Hackaday Links Column Banner

Hackaday Links: April 26, 2020

Gosh, what a shame: it turns out that perhaps 2 billion phones won’t be capable of COVID-19 contact-tracing using the API that Google and Apple are jointly developing. The problem is that the scheme the two tech giants have concocted, which Elliot Williams expertly dissected recently, is based on Bluetooth LE. If a phone lacks a BLE chipset, then it won’t work with apps built on the contact-tracing API, which uses the limited range of BLE signals as a proxy for the physical proximity of any two people. If a user is reported to be COVID-19 positive, all the people whose BLE beacons were received by the infected user’s phone within a defined time period can be anonymously notified of their contact. As Elliot points out, numerous questions loom around this scheme, not least of which is privacy, but for now, something like a third of phones in mature smartphone markets won’t be able to participate, and perhaps two-thirds of the phones in developing markets are not compatible. For those who don’t like the privacy-threatening aspects of this scheme, pulling an old phone out and dusting it off might not be a bad idea.

We occasionally cover stories where engineers in industrial settings use an Arduino for a quick-and-dirty automation solution. This is uniformly met with much teeth-gnashing and hair-rending in the comments asserting that Arduinos are not appropriate for industrial use. Whether true or not, such comments miss the point that the Arduino solution is usually a stop-gap or proof-of-concept deal. But now the purists and pedants can relax, because Automation Direct is offering Arduino-compatible, industrial-grade programmable controllers. Their ProductivityOpen line is compatible with the Arduino IDE while having industrial certifications and hardening against harsh conditions, with a rich line of shields available to piece together complete automation controllers. For the home-gamer, an Arduino in an enclosure that can withstand harsh conditions and only cost $49 might fill a niche.

Speaking of Arduinos and Arduino accessories, better watch out if you’ve got any modules and you come under the scrutiny of an authoritarian regime, because you could be accused of being a bomb maker. Police in Hong Kong allegedly arrested a 20-year-old student and posted a picture of parts he used to manufacture a “remote detonated bomb”. The BOM for the bomb was strangely devoid of anything with wireless capabilities or, you know, actual explosives, and instead looks pretty much like the stuff found on any of our workbenches or junk bins. Pretty scary stuff.

If you’ve run through every binge-worthy series on Netflix and are looking for a bit of space-nerd entertainment, have we got one for you. Scott Manley has a new video that goes into detail on the four different computers used for each Apollo mission. We knew about the Apollo Guidance Computers that guided the Command Module and the Lunar Module, and the Launch Vehicle Digital Computer that got the whole stack into orbit and on the way to the Moon, but we’d never heard of the Abort Guidance System, a backup to the Lunar Module AGC intended to get the astronauts back into lunar orbit in the event of an emergency. And we’d also never heard that there wasn’t a common architecture for these machines, to the point where each had its own word length. The bit about infighting between MIT and IBM was entertaining too.

And finally, if you still find yourself with time on your hands, why not try your hand at pen-testing a military satellite in orbit? That’s the offer on the table to hackers from the US Air Force, proprietor of some of the tippy-toppest secret hardware in orbit. The Hack-A-Sat Space Security Challenge is aimed at exposing weaknesses that have been inadvertantly baked into space hardware during decades of closed development and secrecy, vulnerabilities that may pose risks to billions of dollars worth of irreplaceable assets. The qualification round requires teams to hack a grounded test satellite before moving on to attacking an orbiting platform during DEFCON in August, with prizes going to the winning teams. Get paid to hack government assets and not get arrested? Maybe 2020 isn’t so bad after all.

Fuel From Water Using Only An Arc Welder

Water, high currents, blinding balls of plasma, and a highly flammable gas that’s toxic enough to kill you in three minutes if you breathe enough of it. What’s not to love about this plasma-powered water gas generator?

In all seriousness, [NightHawkInLight] is playing with some dangerous stuff here, and he’s quite adamant about this one being firmly in the “Don’t try this at home” category. But it’s also fascinating stuff, since it uses nothing but a tank of water and an electric arc to produce useful amounts of fuel very quickly. It’s easy to jump to the conclusion that he’s talking about the electrolytic splitting of water into the hydrogen-oxygen mix HHO, but this is something else entirely.

Using a carbon electrode torch connected to his arc welder, a setup that’s similar to the one he used to make synthetic rubies, [NightHawkInLight] is able to strike an underwater arc inside a vessel that looks for all the world like a double-barreled bong. The plasma creates a mixture of carbon monoxide and hydrogen which accumulates very rapidly in the gasometer he built to collect the flammable products produced by a wood gasifier.

The water gas burns remarkably cleanly, but probably has limited practical uses. Unless you live somewhere where electricity costs practically nothing, it’ll be hard to break even on this. Still, it’s an interesting look at what’s possible when plasma and water mix.

Continue reading “Fuel From Water Using Only An Arc Welder”

GPU Turned Into Radio Transmitter To Defeat Air-Gapped PC

Another week, another exploit against an air-gapped computer. And this time, the attack is particularly clever and pernicious: turning a GPU into a radio transmitter.

The first part of [Mikhail Davidov] and [Baron Oldenburg]’s article is a review of some of the basics of exploring the RF emissions of computers using software-defined radio (SDR) dongles. Most readers can safely skip ahead a bit to section 9, which gets into the process they used to sniff for potentially compromising RF leaks from an air-gapped test computer. After finding a few weak signals in the gigahertz range and dismissing them as attack vectors due to their limited penetration potential, they settled in on the GPU card, a Radeon Pro WX3100, and specifically on the power management features of its ATI chipset.

With a GPU benchmarking program running, they switched the graphics card shader clock between its two lowest power settings, which produced a strong signal on the SDR waterfall at 428 MHz. They were able to receive this signal up to 50 feet (15 meters) away, perhaps to the annoyance of nearby hams as this is plunk in the middle of the 70-cm band. This is theoretically enough to exfiltrate data, but at a painfully low bitrate. So they improved the exploit by forcing the CPU driver to vary the shader clock frequency in one megahertz steps, allowing them to implement higher throughput encoding schemes. You can hear the change in signal caused by different graphics being displayed in the video below; one doesn’t need much imagination to see how malware could leverage this to exfiltrate pretty much anything on the computer.

It’s a fascinating hack, and hats off to [Davidov] and [Oldenburg] for revealing this weakness. We’ll have to throw this on the pile with all the other side-channel attacks [Samy Kamkar] covered in his 2019 Supercon talk.

Continue reading “GPU Turned Into Radio Transmitter To Defeat Air-Gapped PC”

The Rusty Nail Award For Worst WiFi Antenna

In general, you get what you pay for, and if what you pay for is a dollar-store WiFi antenna that claims to provide 12 dBi of signal gain, you shouldn’t be surprised when a rusty nail performs better than it.

The panel antenna that caught [Andrew McNeil]’s eye in a shop in Rome is a marvel of marketing genius. He says what caught his eye was the Windows Vista compatibility label, a ploy that really dates this gem. So too does the utterly irrelevant indication that it’s USB compatible when it’s designed to plug into an SMA jack on a WiFi adapter. [Andrew]’s teardown was uninspiring, revealing just a PCB with some apparently random traces to serve as the elements of a dipole. We found it amusing that the PCB silkscreen labels the thru-holes as H1 to H6, which is a great way to make an uncrowded board seem a bit more important.

The test results were no more impressive than the teardown. A network analyzer scan revealed that the antenna isn’t tuned for the 2.4-GHz WiFi band at all, and practical tests with the antenna connected to an adapter were unable to sniff out any local hotspots. And just to hammer home the point of how bad this antenna is, [Andrew] cobbled together a simple antenna from an SMA connector and a rusty nail, which handily outperformed the panel antenna.

We’ve seen plenty of [Andrew McNeil]’s WiFi antenna videos before, like his umbrella and tin can dish. We like the sanity he brings to the often wild claims of WiFi enthusiasts and detractors alike, especially when he showed that WiFi doesn’t kill houseplants. We can’t help but wonder what he thinks about the current 5G silliness.

Continue reading “The Rusty Nail Award For Worst WiFi Antenna”

Machine Learning Algorithm Runs On A Breadboard 6502

When it comes to machine learning algorithms, one’s thoughts do not naturally flow to the 6502, the processor that powered some of the machines in the first wave of the PC revolution. And one definitely does not think of gesture recognition running on a homebrew breadboard version of a 6502 machine, and yet that’s exactly what [Nick Bild] has accomplished.

Before anyone gets too worked up in the comments, we realize that [Nick]’s Vectron breadboard computer is getting a lot of help from other, more modern machines. He’s got a pair of Raspberry Pi 3s in the mix, one to capture and downscale images from a Pi cam, and one that interfaces to an Atari 2600 emulator and sends keypresses to control games based on the gestures seen by the camera. But the logic to convert gesture to control signals is all Vectron, and uses a k-nearest neighbor algorithm executed in 6502 assembly. Fifty gesture images are stored in ROM and act as references for the four known gesture classes: up, down, left, and right. When a match between the camera image and a gesture class is found, the corresponding keypress is sent to the game. The video below shows that the whole thing is pretty responsive.

In our original article on [Nick]’s Vectron breadboard computer, [Tom Nardi] said that “You won’t be playing Prince of Persia on it.” That may be true, but a machine learning system running on the Vectron is not too shabby either.

Continue reading “Machine Learning Algorithm Runs On A Breadboard 6502”

A Basketball Hoop That Never Lets You Brick

With none of the major leagues in any team sport currently meeting, sports fans have a huge void that has to be filled with something. For [Shane Wighton], the machine shop is the place to go when sports let you down, and the result is this basketball backboard that lets you sink every shot every time.

When we first saw this, we thought for sure it would be some overly complicated motorized affair that would move the hoop to catch the basketball, sort of like the dart-catching dartboard we featured some time ago. And while that would be awesome and somebody should totally build that so we can write it up, [Shane]’s hoop dream is a lot simpler mechanically, even if the math needed to determine the proper shape for the backboard was complex. He wrote software to simulate throws from hundreds of positions to determine the shape for the board, which ends up looking like a shallow elliptic paraboloid. The software created a mesh that was translated into CNC tool paths in Fusion 360, and the backboard was carved from blocks of softwood.

The first tests were disappointing; instead of landing every shot, the board seemed to be actively denying them. [Shane] had to puzzle over that for a while before realizing that he didn’t account for the radius of the ball, which means the centroid never actually contacts the backboard. Rather than recalculate and create a new backboard, he just shifted the hoop out from the backboard by a ball radius. With that expedient in place, the setup performed exactly as calculated.

[Shane] may have taken the long road to hoops glory, but we appreciate the effort and the math lesson. And the fact that this ends up being the same shape as some antennas is a plus.

Continue reading “A Basketball Hoop That Never Lets You Brick”

Hacking Apollo Hack Chat

Join us on Wednesday, April 22 at noon Pacific for the Hacking Apollo Hack Chat with “CuriousMarc” VerdiellKen ShirriffMike Stewart, and Carl Claunch!

When President Kennedy laid down the gauntlet to a generation of scientists and engineers to land a man on the Moon before the close of the 1960s, he likely had little idea what he was putting in motion. The mission was dauntingly complex, the science was untested, and the engineering was largely untried. Almost everything had to be built from scratch, and entire industries were born just from the technologies that had to be invented to make the dream come true.

Chief among these new fields was computer science, which was barely in its infancy when the 1960s started. By the end of the decade and the close of the Space Race, computers had gone from room-filling, power-guzzling machines to something compact and capable enough to fly men to the Moon and back. The computers that followed all built on the innovations that came about as a result of Apollo, and investigating the computers of the era and finding out what made them tick is an important part of our technological culture.

That’s where this retrocomputing dream team came into play. Together, they’ve poked and prodded at every bit of hardware from the Space Race era they could find, including a genuine Apollo Guidance Computer (AGC) that was rescued from the trash. What’s more, they actually managed to restore it to working condition with a series of epic hacks and sheer force of will.

Marc, Ken, Mike, and Carl will stop by the Hack Chat to talk about everything that went into getting the AGC working again, along with anything else that pops up. Come ready to have your Apollo-era hardware itches scratched by the people who’ve been inside a lot of it, and who have seen first-hand what it took to make it to the Moon and back.

join-hack-chatOur Hack Chats are live community events in the Hackaday.io Hack Chat group messaging. This week we’ll be sitting down on Wednesday, April 22 at 12:00 PM Pacific time. If time zones have got you down, we have a handy time zone converter.

Click that speech bubble to the right, and you’ll be taken directly to the Hack Chat group on Hackaday.io. You don’t have to wait until Wednesday; join whenever you want and you can see what the community is talking about.

Continue reading “Hacking Apollo Hack Chat”