Lattice Semiconductor Targets Bitstream Reverse Engineering In Latest Propel SDK License

The topic of reverse engineering is highly contentious at best when it comes to software and hardware development. Ever since the configuration protocol (bitstream) for Lattice Semiconductor’s iCE40 FPGAs was published in 2015 through reverse engineering efforts, there has been a silent war between proponents of open bitstream protocols and FPGA manufacturers, with the Lattice ECP5’s bitstream format having been largely reverse-engineered at this point.

Update: About eight hours after this article was published, Lattice Semiconductor issued a statement retracting the EULA language that banned bitstream reverse engineering. Please check out Hackaday’s article about this reversal.

Most recently, it appears that Lattice has fired a fresh shot across the bow of the open source projects. A recently discovered addition to the Propel SDK, which contains tools to program and debug Lattice devices, specifically references bitstream reverse engineering. When logged in with an account on the company’s website the user must agree to the Lattice Propel License Agreement for Lattice Propel 1.0 prior to download. That document includes the following language:

In particular, no right is granted hereunder […] (3) for reverse engineering a bitstream format or other signaling protocol of any Lattice Semiconductor Corporation programmable logic device.

Continue reading “Lattice Semiconductor Targets Bitstream Reverse Engineering In Latest Propel SDK License”

Join The Movement With This Mini Cyberdeck

The global pandemic has given many people a lot more time at home, which has undoubtedly pushed an untold number of projects over the finish line. Unfortunately, it’s also disrupted global commerce and shipping to the point that getting parts can be a lot harder than we’d like. Which is why [facelesstech] decided to put together this exceptionally mobile cyberdeck out of things he already had laying around.

Now to be fair, his parts bin is perhaps a bit better stocked for this kind of thing than most. He’s built a couple of Raspberry Pi portables already, so the Pi Zero W, display, and battery management board were already kicking around. He just had to come up with a new 3D printed enclosure that holds it all together with a little bit of cyberpunk flair.

To that end, he’s done an excellent job of documenting the build and has released the STL files for the 3D printed components. All things considered, we’d say this is probably the most approachable cyberdeck design currently available; if you’ve been wondering what all the fuss is about with these bespoke little computers, this is an ideal project to get started with.

Keep in mind that the idea of a cyberdeck is to build something custom for yourself, so there’s no need to copy this build exactly. If you’re short on parts, you could forgo the battery powered aspect and just keep it tethered. The superfluous (but very cool) GX12 connectors could certainly be deleted as well, although at serious stylistic cost. You’ll probably need to order the specific keyboard that [facelesstech] designed the lower half of the device around, but it’s common enough that it shouldn’t be hard to track down. No matter which way you take it, this design is a great base to start from.

If you’re looking for something a bit more substantial and have the filament to burn, you might take a look at the VirtuScope to fulfill your offset screen needs.

Continue reading “Join The Movement With This Mini Cyberdeck”

Ancient History Of The Phone Jack

While watching a video about old radios from the 1920s, a phone jack popped up. The host mentioned that phone jacks are super old and he wondered what was their origin. I always assumed they had something to do with the telephone system, and that’s right, but I had no idea how old they really are and how they’ve evolved. Turns out the venerable plug goes back to at least 1878.

Keep in mind, I’m talking about the good old fashioned 1/4″ phone jack with two wires. Over time, the jack and plug have spawned different versions with more wires and — particularly — smaller dimensions. The headphone jack that many smartphone makers are dropping is a direct descendant of that old phone jack. But a mono cable like you would see connecting an electric guitar or another mono source would be right at home connected to a 1900s switchboard. Let’s take a look at the origins of a design that’s almost 150 years old and still in use.

Continue reading “Ancient History Of The Phone Jack”

Hackaday Podcast 070: Memory Bump, Strontium Rain, Sentient Solder Smoke, And Botting Browsers

Hackaday editors Elliot Williams and Mike Szczys bubble sort a sample set of amazing hacks from the past week. Who has even used the smart chip from an old credit card as a functional component in their own circuit? This guy. There’s something scientifically devious about the way solder smoke heat-seeks to your nostrils. There’s more than one way to strip 16-bit audio down to five. And those nuclear tests from the 40s, 50s, and 60s? Those are still affecting how science takes measurements of all sorts of things in the world.

Take a look at the links below if you want to follow along, and as always, tell us what you think about this episode in the comments!

Direct download (60 MB or so.)

Continue reading “Hackaday Podcast 070: Memory Bump, Strontium Rain, Sentient Solder Smoke, And Botting Browsers”

Turning A MicroKORG Into A MicroKORG S With This Speaker Mod

When [Michael Wessel] bought his MicroKORG synthesizer/vocoder, he felt less than amused when two years later the MicroKORG S was released, with the ‘S’ standing for ‘sound’, apparently, for the 2+1 speaker system that was added to it. Undeterred, [Michael] figured out that both synthesizers are similar enough that one could likely add a similar speaker system to the original MicroKORG.

The similarities between the two products become apparent when one compares the original with its successor, with the latter seemingly mostly adding said speakers and more presets, along with a snazzy new exterior. (Although the 1970s styling of the original may have more fans.)  As the embedded video shows, this mod is fairly clean.

At the core of this mod is a PAM8403-based class D amplifier board. The PAM8403 is a 3 W audio amplifier, originally produced by Power Analog Microelectronics (now Diodes). While not an amazing amplifier, it lends itself well for battery-powered applications like the MicroKORG. Rounding out the build is a 7805 linear regulator to get 5 V for the PAM8403, a few filter capacitors, a switch to turn the speakers on/off, and of course the speakers.

Although there’s quite a bit of space in the enclosure, most speakers tend to be large enough that this can be a bit of a squeeze. [Michael] found some low-profile 20 W full-range speakers that seem to work well for this purpose. To finish wiring this up, all it takes is a hole saw and a way to get the audio output from the MicroKORG.

In this mod, [Michael] opted to get the audio from the output jack on the back, but for a cleaner result it probably could be wired straight into the on-board header.

Continue reading “Turning A MicroKORG Into A MicroKORG S With This Speaker Mod”

This Week In Security: Exim, Apple Sign-in, Cursed Wallpaper, And Nuclear Secrets

So first off, remember the Unc0ver vulnerability/jailbreak from last week? In the 13.5.1 iOS release, the underlying flaw was fixed, closing the jailbreak. If you intend to jailbreak your iOS device, make sure not to install this update. That said, the normal warning applies: Be very careful about running out-of-date software.

Apple Sign In

An exploit in Apple’s web authentication protocol was fixed in the past week . Sign In With Apple is similar to OAuth, and allows using an Apple account to sign in to other sites and services. Under the hood, a JSON Web Token (JWT) gets generated and passed around, in order to confirm the user’s identity. In theory, this scheme even allows authentication without disclosing the user’s email address.

So what could go wrong? Apparently a simple request for a JWT that’s signed with Apple’s public key will automatically be approved. Yeah, it was that bad. Any account linked to an Apple ID could be trivially compromised. It was fixed this past week, after being found and reported by [Bhavuk Jain]. Continue reading “This Week In Security: Exim, Apple Sign-in, Cursed Wallpaper, And Nuclear Secrets”

Tic-Tac-Toe Implemented In Single Call To Printf()

[Nicholas Carlini] programmed a C implementation of two-player Tic Tac Toe, and he did it in a single call to printf(). The arguments for that single function call get mind-bendingly complex, so it may come as no surprise that it was written for The International Obfuscated C Code Contest (IOCCC).

Most of us are aware that printf() is one of those functions that is considerably more complex under the hood, and capable of far more, than it may appear to be. But did you know that it is capable of Turing-complete computation?

[Nicholas] clearly steps through the theory, so give it a read. In short, a maze of arguments handles the logic of the game while an embedded scanf() reads user input, and printing the game board is always preceded by an escape code to clear the screen.

[Nicholas] is certainly no stranger to in-depth understandings; we’ve seen his work before in demonstrating how to fool speech recognition with hidden commands, including a powerful example showing how two virtually identical-sounding audio files transcribe entirely differently.