We received belated word this week of the passage of Ward Christensen, who died unexpectedly back in October at the age of 78. If the name doesn’t ring a bell, that’s understandable, because the man behind the first computer BBS wasn’t much for the spotlight. Along with Randy Suess and in response to the Blizzard of ’78, which kept their Chicago computer club from meeting in person, Christensen created an electronic version of a community corkboard. Suess worked on the hardware while Christensen provided the software, leveraging his XMODEM file-sharing protocol. They dubbed their creation a “bulletin board system” and when the idea caught on, they happily shared their work so that other enthusiasts could build their own systems.
RFID From First Principles And Saving A Cat
[Dale Cook] has cats, and as he readily admits, cats are jerks. We’d use stronger language than that, but either way it became a significant impediment to making progress with an RFID-based sensor to allow his cats access to their litterbox. Luckily, though, he was able to salvage the project enough to give a great talk on RFID from first principles and learn about a potentially tragic mistake.
If you don’t have 20 minutes to spare for the video below, the quick summary is that [Dale]’s cats are each chipped with an RFID tag using the FDX-B protocol. He figured he’d be able to build a scanner to open the door to their playpen litterbox, but alas, the read range on the chip and the aforementioned attitude problems foiled that plan. He kept plugging away, though, to better understand RFID and the electronics that make it work.
To that end, [Dale] rolled his own RFID reader pretty much from scratch. He used an Arduino to generate the 134.2-kHz clock signal for the FDX-B chips and to parse the returned data. In between, he built a push-pull driver for the antenna coil and an envelope detector to pull the modulated data off the carrier. He also added a low-pass filter and a comparator to clean up the signal into a nice square wave, which was fed into the Arduino to parse the Differential Manchester-encoded data.
Although he was able to read his cats’ chips with this setup, [Dale] admits it was a long road compared to just buying a Flipper Zero or visiting the vet. But it provided him a look under the covers of RFID, which is worth a lot all by itself. But more importantly, he also discovered that one cat had a chip that returned a code different than what was recorded in the national database. That could have resulted in heartache, and avoiding that is certainly worth the effort too.
Continue reading “RFID From First Principles And Saving A Cat”
There’s Now A Wiki For Hacking Redbox Machines
With the rapidly evolving situation surrounding the Redbox vending machines still out in the wild, it’s about time somebody put together a Wiki to keep it all straight.
The unredbox wiki has information on the various different hardware revisions that Redbox put out into the wild, from the regular outdoor machines to the weird indoor blue variant. The site also has breakdowns on individual components. For example, it covers the computers inside the machines, built by Dell, Lenovo, and Premio, and bits and pieces like the DVD carousel and the modems used inside.
Basically, if you’re working with these machines and you don’t have a manual, this resource could help you out. As could the neat video below that shows the internals of a Redbox machine during the reloading process.
Whatever you do, though, don’t steal the kiosks. There’s folks handling that already, you’re not allowed to just walk up and haul them away. Check out our earlier coverage of people that are still out there renting from these machines, too.
Continue reading “There’s Now A Wiki For Hacking Redbox Machines”
AI Face Anonymizer Masks Human Identity In Images
We’re all pretty familiar with AI’s ability to create realistic-looking images of people that don’t exist, but here’s an unusual implementation of using that technology for a different purpose: masking people’s identity without altering the substance of the image itself. The result is the photo’s content and “purpose” (for lack of a better term) of the image remains unchanged, while at the same time becoming impossible to identify the actual person in it. This invites some interesting privacy-related applications.

The paper for Face Anonymization Made Simple has all the details, but the method boils down to using diffusion models to take an input image, automatically pick out identity-related features, and alter them in a way that looks more or less natural. For this purpose, identity-related features essentially means key parts of a human face. Other elements of the photo (background, expression, pose, clothing) are left unchanged. As a concept it’s been explored before, but researchers show that this versatile method is both simpler and better-performing than others.
Diffusion models are the essence of AI image generators like Stable Diffusion. The fact that they can be run locally on personal hardware has opened the doors to all kinds of interesting experimentation, like this haunted mirror and other interactive experiments. Forget tweaking dull sliders like “brightness” and “contrast” for an image. How about altering the level of “moss”, “fire”, or “cookie” instead?
Landscape Motif Makes This E-Ink Weather Display Easy To Understand
True weather geeks will disagree, but there might be a better way to know how to dress for the day than divining what the weather will likely be from the current readings for temperature, pressure, humidity, and wind. Sure, the data will give you a good idea of where the weather is heading, but perhaps a quick visual summary such as the one offered by this pictorial landscape weather display is a better way to get out the door in the morning.
While many consumer weather stations incorporate some kind of graphical forecast for quick reference, [lds133] took a slightly different approach to forecasting. A cartoon landscape represents the day ahead, with various elements representing the coming weather scrolling across the display as time progresses. Trees are used to indicate wind direction and speed, with palm trees indicating south wind and pine trees winds from the north, and the taller the trees, the stronger the wind. The forest floor rises and falls with the expected temperature, the sun and moon appear at the proper time to indicate sunrise and sunset, and cloud icons are added when needed to show the degree of cloud cover. And because into each life a little rain must fall, animations show when you can expect rain or snow.
As for the electronics, if you think this would be a perfect application for an E-ink module, [lds133] agrees. The 296×128 pixel Waveshare display is the perfect aspect ratio for the job and provides nice, crisp icons. The display is updated every 15 minutes from the OpenWeather API by a Python program running on an ESP32 behind the scenes.
We’ve seen similar graphical forecast displays before, but we get it if that’s not your thing. Perhaps a more data-driven weather forecast will suit you better?
Welcome To SubTropolis: The Limestone Mine Turned Climate-Controlled Business Complex
After extracting all the useful stuff from a mine, you are often left with a lot of empty subterranean space without a clear purpose. This was the case with the Bethany Falls limestone mine, near Kansas City, Missouri, which left a sprawling series of caverns supported by 16′ (4.9 meter) diameter pillars courtesy of the used mining method. As detailed by [Benjamin Hunting] in a recent article on the Hagerty site, this made it a fascinating place for a business complex development now called SubTropolis that among other things is used for car storage by Ford and long-term stamp storage by the US Post Office. (Check out their cool period photos!)
The reason for this is the extremely stable climate within these man-made caverns, with relative humidity hovering around a comfortable 40% and temperatures stable year-round at about 21 °C (70 °F), making it ideal for storing anything that doesn’t like being placed outdoors, while saving a lot on airconditioning costs. With Ford one of the biggest companies in SubTropolis, this means that many companies providing customization services for vehicles have also moved operations inside the complex.
With the only negative being a lack of daylight, it seems like the perfect place for many businesses and (evil) lairs, assuming electrical power and constant air circulation are provided.
Featured image: “Subtropolis” by [ErgoSum88]
The Rogue Emperor, And What To Do About Them
The chances are if you know someone who is a former Apple employee, you’ll have heard their Steve Jobs anecdote, and that it was rather unflattering to the Apple co-founder. I’ve certainly heard a few myself, and quick web search will reveal plenty more. There are enough of them that it’s very easy to conclude the guy was not a very pleasant person at all.
At the same time, he was a person whose public persona transcended reality, and his fan base treated him with an almost Messianic awe. For them everything he touched turned to gold, every new feature on an Apple product was his personal invention, every one of his actions even the not-so-clever ones were evidence of his genius, and anyone who hadn’t drunk the Apple Kool-Aid was anathema. You’ll still see echoes of this today in Apple fanboys, even though the shine on the company is perhaps now a little tarnished.
It’s easy to spot parallels to this story in some of today’s tech moguls who have gathered similar devotion, but it’s a phenomenon by no means limited to tech founders. Anywhere there is an organisation or group that is centred around an individual, from the smallest organisation upwards, it’s possible for it to enter an almost cult-like state in which the leader both accumulates too much power, and loses track of some of the responsibilities which go with it. If it’s a tech company or a bowls club we can shrug our shoulders and move to something else, but when it occurs in an open source project and a benevolent dictator figure goes rogue it has landed directly on our own doorstep as the open-source community. It’s happened several times that I can immediately think of and there are doubtless more cases I am unaware of, and every time I am left feeling that our community lacks an adequate mechanism to come through it unscathed. Continue reading “The Rogue Emperor, And What To Do About Them”






