I’ve arrived at the Rio Casino in Las Vegas, Nevada for DEF CON 21. Over the next couple of days, I’ll be talking about what I get up to here.
The main event today is registration, which means getting a neat badge. This year’s badge was designed by [Ryan Clarke]. According to the DEF CON booklet, they are “non-electronic-electronic” badges this year, and DEF CON will be alternating between electronic badges every other year.
The playing card design is printed on a PCB, and uses the silkscreen, solder mask, and copper layers to provide three colors for the artwork. The badge is a crypto challenge, featuring some cryptic characters, numbers, and an XOR gate. I don’t have any ideas about it yet, but some people are already working hard on cracking the code.
Tomorrow, I’ll be heading to a few talks including one on hacking cars that we discussed earlier, and one on decapping chips. I’ll also be checking out some of the villages. The Tamper Evident Village is premiering this year, and they’ll be showing off a variety of tamper proofing tech. I’ll also try to get to the Beverage Cooling Contraption Contest, where competitors build devices to cool beverages (ie, beer) as quickly as possible.
If you have any DEF CON tips, let me know in the comments.
This is Hackaday writer [Eric Evenchick]. He’s headed off to DEF CON, the annual hacking conference held every year at this time in Las Vegas. He’s hoping to see some cool stuff and make some networking connections that lead to a real job. If you’re not attending the conference here’s your chance to live vicariously. He’ll be writing on Thursday, Friday, and Saturday of next week (August 1-3) about all the stuff he encounters at the event.
If you are attending, keep your eyes open for him. We’re sorry that we didn’t manage to get any swag to him for handing out to loyal readers (not his fault, we’ve been a bit preoccupied). If you know of something he just shouldn’t miss email him: eric at hackaday.com. This includes invites to any awesome parties you’ve got planned.
Oh, and don’t be shy about making him pose with you for pictures…. just make sure to Tweet it to @hackaday if you do.
This one’s a treasure trove of CAN bus hacks that will scare the crap out of an unsuspecting driver — or worse. [Charlie Miller] and [Chris Valasek] are getting ready to present their findings, which were underwritten by DARPA, at this year’s Defcon. They gave a Forbes reporter a turn in the driver’s seat in order to show off.
You’ve got to see the video on this one. We haven’t had this much fun looking at potentially deadly car hacking since Waterloo Labs decided to go surfing on an Olds. The hacks shown off start as seemingly innocent data tweaks, like misrepresenting your fuel level or displaying 199 mph on the speedometer while the car is standing still. But things start to get interesting when they take that speed readout from 199 down to zero instantly, which has the effect of telling the car you’ve been in a crash (don’t worry, the airbags don’t fire). Other devilish tricks include yanking the steering wheel to one side by issuing a command telling the car to park itself when driving down the road. Worst of all is the ability to disable the brakes while the vehicle is in motion. Oh the pedal still moves, but the brake calipers don’t respond.
The purpose of the work is to highlight areas where auto manufacturers need to tighten up security. It certainly gives us an idea of what we’ll see in the next Bond film.
Continue reading “Defcon presenters preview hack that takes Prius out of driver’s control”
Let’s face it, we all love DEFCON. Even if you’ve never been there before, we think it would be a huge struggle to find a reader who hadn’t been enchanted by at least one of the many hacks and talks that come out of the conference every year. We’ll prove it to you in a second, but first let’s get to the business at hand. Internet historian and all around good-guy [Jason Scott] has set his documentarian skills on DEFCON and just published a nearly twenty minute preview of the film which will leave you with more questions than answers (that’s the point of a teaser, right?). He’s not new to this kind of work. We loved his film BBS: The Documentary and can’t wait to see what he’s managed to do when this is released in the new year.
Oh yeah… we were going to prove a point. Some things that came out of the yearly hacker conference which you probably drooled over after the fact include:
This is just a sliver of what this event offers. Should be fun to see all the stuff [Jason] got into that we never even knew about.
How we missed this one is anybody’s guess, but one of the presentations at DEFCON last year covers a DIY radar build. [Michael Scarito] talks about the concepts behind radar, and then goes on to show that it’s not too hard or expensive to build a setup of your own. We’ve embedded his 45 minute talk after the break.
The two large pieces of hardware above should look familiar. They’re descendents of a favorite hacking project, the cantenna. The can-based long-range antenna is most popular with WiFi applications, but we’ve seen it used for Bluetooth as well and it’s not surprising to see it here. The rest is a lot of sensing hardware and enough math crammed into the coding to make your ears droop.
If you make it far enough (exactly 39 minutes into the talk) [Michael] shares some links for more information on the build. We think living vicariously is enough for us, but if you manage to build your own setup don’t forget to post a project log!
Continue reading “Build your own radar system”
The Amp Hour, a podcast of electronics enthusiasts and professionals alike, just did an epic interview with [Joe Grand]. Along with hosts [Chris Gammell] and [Dave Jones], the discussion runs the gamut of points of interest in the hardware hacking world. The first vignette explores the rise, run, and fall of Prototype This, an engineering-centric TV show that [Joe] did along with a group of various engineers for the Discover Channel. He politely discusses some of the goods and bads of the TV business and how that affected the team’s ability to go into great detail about the projects they were building.
From there the guys discuss the development of Hackerspaces through the years. [Joe] has some concerns about the injection of corporate sponsorships in these DIY spaces and what that may mean in the long run. He then talks about the impending release of his 3-year-long laser range-finder project (we’ve seen a project using a prototype of this sensor). The show is rounded out with discussions about hardware fab houses that [Joe] uses and has used over the years for projects like the Defcon Badges (we loved his Defcon 18 badges).
It’s a great episode so download a copy and set aside about an hour to listen to the whole show.
The crew at Defcon is hard at work getting things ready for this year’s event, taking place over the first weekend in August. While the typical call for papers has been out for almost two months now, the extra space afforded by the RIO hotel has given the organizers a chance to shake things up a bit and try something new.
Along side the call for papers, they have issued a call for workshops. Since they have about 8 spare rooms on hand, they have decided to allow people who consider themselves a leader, ‘leet hacker, or ninja in their particular field to share their knowledge in a small (30 person) workshop setting.
The organizers are not strict on content, though it should be compelling. They cite examples such as teaching people to build an impenetrable Linux installation, PS3 hacking, or even helping people prep for a Ham radio license exam.
If you have something interesting to share with the community, be sure to swing by the Defcon site and get your application started!