We Are Now At DEFCON 2

If you had a working DEFCON meter that reported on real data, would it be cool or distressing?

Before we get ahead of ourselves: no, not that DEF CON. Instructables user [ArthurGuy] is a fan of the 1983 movie  War Games, and following a recent viewing –hacker senses a-tingling — he set to work building his own real-time display.

Making use of some spare wood, [ArthurGuy] glued and nailed together a 10x10x50cm box for the sign. Having been painted white already at some point, the paint brilliantly acted as a reflector for the lights inside each section. The five DEF CON level panels were cut from 3mm pieces of coloured acrylic with the numbers slapped on after a bit of work from a vinyl cutter.

Deviating from a proper, screen-accurate replica, [ArthurGuy] cheated a little and used WS2812 NeoPixel LED strips — 12 per level — and used a Particle Photon to control them. A quick bit of code polls the MI5 terrorism RSS feed and displays its current level — sadly, it’s currently at DEFCON 2.

Continue reading “We Are Now At DEFCON 2”

DEFCON Thermometer

Redditor [mulishadan] — a fan of the movie WarGames — has created a singular thermostat in the form of a Defcon alert meter.

Looking to learn some new skills while building, [mulishadan] tried their hand at MIG welding the 16g cold-rolled plate steel into the distinctive shape. A second attempt produced the desired result, adding a 1/4-inch foam core and painting the exterior. Individual LEDs were used at first for lighting, but were replaced with flexible LED strips which provided a more even glow behind the coloured acrylic. A Particle Photon board queries the Weather Underground API via Wi-Fi in five-minute intervals.

Weather Data BoardEach escalation in the Defcon alert signals an increase of 10 F, starting at Defcon 5 for 69 F and below, up to Defcon 1 for 100+ F. The final build looks like a true-to-life prop with some useful functionality that can be adapted to many different purposes — proof that a relatively simple project can still produce fantastic results for entry-level makers. So why not try making this thermostat scarf as well?

[via /r/DIY]

Help Decipher the DEFCON Badge

The 23rd DEFCON — the Western Hemisphere’s largest hacker conference — doesn’t start until tomorrow but Thursday has become the de facto start for regulars. [Brian] and I rolled into town this afternoon and are working on gathering as much information as possible about the badge challenge.

This year the badge is a 7″ vinyl record. Traditionally the badge alternates years of electronic badges and ones that aren’t. Spend your weekend pulling your hair our trying to solve the puzzles. Check out all the pictures and information (updated as we gather it) and work together collaboratively for a solution by requesting to join the crew on the Badge Hacking page.

Hackaday Breakfast on Sunday

Iocn of Coffee CupIf you’re in town Sunday morning, come nurse your hangover with [Brian], [Eric], and me. We’re headed to Va Bene Caffè at 10:30am on 8/9/15. It’s just across the street in the Cosmopolitan. Request to join this event and I’ll send you a reminder so you don’t forget. You can also hit me up on Twitter for a reminder. See you then (and don’t forget to bring hardware to show off if you have some!).

PS- The Hackaday WiFi Hat is in play. Anyone have the chops to hack it this year?

How To Build A ProxyHam Despite A Cancelled DEFCON Talk

A few days ago, [Ben Caudill] of Rhino Security was scheduled to give a talk at DEFCON. His project, ProxyHam, is designed for those seeking complete anonymity online. Because IP addresses can be tied to physical locations, any online activities can be tracked by oppressive regimes and three letter government agencies. Sometimes, this means doors are breached, and “seditious” journalists and activists are taken into custody.

With the ProxyHam, the link between IP addresses and physical locations is severed. ProxyHam uses a 900MHz radio link to bridge a WiFi network over miles. By hiding a ProxyHam base station in a space with public WiFi, anyone can have complete anonymity online; if the government comes to take you down, they’ll first have to stop at the local library, Starbucks, or wherever else has free WiFi.

[Ben Caudill] will not be giving a talk at DEFCON. It wasn’t the choice of DEFCON organizers to cancel the talk, and it wasn’t his employers – [Ben] founded and is principal consultant at Rhino Security. The talk has been killed, and no one knows why. Speculation ranges from National Security Letters to government gag orders to a far more pedestrian explanations like, “it doesn’t work as well as intended.” Nevertheless, the details of why the ProxyHam talk was cancelled will never be known. That doesn’t mean this knowledge is lost – you can build a ProxyHam with equipment purchased from Amazon, Newegg, or any one of a number of online retailers.

Continue reading “How To Build A ProxyHam Despite A Cancelled DEFCON Talk”

Turning the DEFCON Badge Into a Bitcoin Miner


The DEFCON badge this year was an impressive piece of hardware, complete with mind-bending puzzles, cap sense buttons, LEDs, and of course a Parallax Propeller. [mike] thought a chip as cool as the Propeller should be put to better use than just sitting around until next year so he turned it into a Bitcoin miner, netting him an astonishing 40 hashes per second.

Mining Bitcoins on hardware that doesn’t have much processing power to begin with (at least compared to the FPGAs and ASIC miners commonly used) meant [mike] would have to find some interesting ways to compute the SHA256 hashes that mining requires. He turned to RetroMiner, the Bitcoin miner made for an original Nintendo. Like the NES miner, [mike] is offloading the communication with the Bitcoin network to a host computer, but all of the actual math is handled by a single core on the Propeller.

Saving one core for communication with the host computer, a DEFCON badge could conceivably manage 280 hashes/second, meaning the processing power of all the badges made for DEFCON is about equal to a seven-year-old graphics card.

DEFCON: Blackphone

Despite being full of techies and people doing interesting things with portable devices, you don’t want to have an active radio on you within a quarter-mile of DEFCON. The apps on your phone leak personal data onto the Internet all the time, and the folks at DEFCON’s Wall Of Sheep were very successful in getting a few thousand usernames and passwords for email accounts.

Blackphone is designed to be the solution to this problem, so when we ran into a few members of the Blackphone crew at DEFCON, we were pretty interested to take a quick peek at their device.

The core functionality for the Blackphone comes from its operating system called PrivatOS. It’s a fork of Android 4.4.2 that is supposed to seal up the backdoors found in other mobile phones. There’s also a bundle of apps from Silent Circle that give the Blackphone the ability to make encrypted phone calls, texts (with file sharing), and encrypted and password protected contact lists.

The hardware for the Blackphone is pretty impressive; a quad-core Nvidia Tegra provides all the power you need for your apps, video, and playing 2048, a 2000mAh battery should provide enough juice to get you through a day or two (especially since you can turn off cores), and the usual front/rear cameras, GPS, 802.11bgn and GSM and HSPA+/WCDA radios means this phone will be useable on most networks.

Defcon Side Trip: Pololu And Robots

PololuDuring our trip out to Vegas for Defcon, we were lucky enough to catch up with a few of the companies that should be of interest to Hackaday readers. One of the companies based out of the area is Pololu, makers and purveyors of fine electronics and robots. In an incredible bit of lucky scheduling, LV Bots, the Las Vegas area robot builders club, was having an event the same weekend we were there. A maze challenge, no less, where builders would compete to build the best robot and write the best code to get a pile of motors and electronics through a line-following maze in the fastest amount of time.

The Bots

The LV Bots events are held in the same building as Pololu, and unsurprisingly there were quite a few Pololu employees making a go at taking the stuff they developed and getting it to run through a maze. At least one bot was based on the Zumo kit, and a few based on the 3pi platform. Interestingly, the Raspberry Pi Model B+ was the brains of quite a few robots; not extremely surprising, but evidence that the LV Bots people take their line-following mazes seriously and are constantly improving their builds.

Each robot and builder ‘team’ was given three runs. For each team, the first run is basically dedicated to mapping the entire maze. A carefully programmed algorithm tries to send the robot around the entire maze, storing all the intersections in memory. For the second and third runs, the bot should – ideally – make it to the end in a very short amount of time. This is the ideal situation and was only representative of one team for that weekend’s event.

Continue reading “Defcon Side Trip: Pololu And Robots”