Open-Sourcing The Lisa, Mac’s Bigger Sister

Forty years ago, on January 19th of 1983, Apple released the Lisa, which was in many ways a revolutionary system. On January 19th of 2023, to celebrate the system’s 40th birthday, the Computer History Museum released the source code for Lisa OS version 3.1 under the Apple Academic License Agreement. Written in Pascal, the source includes over 1,300 source files, covering the OS itself, the Lisa Toolkit development system and a number of applications. The questions one might ask at this point include what the Apple Lisa even is, and why it was such an important system in computer history.

This especially in light of the terrible flop that the Lisa turned out to be, with only 10,000 units sold over two years. Part of this failure was definitely due to the introductory price, that was set at $9,995 (over $27,000 in 2021 dollars). Although it featured an OS with memory protection, despite the lack of an MMU on the Motorola 68k, among other advanced features that placed it well beyond other desktop computers of the time, it got quickly crushed in the market by Apple’s MacIntosh, even after successive Lisa successor releases that sought to address its shortcomings.

Continue reading “Open-Sourcing The Lisa, Mac’s Bigger Sister”

Laptop connected via Ethernet to Raspberry Pi-based secure radio device with antenna

Secure LoRa Mesh Communication Network

The Internet has allowed us to communicate more easily than ever before, and thanks to modern cell-phone networks, we don’t even have to be tied down to a hard line anymore. But what if you want something a little more direct? Maybe you’re in an area with no cell-phone coverage, or you don’t want to use public networks for whatever reason. For those cases, you might be interested in this Secure Communication Network project by [Thomas].

By leveraging the plug-and-play qualities of the Raspberry Pi 4 and the Adafruit LoRa Radio Bonnet, [Thomas] has been able to focus on the software side of this system that really turns these parts into something useful.

Window showing secure text communications
Messages are tagged as “authenticated” when a shared hashing code is included in the message

Rather than a simple point-to-point radio link, a mesh network is built up of any transceivers in range, extending the maximum distance a message can be sent, and building in resilience in case a node goes down. Each node is connected to a PC via Ethernet, and messages are distributed via a “controlled flooding” algorithm that aims to reduce unnecessary network congestion from the blind re-transmission of messages that have already been received.

Security is handled via RSA encryption with 256-byte public/private keys and additional SHA256 hashes for authentication.

The packet-size available through the LoRa device is limited to 256 bytes, of which 80 bytes are reserved for headers. To make matters worse, the remaining 176 bytes must contain encrypted data, which is almost always more lengthy than the raw message it represents. Because of this, longer messages are fragmented by the software, with the fragments sent out individually and re-assembled at the receiving end.

If you’re in need of a decentralized secure radio communications system, then there’s a lot to like about the project that [Thomas] has documented on his Hackaday.io page. He even includes an STL file for a 3D printed case. If you need to send more than text, then this Voice-over-LoRa Mesh Network project may be more your style.

New Commodore VIC-20 Build

In a recent episode of [The Retro Shack], a new Commodore VIC-20 is built, using a ‘Vicky Twenty’ replacement PCB by [Bob’s Bits] as the base and as many new components as could be found. The occasion for this was that a viewer had sent in a VIC-20 that turned out to be broken, so in order to diagnose it, building a new one with known working parts seemed incredibly useful.

Advantages of the reproduction PCB are a number of board-level fixes that negate the need for certain bodge wires, while also having footprints for a wider range of round DIN connectors. The non-proprietary ICs were obtained along with other standard parts from a retro computing store, while the proprietary Commodore components were scrounged up from your friendly used component selling sites.

The result is what from the outside looks like a genuine VIC-20, and which should prove to be very useful in diagnosing the broken VIC-20 system in the future, as well as presumably to play some games on.

Continue reading “New Commodore VIC-20 Build”