PC Floppy Copy Protection: Electronic Arts Interlock

Continuing the series on floppy copy protection, [GloriousCow] examines Electronic Arts’ Interlock system. This was used from 1984 to 1987 for at least fourteen titles released on both 5.25″ and 3.5″ floppies. Although not officially advertised, in the duplication mark sector the string ELECTRONIC ARTS IBM INTERLOCK. appears, hence the name. Compared to other copy protection systems like Softguard Superlok this Interlock protection poses a number of somewhat extreme measures to enforce the copy protection.

The disk surface of Side #0 of the 1984 mystery-adventure title, Murder on the Zinderneuf (Credit: GloriousCow)
The disk surface of Side #0 of the 1984 mystery-adventure title, Murder on the Zinderneuf (Credit: GloriousCow)

Other than the typical issues that come with copying so-called ‘booter’ floppies that do not use DOS but boot directly into the game, the protection track with Interlock is rather easy to spot, as seen on the right. It’s the track that lights up like a Christmas tree with meta data, consisting out of non-consecutive sector IDs. Of note is the use of ‘deleted’ sector data marks (DDAM), which is a rarity in normal usage. Along with the other peculiarities of this track it requires an exact query-response from the disk to be accepted as genuine, including timings. This meant that trying to boot a straight dump of the magnetic surface and trying to run it in an emulated system failed to work.

Reverse-engineering Interlock starts with the stage 0 bootloader from the first sector, which actually patches the End-of-Track (EOT) table parameter to make the ridiculous number of sectors on the special track work. The bootloader then loads a logo, which is the last thing you’ll see if your copy is imperfect.

Decrypting the second stage bootloader required a bit of disassembly and reverse-engineering, which uncovered some measures against crackers. While the actual process of reverse-engineering and the uncovered details of Interlock are far too complex to summarize here, after many hours and the final victory over the handling of an intentional bad CRC the target game (Murder on the Zinderneuf from 1984) finally loaded in the emulator.

After confirming the process with a few other titles, it seems that Interlock is mostly broken, with the DOS-based title ArcticFox (1987) the last hurdle to clear. We just hope that [GloriousCow] is safe at this point from EA’s tame lawyers.

Interested in more copy protection deep dives? Check out the work [GloriousCow] has already done on investigating Softguard’s Superlok and Formaster’s Copy-Lock.

Apple May Break Into The Hearing Aid Industry

When the entry of a tech giant such as Apple into a market represents its liberation from exploitation, that market must be really broken, yet the reported FDA approval of the hearing aid feature in the latest AirPod earbuds seems to represent just that. The digital hearing aid business is notorious for its sharp sales practices and eye-watering prices, so for all Apple’s own notoriety the news might actually represent a leap forward for consumers in that sector. We have to ask though, if Apple of all people are now the Good Guys, where has the world of electronics gone so badly wrong?

Your grandparents decades ago would have had a simple analogue hearing aid if they had one, usually a small transistor circuit and perhaps with some kind of analogue filtering.  Digital aids with DSP algorithms to pick out speech arrived some time in the 1990s, and from there evolved a market in which their high prices increasingly didn’t match the cost of the technology or software involved. At least in the UK, they were sold aggressively to older people as less cumbersome or better than the National Health Service aids, and if you had an older person in the family it was routine to see pages and pages of targeted junk mail offering dubious financial schemes to pay for them.

The question then, given that a modern hearing aid has a relatively cheap microcontroller and DSP at its heart, why has the open source community not risen to the challenge? The answer is that they have, though the Tympan seems an over-expensive trinket for what it is and the LoCHAid and Open Speech Platform seem to have sunk without trace. Can we do better?

Header: Gregory Varnum, CC BY-SA 4.0 .

The Rise Of Self-Cleaning, Cat-Killing Litter Boxes

Machines that automate the various tedious tasks that come with being a servant in a cat’s household — like feeding and cleaning Mr. Fluffles’ litter box — are generally a godsend, as they ensure a happy cat and a happy human. That is, unless said litter box-cleaning robot kills said cat. That’s the gruesome topic that [Philip Bloom], also known as the bloke of the One Man Five Cats channel on YouTube, decided to investigate after coming across a report about a certain Amazon-bought unit.

The theory of a self-cleaning litter box: a happy Mr. Fluffles.
The theory of a self-cleaning litter box: a happy Mr. Fluffles.

Although he was unable to get the (generic & often rebranded) unit off Amazon UK, he did get it via AliExpress for £165 + £80 shipping. Although this version lacks the cute ears of other variants, it’s still effectively the same unit, with the same moving components and mechanism. An initial test with a cat plushie gave the result that can be observed in the above image, where the inner part with the opening will move upwards, regardless of whether a cat is currently poking through said opening. Once the victim is stuck, there is no obvious way to free the trapped critter, which has already led to the death of a number of cats.

The other self-cleaning litter boxes which [Philip] owns have a number of safety features, including a weight sensor, an infrared sensor above the opening to detect nearby critters, a top that will pop off rather than trap a critter, as well as a pinch sensor. During a test with his own hand, [Philip] managed to get injured, and following a banana test, he had a nice banana smoothie.

What takes the cake here is that after [Philip] connected the mobile app for the litter box, he found that there was a firmware update that seems to actually change the machine to use the pinch and infrared sensors that do exist in the litter box, but which clearly were not used properly or at all with the shipped firmware. This means that anyone who buys any of these self-cleaning litter boxes and does not update the firmware runs the significant risk of losing their pet(s) in a gruesome incident. In the video a number of such tragic deaths are covered, which can be rather distressing for any cat lover.

Of note here is that even with the improved firmware, any issue with the sensors will still inevitably lead to the tragic death of Mr. Fluffles. If you do want to obtain a self-cleaning litter box, make sure to for example get one of [Philip]’s recommendations which come with a paw stamp of approval from his own precious fluff balls, rather than a random unit off Amazon or AliExpress.

Continue reading “The Rise Of Self-Cleaning, Cat-Killing Litter Boxes”

A person examines a diamond with a loupe.

We’ll Take DIY Diamond Making For $200,000

They say you can buy anything on the Internet if you know the right places to go, and apparently if you’re in the mood to make diamonds, then Alibaba is the spot. You even have your choice of high-pressure, high-temperature (HPHT) machine for $200,000, or a chemical vapor deposition (CVD) version, which costs more than twice as much. Here’s a bit more about how each process works.

A sea of HPHT diamond-making machines.
A sea of HPHT machines. Image via Alibaba

Of course, you’ll need way more than just the machine and a power outlet. Additional resources are a must, and some expertise would go a long way. Even so, you end up with raw diamonds that need to be processed in order to become gems or industrial components.

For HPHT, you’d also need a bunch of good graphite, catalysts such as iron and cobalt, and precise control systems for temperature and pressure, none of which are included as a kit with the machine.

For CVD, you’d need methane and hydrogen gases, and precise control of microwaves or hot filaments. In either case, you’re not getting anywhere without diamond seed crystals.

Right now, the idea of Joe Hacker making diamonds in his garage seems about as far off as home 3D printing did in about 1985. But we got there, didn’t we? Hey, it’s a thought.

Main and thumbnail images via Unsplash

The Universe As We Know It May End Sooner Than Expected

The 'Sombrero Potential' as seen with the Higgs mechanism.
The ‘Sombrero Potential’ as seen with the Higgs mechanism.

One of the exciting aspects of some fields of physics is that they involve calculating the expected time until the Universe ends or experiences fundamental shifts that would render most if not all of the ‘laws of physics’ invalid. Within the Standard Model (SM), the false vacuum state is one such aspect, as it implies that the Universe’s quantum fields that determine macrolevel effects like mass can shift through quantum field decay into a lower, more stable state. One such field is the Higgs field, which according to a team of researchers may decay sooner than we had previously assumed.

As the Higgs field (through the Higgs boson) is responsible for giving particles mass, it’s not hard to imagine the chaos that would ensue if part of the Higgs field were to decay and cause a spherical ripple effect throughout the Universe. Particle masses would change, along with all associated physics, as suddenly the lower Higgs field state means that everything has significantly more mass. To say that it would shake up the Universe would an understatement.

Of course, this expected time-to-decay has only shifted from 10794 years to 10790 years with the corrections to the  previous calculations as provided in the paper by [Pietro Baratella] and colleagues, and they also refer to it as ‘slightly shorter’. A sidenote here is also that the electroweak vacuum’s decay is part of the imperfect SM, which much like the false vacuum hypothesis are part of these models, and not based on clear empirical evidence (yet).

Raspberry Pi Becomes Secure VPN Router

OpenWRT is a powerful piece of open-source software that can turn plenty of computers into highly configurable and capable routers. That amount of versatility comes at a cost, though; OpenWRT can be difficult to configure outside of the most generic use cases. [Paul] generally agrees with this sentiment and his latest project seeks to solve a single use case for routing network traffic, with a Raspberry Pi configured to act as a secure VPN-enabled router configurable with a smartphone.

The project is called PiFi and, while it’s a much more straightforward piece of software to configure, at its core it is still running OpenWRT. The smartphone app allows most users to abstract away most of the things about OpenWRT that can be tricky while power users can still get under the hood if they need to. There’s built-in support for Wireguard-based VPNs as well which will automatically route all traffic through your VPN of choice. And, since no Pi router is complete without some amount of ad blocking, this router can also take care of removing most ads as well in a similar way that the popular Pi-hole does. More details can be found on the project’s GitHub page.

This router has a few other tricks up its sleeve as well. There’s network-attached storage (NAS) built in , with the ability to use the free space on the Pi’s microSD card or a USB flash drive. It also has support for Ethernet and AC1300 wireless adapters which generally have much higher speeds than the built-in WiFi on a Raspberry Pi. It would be a great way to build a guest network, a secure WiFi hotspot when traveling, or possibly even as a home router provided that the home isn’t too big or the limited coverage problem can be solved in some other way. If you’re looking for something that packs a little more punch for your home, take a look at this guide to building a pfSense router from the ground up.

No Z80? No Problem!

Earlier this year Zilog stopped production of the classic 40-pin DIP Z80 microprocessor, a move that brought a tear to the eye of retro computing enthusiasts everywhere. This chip had a huge influence on both desktop and embedded computing that lingers to this day, but it’s fair to say that the market for it has dwindled. If you have a retrocomputer then, what’s to be done? If you’re [Dean Netherton], you create a processor card for the popular RC2014 retrocomputer backplane, carrying the eZ80, a successor chip that’s still in production.

The eZ80 can be thought of as a Z80 system-on-chip, with microcontroller-style peripherals, RAM, and Flash memory on board. It’s much faster than the original and can address a relatively huge 16MB of memory. For this board, he’s put the chip on a processor daughterboard that plugs into a CPU card with a set of latches to drive the slower RC2014 bus. We can’t help drawing analogies with some of the 16-bit upgrades to 8-bit platforms back in the day, which used similar tactics.

So this won’t save the Z80, but it might well give a new dimension to Z80 hacking. Meanwhile, we’re sure there remain enough of the 40-pin chips out there to keep hackers going for many years to come if you prefer the original. Meanwhile, read our coverage of the end-of-life announcement, even roll your own silicon if you want., or learn about the man who started it all, Federico Faggin.