3D Printing Fishing Lure Molds

Every fisherman has a secret. A secret spot, a secret technique, or a secret bait. Maybe that’s why tying flies is so popular. [Steve] certainly has is own special lures, although he’s not keeping it a secret. (Video, embedded below.) He designs lures in Simplify3D, 3D prints molds, and then casts them.

The 3D printing part is interesting, but it is also kind of neat to see the lures and the natural prey he uses for inspiration. If you want to catch fish, you have to use bait that looks like real food.

Continue reading “3D Printing Fishing Lure Molds”

This Week In Security: Zoom (Really This Time), Fingerprints, And Bloatware

You were promised Zoom news last week, but due to a late night of writing, that story was delayed to this week. So what’s the deal with Zoom? Google, SpaceX, and even the government of Taiwan and the US Senate have banned Zoom. You may remember our coverage of Zoom from nearly a year ago, when Apple forcibly removed the Zoom service from countless machines. The realities of COVID-19 have brought about an explosion of popularity for Zoom, but also a renewed critical eye on the platform’s security.

“Zoombombing”, joining a Zoom meeting uninvited, made national headlines as a result of a few high profile incidents. The US DOJ even released a statement about it. Those incidents seem to have been a result of Zoom default settings: no meeting passwords, no “waiting room”, and meeting IDs that persist indefinitely. A troll could simply search google for Zoom links, and try connecting to them until finding an active meeting. Ars ran a great article on how to avoid getting zoombombed (thanks to Sheldon for pointing this out last week).

There is another wrinkle to the Zoom story. Zoom is technically an American company, but its Chinese roots put it in a precarious situation. Recently it’s been reported that encryption keying is routed through infrastructure in China, even though the calling parties are elsewhere. In some cases, call data itself goes through Chinese infrastructure, though that was labeled as a temporary bug. Zoom was also advertising its meetings as having end-to-end encryption. That claim was investigated, and discovered to be false. All meetings get decrypted at Zoom servers, and could theoretically be viewed by Zoom staff. Continue reading “This Week In Security: Zoom (Really This Time), Fingerprints, And Bloatware”

Iceland Is Doing Its COVID-19 Proximity Tracing The Open Source Way

As governments around the world grapple with the problem of tracing those who have had contact with a person known to have been infected with the COVID-19 virus, attention has turned to the idea of mobile apps that can divulge who a person has been near so that they can be alerted of potential infections. This has a huge potential for abuse by regimes with little care for personal privacy, and has been a significant concern for those working in that field. An interesting compromise has been struck by Iceland, who have produced an app for their populace that stores the information on the device and only uploads it with the user’s consent once they have received a diagnosis. We can all take a look, because to ensure transparency they have released it as open source.

On signing up for the scheme a central server stores the details of each user as well as their phone number. When the epidemiologists have a need to trace a person’s contacts they send a notification, and the person can consent to their upload. This is a fine effort to retain user privacy, with depending on your viewpoint the flaw or the advantage being that the user can not have their data slurped without their knowledge. Iceland is a country with a relatively small population, so we can imagine that with enough consent there could be effective tracing.

We installed the Android version on the Hackaday phone to have a look, but unfortunately it seems to need to be in Iceland to be of use enough to explore. We would be interested to hear from our Icelandic readers, to hear their views. Meanwhile readers can juxtapose the Icelandic app with another proposal for a more anonymised version.

Accessible Controller Plays Around With Modularity

Video games are a great way to have some fun or blow off a little steam when real life becomes laughable. But stock controllers and other inputs are hardly one size fits all. Even if you have no physical issues, they can be too big, too small, or just plain uncomfortable to hold.

[kefcom] wrote in to give us a heads up about a modular, adaptive system he designed for anyone who is unable to operate a PS3, PS4, or PC with a standard controller. The project was inspired by Microsoft’s adaptive XBOX controller and works pretty much the same way — broken-out buttons, joysticks, and other inputs all connect to a hub that unifies them into a controller the console or computer can communicate with. The major difference is that this project is open source and can be realized much more cheaply.

If you want to give this a try, [kefcom]’s project repo has step-by-step instructions for disassembling two types of wireless controllers and converting them into hubs for modular controls. He’s looking for help with design, documentation, and finding reliable suppliers for all the parts, so let him know if you can assist.

Some players need something more accessible than just broken-out buttons and full-size joysticks. Here’s an adaptive controller that uses ridged foam rollers to actuate buttons.