California Looks To Compel IoT Security

There is a bill going through committee in the state of California which, if passed, would require a minium level of security for Internet of Things devices and then some. California SB 327 Information privacy: connected devices in its original form calls for connected device manufacturers to secure their devices, protect the information they collect or store, indicate when they are collecting it, get user approval before doing so, and be proactive in informing users of security updates:

require a manufacturer that sells or offers to sell a connected device, defined as any device, sensor, or other physical object that is capable of connecting to the Internet, directly or indirectly, or to another connected device, to equip the device with reasonable security features appropriate to the nature of the device and the information it may collect, contain, or transmit, that protect it from unauthorized access, destruction, use, modification, or disclosure, and to design the device to indicate when it is collecting information and to obtain consumer consent before it collects or transmits information, as specified. The bill would also require a person who sells or offers to sell a connected device to provide a short, plainly written notice of the connected device’s information collection functions at the point of sale, as specified. The bill would require a manufacturer of a connected device to provide direct notification of security patches and updates to a consumer who purchases the device.

This is just a proposal and will change as it finds its way through committee. Currently there a really no methods of punishment outlined, but recent comments have suggested individual prosecutors may have latitude to interpret these cases as they see fit. Additionally it has been suggested that the devices in question would be required to notify in some way the user when information is being collected. No language exists yet to clarify or set forth rules on this matter.

The security community has been sounding the cry of lackluster (often lack of) security on this growing army of IoT hardware and we’ve all known one day the government would get involved. Often this type of action requires a major event where people were in some way harmed either physically or financially that would push this issue. Denial of service attacks have already occurred and hijacking of webcams and such are commonplace. Perhaps what we saw in September finally pushed this into the limelight.

Any reasonable person can see the necessity of some basic level of security such as eliminating default passwords and ensuring the security of the data. The question raised here is whether or not the government can get this right. Hackaday has previously argued that this is a much deeper problem than is being addressed in this bill.

The size of California’s economy (relative to both the nation and the world) and the high concentration of tech companies make it likely that standards imposed if this law passes will have a large effect on devices in all markets.

Hackaday Prize Entry: Electric Variable Pitch Props

Barring the smallest manned airplanes, most aircraft that are pulled around by a prop have variable pitch propellers. The reason for this is simple efficiency. Internal combustion engines are most efficient at a specific RPM, and instead of giving the engine more gas to speed up, pilots can simply change the pitch of a propeller. With a gas powered engine, the mechanics and design of variable pitch propellers are well understood and haven’t really changed much in decades. Adding variable pitch props to something pulled around by an electric motor is another matter entirely. That’s what [Peter McCloud] is building for his entry to the Hackaday Prize, and it’s going into the coolest project imaginable.

This project is designed for a previous Hackaday Prize entry, and the only 2014 Hackaday Prize entry that hasn’t killed anyone yet. Goliath is a quadcopter powered by a lawnmower engine, and while it will hover in [Peter]’s test rig, he’s not getting the lift he expected and the control system needs work. There are two possible solutions to the problem of controlling the decapatron: an ingenious application of gimballed grid fins, or variable pitch rotors. [Peter] doesn’t know if either solution will work, so he’s working on both solutions in parallel.

[Peter]’s variable pitch rotor system is basically an electronic prop mount that connects directly to the driven shafts on his gas-powered quadcopter. To get power to the electronics, [Peter] is mounting permanent magnets to the quad’s frame, pulling power from coils in the rotor hub, and rectifying it to DC to drive the servos and electronics. Control of the props will be done wirelessly through an ESP32 microcontroller.

Variable pitch props are the standard for everything from puddle jumpers to acrobatic RC helis. In the quadcopter world, variable pitch props are at best a footnote. The MIT ACL lab has done something like this, but perhaps the best comparison to what [Peter] is doing is the incredible Stingray 500 quad. Flite Test did a great overview of this quad (YouTube), and it’s extremely similar to a future version of the Goliath. A big motor (in the Stingray’s case, a brushless motor) powers all the props via a belt, and the pitch of the props is controlled by four servos. The maneuverability of these variable pitch quads is unbelievable, but since the Goliath is so big and has so much mass, it’s doubtful [Peter] will be doing flips and rolls with his quads.

You can check out a video of [Peter]’s build below.

Continue reading “Hackaday Prize Entry: Electric Variable Pitch Props”

LEGO Liquid Handler And Big Biology

A career as a lab biologist can take many forms, but the general public seems to see it as a lone, lab-coated researcher sitting at a bench, setting up a series of in vitro experiments by hand in small tubes or streaking out a little yeast on an agar plate. That’s not inaccurate at all – all of us lab rats have done time with a manual pipettor while trying to keep track of which tube in the ice bucket gets which solution. It’s tedious stuff.

But because biology experiments generally scale well, and because more data often leads to better conclusions, life science processes can quickly grow beyond what can be handled manually. I’ve seen this time and again in my 25 years in science, from my crude grad school attempts to miniaturize my assays and automate data collection to the multi-million dollar robotic systems I built in my career in the pharmaceutical industry. Biology can get pretty big in a hurry. Continue reading “LEGO Liquid Handler And Big Biology”

VCF East: Enigma Machines In The Flesh

At the end of World War II, the Germans ordered all Enigma cipher machines destroyed. Around the same time, Churchill ordered all Enigma cipher machines destroyed. Add a few decades, neglect the efforts of Polish codebreakers, and make a movie about Alan Turing and an offensively historically incorrect love interest, and you have a mystique around these rare, innovative cipher machine.

At the Vintage Computer Festival East, I was privy to what is probably the largest collection of Enigma machines on the planet. The exhibit comes from [Tom] and [Dan Perera] of Enigma Museum. Right now, they’re they only place where you can go out and simply buy a real, wartime Enigma machine. The price? Well, there is a pair of million-dollar Apple I boards at VCF. The Enigmas go for about a fifth of an Apple I.

Continue reading “VCF East: Enigma Machines In The Flesh”

When The Grid Goes Dark

If you lived through the Y2K fiasco, you might remember a lot of hype with almost zero real-world ramifications in the end. As the calendar year flipped from 1999 to 2000 many forecast disastrous software bugs in machines controlling our banking and infrastructure. While this potential disaster didn’t quite live up to its expectations there was another major infrastructure problem, resulting in many blackouts in North America, that reared its head shortly after the new millennium began. While it may have seemed like Y2K was finally coming to fruition based on the amount of chaos that was caused, the actual cause of these blackouts was simply institutional problems with the power grid itself.

Continue reading “When The Grid Goes Dark”

Revealing Capcom’s Custom Silicon Security

Ask any security professional and they’ll tell you, when an attacker has hardware access it’s game over. You would think this easily applies to arcade games too — the very nature of placing the hardware in the wild means you’ve let all your secrets out. Capcom is the exception to this scenario. They developed their arcade boards to die with their secrets through a “suicide” system. All these decades later we’re beginning to get a clear look at the custom silicon that went into Capcom’s coin-op security.

Alas, this is a “part 1” article and like petulant children, we want all of our presents right now! But have patience, [Eduardo Cruz] over at ArcadeHacker is the storyteller you want to listen to on this topic. He is part of the team that figured out how to “de-suicide” the CP2 protections on old arcade games. We learned of that process last September when the guide was put out. [Eduardo] is now going through all the amazing things they learned while figuring out that process.

These machines — which had numerous titles like Super Street Fighter II and Marvel vs. Capcom — used battery-backed ram to store an encryption key. If someone tampered with the system the key would be lost and the code stored within undecipherable thanks to “two four-round Feistel ciphers with a 64-bit key”. The other scenario is that battery’s shelf life simply expires and the code is also lost. This was the real motivation behind the desuicide project.

An overview of the hardware shows that Capcom employed at least 11 types of custom silicon. As the board revisions became more eloquent, the number of chips dropped, but they continued to employ the trick of supplying each with battery power, hiding the actual location of the encryption key, and even the 68000 processor core itself. There is a 6-pin header that also suicides the boards; this has been a head-scratcher for those doing the reverse engineering. We assume it’s for an optional case-switch, a digital way to ensure you void the warranty for looking under the hood.

Thanks for walking us through this hardware [Eduardo], we can’t wait for the next installment in the series!

Recover Your Broken SD Card Selfies By Your Selfie

You may still have some luck getting those selfies off of your SD card, even if it will no longer mount on your computer. [HDD Recovery Services] shows us a process to directly access the NAND memory of a faulty micro SD card to recover those precious files you thought about backing up but never got around to.

On a Micro SD card you may have noticed there are two slightly longer pins than the rest. These are VSS and VCC pins. As long as they are not a dead short between the two the SD card controller isn’t completely trashed and we can go ahead and get into that little sucker. With a bit of know how — along with sandpaper, enameled wire, and a NAND reader — an image of your lost data can be recovered with a bit of patience and some good soldering skills.

Working your way down from a relatively high grit sand paper, slowly sand away the plastic on the underside of the SD card until you can clearly see the copper traces hidden away inside. Then solder your enameled wire onto the small solder pads to hook it up to a NAND reader and you should be able to read the data that was previously unreachable via conventional means. Of course you’re still going to need to make sense out of the NAND dump. That’s a topic for a different article.

If you ever find yourself in need of an SD card recovery tool you could always roll your own DIY NAND reader. We will likely give this process a try just to play round with the concept. Hopefully we’ll never need to do SD card recovery!

Continue reading “Recover Your Broken SD Card Selfies By Your Selfie”