DARPA Robotics Challenge Trials Day 1

darpa-val1

Today was the first of two days of trials at the DARPA Robotics challenge at Homestead-Miami Speedway in Florida. Created after the Japan’s Fukushima nuclear disaster, The robotics challenge is designed to advance the state of the art of robotics. The trials range from driving a car to clearing a debris field, to cutting through a wall. Robots score points based on their performance in the trials. Much of the day was spent waiting for teams to prepare their robots. There were some exciting moments however, with one challenger falling through a stacked cinder block wall.

Pictured above is Valkyrie from NASA JPL JSC. We reported on Valkyrie earlier this month. Arguably one of the better looking robots of the bunch, Valkyrie proved to be all show and no go today, failing to score any points in its day 1 trials. The day one lead went to Team Schaft, a new robot from Tokyo based startup company Schaft inc. Schaft scored 18 points in its first day. In second place is the MIT team  with 12 points. Third place is currently held by Team TRACLabs with 9 points. All this can change tomorrow as the second day of trials take place. The live stream will be available from 8am to 7pm EST on DARPA’s robotics challenge page.

Continue reading “DARPA Robotics Challenge Trials Day 1”

Hack Some Picks

lawlpicks

You know you can make your own lock picks out of cheapo carbon steel hacksaw blades, right? So what if you’ve tripped over this hack on every website that also tells you to read and worship the MIT Guide to Lock Picking; ’tis the season to pick up a new hobby now that many of us have some extra holiday free time. Unlike the authentic hand-crafted macrame indoor hanging vertical tomato garden you bought for that girl you’re trying to impress, hacksaw blades won’t cut into your purchasing power. Also, believe it or not, although we have thirteen picking hacks that are sitting in the “lockpicking” category, this isn’t one of them.

Though the guide chose to use existing picks as a template, there are plenty you can find online. After tracing the pick, the next step is to secure the hacksaw blade and carve out the excess with a rotary tool, then grind down the edges to remove any sharp bits. We recommend that you’re careful not to get the blade too hot here or you’ll alter its crystalline structure: perhaps one of our blacksmith-savvy readers can better explain what you should aim for and avoid when working with carbon steel. As usual, wear the necessary safety headgear: your eyes are valuable and you’ll need them to watch the video after the break.

What do you think? Should we make an effort at reviving the Lock Picking category? We know a lot of hackerspaces have lock picking events if you want to get into the dark art. Help us get things rolling by sending in tips recapping those events, as well as anything else that fits this theme.

Continue reading “Hack Some Picks”

Impersonating FBI Agents And People Who Can Solder

[Dale Botkin], [N0XAS], is a competent designer for the amateur radio crowd and has a part-time business on the side selling a few kits. As anyone who owns a business, works in retail, or simply interacts with the general population will know, eventually you’ll have to deal with one of those customers. [Dale]’s latest horror story (here’s the coral cache but that doesn’t seem to be working either) comes from someone who bought a little repeater controller. You’re looking at this customer’s handiwork above. It gets worse.

After this customer completely botched an assembly job, he contacted [Dale] for some technical assistance. [Dale] graciously accepted a return and received the above mess of solder, wires, and parts. Then an email disputing the Paypal charge arrived. The customer wanted a refund for the original kit and the cost of shipping it back.

Oh, but it gets better. After posting this story, [Dale] received yet another email from an FBI agent demanding that his original post be taken down. The email from the FBI came from a Czech domain, so of course this is a totally legit demand.

So there’s your, “worst customer ever” story from the world of kit electronics. The assembly is impressively bad, even for something that was ‘professionally installed by an electrician’, but mail fraud and impersonating federal officials just takes this over the top.


Quick note: any doxxing in the comments will be deleted, so just don’t do it.

An Even Larger Array Of Many LEDs And No Ping-Pong balls

Color Led Matrix

[George] has gone pro with his latest RGB LED panel. We’ve chronicled [George’s] journey toward the elusive land of LED nirvana for a couple of years now. He started with an 8×8 rainbow board of many ping-pong balls. When that wasn’t enough, he upped the ante to a 32×16 array of ping-pong balls. Still not satisfied, [George] has now increased the size to two 20×15 panels, for a total of 600 LEDs. While this is only a modest size increase from the previous incarnation, the major changes here have been in the design and construction of the array.

[George] found himself using his LED panels in some professional settings. The stresses of moving and rigging the panels revealed several design weaknesses. The point to point discrete LED design tended to short, leading to troubleshooting by poking at wires in a dark club. The control code was also a mixed bag of solderlab’s code, [George’s] code, and various scripts. Even the trademark ping-pong ball light diffusers were a problem, as they created a fire hazard. [George] took all the lessons from the first and second LED arrays and started a new design – the MX3. The panel frames were constructed by a professional metal shop. Starting with a square steel tube backbone, and aluminum panel shell was welded into place. The steel tube provides a hardpoint mount for any number of rigging options. The front panels are medium-density fibreboard, treated with a fire-retardant paint.

The electronics have also changed. Gone are the individual RGB LEDs. [George] has switched over to the common WS2812 LED strings. Panel mounted Raspberry Pis control the LED strings. Communication is via Art-Net, an Ethernet implementation of the common DMX512 protocol commonly used in stage lighting. The final result looks great.  We’re impressed with how much [George] has accomplished at such a young age (He was 16 last June).

Continue reading “An Even Larger Array Of Many LEDs And No Ping-Pong balls”

Ambient Computer Noise Leaks Your Encryption Keys

[Daniel, Adi, and Eran], students researchers at Tel Aviv University and the Weizmann Institute of Science have successfully extracted 4096-bit RSA encryption keys using only the sound produced by the target computer. It may sound a bit like magic, but this is a real attack – although it’s practicality may be questionable. The group first described this attack vector at Eurocrypt 2004. The sound used to decode the encryption keys is produced not by the processor itself, but by the processor’s power supply, mainly the capacitors and coils. The target machine in this case runs a copy of GNU Privacy Guard (GnuPG).

During most of their testing, the team used some very high-end audio equipment, including Brüel & Kjær laboratory grade microphones and a parabolic reflector. By directing the microphone at the processor air vents, they were able to extract enough sound to proceed with their attack. [Daniel, Adi, and Eran] started from the source of GnuPG. They worked from there all the way down to the individual opcodes running on the x86 processor in the target PC. As each opcode is run, a sound signature is produced. The signature changes slightly depending on the data the processor is operating on. By using this information, and some very detailed spectral analysis, the team was able to extract encryption keys. The complete technical details of the attack vector are available in their final paper (pdf link).

Once  they had the basic methods down, [Daniel, Adi, and Eran] explored other attack vectors. They were able to extract data using ground fluctuations on the computers chassis. They even were able to use a cell phone to perform the audio attack. Due to the cell phone’s lower quality microphone, a much longer (on the order of several hours) time is needed to extract the necessary data.

Thankfully [Daniel, Adi, and Eran] are white hat hackers, and sent their data to the GnuPG team. Several countermeasures to this attack are already included in the current version of GnuPG.

DIY Laser Cutter

[Jens] decided he wanted to try building his own laser cutter to see just how much you can actually cut with a fairly low power 300mW laser diode.

He was inspired by a similar project from earlier this year, and chose to use the same LPC-826 laser diode, which you can find online for about $10-30. The cutter itself is has a wooden frame and uses drawer slides on both axes. Threaded M6 rods and NEMA17 stepper motors provide the actuation, and the whole thing is controlled by an Arduino Nano with Easy Driver stepper motor drivers.

So what can it cut? In his experiments he was able to cut through adhesive plastics (sticker paper), EVA foam, and black paper. He was also able to engrave wood and ABS plastic, although the plastic didn’t play too nicely with the laser. He also found it useful for laser cutting stencils, which he then used to create rusty art using hydrochloric acid and hydrogen peroxide.

Considering how cheap you could make one of these, it’s not a bad tool to have. Stick around after the break to see it laser cut a shark!

Continue reading “DIY Laser Cutter”

Fubarino Contest: A Dutch Word Clock

dutchclock

[Gerben] started on his adventure into the world of electronics about a year ago. His first big project is this magnificent word clock. It’s Dutch, if you’re wondering.

As a web developer, the first thing [Gerben] did was build a web-based mockup of this clock. After that, he went crazy with power tools crafting the wooden frame. Perhaps too crazy, as he forgot the space for the electronics. This oversight was solved by making his own PCBs, first using peroxide and vinegar, then giving up and moving to peroxide and HCl.

The easter egg for this word clock is a scrolling URL when the time is 13:37. A clever egg that is really completely original.

From the looks of the video, the fit and finish of this word clock is beyond anything we’ve seen before. The entire front of the clock is glass, with capacitive touch buttons down by the four-LED ‘minute’ display.

Video below, Pics over here, and all the code and board files are here.


This is an entry in the Fubarino Contest for a chance at one of the 20 Fubarino SD boards which Microchip has put up as prizes!

Continue reading “Fubarino Contest: A Dutch Word Clock”