Mostly Non-Volatile Memory With Supercapacitors

Back in the days of old, computers used EPROMs to store their most vital data – usually character maps and a BASIC interpreter. The nature of these EPROMs meant you could write to them easily enough, but erasing them meant putting them under an ultraviolet light. Times have changed and now we have EEPROMs, which can be erased electronically, and Flash, the latest and greatest technology that would by any other name be called an EEPROM. [Nicholas] wanted an alternative to these 27xx-series EPROMs, and found his answer in supercapacitors.

[Nick]’s creation is a mostly non-volatile memory built around an old 62256 32k SRAM. SRAM is completely unlike EPROMs or Flash, in that it requires power to keep all its bits in memory. Capacitor technology has improved dramatically since the 1980s, and by using a supercap and one of these RAM chips, [Nick] has created a substitute for a 27-series EPROM that keeps all its memory alive for days at a time.

The circuit requires a small bit of electronics tucked between the EPROM socket and the SRAM chip; just enough to turn the 12 Volts coming from the EPROM programming pin to the 5 Volts expected from the SRAM’s Write Enable pin. This is accomplished by a few LEDs in series, and a 0.1F 5.5V supercap which keeps the SRAM alive when the power is off.

As for why anyone would want to do this when modern technologies like Flash can be found, we can think of two reasons. For strange EPROM sizes, old SRAMs abound, but a suitable Flash chip in the right package (and the right voltage) might be very hard to find. Also, EEPROMs have a write lifetime; SRAMs can be written to an infinite number of times. It’s not the best solution in every case, but it is certainly interesting, and could be useful for more than a few vintage computing enthusiasts.

This project makes us think of another where an LED may have been supplying keep-alive power to some volatile memory.

Rod Logic And Graphene: Elusive Molecule-Scale Computers

I collect slide rules. You probably know a slide rule is a mechanical calculator of sorts. They usually look like a ruler (hence the name) and have a sliding part (hence the name) and by using logarithms you can multiply and divide easily by doing number line addition and subtraction (among other things).

It is easy to dismiss old technology like that out of hand as being antiquated, but mechanical computing may be making a comeback. It may seem ancient, but mechanical adding machines, cash registers, and even weapon control computers were all mechanical devices a few decades ago and there were some pretty sophisticated techniques developed to make them work. Perhaps the most sophisticated of all was Babbage’s difference engine, even though he didn’t have the technology to make one that actually functioned (the Computer History Museum did though; you should see it operating in person, but this is good too).

Continue reading “Rod Logic And Graphene: Elusive Molecule-Scale Computers”

Breaking: Drone Registration Will Be Required Says US DoT

Today, the US Department of Transportation announced that unmanned aerial systems (UAS) will require registration in the future.

The announcement is not that UAS, quadcopters, or drones would be required to be registered immediately. This announcement is merely that a task force of representatives from the UAS industry, drone manufacturers, and manned aviation industries would provide recommendations to the Department of Transportation for what types of aircraft would require registration. The task force is expected to develop these recommendations and deliver a report by November 20.

A Short History of FAA Model Aircraft Regulation

Introduced in 1981, AC 91-57 was the model aircraft operating standards for more than 30 years. This standard suggested that model pilots not fly higher than 400 feet, and to notify a flight service station or control tower when flying within three miles of an airport.

The FAA Modernization And Reform Act Of 2012 (PDF) required the FAA to create a set of rules for unmanned aerial systems, however the FAA is expressly forbidden from, ‘promulgating any rule or regulation regarding model aircraft.’ The key term being, ‘model aircraft’. This term was defined by the FAA as being, “an unmanned aircraft that is capable of sustained flight in the atmosphere; flown within visual line of sight of the person operating the aircraft; and flown for hobby or recreational purposes.” Anything outside of this definition was an unmanned aerial system, and subject to FAA regulations.

While this definition of model aircraft would have been fine for the 1980s, technology has advanced since then. FPV flying, or putting a camera and video transmitter on a quadcopter, is an extraordinarily popular hobby now, and because it is not ‘line of sight’, it is outside the definition of ‘model aircraft’.

This interpretation has not seen a great deal of countenance from the model aircraft community; FPV flying is seen as a legitimate hobby and even a sport. The entire domain of model aircraft aviation is expanding, and the hobby has never been as popular as it is now.

The Safety of Model Aviation

The issue of drone regulation focuses nearly entirely on the safety of airways in the United States; model aviators flying within five miles of an airport must ask the airport or control tower for permission to fly. To that end, the FAA created the B4UFLY app that takes the trouble out of reading sectional charts and checking up on the latest NOTAMs and TFRs.

However, the FAA is increasingly concerned with drones, multicopters, and model aircraft. In a report issued last summer, the FAA cited a marked increase in the number of ‘close calls’ between manned aircraft and model aircraft. The Academy of Model Aeronautics went over this data and found a different story: only 3.5% of sightings were ‘close calls’ or ‘near misses’. The FAA data is questionable – the reports cited include a drone flying at 51,000 feet over Washington DC. Not only is this higher than any civilian passenger aircraft capable of flying, the ability for any civilian remote-controlled aircraft to operate at this altitude is questionable at best.

Nevertheless, the requirement for registration has been greatly influenced by the perceived concerns of regulators for mid-air collisions.

What exactly will require registration?

The group of industry representatives responsible for delivering the recommendations to the Department of Transportation will take into account what aircraft should be exempt from registration due to a low safety risk. Most likely, small toy quadcopters will be exempt from registration; it’s difficult to fly a small Cheerson quadcopter outside anyway. Whether this will affect larger quadcopters and drones such as the DJI Phantom, or 250 class FPV racing quadcopters remains to be seen.

Repairing $55,000 Of Vintage Core Memory

If you find yourself in the vicinity of Mountain View, California you really should stop by the Computer History Museum. Even if you aren’t into the retrocomputer scene, there’s so much cool hardware ranging from a replica of the Babbage engine to nearly modern PCs. There’s even a room dedicated to classic video games. There are two fully working old computers at the museum that have their own special rooms: a PDP-1 (complete with vector scope to run Space War) and an IBM 1401.

The IBM 1401 looks like big iron, but in its day it was a low-end machine (costing an innovative business about $2500 a month). The base unit had 4000 words of magnetic core memory, but if you had a hankering for more memory, you could add the 350 pound dishwasher-sized IBM 1406 (for only $1575 a month or you could buy for $55100). How much memory did you get for $18900 a year? An extra 12000 words!

The problem is, the museum’s 1406 had developed a problem. Some addresses ending in 2, 4 or 6 failed and they were all in the same 4K block. [Ken Shirriff] was asked to go in and try to find the problem. We don’t want to give away the story, but [Ken] wrote up his experience (with lots of pictures).

Continue reading “Repairing $55,000 Of Vintage Core Memory”

TEMPEST: A Tin Foil Hat For Your Electronics And Their Secrets

Electronics leak waves and if you know what you’re doing you can steal people’s data using this phenomenon. How thick is your tinfoil hat? And you sure it’s thick enough? Well, it turns out that there’s a (secret) government standard for all of this: TEMPEST. Yes, all-caps. No, it’s not an acronym. It’s a secret codename, and codenames are more fun WHEN SHOUTED OUT LOUD!

The TEMPEST idea in a nutshell is that electronic devices leak electromagnetic waves when they do things like switch bits from ones to zeros or move electron beams around to make images on CRT screens. If an adversary can remotely listen in to these unintentional broadcasts, they can potentially figure out what’s going on inside your computer. Read on and find out about the history of TEMPEST, modern research, and finally how you can try it out yourself at home!

Continue reading “TEMPEST: A Tin Foil Hat For Your Electronics And Their Secrets”

Spherical Robot Rolls Then Walks Into Action

download
Droideka [Source: Wookieepedia]
If ever any sci-fi robot form-factor made more sense than the Droideka of the Star Wars franchise, we’re not sure what it could be. Able to transform from a spheroid that rolls quickly onto the battlefield into a blaster-bristling tripodal walker, the Hollywood battle droid showed a lot of imagination and resulted in a remarkably feasible design. And now that basic design is demonstrated in a spherical quadrupedal robot that can transform from rolling to walking.

Intended as a proof of concept of a hybrid rolling-walking locomotion system, the QRoSS robot from Japan’s Chiba Institute of Technology is capable of some pretty amazing things already. Surrounded by a wire roll cage that’s independent of the robot’s legs, QRoSS is able to roll into position, unfurl its legs, and walk where it needs to go. Four independent legs make it sure-footed over rough terrain, with obvious applications in such fields as urban search and rescue; a hardened version could be tossed into a collapsed building or other dangerous environment and walk around to provide intelligence or render aid. The robot’s self-righting feature would be especially handy for that use case, and as you can see in the video below, it has a powered rolling mode that’s six times faster than its walking speed.

For a similar spherical transforming robot, be sure to check out the MorpHex robot with its hexapod design.

Continue reading “Spherical Robot Rolls Then Walks Into Action”

How To Control Siri Through Headphone Wires

Last week saw the revelation that you can control Siri and Google Now from a distance, using high power transmitters and software defined radios. Is this a risk? No, it’s security theatre, the fine art of performing an impractical technical achievement while disclosing these technical vulnerabilities to the media to pad a CV. Like most security vulnerabilities it is very, very cool and enough details have surfaced that this build can be replicated.

The original research paper, published by researchers [Chaouki Kasmi] and [Jose Lopes Esteves] attacks the latest and greatest thing to come to smartphones, voice commands. iPhones and Androids and Windows Phones come with Siri and Google Now and Cortana, and all of these voice services can place phone calls, post something to social media, or launch an application. The trick to this hack is sending audio to the microphone without being heard.

googleThe ubiquitous Apple earbuds have a single wire for a microphone input, and this is the attack vector used by the researchers. With a 50 Watt VHF power amplifier (available for under $100, if you know where to look), a software defined radio with Tx capability ($300), and a highly directional antenna (free clothes hangers with your dry cleaning), a specially crafted radio message can be transmitted to the headphone wire, picked up through the audio in of the phone, and understood by Siri, Cortana, or Google Now.

There is of course a difference between a security vulnerability and a practical and safe security vulnerability. Yes, for under $400 and the right know-how, anyone could perform this technological feat on any cell phone. This feat comes at the cost of discovery; because of the way the earbud cable is arranged, the most efficient frequency varies between 80 and 108 MHz. This means a successful attack would sweep through the band at various frequencies; not exactly precision work. The power required for this attack is also intense – about 25-30 V/m, about the limit for human safety. But in the world of security theatre, someone with a backpack, carrying around a long Yagi antenna, pointing it at people, and having FM radios cut out is expected.

Of course, the countermeasures to this attack are simple: don’t use Siri or Google Now. Leaving Siri enabled on a lock screen is a security risk, and most Androids disable Google Now on the lock screen by default. Of course, any decent set of headphones would have shielding in the cable, making inducing a current in the microphone wire even harder. The researchers are at the limits of what is acceptable for human safety with the stock Apple earbuds. Anything more would be seriously, seriously dumb.