Hands-On: MNT Reforms The Laptop

When we met our contact from MNT in the coffee shop, he was quietly working away on his laptop. Jet black and standing thick it was like an encyclopedia that didn’t quite blend in with the sea of silver MacBook lookalikes on the surrounding tables. After going through all the speeds and feeds we eagerly got our 64 piece driver kit out to open it up and see what made this marvel tick, but when the laptop was turned over it became clear that no tools were needed. The entire bottom of the machine was a single rectangle of transparent acrylic revealing everything from sharp white status LEDs on the bare mainboard to individual 18650 LiFePO4 battery cells in a tidy row. In a sense that’s the summary of the entire product: it’s a real laptop you can use to get work done, and every element of it from design to fabrication is completely transparent.

a view of the inside of a MNT Reform laptop, showing screen and keyboard
The MNT Reform

The device pictured here is called the Reform and is designed and manufactured by MNT, a company in Berlin, Germany (note MNT stands for MNT, it’s not an acronym). The Reform is a fully open source laptop which is shipping today and available via distribution through Crowd Supply. If the aesthetic doesn’t make it clear the Reform is an opinionated product designed from the ground up to optimize for free-as-in-freedom: from it’s solid metal chassis to the blob-free GNU/Linux distribution running inside.

We’re here to tell you that we’ve held one, it’s real, and it’s very well built.

Continue reading “Hands-On: MNT Reforms The Laptop”

Psion Organiser with a Pico memory pack.

Proto-PDA Regains Its Memory With The Help Of A Raspberry Pi Pico

Remember the Psion Organiser? If you do, chances are you were an early adopter, as the 8-bit pocket computer had its heyday in the mid-1980s. Things have come a long way since then, of course, but just how far is illustrated nicely by the fact that a Raspberry Pi Pico can stand in for the Psion’s original memory packs.

Like many of the early attempts at putting a computer in your pocket, the Psion II had removable modules, which were dubbed “Datapaks”. The earliest versions of the Datapaks were little more than an EPROM chip on a small PCB, and the technical limitations of the day plus the quirky way of addressing the memory made it possible for [Amen] to mimic a Datapak using a modern microcontroller.

The first version was a breakout board that extended out of the Datapak slot significantly, with a Pico, OLED display, SD card slot, and a bunch of pushbuttons. That prototype proved that the Pico was indeed fast enough to fool the Psion into thinking a legit Datapak was plugged in. [Amen] later refined the design by making a board that stuffs everything into the Datapak slot, with the exception of the OLED which still dangles out where it can be seen. He puts the faux memory to the test in the video below.

It’s great to see groundbreaking tech of yesteryear like the Psion being taken care of and returned to use. We’ve seen others try before; here’s a hack that uses a Pi to connect a Psion Organiser to the internet through its RS-232 serial port.

Continue reading “Proto-PDA Regains Its Memory With The Help Of A Raspberry Pi Pico”

Razer Mouse Grants Windows Admin Privileges

As the common saying goes, “all networked computers are vulnerable to exploits, but some networked computers are more vulnerable than others”. While not the exact wording from Animal Farm, the saying does have plenty of merit nonetheless. Sure, there are some viruses and issues with Linux distributions but by far most of the exploits target Windows, if only because more people use it daily than any other operating system. The latest Windows 10 exploit, discovered by [jonhat], is almost comically easy too, and involves little more than plugging in a mouse.

While slightly comforting in that an attacker would need physical access to the device rather than simple network access, it is very concerning how simple this attack is otherwise. Apparently plugging in a Razer mouse automatically launches Windows Update, which installs a driver for the mouse. The installation is run with admin privileges, and a Power Shell can be opened by the user simply by pressing Shift and right-clicking the mouse. While [jonhat] originally tried to let the company know, they weren’t responsive until he made the exploit public on Twitter, and are now apparently working on solving the issue.

Others have confirmed the exploit does in fact work, so hopefully there is a patch released soon that solves the issue. In the meantime, we recommend not allowing strangers to plug any devices into your personal computers as a general rule, or plugging in anything where its origins are unknown. Also remember that some attacks don’t required physical or network access at all, like this one which remotely sniffs keystrokes from a wireless keyboard with less than stellar security, also coincidentally built by Microsoft.