data logger

Data Logger Powered By Linkit One Board

[Jed Hodson] put together a nice little data logger with a Linkit One board at its heart. It’s capable of logging two analog channels and one digital channel which also has PWM capabilities. A GPS is used to get the correct time and a Freetronics OLED display coupled with a shield lets the user view the data in real time.

The data is logged on the Linkit One’s internal storage as a .CSV file, allowing for easy access via a spread sheet program. A LiPo rechargeable battery keeps the electrons flowing and the system will give a warning once the power drops below 20%. Speaking of system – the Linkit One board features an ARM-7 processor and has headers to fit Arduino shields. It’s targeted for wearable and IoT type devices.

Be sure to check out this project if you’re in need of a nice data logger. All code and details of the build are available on [Jed’s] Blog.

Party Balloon Crosses Atlantic, Tours Europe & Phones Home

For the past few months, [David VE3KCL] has been launching balloons from his Canadian home fitted with radio transmitters. Nothing unusual there: quite a few people do this, including schools, hackerspaces, and individuals. What is remarkable is how far he has gotten. His S-4 flight in August of this year crossed the Atlantic, reached France and took a tour of Germany, Denmark, Sweden, Finland and Norway before finally landing in the Norwegian Sea. That’s over 10,000 kilometers (6200 miles): not bad for a couple of party balloons strung together.

The flight payload of one of the balloon flights.
The flight payload of one of the balloon flights.

Although the distance these balloons have travelled is quite remarkable, the interesting part is how [David] is tracking the balloons. Cell phones obviously won’t work over the Atlantic, and satellite transmitters are expensive, so he used a low-cost transmitter that was programmed to broadcast using a variety of Ham radio signals. The most effective seems to be WSPRnet (the Weak Signal Propagation Network), a system used by Hams to see how far low strength signals will go. This system relies on Hams leaving their receivers on and running software that uploads the received signals to a central server.

By cleverly encoding information such as height and position into this signal, he was able to turn this worldwide network into a tracking network that would report the balloon’s position pretty much anywhere on the globe. [David] is continuing to launch balloons: his latest went up on the 24th of September and travelled over 4300km (2600 miles) before the signal was lost over the Atlantic.

A White Hat Virus For The Internet Of Things

The Internet of Things is going gangbusters, despite no one knowing exactly what it will be used for. There’s more marketing money being thrown at IoT paraphernalia than a new soda from Pepsi. It’s a new technology, and with that comes a few problems: these devices are incredibly insecure, and you only need to look at a few CCTV camera streams available online for proof of that.

The obvious solution to vulnerable Internet of Things things would be to get people to change the login credentials on their devices, but that has proven to be too difficult for most of the population. A better solution, if questionable in its intentions, would be a virus that would close all those open ports on routers, killing Telnet, and reminding users to change their passwords. Symantec has found such a virus. It’s called Wifatch, and it bends the concept of malware into a force for good.

Wifatch is a bit of code that slips through the back door of routers and other IoT devices, closes off Telnet to prevent further infection, and leaves a message telling the owner to change the password and update the device firmware. Wifatch isn’t keeping any secrets, either: most of the code is written in unobfuscated Perl, and there are debug messages that enable easy analysis of the code. This is code that’s meant to be taken apart, and code that includes a comment directed at NSA and FBI agents:

To any NSA and FBI agents reading this: please consider whether defending
the US Constitution against all enemies, foreign or domestic, requires you
to follow Snowden's example.

Although the designer of Wifatch left all the code out in the open, and is arguably doing good, there is a possible dark side to this white hat virus. Wifatch connects to a peer-to-peer network that is used to distribute threat updates. With backdoors in the code, the author of Wifatch could conceivably turn the entire network of Wifatch-infected devices into a personal botnet.

While Wifatch is easily removed from a router with a simple restart, and re-infection can be prevented by changing the default passwords, this is an interesting case of virtual vigilantism. It may not be the best way to tell people they need to change the password on their router, but it’s hard to argue with results.

[Image source: header, thumb]

Embed With Elliot: Interrupts, The Ugly

Welcome to part three of “Interrupts: The Good, the Bad, and the Ugly”. We’ve already professed our love for interrupts, showing how they are useful for solving multiple common microcontroller tasks with aplomb. That was surely Good. And then we dipped into some of the scheduling and priority problems that can crop up, especially if your interrupt service routines (ISRs) run for too long, or do more than they should. That was Bad, but we can combat those problems by writing lightweight ISRs.

This installment, for better or worse, uncovers our least favorite side effect of running interrupts on a small microcontroller, and that is that your assumptions about what your code is doing can be wrong, and sometimes with disastrous consequences. It’s gonna get Ugly

TL;DR: Once you’ve started changing variables from inside interrupts, you can no longer count on their values staying constant — you never know when the interrupt is going to strike! Murphy’s law says that it will hit at the worst times. The solution is to temporarily turn off interrupts for critical blocks of code, so that your own ISRs can’t pull the rug out from under your feet. (Sounds easy, but read on!)
Continue reading “Embed With Elliot: Interrupts, The Ugly”

No Sex Please, We’re Robots

There was a time when technology would advance and launch debates over ethical concerns raised by the technology. Lately, however, it seems ethical debate is (I hope) in advance of the actual technology. Maybe that’s a good thing.

Case in point: A paper at Ethicomp 2015 from De Montfort University warns that having sex with robots may have negative effects on par with prostitution. You might think that this is an isolated academic concept, but apparently there is a conference titled The International Congress on Love and Sex with Robots. There’s even a 2008 book titled Love and Sex with Robots that is neither science fiction nor pornography.

Second case: Softbank has created a robot called [Pepper] that supposedly can understand human emotions. You know the license agreements you get with everything you buy that you don’t really read? Here’s a translation of part of the one that comes with [Pepper]: ” …owner must not perform any sexual act or other indecent behavior.

Continue reading “No Sex Please, We’re Robots”

Numato Opsis: FPGA-based Open Video Platform

Imagine that you’re running a conference and you want to do a professional job recording the speakers and their decks. You’ll need to record one video stream from the presenter’s laptop, and it’d be nice to have another of the presenter taken with a camera. But you also need to have the presenter’s screen displayed on a projector or two for the live audience. And maybe you’d like all of this dumped down to your computer so that you can simultaneously archive the presentation and stream it out over the Internet.

io-ports_png_project-bodyThat’s exactly the problem that the hdmi2usb project tries to solve on the software side for open-source software conventions. And to go with this software, [Tim Ansell] has built the Numato Opsis FPGA video board, to tie everything together. What’s great about the platform is that the hardware and the firmware are all open source too.

Because everything’s open and it’s got an FPGA on board doing the video processing, you’re basically free to do whatever you’d like with the content in transit, so it could serve as an FPGA video experimenter board. It also looks like they’re going to port code over so that the Opsis could replace the discontinued, but still open source, Milkimist One video effects platform.

One thing that’s really cute about the design is that it reports over USB as being a camera, so you can record the resulting video on any kind of computer without installing extra drivers. All in all, it’s an FPGA-video extravaganza with a bunch of open-source software support behind it. Very impressive, [Tim]!

Why Aren’t We Arguing More About Mr Robot?

Editor’s note: Thar be spoilers below.

Showing any sort of ‘hacking’ on either the big screen or the small often ends in complete, abject failure. You only need to look at Hackers with its rollerblading PowerBooks, Independance Day where the aliens are also inexplicably using PowerBooks, or even the likes of Lawnmower Man with a VR sex scene we keep waiting for Oculus to introduce. By design, Mr Robot, a series that ended its first season on USA a month ago, bucks this trend. It does depressed, hoodie-wearing, opioid-dependant hackers right, while still managing to incorporate some interesting tidbits from the world of people who call themselves hackers.

Desktop Environments

In episode 0 of Mr Robot, we’re introduced to our hiro protagonist [Elliot], played by [Rami Malek], a tech at the security firm AllSafe. We are also introduced to the show’s Macbeth, [Tyrell Wellick], played by Martin Wallström]. When these characters are introduced to each other, [Tyrell] notices [Elliot] is using the Gnome desktop on his work computer while [Tyrell] says he’s, “actually on KDE myself. I know [Gnome] is supposed to be better, but you know what they say, old habits, they die hard.”

[Elliot], running Kali with Gnome
[Elliot], running Kali with Gnome
While this short exchange would appear to most as two techies talking shop, this is a scene with a surprisingly deep interpretation. Back in the 90s, when I didn’t care if kids stayed off my lawn or not, there was a great desktop environment war in the land of Linux. KDE was not free, it was claimed by the knights of GNU, and this resulted in the creation of the Gnome.

Subtle, yes, but in one short interaction between [Elliot] and [Tyrell], we see exactly where each is coming from. [Elliot] stands for freedom of software and of mind, [Tyrell] is simply toeing the company line. It’s been fifteen years since message boards have blown up over the Free Software Foundation’s concerns over KDE, but the sentiment is there.

Biohacking

There’s far more to a hacker ethos than having preferred Linux desktop environments. Hacking is everywhere, and this also includes biohacking, In the case of one Mr Robot character, this means genetic engineering.

In one episode of Mr Robot, the character Romero temporarily gives up his power in front of a keyboard and turns his mind to genetics. He “…figured out how to insert THC’s genetic information code into yeast cells.” Purely from a legal standpoint, this is an interesting situation; weed is illegal, yeast is not, and the possibilities for production are enormous. Yeast only requires simple sugars to divide and grow in a test tube, marijuana actually requires a lot of resources and an experienced staff to produce a good crop.

Life imitates art, but sometimes the reverse is true. Just a few weeks after this episode aired, researchers at  Hyasynth Bio announced they had genetically modified yeast cells to produce THC and cannabidiol.

The promise of simply genetically modifying yeast to produce THC is intriguing; a successful yeast-based grow room could outproduce any plant-based operation, with the only input being sugar. Alas, the reality of the situation isn’t quite that simple. Researchers at Hyasynth Bio have only engineered yeast to turn certain chemical precursors into THC. Making THC from yeast isn’t yet as simple as home brewing an IPA, but it’s getting close, and a great example of how Mr Robot is tapping into hacking, both new and old.

Why Aren’t We Arguing More About This?

The more we ruminate on this show, the more there is to enjoy about it. It’s the subtle background that’s the most fun; the ceiling of the chapel as it were. We’re thinking of turning out a series of posts that works through all the little delights that you might have missed. For those who watched and love the series, what do you think? Perhaps there are other shows worthy of this hacker drill-down, but we haven’t found them yet.