A photo of a white dog with curly fur riding a black skateboard with grey motors under the front deck. There are blue squares on the top of the deck that she is standing on to steer the board.

An Electric Skateboard For The Dogs

What’s a dog to do if they want to do some accessible skateboarding? [Simone Giertz]’s three-legged pup, [Scraps], got the chance to try a LEGO Technic board for her thrills.

This electric LEGO skateboard features six motors and paw pedals to let [Scraps] steer while [Giertz] remotely controls the speed of the board. While it’s not a particularly fast ride, it does let [Scraps] live out her dreams of being a YouTube dog skateboard celebrity.

A video from [Giertz] wouldn’t be complete without a life lesson, and this time it was the importance of rest to the creative process. Sometimes when a solution eludes you, it’s just time to take a break. The steering mechanism, in particular, was giving her trouble but became simple the next morning. We’re also treated to an adorable shot of [Scraps] napping when the initial shoot of her riding the board wasn’t going as planned.

Want to try your hand at making your own skateboard? How about a deck from recycled plastic, tank treads instead of wheels, or is a rocket-powered skateboard more your speed?

Continue reading “An Electric Skateboard For The Dogs”

This Week In Security: EUCLEAK, Revival Hijack, And More

[Thomas Roche] of NinjaLab is out with EUCLEAK, (pdf) a physical attack against Infineon security microcontrollers, and the security tokens that contain them. The name is a portmanteau of Euclidean and leak. And no surprise, it’s a data leak in some implementations of the Extended Euclidean Algorithm (EEA), a component of an Elliptical Curve Digital Signature Algorithm (ECDSA).

OK, time to step back. Infineon microcontrollers are the digital smart parts inside popular security tokens like the Yubikey 5, some Java smart cards, and even the Infineon TPMs. These devices all serve a similar purpose. They store one or more secret keys, and are guaranteed to never disclose those keys. Instead, they use their secret keys to do cryptographic functions, like ECDSA signatures, and output the result. There’s even a special set of tests, the Common Criteria, that are intended to backstop these guarantees. What’s interesting is that an otherwise excellent product like the Yubikey 5, that passes all these auditing and certification processes, is still vulnerable.

The actual attack is to perform ECDSA signatures while monitoring the physical chip with an electromagnetic probe. This tiny directional antenna can pick up on EM noise generated by the microprocessor. That EM noise leaks timing information about the internal state of the cryptography, and the secret key can be derived as a result.

This process does require physical access to the token for several minutes. To get useful readings, the plastic case around the security token does need to be disassembled to get the probe close enough to pick up signals. From there it’s at least an hour of post-processing to actually get the key. And most of these security tokens intentionally make the disassembly process rather difficult. The point isn’t that it’s impossible to open up, but that it’s impossible not to notice that your token has been tampered with. Continue reading “This Week In Security: EUCLEAK, Revival Hijack, And More”

3D Print Yourself These Mini Workshop Tools

Kitting out a full workshop can be expensive, but if you’re only working on small things, it can also be overkill. Indeed, if your machining tends towards the miniature, consider building yourself a series of tiny machines like [KendinYap] did. In the video below, you can see the miniature electric sander, table saw, drill press, and cut-off saw put through their paces.

Just because the machines are small, doesn’t mean they’re not useful. In fact, they’re kind of great for doing smaller jobs without destroying what you’re working on. The tiny belt sander in particular appeals in this case, but the same applies to the drill press as well. [KendinYap] also shows off a tiny table and circular saw. The machines are straightforward in their design, relying largely on 3D printed components. They’re all powered by basic DC brushed motors which are enough to get the job done on the small scale.

They look particularly good if tiny scale model-making is your passion.

Continue reading “3D Print Yourself These Mini Workshop Tools”

A light-dependent resistor detects cacti in the Google Chrome Offline Dinosaur game.

Jump Cacti With An LDR And A Pico

By now, probably everyone is familiar with the “You’re Offline” dinosaur that stars in Google’s T. Rex game. You know — jump cacti, avoid pterodactyls. Repeat until you lose, or, we suppose, make the leaderboard. Well, what if you theoretically couldn’t lose? That’s kind of the idea behind [Bas BotBerg]’s cactus detection-and-avoidance scheme (translated from Dutch).

Like many of us, [Bas] firmly believes that repetitive tasks should be automated, and that includes the controls of the famous T. Rex. Since the cacti are always dark gray and appear along the same plane, it’s easy to register the difference between cacti and screen electronically. In order to accomplish this, [Bas] is using a light-dependent resistor and a pull-up resistor to create a resistance bridge, which is then connected to an analog input pin on a Raspberry Pi Pico.

But [Bas] didn’t do this just to cheat at Offline Dinosaur. Really! It’s for educational purposes, to get people comfortable with embedded processing, sensors, and interfaces between different devices. Check it out in brief action after the break.

Once they get familiar with these concepts, maybe introduce the ESP32 version of Offline Dinosaur.

Continue reading “Jump Cacti With An LDR And A Pico”