Teardown Of Two Russian Missile Sensors

Recently [Michel] received two packages from Ukraine containing some salvaged Russian electronics that once belonged to (presumably) a 9K38 Igla, Vympel R-27 or similar infrared homing missile, as well as a Fiber Optic Gyroscope (FOG) from an unknown missile, though possibly from the Tornado family of MRLSes. The latter uses the Sagnac effect to detect the phase shift between two laser beams being injected into the same fiber when the fiber, and thus the device, are rotating. The advantage of such a gyroscope is that it is effectively solid-state, requiring only some optical components, amplifier stage and as shown here an Altera Cyclone II FPGA to integrate the results.

The 16-channel linear infrared array sensor is more basic, with a matching amplification channel for each optical receiver element, which are fed into a multiplexer IC in a rather remarkable looking ceramic-gold packaged DIP format, with what looks like a 2004 date code (‘0424’). Although both are rather damaged, [Michel] figures that he might be able to restore the FOG to working condition, assuming no crucial and irreplaceable parts are missing. As useful as FOGs are in missiles, they also have countless uses outside of military applications.

Continue reading “Teardown Of Two Russian Missile Sensors”

Digital Master Tapes Seek Deck

As a nerdy kid in the 90s, I spent a fair bit of time watching the computer-themed cartoon Reboot. During the course of making a documentary about the show, [Jacob Weldon] and [Raquel Lin] have uncovered the original digital master tapes of the show.

This is certainly exciting news for fans of the show, but there’s a bit of a wrinkle. These digital masters are all on D-1 digital cassette tapes which the studio doesn’t have a player for anymore. The dynamic duo are on the hunt for a Bosch BTS-D1 to be able to recapture some of this video for their own film while also heavily hinting to the studio that a new box set from the masters would be well-received.

As the first CGI TV series, Reboot has a special place in the evolution of entertainment, and while it was a technical marvel for its time, it was solid enough to last for four seasons and win numerous awards before meeting a cliffhanger ending. If you’re an expert in D-1 or have a deck to lend or sell, be sure to email the creators.

Feeling nostalgic for the electromechanical era? Why not check out some hidden lyrics on Digital Compact Cassettes (DCC) or encoding video to Digital Audio Tapes (DAT)?

[via Notebookcheck]

The ScottoKatana Keyboard Is Cutting-Edge

The lovely thing about a hobby like keyboard building is that the melting pot of designs manages to never turn into a nasty porridge. Rather, it remains a tasty chili that keeps getting more flavorful with time. It’s a simple recipe, really; someone becomes dissatisfied enough with their peripherals to do something about it, often trying various designs until they either settle on one, or come up with yet another awesome variant that suits their needs — and possibly someone else’s down the line.

The inimitable [Joe Scotto] has happened upon the katana layout, which has an inverse left-hand row stagger that lends symmetry to the design, and Scotto-ized it into a 33-key build that he says is the best-sounding one yet with lubed Gateron Milky Yellows.

The case and the keycaps are both 3D-printed, and as with all Scotto builds, it is beautifully hand-wired. This one uses an RP2040 Pro Micro, but an ATMega Pro Micro will work, too.

Everything is available on GitHub, and [Joe] promises a typing test soon, as well as a gasket version that foregoes the integrated plate.

Do you need a fast keyboard? Like, ridiculously fast? Then you should use an FPGA.

Via KBD and Make:

Niklaus Wirth with Personal Computer Lilith that he developed in the 1970ies. (Photo: ETH Zurich)

Remembering Niklaus Wirth: Father Of Pascal And Inspiration To Many

Although perhaps not as much of a household name as other pioneers of last century’s rapid evolution of computer hardware and the software running on them, Niklaus Wirth’s contributions puts him right along with other giants. Being a very familiar face both in his native Switzerland at the ETH Zurich university – as well as at Stanford and other locations around the world where computer history was written – Niklaus not only gave us Pascal and Modula-2, but also inspired countless other languages as well as their developers.

Sadly, Niklaus Wirth passed away on January 1st, 2024, at the age of 89. Until his death, he continued to work on the Oberon programming language, as well as its associated operating system: Oberon System and the multi-process, SMP-capable A2 (Bluebottle) operating system that runs natively on x86, X86_64 and ARM hardware. Leaving behind a legacy that stretches from the 1960s to today, it’s hard to think of any aspect of modern computing that wasn’t in some way influenced or directly improved by Niklaus.

Continue reading “Remembering Niklaus Wirth: Father Of Pascal And Inspiration To Many”

Hackaday Podcast Episode 251: Pluto, Pinball, Speedy Surgery, And DIY GPS

Welcome to 2024! This time around, Elliot and Dan ring in a new year of awesome hacks with quite an eclectic mix. We kick things off with a Pluto pity party and find out why the tiny ex-planet deserved what it got. What do you do if you need to rename a bunch of image files? You rope a local large-language model in for the job, of course. We’ll take a look at how pinball machines did their thing before computers came along, take a fractal dive into video feedback, and localize fireworks with a fleet of Raspberry Pi listening stations. Ever wonder what makes a GPS receiver tick? The best way to find out might be to build one from scratch. Looking for some adventure? A ride on an electroluminescent surfboard might do, or perhaps a DIY “Vomit Comet” trip would be more your style. And make sure you stick around for our discussion on attempts to optimize surgery efficiency, and our look back at 2023’s top trends in the hardware world.

 

Grab a copy for yourself if you want to listen offline.

Continue reading “Hackaday Podcast Episode 251: Pluto, Pinball, Speedy Surgery, And DIY GPS”

High-Resolution MIDI Controller

For an older standard, MIDI has remarkable staying power in the music industry. It remains the de facto digital interface between computers and instruments thanks to its open nature, but its age does show a little bit. Sending control change (CC) messages, for example, was originally designed to fit within seven bits, which doesn’t give particularly fine resolution compared to more capable modern computers. To work around that, a fourteen-bit message is possible, doubling the resolution, and this MIDI interface uses this larger amount of data to send these high-resolution CC messages.

The 14-bit messages are actually fairly well documented but are a bit obscure, with very limited hardware support. To that end, [Gero] set about building this control interface to solve that problem. It’s made up of only eight knobs, each of which is mapped one-to-one to a parameter on the computer, allowing the interface to feel more like an analog device where the knob corresponds directly to a change in an aspect of the sound. The platform is built around a Teensy 4.0 and some multiplexers to handle all of the knobs, with the open source software available for anyone to use to modify their actions. [Gero] was aiming for high fidelity for all aspects of this controller, not just the improved digital resolution, and made a number of other improvements to it as well like re-greasing the potentiometer knobs and a custom 3D printed enclosure.

All of the software is available for use, as well as the files to print the case. [Gero] is also working on a PCB to make the construction of the device a little more streamlined, but for now, it requires a bit of soldering off-the-shelf parts together. The MIDI standard is open as well, which allows for a lot of innovation in the creation of musical instruments from unique hardware. This project builds a MIDI synthesizer with parts from a Sega Genesis.

This Week In Security: Bitwarden, Reverse RDP, And Snake

This week, we finally get the inside scoops on some old stories, starting with the Bitwarden Windows Hello problem from last year. You may remember, Bitwarden has an option to use Windows Hello as a vault unlock option. Unfortunately, the Windows credential API doesn’t actually encrypt credentials in a way that requires an additional Windows Hello verification to unlock. So a derived key gets stored to the credential manager, and can be retrieved through a simple API call. No additional biometrics needed. Even with the Bitwarden vault locked and application closed.

There’s another danger, that doesn’t even require access to the the logged-in machine. On a machine that is joined to a domain, Windows backs up those encryption keys to the Domain Controller. The encrypted vault itself is available on a domain machine over SMB by default. A compromised domain controller could snag a bitwarden vault without ever even running code on the target machine. The good news is that this particular problem with Bitwarden and Windows Hello is now fixed, and has been since version 2023.10.1.

Reverse RDP Exploitation

We normally think about the Remote Desktop Protocol as dangerous to expose to the internet. And it is. Don’t put your RDP service online. But reverse RDP is the idea that it might also be dangerous to connect an RDP client to a malicious server. And of course, multiple RDP implementations have this problem. There’s rdesktop, FreeRDP, and Microsoft’s own mstsc that all have vulnerabilities relating to reverse RDP.

The technical details here aren’t terribly interesting. It’s all variations on the theme of not properly checking remote data from the server, and hence either reading or writing past internal buffers. This results in various forms of information leaks and code executions problems. What’s interesting is the different responses to the findings, and then [Eyal Itkin]’s takeaway about how security researchers should approach vulnerability disclosure.

So first up, Microsoft dismissed a vulnerability as unworthy of servicing. And then proceeded to research it internally, and present it as a novel attack without properly attributing [Eyal] for the original find. rdesktop contained quite a few of these issues, but were able to fix the problem in a handful of months. FreeRDP fixed some issues right away, in what could be described as a whack-a-mole style process, but a patch was cooked up that would actually address the problem at a deeper level: changing an API value from the unsigned size_t to a signed ssize_t. That change took a whopping 2 years to actually make it out to the world in a release. Why so long? Continue reading “This Week In Security: Bitwarden, Reverse RDP, And Snake”