Deciphering Queen Of Scots, Mary Stuart’s Lost Letters

First part of the cypher used by Mary Stuart and Castelnau, showing the use of homophones, special characters and more. (Credit: Lasry et al., 2023)
First part of the cypher used by Mary Stuart and Castelnau, showing the use of homophones, special characters and more. (Credit: Lasry et al., 2023)

Communications by important people over the past thousands of years have been regularly encrypted, making the breaking of this encryption both an essential and also a fascinating historical field. One recent example of an important historical discovery by codebreakers are letters dating back to 1578 through 1584 by Mary Stuart, the Queen of Scots in the 16th century. While deemed lost for centuries, researchers came across them in a stash of encrypted letters that were kept at the Bibliothèque nationale de France’s (BnF). After decrypting these 57 letters, they realized what they had come across.

Even in digitized form, they could not simply be OCRed, leaving the researchers to manually transcribe each character into the software they used to assist with the decrypting. Only during the decrypting process, they began to realize that these were not Italian communications – matching the rest of the collection of which they were part – but in fact letters by Mary and her allies. Of the 57 letters, 54 are from Mary to Castelnau, the French ambassador in London at the time.

Supporting evidence for these decrypted letters being from Mary and Castelnau came from British archives, which had clear text versions of some of the encrypted letters, dated to the years when a mole within the French embassy was leaking translated texts to the English, as part of the usual political pastime during those centuries of getting onto thrones and making other people leave them. Mary’s attempt to become not only the Queen of Scots but also Queen of England came to a tragic end with her execution in 1587 after a politically motivated show trial.

The software the researchers used primarily is called CrypTool 2, which is an open-source project that provides cryptoanalysis and related functionality. The access to the documents themselves was enabled via the DECRYPT project, resources which taken together enables virtually anyone to undertake such historical sleuthing from the comfort of their own home.

(Thanks to [Stephen Walters] for the tip)

Screenshot of Wireshark, showing that source and destination port for ArtNet packets are the same

ArtNet Not Going Through? Your Switch Might Be Protecting You

Cool technology often comes at a cost, and it’s not always that this cost is justified. For instance, [Rainfay] tells us about how the the ArtNet protocol’s odd design choices are causing incompatibility with certain Ethernet switches. ArtNet is a protocol for lighting control over DMX-512 – simply put, it allows you to blink a whole ton of LEDs, even literally. Unlike DMX-512 which can use different physical mediums, ArtNet uses Ethernet, taking form of the usual kind of network packets – and it does seem to do a great job about that, if it weren’t for this one thing.

For some reason, ArtNet connections are required to use the same destination and source port – unlike the usual network traffic, where the destination port is protocol-dependent and the source port is randomized. This behaviour violates RFCs, and not just in an abstract manner – such behaviour is indicative of certain kinds of attacks, that switches on the smart side are able and are supposed to prevent. As a result, ArtNet traffic actually triggers some protections on switches at the fancier end, specifically, so-called BLAT protection.

In short, if your ArtNet stream is mysteriously not going through and your switch is on the fancier side, [Rainfay] says you might need to disable some security mechanisms. Sadly, as she points out, this problem isn’t even a direct consequence of some inherent property of ArtNet, but merely a consequence of a bizarre design choice. Once you’re done disabling protections, however, do check out some ArtNet projects for inspiration – it’s a genuinely useful protocol supported in a ton of fancy software, and it might be that you want to use it in the firmware of your RGB strip controller board!

Dungeons And Dragons Board Game From The 1980s Holds A TMS1100

Today is a little tour back to the early 1980s when Mattel released the DUNGEONS & DRAGONS Computer Labyrinth Game. [Cameron Kaiser] was dealing with a few boxes of old stuff when he came across the game. Luckily for us, he decided to do a complete teardown and a comprehensive review more than 40 years after it came out.

The game itself is pretty simple. You and a friend are characters on the board, navigating an eight-by-eight maze. As you move through the labyrinth, a microcontroller emits twelve audio cues telling you what you’ve run into (walls, doors, treasure, and so on). The eight buttons on the side allow you to hear the different tones to know what they mean, as we imagine even the most well-written manual might struggle to describe that. In addition, the pieces are diecast metal, which allows the game to detect where the pieces have been placed. Continue reading “Dungeons And Dragons Board Game From The 1980s Holds A TMS1100”

A Look Back At The Xbox 360’s Hard Drive Security

Anyone who’s owned a game console from the last couple of generations will tell you that the machines are  becoming increasingly like set-top computers  —  equipped with USB ports, Bluetooth, removable hard drives, and their own online software repositories. But while this overlap theoretically offers considerable benefits, such as the ability to use your own USB controller rather than being stuck with the system’s default, the manufacturers haven’t always been so accommodating.

Take for example the removable hard drive of the Xbox 360. It was a bog standard 2.5″ SATA drive inside a fancy enclosure, but as explained by [Eaton], Microsoft went to considerable lengths to prevent the user from upgrading it themselves. Which wouldn’t have been such a big deal, if the Redmond giant wasn’t putting a huge markup on the things; even in 2005, $99 USD for 20 GBs was highway robbery. Continue reading “A Look Back At The Xbox 360’s Hard Drive Security”

Directing Ambient Light For Some Extra Glow

[Yuichiro Morimoto] wanted to create a decorative lamp, one that wasn’t burdened with batteries or wires, but used just the ambient light in the room to create a directed glow effect. Using a coloured circular acrylic sheet, with a special coating (not specified) ambient light impinging on the surface is diffused toward the edge. This centre sheet is embedded in an opalescent sheet, which scatters the light from the center sheet, giving a pleasant glow, kind of akin to a solar corona. An additional diffuser cover sheet on the front covers over the edge to hide it, and further enhance the glow effect.

Details of the ‘special coating’ are scarce, with the coloured sheet described as a condenser plate. This clearly isn’t the same as diffuser plastic, as that cannot be seen through as clearly as some of the photographs show. So we’re a little stumped on this one! Please answer in the comments if you can, ahem, shed some light on this one!

When talking about ambient light, many people will think more along the lines of active lighting, for example, adaptive ambient light around a TV like this hack.

Continue reading “Directing Ambient Light For Some Extra Glow”

Raspberry Pi Weather Station Features Wireless Sensor Nodes

Online weather services are great for providing generic area forecasts, but they don’t provide hyperlocal data specific to your location. [Harald Kreuzer] needed both and built a Raspberry Pi Weather Station that provides weather forecasts for the next 7 days as well as readings from local sensors. The project is completely open source and based on a Raspberry Pi base station which connects to ESP32 based sensor nodes and online services to nicely present the data on a 7″ touch screen display.

The architecture is quite straightforward. The ESP32 based sensor nodes publish their readings to an MQTT broker running on the Raspberry Pi. The Pi subscribes to these sensor node topics to pick up the relevant sensor data. This makes it easy to add additional sensor nodes in future. Weather forecast data is collected by connecting to the OpenWeatherMap API. All of the collected information is then displayed through an app built using the Kivy: open source Python app development framework. Continue reading “Raspberry Pi Weather Station Features Wireless Sensor Nodes”

Playing Music On A Custom Flyback Transformer

We’ve seen a number of people create plasma speakers over the years here at Hackaday, so at first blush, the latest Plasma Channel video from [Jay Bowles] might seem like more of the same. Even his overview of the assembly of the 555 timer circuit at the heart of the setup, as detailed as it may be, is something we’ve seen before.

But the back half of the video, where [Jay] talks about the flyback transformer used in this plasma speaker, really got our attention. You see, frustrated by the limited options on the market for AC flybacks, he set out to put together a custom transformer utilizing a 3D printed secondary former of his own design.

Winding an early version of the secondary with a drill.

Armed with a spare core, [Jay] spent some time in CAD coming up with his secondary. Despite never having built a flyback before, his first attempt managed to produce some impressive sparks — that is, until it arced through the printed plastic and released the critical Magic Smoke. Inspired by this early success, he went back to the digital drawing board and cranked his way through several different iterations until he came up with one that didn’t self-destruct.

Continue reading “Playing Music On A Custom Flyback Transformer”