, including governments and businesses, are currently being targeted by a sophisticated foreign "state-based" hacker
6 votes -
Obscure Indian cyber firm spied on politicians, investors worldwide
5 votes -
The confessions of Marcus "MalwareTech" Hutchins, the hacker who stopped WannaCry and was arrested by the FBI in 2017
33 votes -
A hacker is trying to break Ohio’s tool for reporting workers who quit during the pandemic
23 votes -
Microsoft's GitHub account allegedly hacked, 500GB stolen
11 votes -
Leaked footage from The Last of Us 2 was likely obtained by hackers who exploited a security vulnerability in prior Naughty Dog games
5 votes -
BlackBerry says Chinese government hackers stole world's sensitive data for ten years
7 votes -
Webcam hacking—The story of how I gained unauthorized Camera access on iOS and macOS
4 votes -
I spoke out against sexual harassment at Uber. The aftermath was more terrifying than anything I faced before
16 votes -
Security researcher hacks SlickWraps, publishes a disclosure
8 votes -
A Tesla vehicle was tricked into speeding with a strip of electrical tape
6 votes -
Four Chinese military personnel charged for Equifax hack
10 votes -
Meet the mad scientist who wrote the book on how to hunt hackers
8 votes -
Hackers are breaking directly into telecom companies to take over customer phone numbers
10 votes -
Tricky phish angles for persistence, not passwords
3 votes -
"Randomizers" are breathing new life into old games
18 votes -
Hackers can use lasers to ‘speak’ to your Amazon Echo or Google Home
10 votes -
Hackers steal secret crypto keys for NordVPN. Here’s what we know so far.
29 votes -
Swedish police can use spyware to hunt criminal gangs – police to use the latest technology to access everyday encrypted apps used by criminals
8 votes -
Stealthy Russian hacker group resurfaces with clever new tricks
8 votes -
Building China's Comac C919 airplane involved a lot of hacking, report says
5 votes -
Planting tiny spy chips in hardware can cost as little as $200
8 votes -
Pair Locking your iPhone to prevent law enforcement forensic imaging with Configurator 2
10 votes -
Sonic Battle (GBA) Renderer Series
6 votes -
Elevator hacking: From the pit to the penthouse
16 votes -
Altstore.io - A third party App Store for iOS
14 votes -
Permanent Bootrom exploit for iOS devices with A5-A11 processors
23 votes -
Web scraping doesn’t violate anti-hacking law, appeals court rules
12 votes -
Microsoft Excel is now a strategy game
13 votes -
Twitter CEO Jack Dorsey's account was compromised, sent public tweets and retweets including racial slurs
17 votes -
WhatsApp protocol decryption for chat manipulation and more
7 votes -
New ‘warshipping’ technique gives hackers access to enterprise offices
8 votes -
Sneaker and fashion marketplace StockX was hacked, with almost seven million records stolen
9 votes -
An Introduction to Mobile Networks, SIM Cards, and GSM.
9 votes -
Ottawa city hall has been targeted by cyber attacks more than 8,000 times in the past year
8 votes -
The near impossible twenty-year journey to translate Fire Emblem: Thracia 776
6 votes -
Cracking a windshield and earning $10,000 on the Tesla Bug Bounty Program
12 votes -
YouTube now bans instructional hacking and phishing
31 votes -
Hackers, farmers, and doctors unite! Support for right to repair laws slowly grows
6 votes -
Florida city to pay $600K ransom to hacker who seized computer systems weeks ago
5 votes -
Hacking thousands of websites via third-party JavaScript libraries
5 votes -
Telegram founder points to China hacking attack during Hong Kong protest
7 votes -
Behind the scenes with the hacktivists who took on Microsoft and the FBI
4 votes