Open-DIP Surgery Cuts Retro Chips Down To Size

At least by today’s standards, some of the early chips were really, really big. They may have been revolutionary and they certainly did shrink the size of electronic devices, but integrating a 40-pin DIP into a modern design can be problematic. The solution: cut off all the extra plastic and just work with the die within.

Continue reading “Open-DIP Surgery Cuts Retro Chips Down To Size”

Get Apple To Track Your Bluetooth Devices For You

Apple’s “Find My” service allows users to track their missing devices by leveraging a worldwide network of location-aware iGadgets. With millions of iPhones and Macs out in the wild listening for the missing device’s Bluetooth advertisements and relaying their findings to the Cupertino Mothership, it’s a highly effective way of tracking hardware so long as it stays in relatively urban areas. Unfortunately, the system is completely proprietary and non-Apple devices aren’t invited to play.

Or at least, that used to be the case. A project recently released by the [Secure Mobile Networking Lab] called OpenHaystack demonstrates how generic devices can utilize Apple’s Find My network by mimicking the appropriate Bluetooth Low Energy (BLE) broadcasts. Currently they have a firmware image for the BBC micro:bit, as well as a Python script for Linux, that will allow you to spin up an impromptu Find My target. But the team has also published all the information required to implement similar functionality on other BLE-capable devices and microcontrollers, so expect the list of supported hardware to grow shortly.

Diagram showing how the Apple Find My system worksSomewhat ironically, while OpenHaystack allows you to track non-Apple devices on the Find Me tracking network, you will need a Mac computer to actually see where your device is. The team’s software requires a computer running macOS 11 (Big Sur) to run, and judging by the fact it integrates with Apple Mail to pull the tracking data through a private API, we’re going to assume this isn’t something that can easily be recreated in a platform-agnostic way. Beyond the occasional Hackintosh that might sneak in there, it looks like Tim Cook might have the last laugh after all.

It’s not immediately clear how difficult it will be for Apple to close this loophole, but the talk of utilizing a private API makes us think there might be a built-in time limit on how long this project will be viable. After all, Big Tech doesn’t generally approve of us peons poking around inside their machinations for long. Though even if Apple finds a way to block OpenHaystack, it’s expected the company will be releasing “AirTags” sometime this year which will allow users to track whatever objects they like through the system.

Eyesight Guardian Polices Your Poor Pupils

Don’t know about you, but over the last year or so, we have gone from spending ten or twelve hours a day at this computer to upwards of sixteen or eighteen. Fortunately there’s a window behind the monitor for taking those 20/20/20 breaks that are supposed to prevent eye strain, but it’s so hard to remember (and boring) to do it. And nobody needs yet another thing to remember in the name of self-care.

[Daniel Hingston] certainly agrees. As you’ll see in the delightful video after the break, [Daniel] has made a game out of the whole process of stopping every twenty minutes to spend twenty seconds looking at a point that’s at least twenty feet away. Once the break is over, [Daniel] uses the dual-purpose start button to acknowledge having looked away for 20 seconds. The device is meant to clip onto the corner of any monitor, and [Daniel] has provided several sizes of the bridge piece so that everyone can find their fit.

The Guardian’s guts are pretty simple — an Arduino Pro Mini runs the stop watch and a TFT display to show the graphics that live on an SD card. This is a great way to preserve your eyesight by gamifying something we all know we should be doing. It might be nice to add a break timer that counts up to 25 or thereabouts so you have time to stand up and come back. If you press the button too soon, it scolds you and you have to start your eye break over.

Need some more self-care lately? Our own [Jenny List] has your back in these interesting times.

Continue reading “Eyesight Guardian Polices Your Poor Pupils”

The Rise And Fall Of The Fan Car

The advent of aerodynamic wings in motorsport was one of the most dramatic changes in the mid-20th century. Suddenly, it was possible to generate more grip at speed outside of altering suspension setups and fitting grippier tyres. However, it was just the beginning, and engineers began to look at more advanced ways of generating downforce without the drag penalty incurred by fitting wings to a racecar.

Perhaps the ultimate expression of this was the fan car. Mechanically complex and arguably dangerous, the technology offered huge downforce with minimal drag. However, the fan car’s time in the spotlight was vanishingly brief, despite the promise inherent in the idea. Let’s take a look at the basic theory behind the fan car, how they worked in practice, and why we don’t see them on racetracks today. Continue reading “The Rise And Fall Of The Fan Car”

Hackaday Podcast 108: Eulogizing Daft Punk Helmets, Bitcoin Feeling The Heat, Squeezing Soft Robots, And Motorizing Ice Skates

Hackaday editors Elliot Williams and Mike Szczys travel through the greatest hacks the week had on offer. Charge up your ice skates (literally) by adding spiked electric motors to push you across the frozen pond. If that’s too cold for early March, snuggle up with a good book under the warm light of a clever lamp made from a rotary-dial telephone. We discuss CAD and CAM in your browser, and a software tool to merge images with PCB gerber files. The episode wraps up with a discussion on the balance of quality versus speed when prototyping, and digesting the environmental impact of the Bitcoin network.

Take a look at the links below if you want to follow along, and as always, tell us what you think about this episode in the comments!

Direct download (~60 MB)

Places to follow Hackaday podcasts:

Continue reading “Hackaday Podcast 108: Eulogizing Daft Punk Helmets, Bitcoin Feeling The Heat, Squeezing Soft Robots, And Motorizing Ice Skates”

Elegant And Portable DIY Nightlight Becomes A Fixture For Hacker’s Kids

When [itzikdiy]’s kids asked for a night light for their room, he got the bright idea to build something that straddles the line between portable and permanent. This fixture-less fixture plugs directly into a wall socket and is turned on and off with a handsome rocker switch on the bottom.

This lovely little lamp is mostly made from scrap — the oak on the front appears to have come from an old cabinet door, and the other two ring-shaped pieces are made from pine. [itzikdiy] even took the acrylic from broken panel lamps. Everything was cut with a Dremel and a circle-cutter attachment except the oak, which required a jigsaw. We think it looks great, especially with the different grain directions — call it art deco woodworking.

When it was all said and done, [itzikdiy] found it was too heavy to hang by the plug alone, so he added an L-shaped support beneath the power supply that holds it more evenly against the wall. [itzikdiy] also made a pair of hooks that snap into a pair of slots on the sides of the outlet itself. The solution is simple, sturdy, and effective without disrupting the lines of the lamp at all. Carve out a little bit of time to watch the build video after the break.

We know that someone of your hulking intelligence has no fear of the dark. But if you think you could use a nightlight in the bathroom for those 2 AM trips, look no further.

Continue reading “Elegant And Portable DIY Nightlight Becomes A Fixture For Hacker’s Kids”

This Week In Security: Text Rendering On Windows, GNU Poke, And Bitsquatting

Project Zero just unrestricted the details on CVE-2021-24093, a potentially nasty vulnerability in Windows 10’s DirectWrite, a text rendering library. The flaw got fixed in this month’s patch Tuesday roundup. The flaw is accessible in all the major browsers on Windows 10, as they use DirectWrite for font rendering. The trick here is to use a malicious font that uses some nonsense values. Those values result in a buffer allocation that is too small for complex characters such as Æ.

Because the vulnerability is a Windows library, it’s possible that an exploit would automatically work as a sandbox escape, but I haven’t seen confirmation either way. Let us know if you have some insight there.

Via Bleeping Computer

GNU Poke

The good folks at GNU have minted the 1.0 release of poke, a new binary editing tool. The real killer feature of poke is that it can interpret binary data, decoding it back into readable data structures. If you’re familiar with the way Wireshark can decode packets and give useful, organized output, it seems that poke will provide a similar function, but not limited to network traffic.

It looks like it could become a useful tool for getting a look inside otherwise opaque binaries. What poke brings is a system where you can write pretty-printing templates on the fly, which should be very useful when mapping out an unfamiliar binary. Distros will likely pick up and start packaging poke in the coming weeks, making it even easier to get and play with. Continue reading “This Week In Security: Text Rendering On Windows, GNU Poke, And Bitsquatting”