Access Controller Now Shipping For PS2/PS3/PC

[Ben Heckendorn]’s Access Controller is now shipping. The controller is designed to be used with just one hand. It has six openings that the five control modules can be placed in. It’s easy to reconfigure depending on the player or game. While the prototype was built using Xbox 360 controller parts, this newly released unit is available for the PS2, PS3, and PCs. The Xbox 360 version is still being reviewed for final production. [Ben] says that in the coming weeks he’ll post a how-to for building your own modules. There’s always one empty slot and the bus like design should make this fairly simple.

Boxee On The Apple TV

[blip.tv ?posts_id=1333256&dest=-1]

Boxee, the social XBMC, is now easy to install on your Apple TV. We first covered Boxee in June when the alpha was released. It’s great to see how much the project has advanced to this point. To install on the Apple TV, you first download a USB “patchstick” creator. The program puts a mac partition on the drive and copies over the necessary files. You reboot the Apple TV with the stick installed and it patches in both Boxee and XBMC. When you restart the the device it will have two new menu items and the rest of the system will be intact. [Dave Mathews] shows the entire process in the video above. He notes that they’re currently not taking advantage of the GPU, so 1080p is a little too much for the system.

Quantum Cryptography In-band Attack

Quantum cryptography is an emerging field, but low install base hasn’t kept researchers from exploring attacks against it. It’s an attractive technology because an attacker sniffing the key exchange changes the quantum state of the photons involved. All eavesdroppers can be detected because of this fundamental principal of quantum mechanics.

We’ve seen theoretical side-channel attacks on the hardware being used, but had yet to see an in-band attack until now. [Vadim Makarov] from the University of Science and Technology in Trondheim has done exactly that (Internet Archive). Quantum key distribution systems are designed to cope with noise and [Makarov] has taken advantage of this. The attack works by firing a bright flash of light at all the detectors in the system. This raises the amount of light necessary for a reading to register. The attacker then sends the photon they want detected, which has enough energy to be read by the intended detector, but not enough for the others. Since it doesn’t clear the threshold, the detectors don’t throw any exceptions. The attacker could sniff the entire key and replay it undetected.

This is a very interesting attack since it’s legitimate eavesdropping of the key. It will probably be mitigated using better monitoring of power fluctuations at the detectors.

[via I)ruid]

Blinkenlights’ Stereoscope Goes Live In Toronto

We’re happy to present this guest post from History Hacker’s [Bre Pettis]. Today [Bre] catches up with the Blinkenlights team, who turn entire buildings into displays. Their current project is Stereoscope which goes live in Toronto, Canada today.

Earlier this week, I posted about the beginnings of the blinkenlights project. It started in 2001 in Berlin, but now Seven years later, in May 2008, blinkenlights is back. The City of Toronto asked the blinkenlights team if they would be interested in joining another Nuit Blanche (as they did in Paris in 2002). Short on time and with a lot of ambition, they decided to redesign and push the envelope on the project to make it wireless for The Toronto City Hall since there would be 960 windows split up in two towers. In the above photo, you can see Stereoscope in all its glory. Continue reading “Blinkenlights’ Stereoscope Goes Live In Toronto”

Avoiding OS Fingerprinting In Windows

[Irongeek] has been working on changing the OS fingerprint of his Windows box. Common network tools like Nmap, P0f, Ettercap, and NetworkMiner can determine what operating system is being run by the behavior of the TCP/IP stack. By changing this behavior, you can make your system appear to be another OS. [Irongeek] started writing his own tool by checking the source of Security Cloak to find out what registry keys needed to be changed. His OSfuscate tool lets you define your own .os fingerprint file. You can pretend to be any number of different systems from IRIX to Dreamcast. Unfortunately this only works for TCP/IP. Other methods, like Satori‘s DHCP based fingerprinting, still work and need to be bypassed by other means. Yes, this is just “security through obscurity”, but it is something fun to play with.

Another IKEA Linux Cluster

In a bit of serendipity, reader [Tim Molter] had decided on the IKEA Helmer cabinet for his new cluster right before seeing the previous IKEA cluster we covered. He and his coding partner recently completed building their own version of the IKEA Linux cluster. The cabinet was $30 and holds six headless boxes. Each board has a quad-core AMD processor for a total of 24 cores. They also feature 1GB of RAM and an 80GB laptop SATA drive. The latter was chosen because of space limitations in the case. [Tim] describes the Helmer cabinet as being almost perfect. The power supply lines up with the top edge of the drawer and the motherboard fits with a millimeter to spare. Power buttons were added to the front plus slots for airflow. It looks like a really clean installation and at $2550, incredibly cheap for the processing power.

Xbox 360 Battery Pack Teardown

Reader, [Fox9p3400], opened up an Xbox 360 controller battery pack so we could all see what goes into one. It contains two Sanyo 2100mAh NiMH AA rechargeables (Model HR-3U 1.2V). In addition to that, there is an Atmel microcontroller (not pictured) and the copper temperature probe you can see above. He has more pictures on Photobucket.