ICANN Board Withhold Consent For .ORG Deal

Over the past few months there has been a battle waging in the world of domain names; the overseeing body ICANN had hatched a plan to transfer the entire .org registry to a private company, to significant opposition from .org domain holders, concerned citizens, and the Electronic Frontier Foundation. Part of the process before the deadline for handover on the 4th of May was a due dilligence process during which the ICANN board would review submissions related to the deal, and after completing that task the board have witheld their consent for it to go ahead. As you might expect the EFF are declaring a victory, but they also make the point that one of the reasons the ICANN board rejected the deal was a potential risk of a debt liability for the organisation.

It’s tempting to frame this as a rare victory for the Little Guy in the face of The Man, but the reality is probably more nuanced. When the deal was hatched the world had not yet come to terms with the COVID-19 pandemic, meaning that the thought of a post-virus economic slump would not yet have been on their minds. It’s thus not unexpected that the ICANN board would think about the financial aspects of it as well as the many objections, because in a time of economic pain the possibility of it going sour would be significantly increased. The future of the .org and other registries should remain a concern to internet users, because after all, this is not the first time such a thing has happened.

Old Laptop Gets New Lease On Life With Raspberry Pi

It seems not a day goes by that we don’t see somebody cramming a Raspberry Pi into some unwilling piece of consumer electronics. But despite being a pretty obvious application for the diminutive ARM board, we don’t often see it installed in an actual computer. Which makes this very clean Raspberry Pi laptop conversion by [Sherbethead2010] all the more interesting.

The first step involved taking a Dremel to the Dell’s chassis and essentially leveling out the entire internal volume. The only component that got reused was the fan, and even that appears to be relocated, so all the mounting posts were just standing in the way of progress.

[Sherbethead2010] mounted the Raspberry Pi towards the rear of the case so its USB and Ethernet ports would be available from the outside, and installed a driver board for the original Phillips LP171 LCD panel in the old drive bay. Power is provided by two custom 18650 battery packs connected to dedicated buck converters, along with an onboard charge controller to safely top them off.

Rather than trying to adapt the original input devices, [Sherbethead2010] decided to take the easy route and installed a Rii K22 wireless keyboard with integrated track pad into the top of the laptop. It turned out to be an almost perfect fit, and beyond the keys being slightly off-center, at first glance it looks like it could be stock.

The last time we saw a Raspberry Pi so well integrated into a real laptop, it was to create a functioning version of one of the props from Hackers. While that build was a joy for its own reasons, it’s hard not to be impressed with how unassuming this computer looks after all the work that’s been done to it.

Any Remote Can Be A Universal Remote

Everyone has a stack of old infra-red remote controllers lying around, for devices that have long since shuffled off this mortal coil. Containing little more than an application-specific encoder chip, keyboard, and IR LED, they’re of little use unless you happen to have another device that uses the same encoding scheme. For [RiYa] though they represent an opportunity, to be repurposed into controllers for other devices. How? Hijack the bitstream with an ATtiny13 microcontroller, re-encode it, and send it out afresh into the ether from the LED. It’s a gloriously simple solution which we can’t help applauding, and has the potential to cheaply replace all those universal remotes.

The ATtiny itself along with a buffer to drive the LED is mounted on a small breakout board and concealed within the shell of the remote. We don’t learn much about the power supply arrangement, but we’d expect the ATtiny to be on its most power-sipping behaviour as anything which would shorten the battery life of a remote would be unlikely to be popular with a couch potato forced to change AA cells every few weeks. There’s a plan for a learning mode to make it more like a commercial universal remote, but for now the translation is hard coded.

Of course, should you lack a handy old remote to play with, you can always try a smartphone.

Using An FPGA To Glitch The Olimex LPC-P1343

After trying out hardware hacking using an FPGA to interface with target hardware, [Grazfather] was inspired to try using the iCEBreaker (one of the many hobbyist FPGAs to have recently flooded the market) to build a UART-controllable glitcher for the Olimex LPC-P1343.

FPGA Modules (The cmd module intercepts what the host computer sends over UART, the resetter holds the reset line until the target is reset, the delay starts counting on reset and waits for a configured number of cycles before sending its signal, the trigger waits for the delay to finish before telling the pulse module to send a pulse, and the pulse works similar to the delay module and outputs to the power multiplexer.)

When the target board boots up, the bootROM reads the flash and determines whether the UART goes to a shell and if the shell can be used to read out the flash. This is meant for developing firmware and debugging it in the bootloader, only flashing a version when the firmware is production-ready. The vulnerability is that only a specific value read from address 0x2FC and the state of a few pins can lock the bootloader in the expected way, and any other value at the address causes the bootROM to consider the device unlocked. Essentially, the mechanism is the opposite of how a lock ought to work.

The goal is to get the CPU to misread the flash at the precise moment it is meant to be reading the specific value, then jumping to the bootloader in the unlocked state. The FPGA can be used as a tool between the host machine and target board, communicating via UART. The FGPA can support configuring the delay between resetting the target board and pulsing a ‘glitch voltage’, as well as resetting the target board and activating the glitch. The primary reasons for using the FPGA over a different microcontroller are that the FPGA allows for precise timing (83.3ns precision) and removes worries about jitters (a Raspberry Pi might have side effects from OS scheduling and other processes and microcontrollers might have interrupts messing up the timing).

The logic analyzer view

To simulate the various modules, [Grazfather] used Icarus Verilog as well as GTKWave to observe the waveforms generated. A separate logic analyzer observes the effects on real hardware.

With enough time, it is possible to brute force any combination of delay and width until you get a dump of the flash you’re not meant to read. You can check out how the width of the pulse gets wider until the max, when the delay is incremented and the width values are tried again.

Continue reading “Using An FPGA To Glitch The Olimex LPC-P1343”

The United States Air Force Would Like You To Hack Into Their Satellite

The Air Force is again holding its annual “Space Security Challenge” where they invite you to hack into a satellite to test their cybersecurity measures. There are actually two events. In the first one, $150,000 is up for grabs in ten prizes and the final event offers a $100,000 purse divided among the three top participants (first place takes $50,000).

Before you get too excited, you or your team has to first qualify online. The qualification event will be over two days starting May 22. The qualifying event is set up a bit like the TV show Jeopardy. There is a board with categories. When a team solves a challenge in a category it receives a flag that is worth points as well as getting to unlock the next challenge. Once a challenge is unlocked however, any team could potentially work on it. There are more rules, but that’s the gist of it. At the end of the event, the judges will contact the top 10 teams who will then each have to submit a technical paper.

Continue reading “The United States Air Force Would Like You To Hack Into Their Satellite”

DJ Scratches Out Club Music With Tape, Not Turntables

It goes without saying that not everyone has the same taste in music, and what sounds amazing to one person will be the next person’s noise. But even if you’re not into hip-hop and the whole DJ scene, it’s hard not to be impressed with what [Jeremy Bell] has done here with his homemade tape loop “scratching” rig.

Most people have probably seen a DJ in a club using dual turntables to scratch or “scrub” a vinyl record back and forth to create effects that add to the music. Part musician and part performance artist, DJs and “turntablists” tend to be real crowd-pleasers. [Jeremy]’s “ScrubBoard” uses a loop of 2″ audiotape, the kind recording studios once used for multitrack recordings. The loop is driven across a wide platen by a motor with a foot pedal control, which he can use to quickly reverse the direction of travel and control the speed of the tape. A pair of playback heads are wired into the amplifier and can be positioned anywhere on the sometimes moving, sometimes stationary tape. The sounds he can create are rhythmic, percussive, and at times frenetic, but they’re always interesting. Check it out in action in the video below.

This version of the ScrubBoard is far from the first [Jeremy] has built. You may recall his first prototype from our coverage in 2014; that one used just a few feet of 1/4″ tape fixed to a board. He was still able to get some great sounds from it, but this version should really change things for him. 

Continue reading “DJ Scratches Out Club Music With Tape, Not Turntables”

Building A New RF Remote From Scratch

We’ve seen no shortage of projects that use the ESP8266 or ESP32 to add “smart” features to existing home appliances, often by pairing the microcontroller with a radio or IR transmitter. If your device has an existing remote, integrating it into a custom home automation system is often just a matter of getting a few cheap modular components and writing some simple code to glue it all together.

But what if the appliance you want to control doesn’t use a common frequency? That’s a question that [eigma] recently had to answer after finding the remote control for the bedroom ceiling fan was operating at a somewhat unusual 304 MHz. Something like the MAX1472 could probably have been tuned to this frequency, but the chip doesn’t seem to be available in a turn-key module as the popular 315 MHz transmitters are.

There were a few possible options, including using a software defined radio (SDR), but [eigma] didn’t want to spend a fortune on this project or wait months for parts to get shipped from overseas. The most straightforward solution was to design a custom transmitter tuned to the proper frequency using discrete components; something of a dark art to those of us who’ve been spoiled by the high availability of modular components.

What follows is an fascinating look at the design, testing, and troubleshooting of a truly scratch-built transmitter. You won’t find any ICs here, the carrier signal is generated with just a transistor, some carefully measured pieces of wire, and a handful of passive components. By modulating the signal with an ESP32, [eigma] successfully makes the oddball ceiling fan an honorary member of the Internet of Things.

The write-up that [eigma] has done is an absolutely invaluable resource if you ever find yourself in need of rolling a bespoke transmitter. It easily ranks among some of the most informative radio reverse engineering work we’ve covered, and you’d be wise to file this one away for future reference. That said, most of the newer hardware you’re going to run into will probably be utilizing a widely-supported frequency like 433 MHz.