We’ve featured the project before on these hallowed pages; the earlier PewPew Featherwing console was a finalist in the 2017 Hackaday Prize Best Product Competition. At EuroPython, attendees will get to tinker with a special conference edition, which is the latest version of a long line of development versions. It runs the same microcontroller – ATSAMD21E18A – as the Adafruit Trinket M0, and is programmable with CircuitPython. The conference edition comes with a large 60 mm x 60 mm LED matrix, as well as an orange PCB with blue buttons to match the color scheme of the event.
We wager that conference attendees will enjoy hacking on the handheld console, and it makes a great platform for anyone who is new to embedded development with the Python language. Similar to badges, it makes a great pack-in for patrons, and the conference should be all the more enjoyable for it!
Netflix isn’t the first name to come to mind when considering security research firms, but they make heavy use of FreeBSD in their content delivery system and do security research as a result. Their first security bulletin of the year, not surprisingly, covers a FreeBSD vulnerability that happens to also affect Linux kernels from the last 10 years. This vulnerability uses SACKs and odd MSS values to crash a server kernel.
To understand Selective ACKs, we need to step back and look at how TCP connections work. TCP connections provide guaranteed delivery, implemented in the from of ACKnowledgement (ACK) packets. We think of a TCP connection as having a dedicated ACK packet for every data packet. In reality, the Operating System makes great effort to avoid sending “naked” ACK packets, and combines multiple ACKs in a single packet. An ACK is simply a flag in a packet header combined with a running total of bytes received, and can be included in a normal data packet. As much as is possible, the ACK for data received is sent along with data packets flowing in the opposite direction. Continue reading “This Week In Security: SACK Of Death, Rambleed, HIBP For Sale, And Oracle Weblogic — Again!”→
While it might not be quite as revered as its predecessor, the Game Boy Advance is arguably the peak of “classic” handheld gaming, before things got all 3D and dual screen on us. One of its best features is the so-called multiboot mode, which allows the GBA to download a program from its link port. Officially this feature was introduced so you could play multiplayer with your friends even if they didn’t have the game cartridge, but naturally it didn’t take long for hackers to realize you can use it to run arbitrary code on an unmodified system.
[Shyri Villar] has put this capability to excellent use with a plug-in board that allows a stock GBA to be used as a general purpose Bluetooth HID controller. Now you can emulate GBA games on your computer while using the real thing as your input device. Or if that’s a bit too redundant for you, then any 2D game you think could benefit from the classic Game Boy control layout.
An ATmega328P on the board initiates the multiboot sequence when the system powers up, and feeds it the GBA program that’s stored on a W25Q32 chip. Once the code is running on the GBA, it communicates with a common HC-05 Bluetooth module through the same link port. To perform this handoff, [Shyri] uses a HCF4066 switch IC to literally change the pin assignments in the connector from the SPI used to upload the ROM to the UART lines of the Bluetooth module.
With everything powered from the 3.3 V provided by the GBA’s link port, and some software niceties like the ability to store Bluetooth pairing information for subsequent device connections, this is actually a very practical gadget. The fact that you can do this on a completely stock GBA is very compelling, especially considering some of the previous Bluetooth Game Boy modifications we’ve seen. Granted the market might be somewhat limited, but with a custom PCB and a 3D printed enclosure, we could see this potentially being a popular accessory for the classic handheld. It’s not like it can be any more niche than using the GBA as a remote display for your multimeter.
Love ’em or hate ’em, you’ve got to hand it to Apple: they really know how to push people’s buttons with design. Their industrial designers can make a product so irresistible – and their marketing team can cannonball the hype train sufficiently – that people will stand in line for days to buy a new product, and shell out unfathomable amounts of money for the privilege.
But what if you’re a poor college student without the budget for such treasures of industrial design? Simple – you take matters into your own hands and stuff a Raspberry Pi into a cheese grater. That’s what a group of engineering students from the University of Aveiro in Portugal called [NeRD-AETTUA] did, in obvious homage to the world’s most expensive cheese grater. The video below for the aptly named RasPro is somewhat less slick that Apple’s promos for the Mac Pro, but it still gets the basics across. Like the painstakingly machined brushed aluminum housing on the Mac, the IKEA cheese grater on the RasPro is just a skin. It covers a 3D-printed chassis that houses a beefy power supply and fan to go along with the Raspberry Pi 3. There’s also a speaker for blasting the tunes, which seems to be the primary use for the RasPro.