[Federico Musto] Of Arduino SRL Discusses Arduino Legal Situation

Recently we had the opportunity to sit down and interview Arduino SRL’s CEO, [Federico Musto], over a nice dinner. His company is one half of the Arduino vs Arduino debacle which has pitted Arduino.cc against Arduino.org in a battle over the trademark on “Arduino”.

Given the tremendous amount of press coverage of [Massimo Banzi] and the Arduino LLC side of the story (Arduino.cc), we were very interested in hearing how the whole situation looks where [Frederico Musto] sit (Arduino.org). In the end, we came away with what we feel is a more balanced and complete picture of the situation, as well as interesting news about future products from the Arduino SRL camp. [Musto’s] take on the legal proceedings, both past and present, is nothing short of fascinating.

Continue reading “[Federico Musto] Of Arduino SRL Discusses Arduino Legal Situation”

Designing A CPU In VHDL For FPGAs: OMG.

If you’ve been thinking about playing around with FPGAs and/or are interested in CPU design, [Domipheus] has started a blog post series that you should check out. Normally we’d wait until the whole series is done to post about it, but it’s looking so good, that we thought we’d share it with you while it’s still in progress. So far, there are five parts.

minispartan6In Part One, [Domipheus] goes through his rationale and plans for the CPU. If you’re at all interested in following along, this post is a must-read. The summary, though, is that he’s aiming to make a stripped-down 16-bit processor on a Spartan 6+ FPGA with basic arithmetic and control flow, and write an assembler for it.

In Part Two, [Domipheus] goes over the nitty-gritty of getting VHDL code rendered and uploaded to the FPGA, and as an example builds up the CPU’s eight registers. If you’re new to FPGAs, pay special attention to the test bench code at the end of the post. Xilinx’s ISE package makes building a test suite for your FPGA code pretty easy, and given the eventual complexity of the system, it’s a great idea to have tests set up for each stage. Testing will be a recurring theme throughout the rest of the posts.

In Part Three, [Domipheus] works through his choices for the instruction set and starts writes up the instruction set decoder. In Part Four, we get to see an ALU and the jump commands are implemented. Part Five builds up a bare-bones control unit and connects the decoder, ALU, and registers together to do some math and count up.

pipe

We can’t wait for further installments. If you’re interested in this sort of thing, and are following [Domipheus]’s progress, be sure to let him know: we gotta keep him working.

Of course, this isn’t the first time anyone’s built a soft-CPU in an FPGA. (The OMG was added mostly to go along with the other TLAs.) Here’s a tiny one, a big one, and a bizarre one.

Artificial Killing Machine

L.A. artist [Jonathan Fletcher Moore] sent us this fantastic tech-art piece on dehumanization and drone warfare. Talking too much about art is best left to the artists, so we’ll shut up and let you watch the video below the break.

artificial_killing_machine_0011_800The piece is essentially a bunch of old cap guns with servos that pull their triggers. A Raspberry Pi with an Internet connection fetches data on US drone strikes from www.dronestre.am and fires off a cap every time someone is killed. At the same time, the story version of the data is printed out in thermal paper that cascades onto the floor.

Viewers are encouraged to sit underneath all the cap guns and wait. Talk about creepy and suspenseful. And a tiny reflection of the everyday fears that people who live under drone-filled skies.

Continue reading “Artificial Killing Machine”

Panopticlick: You Are A Beautiful And Unique Snowflake

We all like to think we’re unique, but when it comes to remaining anonymous online that’s probably not such a good idea. By now, it’s common knowledge that advertising firms, three-letter agencies, and who-knows-who-else want to know what websites you’re visiting and how often. Persistent tracking cookies, third-party cookies, and “like” buttons keep tabs on you at all times.

For whatever reason, you might want to browse anonymously and try to plug some of the obvious sources of identity leakage. The EFF and their Panopticlick project have bad news for you.

The idea behind Panopticlick is simple: to try to figure out how identifiable you are even if you’re not accepting cookies, or if you’ve disabled Flash, or if you’re using “secure” browsers. To create a fingerprint of your browser, Panopticlick takes all the other little bits of identifying information that your browser gives up, and tries to piece them together.

For a full treatment of the project, see this paper (PDF). The takeaway from the project is that the information your browser gives up to servers can, without any cookies, specifically identify you.

fooFor instance, a server can query which plugins your browser supports, and if you’ve installed anything a tiny bit out of the ordinary, you’re fingerprinted. Your browser’s User Agent strings are often over-specific and tell which browser sub-sub-sub version you’re running on which OS platform. If you’re running Flash, it can report back which fonts you’ve got installed on your system. Any of these can be easily as rare as one-in-a-million. Combining them together (unless they’re all highly correlated) can fingerprint you uniquely.

You can’t necessarily win. If you disable Flash, the remote site doesn’t get your font list, but since only one in five browsers runs with Flash disabled, you’re still giving up two bits of information. If you run a “privacy-enhancing” niche browser, your chances of leaving a unique fingerprint go through the roof unless you’re also forging the User Agent strings.

I ran the Panopticlick experiment twice, once with a Firefox browser and once with an obscure browser that I actually use most of the time (dwb). Firefox runs a Flash blocker standard, so they didn’t get my font list. But still, the combination of browser plugins and a relatively new Firefox on Linux alone made me unique.

It was even worse for the obscure browser test. Only one in 1.4 million hits use dwb, so that alone was bad news. I also use a 4:3 aspect-ratio monitor, with 1280×1024 pixels at 24-bit color depth, which is apparently a one-in-twenty-four occurrence. Who knew?

fooFinally, I tried out the Tor browser, which not only routes your traffic through the Tor network, but also removes a lot of the specific data about your session. It fared much better, making me not uniquely identifiable: instead only one in a thousand. (Apparently a lot of people trying out the Panopticlick site ran Tor browser.)

If you’re interested in online anonymity, using something like Tor to obscure your IP address and disabling cookies is a good start. But Panopticlick points out that it may not be enough. You can never use too many layers of tinfoil when making your hat.

Try it out, and let us know in the comments how you fare.

Stenography (Yes, With Arduinos)

What’s the fastest keyboard? Few subjects are as divisive in the geek community. Clicky or squishy? QWERTY or Dvorak? Old-school IBM or Microsoft Natural? The answer: none of the above.

danger-court-reporter-tyingThe fastest normal-keyboard typists (Dvorak or Qwerty) can get around 220 words per minute (wpm) in bursts. That sounds fast, and it’s a lot faster than we type, but that’s still below the minimum speed allowable for certified court reporters or closed captioners. The fastest court reporters clock in around 350 to 375 wpm for testimony. But they do this by cheating — using a stenotype machine. We’ll talk more about stenography in a minute, but first a hack.

The Hack

[Kevin Nygaard] bought a used Stentura 200 stenotype machine off Ebay and it wasn’t working right, so naturally he opened it up to see if he could fix it. A normal stenotype operates stand-alone and prints out on paper tape, but many can also be connected to an external computer. [Kevin]’s machine had a serial output board installed, but it wasn’t outputting serial, so naturally he opened it up to see if he could fix it. In the end, he bypassed the serial output by soldering on an Arduino and writing a few lines of code.

shot0001The serial interface board in [Kevin]’s machine was basically a set of switches that made contact with the keys as they get pressed, and a few shift registers to read the state of these switches out over a serial connection. [Kevin] tapped into this line, read the switch state out into his Arduino, and then transmitted the correct characters to his computer via the Arduino’s serial over USB. (Video demo) As hardware types like to say, the rest is a simple matter of software.

Continue reading “Stenography (Yes, With Arduinos)”

Pico Space Balloon Circumnavigates The Globe, Twice

We’ve reported on “space” balloons before. Heck, some of us have even launched a few. Usually they go way up in the air, take some cool pictures, and land within driving (and retrieving) distance the same afternoon. You get often amazing photos and bragging rights that you took them for the low, low price of a really big helium balloon and a fill.

But what if you shrunk everything down? Over the last few years, [Andy, VK3YT] has been launching ever smaller and lighter balloons with very low power ham radio payloads. So no camera and no photos, but the payback is that he’s launching payloads that weigh around thirteen grams complete with GPS, radio, solar cell, and batteries. They can stay up for weeks and go really far. We’d love to see some construction details beyond the minimalistic “Solar powered party balloon, 25mW TX”. But that about sums it up.

Continue reading “Pico Space Balloon Circumnavigates The Globe, Twice”