Since early evening on September 5th, 2013 the US National Institute of Standards and Technology (NIST) has been publishing a 512-bit, full-entropy random number every minute of every day. What’s more, each number is cryptographically signed so that you can easily verify that it was generated by the NIST. A date stamp is included in the process, so that you can tell when the random values were created. And finally, all of the values are linked to the previous value in a chain so that you can detect if any of the past numbers in the series have been altered after the next number is published. This is quite an extensive list of features for a list of random values, and we’ll get into the rationale, methods, and uses behind this scheme in the next section, so stick around.
During the summers [Doug] has been building a 75 foot sailing junk to be launched from America’s most inland port. When Oklahoma’s winter hits he heads indoors to work on an ROV that will prowl 3,000 feet below the surface. Originally building a piloted submarine, he grew bored and decided to use the sailboat as a carrier for his fleet of remote submersibles instead.
A consummate amateur, [Doug] is the first to admit how little he knows about anything and how much he enjoys the open source spirit: collaboration, cooperation and learning from others. Determination and hard work fills in everything in between.
Hackaday covered the beginnings of his ROV last winter. In the year since it has progressed from some sketches and a 10″ steel pipe turned into a pressure testing rig to a nearly-complete, 10 foot long, custom-lathed 4″ aluminum torpedo laying on his shop table. In a bow-to-stern walk-through [Doug] shows how he is building science equipment for less than a penny on the dollar by using largely off-the-shelf imaginatively-repurposed parts or things he could fabricate himself with only a lathe and a 3d printer.
Continue after the break for a breakdown of the tech used.
And now for something completely different: [Becky Stern]’s musical tour of her favorite tools around the Adafruit factory is the best holiday tune we’ve heard since The Waitresses’ “Christmas Wrapping”. Of course, good tools are near and dear to us as well, and we found ourselves nodding frequently in agreement and smiling as broadly as [Billie, Ruby, and Gus], the anthropomorphic LED backup singers.
In other Adafruity news, it looks like their new Samsung SM482 pick and place machine was given the gift of eyes as big as pizza pies. What tools would you like to see under the tree, leaning against the Festivus pole, or all wrapped up a safe distance from the menorah this year? Do tell.
Batteries flat and no cellphone coverage and you need to communicate hundreds of miles? No problem. [Peter Parker VK3YE] has created a wind-up ham radio transmitter built into a discount store crank-handle flashlight (or torch). No batteries – all power comes from you turning the hand crank. This design was inspired by the ‘Gibson Girl’ emergency beacon transmitter used during Second World War. But what used to be an very large, full body cranking box is now tiny and simple to crank. Let’s take a look at he video and the build details after the break.
Whilst the original Sting glowed blue as a defensive alert, Spark’s “WarSting” is all about aggression. The project hacks a toy Hobbit sword and teaches it to glow blue when vulnerable WiFi is detected. Once alerted, combat ensues. If its bearer slashes, the sword will battle the helpless network, swinging and clanging until it acquires an IP from the defeated DHCP server. Once conquered, the sword publishes a “Vanquished” message to Spark’s cloud, teaching the sword to ignore it from thenceforth.
While “wardriving” has not really been a thing since the first Lord of the Rings movie came out, the last time we saw someone do something similar the hardware was limited to detecting WiFi, not connecting.
Spark CEO [Zach] chose the particular sword because it could be disassembled without being cut apart and already came equipped with easily-hackable LEDs, motion control, and sound effects. Naturally he added one of his own products – the Spark Core – to the hilt to graft WiFi features onto the weapon (a cheaper alternative would be an MCU of your choice and the new ESP8266). The project then hijacks the LED lighting, sound, and hit detection sensor. Our readers can probably come up with some more imaginative actions to take once connected, though the project’s existing code for the Core is published on Github. As-is, in many jurisdictions even merely connecting to an unsecured WiFi these days is unlawful so beware your local restrictions.
Lots of companies could simply advertise the easy way and while obviously an ad, the WarSting is still a creative and fun hack.
See the video below for the sword in action and a Spark’s lore regarding the hack. Thanks [Chris] for the tip.
Many of us have gone on a stationary romp through some virtual or augmented scape with one of the few headsets out in the wild today. While the experience of viewing a convincing figment of reality is an exciting sensation in itself, [Mark Lee] and [Kevin Wang] are figuring out how to tie other senses into the mix.
The duo from Cornell University have built a mechanical exoskeleton that responds to light with haptic feedback. This means the wearer can touch the sphere of light around a source as if it were a solid object. Photo resistors are mounted like antenna to the tip of each finger, which they filed down around the edges to receive a more diffused amount of light. When the wearer of the apparatus moves their hand towards a light source, the sensors trigger servo motors mounted on the back of the hand to actuate and retract a series of 3D printed tendons which arch upward and connect to the individual fingers of the wearer. This way as the resistors receive varying amounts of light, they can react independently to simulate physical contours.
One of the goals of the project was to produce a working proof of concept with no more than 100 dollars worth of materials, which [Mark] and [Kevin] achieve with some cash to spare. Their list of parts can be found on their blog along with some more details on the project.
Imagine a camera that took encrypted pictures. If your camera is stolen, the only thing on the memory card would be random data that can only be unlocked with a key. If you hire a photographer, those images cannot be copied without the key. At the very least, it’s an interesting idea made impressive because this actually exists.
[Doug] recently got his hands on a Samsung NX300, a nice camera for the price that conveniently runs Linux and is kinda open-sourced by Samsung. With special firmware, [Doug] created public/private key encryption for this camera, giving only the person with the private key the ability to unlock the pictures taken with this camera.
[Doug] started his build by looking at the firmware for this camera, figuring out how to take everything apart and put it back together. With a few modifications that included encryption for all images taken with this camera, [Doug] repackaged the firmware and upgraded the camera.
The encryption firmware is available on the site, but considering how easily [Doug] was able to make this hack happen, and a great walkthrough of how to actually do it raises some interesting possibilities. The NX300 is a pretty nice camera that’s a little bit above the Canon PowerShot cameras supported by CHDK. It also runs Linux, so if you’re looking for something cool to do with a nice camera, [Doug] has a very good resource.