2026-03-14 10:00:32

Ford does sell an electric pickup, but not very many of them. We can’t say for sure, but it’s possible that if the F150 Lightning had the classic cool of [ScottenMotors] 1977 F150 SuperCab conversion they’d have better numbers.

On Reddit, [Scotten] shares the takeaways from his conversion effort, which involved a custom Tesla-cell battery pack and a new rear axle assembly to house the Tesla SDU (Small Drive Unit). A Large Drive Unit (LDU) would probably fit, but the SDU already puts out 264 HP, which compares rather favourably to the 156 HP this truck’s malaise-era V8 put out stock. The old F-bodies were great trucks in a lot of respects, but even an die-hard ICE enthusiast is probably not going to be sad to see that motor go.
Choosing to put the integrated drive unit in the rear axle complicates the build compared to other conversions that re-use the

stock transmission and differential, but saves you all the losses associated with that frankly unnecessary powertrain hardware. The takeaway there is to figure out all the mechanical work on the chassis, because the EV stuff is actually the easy part. [Scotten] had the wheels turning a full year before he got the brakes figured out, because even if they’re just the rears and even if there’s regen– you want all the breaks to work on your test drive.
With the 100kW power pack, he’s getting about 220 miles of range. From the pictures, it looks like he’s filled up most of the hood space with that battery, but we can’t help but wonder if there’s room under the bed where the gas tank(s) lived to squeeze in more cells for those of us who need to go further.
Sadly the design isn’t open source, but [ScottenMotors] is apparently doing conversions on commission and open to selling kits; you can check that out on their website. In that, he’s following in the series-hybrid footsteps of Edison Motors.
While we respect the hustle to design an all-new rear end in this hack, you don’t even have to pull the internal combustion engine if you want to play on easy mode. You don’t need to be a nanoscience professor like [ScottenMotors] to pull off an electric truck, for the record– [Mr.G]’s high school class did a great job on a kei truck.
Thanks to [JohnU] for the tip!
2026-03-14 07:00:04

The Tesla turbine is a bladeless centripetal-flow turbine invented by Nikola Tesla in 1913, using the boundary-layer effect rather than having a stream of gases or a fluid impinge on blades. Recently [Jamie’s Brick Jams] constructed one using Lego to demonstrate just how well these turbines work compared to their bladed brethren.
Since it uses the boundary-layer effect, the key is to have as much surface area as possible. This means having many smaller discs stacked side by side with some spacing between them.
Interestingly, the air that is directed against the turbine will travel inwards, towards the axle of the discs and thus requiring some way to vent the air. In the video a number of design prototypes are tested to see how they perform before settling on a design suitable for a functional generator.
The first discs are printed in PLA with an FDM printer, which are put on a shaft with 1 mm spacers. What becomes clear during testing is that these turbines can reach ridiculous speeds, but torque is really quite weak until you hit very high RPMs, well beyond 10,000 RPM. This is a bit of an issue if you want to drive any load with it, especially on start-up, but managed to propel a walker robot as a quick torque test.
After all that testing and experimenting, the right material for the turbine discs was investigated, with PLA pitted against ‘PLA tough’, PETG, PC and TPU. Of these PLA Tough got the best results in terms of RPM at the same air pressure. This was assembled into a basic generator, but the turbine struggled to generate enough torque.
Here the solution was to create a custom generator that would be much easier to spin up. To this was added a much larger turbine with 0.3 mm thin discs, using which ultimately some power could be generated, along with a considerable amount of torque. To adjust the RPM into the generator from the turbine a CVT initially was used to provide a gradual adjustment, but this had to be replaced with metal gears.
After this change the generator was good enough for a power output of about 14 Watt at 30 V with 85 PSI as input. Which is more than enough to charge a smartphone or light up a big LED panel. The design files for all of these turbines are provided on MakerWorld, such as for the big turbine.
Although Tesla turbines never made much of a splash as turbines, they are quite nice as pumps that can take a bit of abuse, including ingesting debris that would wreck other types of pumps. As a turbine they remain a fun hobbyist toy, with us covering various designs over the years. Take for example this one from 2011 based on HDD platters, or a micro turbine out of metal.
2026-03-14 04:00:23

Remember those brick cellphones in the 1990s? They were comically large by today’s standards. These phones used the 1G network to communicate and, as such, have been unusable for decades now. However [Alan Boris] has resurrected this classic phone to operate today.
Originally costing as much as today’s top-of-the-line phones, but instead of weighing just a few ounces this classic Motorola DynaTAC 8000 Classic 2 tips the scales at a hefty 1.5 lbs. [Alan Boris] decided to not just bring the electronics back to life, but to even stuff a modern cellphone inside it to make it fully functional. Given the size of this phone, finding room for the new innards wasn’t much of a challenge. In fact, after the retrofit there was less in the phone than when it started life.
Using a perfboard and some tactile switches he was able to sense the button presses on the phone’s keypad and relay those to a Raspberry Pi Pico 2. The Pico in turn drove a small color LCD to replicate the original screen and controlled a pair of ADG729 boards used to dial the BM10 cellphone within this cellphone. The BM10 is a cellphone about the size of a 9V battery, making it easy to put inside the DynaTAC and bring the handset back to the modern cellular network.
Thanks [Alan Boris] for the tip! Be sure to check out our other cellphone hacks as well as some of our other retrofit hacks.
2026-03-14 01:15:41

Join Hackaday Editors Elliot Williams and Tom Nardi as they cover their favorite hacks and stories from the week. The episode kicks off with some updates about Hackaday Europe and the recently announced Green Power contest, as well as the proposal of a new feature of the podcast where listeners are invited to send in their questions and comments. After the housekeeping is out of the way, the discussion will go from spoofing traffic light control signals and the line between desktop computers and smartphones, all the way to homebrew e-readers and writing code with chocolate candies. You’ll hear about molding replacement transparent parts, a collection of fantastic tutorials on hardware hacking and reverse engineering, and the recent fireball that lit up the skies over Germany. The episode wraps up with a fascinating look at how the developer of Pokemon Go is monetizing the in-game efforts of millions of players.
Check out the links below if you want to follow along, and as always, tell us what you think about this episode in the comments!
Download this episode in DRM-free MP3 so you can listen to it while doing unpaid labor in Pokemon Go.
2026-03-13 23:30:34

After the previous attempt of running a PC off AA cells got a lot of comments, [ScuffedBits] decided to do the scientifically responsible thing and re-ran the experiment with all the peer-reviewed commentary in mind. Although we noted with the previous experiment that only alkaline cells were used, [ScuffedBits] rectified this by stating that both carbon and alkaline AA cells were used the first time around.
For this second experiment a number of changes were made, though still both carbon and alkaline cells were put into the mix. To these a third string was added, consisting of NiMH cells, for a total of 64 cells with each of the three strings outputting around 25 VDC when fully charged. These fed a cheap buck regulator module to generate the 12 VDC for the DC-DC converter on the mainboard’s ATX connector.
Although it appears that the same thin Cat-5e-sourced wiring was used, with the higher voltage this meant a lower current, making it significantly less sketchy. Unlike with the first experiment, this time around the Core i3 530 based PC could run much longer and even boot off the DIY battery pack. After a quick game and pushing through a Cinebench run for 64 Watts maximum power usage, it turned out that there was still plenty of time for more fun activities, such as troubleshooting Minecraft and even playing it.
After a total runtime of 33 minutes and 19 seconds the voltage finally dropped too low to continue. A quick check of cells in each string, it turned out that the carbon cells were the most drained with significant terminal voltage drop. The alkaline cells had been pushed down to a level where they could still probably run a wall clock, but the NiMH cells showed a healthy 1.2 V, meaning that a fully NiMH battery pack could go a lot longer.
This probably isn’t too surprising when we look at the history of battery packs in laptops, where NiCd quickly got pushed out by NiMH-based packs for having significantly higher power density and none of the problems with recharging and disposal. Even today 1.5 V Li-ion-based AA cells do not have significantly more capacity than NiMH AA cells, making this chemistry still very relevant today. Even if you’re not trying to build your own battery pack for running a desktop PC off.
2026-03-13 22:00:18

When Friday the Thirteenth and Patch Tuesday happen on the same week, we’re surely in for a good time.
Anyone who maintains any sort of Microsoft ecosystem knows by now to brace for impact come Patch Tuesday; March brings the usual batch of “interesting” issues, including:
On the server and container side, this month includes a fairly typical collection of patches for SQL Server, and vulnerabilities in the Microsoft-hosted device pricing and payment orchestrator services, which have been automatically patched by Microsoft.
We all love getting every ounce of usability from our old gear, but sometimes enough is enough – at least with the stock firmware. The FBI has issued a warning about decommissioning end-of-life routers made by several large companies, with eleven Linksys and one Cisco branded routers being specifically called out for vulnerabilities under active exploitation.
A notice such as this that an exploit is under active exploitation means that a theoretical vulnerability has been commoditized into specific attacks, typically used against all devices accessible from the Internet. It’s generally safe to assume that at this point, if a vulnerable device is exposed to the Internet, it’s been compromised.
The FBI notice doesn’t call out the specific vulnerabilities used, however there’s a wide variety to pick from:
/proc/net/arp – unlikely to be used for a remote compromise, but still amusing.Once an attacker is inside your router, the possible havoc they might cause is extensive:
If you have a Linksys E1200, E2500, E1000, E4200, E1500, E3000, E3200, E1550, WRT320N, WRT160N, WRT310N, or a Cisco M10 router still in use, the time is now to finally upgrade it – or at least explore the options of third-party firmware like OpenWRT. Unfortunately, many of these devices are so old that even OpenWRT may have difficulty running well on them, but all the more reason to update to something a little newer!
In a pattern which should be familiar to anyone who had to deal with the leak of the Eternal Blue exploit as part of a dump of tools from the NSA which later evolved into the Wannacry and NotPetya global ransomware campaigns, another government-backed exploit toolkit has been captured and converted to a more generic criminal exploit.
Google Threat Intelligence documents the “Coruna” exploit kit, a rare public example of an attack against iPhones from iOS 13 to iOS 17.2.1. Often we see “advanced attack methods” or “targeted specific attacks” in release notes; rarely do we get further insight into the actual attacks!
Evolving from a government-backed tool to a financial crimeware exploit deployed widely to steal cryptocurrencies is interesting on its own, but perhaps the most fascinating aspect is the insight into how difficult modern exploits can be. Coruna combines 23 exploits into 5 chained attacks to be able to actually execute code from a web page. The final payload of the exposed version doesn’t deliver a spy payload, but instead focuses on cryptocurrency: searching for QR codes on disk to discover wallet addresses and saved recovery keys, wallet recovery phrases, and mentions of bank accounts, and leveraging those to steal cryptocurrency.
In true Google fashion, they’ve published indicators of compromise (IOCs) to inspect if a device has been attacked and a map of the control domains. Additional work deobfuscating the attacks and payloads can be found on GitHub here.
The US Government Cyber Defense Agency (CISA) has added additional warnings to the Known Exploited Vulnerabilities database (KEV) database. The KEV attempts to distill the torrent of security issues assigned a CVE into the most actionable vulnerabilities which have been observed being used in the wild. CISA advises not only federal and government agencies, but offers guidance for businesses of all sizes.
Many vulnerabilities on the KEV already have fixes. Paradoxically, this can sometimes make a vulnerability higher risk. Attackers have two advantages: a patch to reverse engineer to discover the exact mechanisms to trigger the flaw, and a motivation to use any exploits on a massive scale, knowing that the window of opportunity is about to close. Most of these vulnerabilities will likely be of interest mostly to readers who are in the enterprise space, but the first one regarding Android is a good reminder to everyone that the KEV isn’t just for giant companies.
As for the latest known exploited issues:
The venerable Phrack has an open call for papers to be contributed to the summer issue. Released since 1985, Phrack has been a font of telecom and computer security hackery, including the critical “Smashing the Stack for Fun and Profit”, one of the first explanations of the now-ubiquitous buffer overflow and stack smashing attack.
If you think you’ve got something to contribute, or just want to check out their awesome retro demo scene loading page and some back issues, head over to the Phrack website.