
[Travis] sent in his oh so simple(why didn’t I think of that) syringe logic probe. that he put together for his version of the sump logic analyzer. Real probes tend to be pretty expensive. With some effort, you can probably fit an led/diode/resistor in there and make a simple 5v logic probe. If you’d like a nice logic analyzer, Spartan-3 board that it’s based on is only $99.
Month: May 2008
The World’s Spookiest Weapons

As purveyors of a fine hacks, we often get pitched on what are generally considered very bad ideas. Luckily, most of these ideas die on the drawing board due to a lack of time and energy or maybe having a shred of moral accountability. There’s nothing that government funding can’t fix though. Popular Science has put together a gallery of The World’s Spookiest Weapons. It’s a who’s who of real and speculative engineering that could lead to our eventual destruction. Opening with the atomic bomb, it moves quickly into more bizarre territory, everything from heat rays, to rail guns, to gassing people with elephant tranquilizers. Our personal favorite is The Rods from God. Imagine getting smote by a precisely targeted metal power pole dropped from space that has accelerated to 36,000 feet per second thanks solely to gravity. What a wondrous world we live in.
[via Acidus]
DefCon CTF 2008 Qualifier

Kenshoto is back again to run the Capture the Flag competition at DefCon. CTF is a multiteam competition featuring creative attack and defense of servers and lasts the entirety of DefCon. Unreleased exploits are often seen during the competition. As in previous years, Kenshoto will be narrowing the field with a qualification round. Quals will start the evening of May 30th and run for 48 hours. NOPS-R-US has a solution guide for the previous two years so you can get some idea of what you’re getting yourself into. They’ve even got a couple write ups for last year’s final. The competition should prove entertaining even if you don’t make the final cut.
[via Midnight Research Lab]
Bruce Schneier’s Opinion On Everything

Honestly, we were originally sent this Q&A with famed cryptographer [Bruce Schneier] as a restaurant recommendation (112 Eatery, Minneapolis). Posted last fall on NYTimes’ Freakonomics blog it covers [Bruce]’s opinion on nearly everything. Here are a few items in particular that really stuck out to us:
The most immediate threat to the average person is crime – in particular, fraud. And as I said before, even if you don’t store that data on your computer, someone else has it on theirs. But the long-term threat of loss of privacy is much greater, because it has the potential to change society for the worse.
What you’re really asking me is about the security. No one steals credit card numbers one-by-one, by eavesdropping on the Internet connection. They’re all stolen in blocks of a million by hacking the back-end database. It doesn’t matter if you bought something over the Internet, by phone, by mail, or in person – you’re equally vulnerable.
We already knew he doesn’t secure his WiFi (neither do we) and you’ll find many other interesting discussions in the article. If you want Bruce Schneier facts though, you’ll have to look elsewhere.
Interfacing Your Laptops Onboard I2c

[ladyada] ran across this excellent hack by [phillip]. Apparently there’s a clock, data, 5v and ground connection available in most modern video connections. (He even notes HDMI cable pins) He wrote some drivers and can now control i2c hardware directly from the PC Mac. [Ladyada] notes that most laptops use an i2c bus for extra sensors as well. For now, the code only works on Mac OS X.
Swarm Robotics

Uber-geek [James McLurkin] was in Austin recently demoing his robot swarm. He’s on tour with EDA Tech Forum. [McLurkin] has multiple degrees from the MIT AI lab and worked at iRobot for a couple of years. Lately, he has been working on distributed robot computing: robot swarms.
[McLurkin] was an entertaining speaker and had an interesting view of robotics. He is optimistic that robot parts will become more modular, so it will be easier to build them, and more importantly, faster to design them.
Some quotes:
- “There’s more sensors in a cockroach’s butt than any robot”
- “12 engineer years to design, 45 minutes to build”
- “If it can break your ankle, it’s a real [rc] car.”
Cold Boot Encryption Attack Video
We haven’t made a regular habit of watching BoingBoing TV, but lately they’ve been covering topics we’ve been interested in… not the dolphin pr0n. In yesterday’s episode they talked to Jacob Appelbaum and members of the EFF about the cold boot encryption attack. The attack involves dumping the contents of memory to a storage device by power cycling the system. Cooling the memory chip with compressed air helps preserve the integrity of the data. The attacker can then search the data to find encryption keys protecting the contents of the hard drive. A fool proof solution to mitigate this attack hasn’t been developed yet. You can read more about cold boot attacks at the Center for Information Technology Policy. The BoingBoing TV episode, bizarre editing and all, can be downloaded directly here.