Winamp Source Code Will Be Opened Up, Company Says

Recently the company currently in charge of the Winamp media player – formerly Radionomy, now Llama Group – announced that it will be making the source code of the player ‘available to developers’. Although the peanut gallery immediately seemed to have jumped to the conclusion that this meant that the source would be made available to all on the announced 24 September 2024 date, reading between the lines of the press release gives a different impression.

First there is the sign-up form for ‘FreeLlama’ where interested developers can sign up, with a strong suggestion that only vetted developers will be able to look at the code, which may or may not be accompanied by any non-disclosure agreements. It would seem appropriate to be skeptical considering Winamp’s rocky history since AOL divested of it in 2013 with version 5.666 and its new owner Radionomy not doing much development on the software except for adding NFT and crypto/blockchain features in 2022. The subsequent Winamp online service doubled down on this.

Naturally it would be great to see Winamp become a flourishing OSS project for the two dozen of us who still use Winamp on a daily base, but the proof will be in the non-NFT pudding, as the saying goes.

Improved 3D Scanning Rig Adds Full-Sized Camera Support

There are plenty of reasons to pick up or build a 3D scanner. Modeling for animation or special effects, reverse engineering or designing various devices or products, and working with fabrics and clothing are all well within the wide range of uses for these tools. [Vojislav] built one a few years ago which used an array of cameras to capture 3D information but the Pi camera modules used in this build limited the capabilities of the scanner in some ways. [Vojislav]’s latest 3D scanner takes a completely different approach by using a single high-quality camera instead.

The new 3D scanner is built to carry a full-size DSLR camera, its lens, and a light. Much more similarly to how a 3D printer works, the platform moves the camera around the object in programmable steps for the desired 3D scan. The object being scanned sits on a rotating plate as well, allowing for the entire object to be scanned without needing to move the camera through a full 180° in two axes. The scanner can also be used for scanning more 2D objects while capturing information about texture, such as various textiles.

For anyone looking to reproduce something like this, [Vojislav] has made all of the plans for this build available on the project’s GitHub page including some sample gcode to demonstrate the intended use for the scanner. On the other hand, if you’re short the often large amount of funding required to get a DSLR camera, his older 3D scanner is still worth taking a look at as well.

Continue reading “Improved 3D Scanning Rig Adds Full-Sized Camera Support”

Emulating Biology For Robots With Rolling Contact Joints

Joints are an essential part in robotics, especially those that try to emulate the motion of (human) animals. Unlike the average automaton, animals are not outfitted with bearings and similar types of joints, but rather rely sometimes on ball joints and a lot on rolling contact joints (RCJs). These RCJs have the advantage of being part of the skeletal structure, making them ideal for compact and small joints. This is the conclusion that [Breaking Taps] came to as well while designing the legs for a bird-like automaton.

These RCJs do not just have the surfaces which contact each other while rotating, but also provide the constraints for how far a particular joint is allowed to move, both in the forward and backward directions as well as sideways. In the case of the biological version these contact surfaces are also coated with a constantly renewing surface to prevent direct bone-on-bone contact. The use of RCJs is rather common in robotics, with the humanoid DRACO 3 platform as detailed in a 2023 research article by [Seung Hyeon Bang] and colleagues in Frontiers in Robotics and AI.

The other aspect of RCJs is that they have to be restrained with a compliant mechanism. In the video [Breaking Taps] uses fishing line for this, but many more options are available. The ‘best option’ also depends on the usage and forces which the specific joint will be subjected to. For further reading on the kinematics in robotics and kin, we covered the book Exact Constraint: Machine Design Using Kinematic Principles by [Douglass L. Blanding] a while ago.

Continue reading “Emulating Biology For Robots With Rolling Contact Joints”

Raspberry Pi Files Paperwork With The London Stock Exchange

If you’re a regular visitor to the Raspberry Pi website and you have a sharp eye, you may have noticed during the last few days a new link has appeared in their footer. Labelled “Investor relations“, it holds links to the documents filed with the London Stock Exchange of their intention to float. In other words, it’s confirmation of their upcoming share offering.

It has been interesting to watch the growth of Raspberry Pi over the last twelve years, from cottage industry producing a thousand boards in China, to dominating the SBC market and launching their own successful silicon. Without either a crystal ball or a window into Eben Upton’s mind, we’re as unreliable as anyone else when it comes to divining their future path. But since we’re guessing that it will involve ever more complex silicon with a raspberry logo, it’s obvious that the float will give them the investment springboard they need.

For those of us who have been around for a long time this isn’t the first company in our corner of the technology world we’ve seen burn brightly. It’s not even the first from Cambridge. Appointing ourselves as pundits though, we’d say that Raspberry Pi’s path to this point has been surprisingly understated, based upon the strength of its products rather than hype, and while Eben is undoubtedly a well-known figure, not based upon a cult of personality. There is already a significant ecosystem around Raspberry Pi, we’d like to think that this move will only strengthen it. We may not be looking at the British Microsoft, but we don’t think we’re looking at another Sinclair either.

Hackaday Podcast Episode 271: Audio Delay In A Hose, Ribbon Cable Repair, And DIY Hacker Metrology

What did Hackaday Editors Elliot Williams and Al Williams find interesting on Hackaday this week? Well, honestly, all the posts, but they had to pick some to share with you in the podcast below. There’s news about SuperCon 2024, and failing insulin pumps. After a mystery sound, the guys jump into reverbing garden hoses, Z80s, and even ribbon cable repair.

Adaptive tech was big this week, with a braille reader for smartphones and an assistive knife handle. The quick hacks ranged from a typewriter that writes on toast to a professional-looking but homemade ham radio transceiver.

Check out the links below if you want to follow along, and as always, tell us what you think about this episode in the comments!

Download a file chock full of podcast here.

Continue reading “Hackaday Podcast Episode 271: Audio Delay In A Hose, Ribbon Cable Repair, And DIY Hacker Metrology”

Nature Vs Nurture In Beethoven’s Genome

When it comes to famous musicians, Beethoven is likely to hit most top ten charts. Researchers recently peered into his genome to see if they could predict his talent by DNA alone.

Using a previously-identified polygenetic index (PGI) for musical talent, which finds the propensity of certain genes to influence a given trait after a genome-wide association study (GWAS), the researchers were able to compare samples of Beethoven’s DNA to that of two separate population studies with known musical achievement data.

Much to the relief of those who saw Gattaca as a cautionary tale, the scientists found that Beethoven scored only around the tenth percentile for the ability to keep a beat according to his genetic markers. According to the researchers, using genetic markers to predict abilities of an individual can lead to incorrect conclusions, despite their usefulness for group level analyses.

Curious about more musical science? How about reconstructing “Another Brick in The Wall (Part I)” from brainwaves or building a Square Laser Harp?

This Week In Security: The Time Was Backdoored And Other Stories

Researchers at Eset have published a huge report on the Ebury malware/botnet (pdf), and one of the high profile targets of this campaign was part of the infrastructure. So on one hand, this isn’t new news, as the initial infection happened back in 2011, and was reported then. On the other hand, according to the new Eset report, four servers were infected, with two of them possibly compromised for as long as two years. That compromise apparently included credential stealing or password cracking.

The Ebury attackers seem to gain initial access through credential stuffing — a huge list of previously captured credentials are tried one at a time. However, once the malware has a foothold in the network, a combination of automated and manual steps are taken to move laterally. The most obvious is to grab any private SSH keys from that system, and try using them to access other machines on the local network. Ebury also replaces a system library that gets called as a part of sshd, This puts it in a position to quietly capture credentials.

For a targeted attack against a more important target, the people behind Ebury seem to go hands-on-keyboard, using techniques like Man-in-the-Middle attacks against SSH logins on the local network using ARP spoofing. In this case, someone was doing something nasty.

And that doesn’t even start to cover the actual payload. That’s nasty too, hooking into Apache to sniff for usernames and passwords in HTTP/S traffic, redirecting links to malicious sites, and more. And of course, the boring things you might expect, like sending spam, mining for Bitcoin, etc. Ebury isn’t exactly easy to notice, either, since it includes a rootkit module that hooks into system functions to hide itself. Thankfully there are a couple of ways to get a clean shell to look for the malware, like using systemd-run or launching a local shell on the system console.

And the multi-million dollar question: Who was behind this? Sadly we don’t know. A single arrest was made in 2014, and recovered files implicated another Russian citizen, but the latest work indicates this was yet another stolen identity. The rest of the actors behind Ebury have gone to great lengths to remain behind the curtain.

Continue reading “This Week In Security: The Time Was Backdoored And Other Stories”