36C3: Open Source Is Insufficient To Solve Trust Problems In Hardware

With open source software, we’ve grown accustomed to a certain level of trust that whatever we are running on our computers is what we expect it to actually be. Thanks to hashing and public key signatures in various parts in the development and deployment cycle, it’s hard for a third party to modify source code or executables without us being easily able to spot it, even if it travels through untrustworthy channels.

Unfortunately, when it comes to open source hardware, the number of steps and parties involved that are out of our control until we have a final product — production, logistics, distribution, even the customer — makes it substantially more difficult to achieve the same peace of mind. To make things worse, to actually validate the hardware on chip level, you’d ultimately have to destroy it.

On his talk this year at the 36C3, [bunnie] showed a detailed insight of several attack vectors we could face during manufacturing. Skipping the obvious ones like adding or substituting components, he’s focusing on highly ambitious and hard to detect modifications inside an IC’s package with wirebonded or through-silicon via (TSV) implants, down to modifying the netlist or mask of the integrated circuit itself. And these aren’t any theoretical or “what if” scenarios, but actual possible options — of course, some of them come with a certain price tag, but in the end, with the right motivation, money is only a detail.

Continue reading “36C3: Open Source Is Insufficient To Solve Trust Problems In Hardware”

Tiny Tree Is A Thermometer For Christmas Fever

Tired of the usual methods for animating all those RGB LEDS for your holiday display? How about using trendiness in a non-trendy way?

[8BitsAndAByte] caved in to increasing holiday madness and bought the cutest little Christmas tree. A special tree deserves special decorations, so they packed it with NeoPixels that turn from red to green and back again one by one. Here’s where the trendiness comes in: the speed at which they change is determined by the popularity of “Christmas” as a search term.

The NeoPixels are controlled by a Raspberry Pi 3B+ that uses PyTrends to grab a value from Google Trends once an hour. The service returns a value between 0 to 100, where 100 means the search term is extremely popular, and 0 means it’s probably the dead of January. Each NeoPixel is wired to the underside of a translucent printed gift box that does a great job of diffusing the light.

You know how Christmas trees have a tendency to stick around well into the new year? This one might last even longer than usual, thanks to the bonus party mode. Press the arcade button on the box cleverly disguised as a present, and the lights change from red to green and back at warp speed while the speaker inside blasts the party anthem of your choice. Be sure to check out the demo/build video waiting for you under after the break.

How could this little tree get any more special? Well, a rotating platform couldn’t hurt.

Continue reading “Tiny Tree Is A Thermometer For Christmas Fever”

Reflection On A Decade Of Hackerspace Expansion

A few days ago I was invited to a party. Party invites are always good, and if I can make it to this one I’ll definitely go. It’s from a continental European hackerspace, and it’s for their tenth birthday party. As I spent a while checking ferries and flights it struck me, a lot of the spaces in my sphere are about a decade old. I went to London Hackspace’s 10th earlier in the year, and a host of other British hackerspaces aren’t far behind. Something tells me I’ll be knocking back the Club Mate and listening to EDM of some form at more than one such party in the coming year.

For most of the decade since I found the then-recently-established mailing list of my local hackerspace I’ve spent a lot of my time involved in more than one space. I’ve been a hackerspace director, a member, and many roles in between and I’ve seen them in both good times and bad ones. Perhaps it’s time to sit back and take stock of that decade and ask a few questions about hackerspaces. How have they fared, what state are they in now, and where are they going?

Continue reading “Reflection On A Decade Of Hackerspace Expansion”

Supercon: The Things You Brought, And A Few You Forgot

Part of the fun of Supercon is that there is so much available in one place. For the price of admission, you’re surrounded by expertise, power, and soldering irons. Digi-Key brought several large parts bins stuffed full of everything from passives to LEDs to chips for people use in hacking away on their badges. But one thing that makes the whole experience really special is the stuff people bring. We don’t just mean the projects you brought to show off, we mean the stuff you bring to enhance your Supercon experience, whether it be tools, bits and bobs, or other fun stuff to play with.

This year was my first Supercon, and you never forget your first. I had a great time, and was overwhelmed by how much awesomeness was going on in one place. I wish Supercon was a simulation I could run again and again so I could listen to every talk, attend every workshop, and spend time talking to everyone about the things they brought and the cool things they’re doing with their time and badges.

Continue reading “Supercon: The Things You Brought, And A Few You Forgot”

Hacking Transmitters, 1920s Style

The origin of the term “breadboard” comes from an amusing past when wooden bread boards were swiped from kitchens and used as a canvas for radio hobbyists to roll homemade capacitors, inductors, and switches. At a period when commercial electronic components were limited, anything within reach was fair game.

[Andy Flowers], call sign K0SM, recently recreated some early transmitters using the same resources and techniques from the 1920s for the Bruce Kelley 1929 QSO Party. The style of the transmitters are based on [Ralph Hartley]’s oscillator circuit built for Bell Telephone in 1915. Most of the components he uses are from the time period, and one of the tubes he uses is even one of four tubes from the first Transatlantic contact in 1923.

Apart from vacuum tubes (which could be purchased) and meters (which could be scrounged from automobiles) [Flowers] recreated his own ferrite plate and outlet condensers for tuning the antennas. The spiderweb coils may not be as common today, but can be found in older Crosley receivers and use less wire than comparable cylindrical coils.

A number of others features of the transmitters also evoke period nostalgia. The coupling to the antenna can be changed using movable glass rods, although without shielding there are quite a number of factors to account for. A vertical panel in the 1920s style also shows measurements from the filament, plate current, and antenna coupling.

While amature radio has become increasingly high-tech over the last few years, it’s always good to see dedicated individuals keeping the old ways alive; no matter what kind of technology they’re interested in.

Continue reading “Hacking Transmitters, 1920s Style”

The Golden Age Of Ever-Changing Computer Architecture

Given the accuracy of Moore’s Law to the development of integrated circuits over the years, one would think that our present day period is no different from the past decades in terms of computer architecture design. However, during the 2017 ACM Turing Award acceptance speech, John L. Hennessy and David A. Patterson described the present as the “golden age of computer architecture”.

Compared to the early days of MS-DOS, when designing user- and kernel-space interactions was still an experiment in the works, it certainly feels like we’re no longer in the infancy of the field. Yet, as the pressure mounts for companies to acquire more computational resources for running expensive machine learning algorithms on massive swaths of data, smart computer architecture design may be just what the industry needs.

Moore’s law predicts the doubling of transistors in an IC, it doesn’t predict the path that IC design will take. When that observation was made in 1965 it was difficult or even impossible to envision where we are today, with tools and processes so closely linked and widely available that the way we conceive processor design is itself multiplying.

Continue reading “The Golden Age Of Ever-Changing Computer Architecture”

Progressive Or Thrash? How Metal Detectors Discriminate

Metal detecting is a fun pastime, even when all you can find is a little bit of peace and a whole lot of pop tabs. [Huygens Optics] has a VLF-based metal detector that offers much more feedback than just a beep or no beep. This thing is fancy enough to discriminate between types of metal and report back a numerical ID value from a corresponding range of conductivity.

Most pop tabs rated an ID of 76 or 77, so [Huygens Optics] started ignoring these until the day he found a platinum wedding band without looking at the ID readout. Turns out, the ring registered in the throwaway range. Now thoroughly intrigued by the detector’s ID system, [Huygens Optics] set up a test rig with an oscilloscope to see for himself how the thing was telling different metals apart. His valuable and sweeping video walk-through is hiding after the break.

A Very Low-Frequency (VLF) detector uses two coils, one to emit and one to receive. They are overlapped just enough so that the reception coil can’t see the emission coil’s magnetic field. This frees up the reception coil’s magnetic field to be interrupted only by third-party metal, i.e. hidden treasures in the ground.

Once [Huygens Optics] determined which coil was which, he started passing metal objects near the reception coil to see what happened on the ‘scope. Depending on the material type and the size and shape of the object, the waveform it produced showed a shift in phase from the emission coil’s waveform. This is pretty much directly translated to the ID readout — the higher the phase shift value, the higher the ID value.

We’ve picked up DIY metal detectors of all sizes over the years, but this one is the ATtiny-ist.

Continue reading “Progressive Or Thrash? How Metal Detectors Discriminate”