Do-It-Yourself Scratch Cards

The lottery is to some a potential bonanza, to others a tax on the poor and the stupid. The only sure-fire way to win a huge fortune in the lottery does remain to start with an even bigger fortune. Nevertheless, scratch-off tickets are the entertainment that keep our roads paved or something. [Emily] over on Instructables came up with a way to create your own scratch-off cards, and the process is fascinating.

For [Emily]’s scratchers, there are five layers of printing on the front of the card. From back to front, they are the gray ‘security confusion layer’ printed with a letterpress, black printing for the symbols and prize amounts, also printed on a letterpress, a scratch-off surface placed onto the card with a Silhouette cutter, the actual graphics on the card, printed in blue with a letterpress, and a final layer of clear varnish applied via screen printing. There’s a lot that goes into this, but the most interesting (and unique) layer is the actual scratch-off layer. You can just buy that, ready to cut on a desktop vinyl cutter. Who knew.

After several days worth of work, [Emily] had a custom-made scratcher, ready to sent out in the mail as a Christmas card. It’s great work, and from the video below we can see this is remarkably similar to a real scratch-off lottery ticket. Not that any of us would know what scratching a lottery ticket would actually be like; of course that’s only for the gullible out there, and of course none of us are like that, oh no. You can check out a video of the scratch-off being scratched off below.

Continue reading “Do-It-Yourself Scratch Cards”

Become The Next Fabergé With A Rose Engine Lathe

The basics of a skill may take a long time to master, but there is always something else to learn about regardless of the craft. Building a piece of fine furniture out of hardwood or being able to weld together a bicycle from scratch are all impressive feats, but there are fine details that you’ll only learn about once you get to this level of craftsmanship. One such tool that will help with these intricacies is known as the rose engine lathe.

This tool is based on an average lathe, typically used for creating round things out of stock which is not round. A rose engine lathe has a set of cams on it as well which allow the lathe to create intricate patterns in the material it’s working with, such as flower type patterns or intricate spirals. One of the most famous implementations of this method was on the Fabergé eggs. While this might make it sound overly complex, this how-to actually shows you how to build your own rose engine lathe out of a piece of MDF and a large number of miscellaneous pieces of hardware.

We recently featured another build which performs a similar function called engine turning. While similar, this is the method responsible for creating overlapping spirals on a piece of metal. Either way, both projects are sure to spice up your metal or woodworking endeavors.

Thanks to [PWalsh] for the tip!

Proposed NASA Budget Signals Changes To Space Launch System

The White House’s proposed budget for 2020 is out, and with it comes cuts to NASA. The most important item of note in the proposed budget is a delay of the Space Launch System, the SLS, a super-heavy lifting launch vehicle designed for single use. The proposed delay would defer work on the enhanced version of the SLS, the Block 1B with the Exploration Upper Stage.

The current plans for the Space Launch System include a flight using NASA’s Orion spacecraft in June 2020 for a flight around the moon. This uncrewed flight, Exploration Mission 1, or EM-1, would use the SLS Block 1 Crew rocket. A later flight, EM-2, would fly a crewed Orion capsule around the moon in 2022. A third proposed flight in 2023 would send the Europa Clipper to Jupiter. The proposed 2020 budget puts these flights in jeopardy.

Continue reading “Proposed NASA Budget Signals Changes To Space Launch System”

3D-Printed Rotary Dial Keypad Is Wonderfully Useless

Right up front, let us stipulate that we are not making fun of this project. Even its maker admits that it has no practical purpose. But this 3D-printed Commodore-style rotary dial keypad fails to be practical on so many levels that it’s worth celebrating.

And indeed, celebrating deprecated technology appears to be what [Jan Derogee] had in mind with this build. Rotary dials were not long ago the only way to place a call, and the last time we checked, pulse dialing was still supported by some telephone central office switchgear. Which brings us to the first failure: with millions of rotary dial phones available, why build one from scratch? [Jan] chalks it up to respect for the old tech, but in any case, the 3D-printed dial is a pretty good replica of the real thing. Granted, no real dial used a servo motor to return the dial to the resting state, but the 3D-printed springs [Jan] tried all returned the dial instantly, instead of the stately spin back that resulted in 10 pulses per second. And why this has been done up VIC-20 style and used as a keypad for Commodore computers? Beats us. It had to be used for something. That the software for the C-64  generates DTMF tones corresponding to the number dialed only adds to the wonderful weirdness of this. Check out the video below.

We’ll hand it to [Jan], he has a unique way of looking at the world, especially when it comes to clocks. We really enjoyed his persistence of phosphorescence clock, and his screw-driven linear clock turns the standard timekeeping UI on its head.

Continue reading “3D-Printed Rotary Dial Keypad Is Wonderfully Useless”

Spoiler, Use-After-Free, And Ghidra: This Week In Computer Security

The past few days have been busy if you’re trying to keep up with the pace of computer security news. Between a serious Chromium bug that’s actively being exploited on Windows 7 systems, the NSA releasing one of their tools as an open source project, and a new Spectre-like speculative execution flaw in Intel processors, there’s a lot to digest.
Continue reading “Spoiler, Use-After-Free, And Ghidra: This Week In Computer Security”

Google+ Communities Won’t Go Down Without A Fight

Google+ is dead. Granted people have been saying that much for years now, but this time it’s really true. As of April, Google’s social media experiment will officially go the way of Reader, Buzz, Wave, Notebook, and all the other products that the search giant decided they were no longer interested in maintaining. Unfortunately in the case of Google+, the shutdown means losing a lot of valuable content that was buried in the “Communities” section of the service. Or at least that’s what we all thought.

Thanks to the efforts of [Michael Johnson], many of those Google+ communities now have a second chance at life. After taking a deep dive into the data from his own personal Google+ account, he realized it should be possible to write some code that would allow pulling the content out of Google’s service and transplanting it into a Discourse instance. With some more work, he was even able to figure out how to preserve the ownership of the comments and posts. This is no simple web archive; you can actually log into Discourse with your Google account and have all of your old content attributed to you. Continue reading “Google+ Communities Won’t Go Down Without A Fight”

Hackers Turn Hard Drive Into Microphone That Can Listen In On Your Computer’s Fan Whine

As reported by The Register, hackers can now listen in on conversations happening around your computer by turning a hard drive into a microphone. There are caveats: the hack only works if these conversations are twice as loud as a blender, or about as loud as a lawn mower. In short, no one talks that loud, move along, nothing to see here.

The attack is to be presented at the 2019 IEEE Symposium on Security and Privacy, and describes the attack as a modification of the firmware on a disk drive to read the Position Error Signal that keeps read/write heads in the optimal position. This PES is affected by air pressure, and if something is affected by air pressure, you’ve got a microphone. In this case, it’s a terrible microphone that’s mechanically coupled to a machine that has a lot of vibrations including the spinning platter and a bunch of fans inside the computer. This is an academic exercise, and not a real attack, and either way to exfiltrate this data you need to root the computer the hard drive is attached to. It’s attacks all the way down.

The limiting factor in this attack is that it requires a very loud conversation to be held near a hard drive. To record speech, the researchers had to pump up the volume to 85 dBA, or about the same volume as a blender crushing some ice. Recording music through this microphone so that Shazam could identify the track meant playing the track back at 90 dBA, or about the same volume as a lawnmower. Basically, this isn’t happening.

The interesting bit of this hack isn’t using a hard drive as a microphone. It’s modifying the firmware on a hard drive to do something. We’ve seen some hacks like this before, but the latest public literature on hard drive firmware hacking is years old. If you’ve got a tip on how to hack hard drives, even if it’s to do something that’s horribly impractical, we’d love to see it.