Water beading up on a feather

PFAS: The Organofluorines Your Biochemist Warned You About

Sometimes it begins to feel like a tradition that a certain substance or group of substances become highly popular due to certain highly desirable chemical or physical properties, only for these chemicals then to go on to turn out to form a hazard to the biosphere, human life, or both. In the case of per- and polyfluoroalkyl substances (PFAS) it’s no different. Upon the discovery that a subgroup of these – the fluorosurfactants – have the ability to reduce water surface tension significantly more than other surfactants, they began to be used everywhere.

Today, fluorosurfactants are being used in everything from stain repellents to paint, make-up, and foam used by firefighters. In a recent study of 231 cosmetic products bought in the US and Canada (Whitehead et al., 2021), it was found that all of them contained PFAS, even when not listed on the packaging. The problematic part here is that PFASs are very stable, do not decay after disposal, and bioaccumulate in the body where they may have endocrine-disrupting effects.

Some areas have now at least partially banned PFAS, but the evidence for this is so far mixed. Let’s review what we do know at this point, and which alternatives we have to continuing to use these substances. Continue reading “PFAS: The Organofluorines Your Biochemist Warned You About”

Neuromorphic Computing: What Is It And Where Are We At?

For the last hundred or so years, collectively as humanity, we’ve been dreaming, thinking, writing, singing, and producing movies about a machine that could think, reason, and be intelligent in a similar way to us. The stories beginning with “Erewhon” published in 1872 by Sam Butler, Edgar Allan Poe’s “Maelzel’s Chess Player,” and the 1927 film “Metropolis” showed the idea that a machine could think and reason like a person. Not in magic or fantastical way. They drew from the automata of ancient Greece and Egypt and combined notions of philosophers such as Aristotle, Ramon Llull, Hobbes, and thousands of others.

Their notions of the human mind led them to believe that all rational thought could be expressed as algebra or logic. Later the arrival of circuits, computers, and Moore’s law led to continual speculation that human-level intelligence was just around the corner. Some have heralded it as the savior of humanity, where others portray a calamity as a second intelligent entity rises to crush the first (humans).

The flame of computerized artificial intelligence has brightly burned a few times before, such as in the 1950s, 1980s, and 2010s. Unfortunately, both prior AI booms have been followed by an “AI winter” that falls out of fashion for failing to deliver on expectations. This winter is often blamed on a lack of computer power, inadequate understanding of the brain, or hype and over-speculation. In the midst of our current AI summer, most AI researchers focus on using the steadily increasing computer power available to increase the depth of their neural nets. Despite their name, neural nets are inspired by the neurons in the brain and share only surface-level similarities.

Some researchers believe that human-level general intelligence can be achieved by simply adding more and more layers to these simplified convolutional systems fed by an ever-increasing trove of data. This point is backed up by the incredible things these networks can produce, and it gets a little better every year. However, despite what wonders deep neural nets produce, they still specialize and excel at just one thing. A superhuman Atari playing AI cannot make music or think about weather patterns without a human adding those capabilities. Furthermore, the quality of the input data dramatically impacts the quality of the net, and the ability to make an inference is limited, producing disappointing results in some domains. Some think that recurrent neural nets will never gain the sort of general intelligence and flexibility that our brains offer.

However, some researchers are trying to creating something more brainlike by, you guessed it, more closely emulates a brain. Given that we are in a golden age of computer architecture, now seems the time to create new hardware. This type of hardware is known as Neuromorphic hardware.

Continue reading “Neuromorphic Computing: What Is It And Where Are We At?”

Linux Fu: The Windows X11 Connection

The life of a Linux user can be a bit difficult. Sometimes you have to — or want to — run Windows. Why Windows? Sometimes you have a work computer or a laptop that Linux doesn’t support well. Or it might be software. Although there are plenty of programs that can edit, say, Word documents, there’s always that one document that doesn’t quite translate correctly. Things like videoconferencing software sometimes works on Linux but might have fewer features.

So what do you do? You can dual boot, of course, but that’s not very handy. You can run Windows in a virtual machine if you have enough horsepower. There’s also Wine, but that often has its own set of problems with features and stability of complex programs. However, recent versions of Windows provide the Windows Subsystem for Linux (WSL).

With WSL, you can have most of what you like about Linux inside your Windows session. You just have to know how to set it up, and I’m going to show you one way that works for me with reasonably stable versions of Windows 10. Continue reading “Linux Fu: The Windows X11 Connection”

Wreck Your Mail Before You Check Your Mail

Every five years or so, I think it’s time to review my e-mail flow. (Oh no!) I run my own mail server, and you should too, but this means that I get to figure out managing and searching and archiving and indexing it all by myself. (Yippee!)

And I’ll be honest — sometimes I’m a bit of a luddite. I actually, literally have been using Mutt, or its derivative NeoMutt for maybe fifteen years, after a decade or so of mouse-intensive graphical mail readers. If e-mail is about typing words, and maybe attaching the occasional image, nothing beats a straight-up text interface. But what a lot of these simple mail clients lack is good search. So I decided to take that seriously.

Notmuch is essentially an e-mail database. It’s an e-mail searcher, tagger, and indexer, but it’s not much else. The nice thing is that it’s brutally fast. Searches and extraction of tagged subsets are faster than sending the same data back and forth to the Big G, and I have a ton more flexibility. It’s awesome. Of course good ol’ Mutt can work with Notmuch. Everything can. It’s Linux/UNIX. Continue reading “Wreck Your Mail Before You Check Your Mail”

Ask Hackaday: How Is The Chip Shortage Affecting You?

Some friends of mine are designing a new board around the STM32F103 microcontroller, the commodity ARM chip that you’ll find in numerous projects and on plenty of development boards. When the time came to order the parts for the prototype, they were surprised to find that the usual stockholders don’t have any of these chips in stock, and more surprisingly, even the Chinese pin-compatible clones couldn’t be found. The astute among you may by now have guessed that the culprit behind such a commodity part’s curious lack of availability lies in the global semiconductor shortage.

A perfect storm of political unintended consequences, climate-related crises throttling Taiwanese chip foundries and shutting down those in the USA, and faulty pandemic recovery planning, has left the chipmakers unable to keep up with the demand from industries on the rebound from their COVID-induced slump. Particularly mentioned in this context is the automotive industry, which has seen plants closing for lack of chips and even models ditching digital dashboards for their analogue predecessors.

Chips on order everywhere on the Mouser website.
Chips on order everywhere on the Mouser website.

The fall-out from all this drama in the world’s car factories has filtered down through all levels that depend upon semiconductors; as the carmakers bag every scrap of chip fab capacity that they can, so in turn have other chip customers scrambled to keep their own supply lines in place. A quick scan for microcontrollers through distributors like Mouser or Digi-Key finds pages and pages of lines on back-order or out of stock, with those lines still available being largely either for niche applications, unusual package options, or from extremely outdated product lines. The chances of scoring your chosen chip seem remote and most designers would probably baulk at trying to redesign around an ancient 8-bit part from the 1990s, so what’s to be done?

Such things typically involve commercially sensitive information so we understand not all readers will be able to respond, but we’d like to ask the question: how has the semiconductor shortage affected you? We’ve heard tales of unusual choices being made to ship a product with any microcontroller that works, of hugely overpowered chips replacing commodity devices, and even of specialist systems-on-chip being drafted in to fill the gap. In a few years maybe we’ll feature a teardown whose author wonders why a Bluetooth SoC is present without using the radio functions and with a 50R resistor replacing the antenna, and we’ll recognise it as a desperate measure from an engineer caught up in 2021’s chip shortage.

So tell us your tales from the coalface in the comments below. Are you that desperate engineer scouring the distributors’ stock lists for any microcontroller you can find, or has your chosen device remained in production? Whatever your experience we’d like to know what the real state of the semiconductor market is, so over to you!

This Week In Security: Morse Code Malware, Literal And Figurative Watering Holes, And More

Code obfuscation has been around for a long time. The obfuscated C contest first ran way back in 1984, but there are examples of natural language obfuscation from way earlier in history. Namely Cockney rhyming slang, like saying “Lady from Bristol” instead of “pistol” or “lump of lead” instead of “head”. It’s speculated that Cockney was originally used to allow the criminal class to have conversations without tipping off police.

Code obfuscation in malware serves a similar purpose — hiding from security devices and applications. There are known code snippets and blacklisted IP addresses that anti-malware software scans for. If that known bad code can be successfully obfuscated, it can avoid detection. This is a bit of a constant game of cat-and-mouse, as the deobfuscation code itself eventually makes the blacklist. This leads to new obfuscation techniques, sometimes quite off the wall. Well this week, I found a humdinger of an oddball approach. Morse Code.

Yep, dots and dashes. The whole attack goes like this. You receive an email, claiming to be an invoice. It’s a .xlsx.hTML file. If you don’t notice the odd file extension, and actually let it open, you’re treated to a web page. The source of that page is a very minimal JS script that consists of a morse code decoder, and a payload encoded in Morse. In this case, the payload is simply a pair of external scripts that ask for an Office 365 login. The novel aspect of this is definitely the Morse Code. Yes, our own [Danie] covered this earlier this week, but it was too good not to mention here. Continue reading “This Week In Security: Morse Code Malware, Literal And Figurative Watering Holes, And More”

The Story Of A Secret Underground Parisian Society

Deep in the heart of Paris, a series of underground tunnels snakes across the city. They cross into unkept public spaces from centuries ago that have since vanished from collective memory – abandoned basements, catacombs, and subways hundreds of miles apart.

Only a few groups still traverse these subterranean streets. One that came into public view a few years ago, Les UX (Urban eXperiment), has since claimed several refurbished developments, including restoring the long neglected Pantheon clock and building an underground cinema, complete with a bar and restaurant.

While the streets of Paris are tame during the day, at night is when Les UX really comes alive. A typical night might involve hiding in the shadows away from potential authorities roaming the streets, descending into the tunnels through a grate in the road, and carrying materials to an agreed upon drop off location. Other nights might involve wedging and climbing over pipes and ladders, following the routes into the basements of buildings left unguarded.
Continue reading “The Story Of A Secret Underground Parisian Society”