Rolling codes change the signal sent by car keyfobs unpredictably on every use, rendering them safe from replay attacks, and we can all sleep well at night. A research team lead by [Levente Csikor] gave a presentation at Black Hat where they disclose that the situation is not pretty at all (PDF).
You might know [Samy Kamkar]’s RollJam attack, which basically consists of jamming the transmission between fob and car while the owner walks away, fooling the owner into clicking again, and then using one of the two rolling codes to lock up the car, keeping the other in your back pocket to steal it once they’re getting coffee. This is like that, but much, much worse. Continue reading “RollBack Breaks Into Your Car”→
You wake up in the morning, and check Hackaday over breakfast. Then it’s off to work or school, where you’ve already had to explain the Jolly Wrencher to your shoulder-surfing colleagues. And then to a hackspace or back to your home lab, stopping by the skull-and-cross-wrenches while commuting, naturally. You don’t bleed red, but rather #F3BF10. It’s time we talked.
The Hackaday writing crew goes to great lengths to cover all that is interesting to engineers and enthusiasts. We find ourselves stretched a bit thin and it’s time to ask for help. Want to lend a hand while making some extra dough to plow back into your projects? We’re looking for contributors to write a few articles per week and keep the Hackaday flame burning.
Contributors are hired as private contractors and paid for each article. You should have the technical expertise to understand the projects you write about, and a passion for the wide range of topics we feature. You’ll have access to the Hackaday Tips Line, and we count on your judgement to help us find the juicy nuggets that you’d want to share with your hacker friends.
One example article written in the voice of Hackaday. Include a banner image, at least 150 words, the link to the project, and any in-links to related and relevant Hackaday features. We need to know that you can write.
Details about your background (education, employment, interests) that make you a valuable addition to the team. What do you like, and what do you do?
Links to your blog/project posts/etc. that have been published on the Internet, if any.
What are you waiting for? Ladies and Gentlemen, start your applications!
Did I tell you about the time that [Spetku] turned the schwag bottle into a Jacob’s Ladder?Supercon Tickets go on sale right now! And the true-believer tickets usually sell out fast, so if you’re as excited about the thought of a real-life Supercon as we are, get yours now for a healthy discount.
We might be biased, but Supercon is our favorite conference of the year. Smaller than most and hardware-focused, you really can’t beat the signal/noise ratio of the crowd in attendance and the talks on the stage. People bring their projects, their great ideas, and their big dreams with them. And we have a cool badge to boot. It’s Hackaday, but in real life. And you should join us!
The conference starts on Friday Nov. 4th with registration, a mellow afternoon of badge-hacking, and a party to kick things off right. Saturday and Sunday are the main show, with a hacker village in the alley, workshops aplenty, and of course all of the talks. It’s only a weekend, but it’s one you’ll keep going back to in your mind for the whole year.
The Nitty Gritty Details
One hundred (100) True-believer Tickets are on sale now for $128 apiece, or until Aug. 29th. We call them True-believer Tickets because we haven’t even finished the call for proposals yet, much less selected the talks, but trust us, it’s going to be a good slate. (In past years, the True-believer tickets have sold out in as little as a day, so don’t sleep on this!) After that, regular admission is $256.
Of course, there’s always a back door if you want to sneak in for free. In our opinion, the coolest way to attend a conference is to give a talk, and you’ll get a complimentary ticket to boot! And even if you don’t get selected, we’ll give everyone who submits a serious talk proposal a ticket at the discounted price, so don’t hesitate. Volunteers also get in free, and we’ll be putting out the call on Aug 29th.
No matter how you get yourself a ticket, get one, and get to Supercon. We’re excited to see you in person again!
The Daguerreotype was among the earliest photographic processes, long before glass plates or film, that relied on sensitizing a thin layer of silver on top of a copper plate. The earliest Daguerreotype plates were made physically, by rolling a copper-silver plate thinner and thinner until the silver layer was just right. Good luck finding a source of Daguerreotype plates made this way in 2022. (There are electroplating methods, but they all end up with chemically contaminated silver.)
On the other hand, magnetron sputtering is a process of depositing pure metal in thin layers using plasma, high voltages, and serious magnets, and [Koji Tokura] is making his own sputtered Daguerreotype plates this way, giving him the best of both worlds: the surreal almost-holographic quality of the Daguerreotype with the most difficult film preparation procedure imaginable.
The star of the show is [Koji]’s sputtering rig, which consists of a Tupperware glass sandwich box as a vacuum chamber and a microwave oven transformer as the high voltage source. In use, he pumps the chamber down, introduces a small amount of argon, and then lights up the plasma. The high voltage accelerates the plasma ions into a sheet of silver, and the silver particles that get knocked free coat the copper plate. A strong magnet creates a local plasma, which accelerates the coating procedure, but since [Koji] only had a relatively small magnet, he scans the plate with the magnet, using a scavenged 2D pen plotter mechanism.
The result is a chemically pure Daguerreotype plate produced in a seriously modern way, and we’d love to see the images in person. In these days of disposable images made by the AIs in your cell phone, it’s nice to see some people taking photography in strange directions. For instance, maybe you’d like to make your own ultra-large collodion plates. Or something else? If you do, show us!
Belgian security researcher [Lennert Wouters] has gotten his own code running on the Starlink “Dishy McFlatface” satellite terminals, and you can too! The hack in question is a “modchip” with an RP2040 and a MOSFET that crowbars the power rails, browning out the main CPU exactly when it’s verifying the firmware’s validity and bypassing that protection entirely. [Lennert] had previously figured out how to dump the Starlink firmware straight from the eMMC, and with the ability to upload it back, the circle of pwnership is closed. This was a talk at DEFCON, and you can check out the slides here. (PDF)
The mod chip itself was a sweet piece of work, being tailored to fit into the Starlink’s motherboard just so, and taking good advantage of the RP2040’s PIOs, which are probably the microcontroller’s superpower.
[Lennert] says he submitted his glitch attack to Starlink and they took some precautions to make the glitching harder. In particular, [Lennert] was triggering his timing off of the USART port coming up on the Starlink unit, so Starlink just shut that down. But it’s not like he couldn’t trigger on some other timing-relevant digital signal, so he chose the eMMC’s D0 data line: they’re not going to be able to boot up without it, so this hack is probably final. No shade against Starlink here. It’s almost impossible to shield a device against an attacker who has it on their bench, and [Lennert] concludes that he found no low-hanging fruit and was impressed that he had to work so hard to get root.
What can you do with this? Not much, yet. But in principle, it could be used to explore the security of the rest of the Starlink network. As reported in Wired, Starlink says that they’ve got a defence-in-depth system and that just getting into the network doesn’t really get you very far. We’ll see!
I was struck by reading our writeup of the Zenit in Electronics contest – an annual event in the Slovak Republic – that it’s kind of like a decathlon for electronic engineers and/or hardware hackers. It’s a contest, in which students compete presumably initially on a local level, and then up to 32 at the national level. There’s a straight-up knowledge test, a complex problem to solve, and then a practical component where the students must actually fabricate a working device themselves, given a schematic and maybe some help. Reading through the past writeups, you get the feeling that it’s both a showcase for the best of the best, but also an encouragement for those new to the art. It’s full-stack hardware hacking, and it looks like a combination of hard work and a lot of fun.
What’s most amazing is that it’s in its 38th year. Think how much electronics, not to mention geopolitics, has changed in the last 40 years. But yet the Zenit competition still lives on. Since it’s mostly volunteer driven, with strong help from the Slovak electronics industry, it has to be a labor of love. What’s astounding to me is that this love has been kept alive for so long.
I think that part of the secret is that, although it’s a national competition, it’s possible to run it with a small yet dedicated crew. It’s certainly a worthwhile endeavor – I can only imagine how many young students’ lives have been impacted by the exposure to microelectronics hacking through the contest. Indeed, it’s telling that the current chairman of the competition, Daniel Valúch, was a competitor himself back in 1994.
I wonder if the people founding Zenit back in 1984 thought of themselves as creating a perpetual electronic engineering contest, or if they just wanted to try it out and it took on a life of its own? Could you start something like this today?
This article is part of the Hackaday.com newsletter, delivered every seven days for each of the last 200+ weeks. It also includes our favorite articles from the last seven days that you can see on the web version of the newsletter.
Want this type of article to hit your inbox every Friday morning? You should sign up!
Wow! We knew that the Hack it Back Challenge round of the Hackaday Prize would bring out the clever repairers among you, but we’re still impressed to see the results! This was a tough round for the judges, but they came up with a short list of ten finalists, and we’re pleased to bring them to you here.
The Hack it Back Challenge aimed to keep old gear from being thrown away by performing a heroic repair, giving it a new purpose in life, or otherwise bringing it back to a useful state. Of course, once you’ve got the box open, you start thinking of how to improve whatever the gadget is, and some of our finalists took that in unexpected directions. Continue reading “2022 Hackaday Prize: Congratulations To The Winners Of The Hack It Back Challenge”→