Hackaday Links Column Banner

Hackaday Links: November 19, 2023

Two RUDs are better than one, right? That might be the line on Saturday morning’s briefly spectacular second attempt by SpaceX to launch their Starship vehicle atop a Super Heavy booster, which ended with the “rapid unscheduled disassembly” of both vehicles. The first attempt, back in April, had trouble from the get-go, including the rapid unscheduled partial disassembly of their Stage Zero launch pad, followed by rapid but completely predictable disassembly of a lot of camera gear and an unfortunate minivan thanks to flying chunks of concrete.

Starship’s first “hot” separation

Engineering changes helped keep Stage Zero more or less intact this time, and the Super Heavy booster performed flawlessly — for about three minutes. It was at that point, right after the start of the new “hot staging” process, where Starship’s six engines light before the booster actually drops away, that the problems started. The booster made a rapid flip maneuver to get into the correct attitude for burn-back and landing before disappearing in a massive ball of flame.

Reports are that the flight termination system did the deed, but it’s not yet exactly clear why. Ditto the Starship, which was also snuffed by the FTS after continuing to fly for about another five minutes. Still in all, the SpaceX crew seem to be ecstatic about the results, which is understandable for a company with a “move fast, break things” culture. Nailed it.

Continue reading “Hackaday Links: November 19, 2023”

A Low Voltage Tube Makes For A Handy Preamplifier

When most people think of tube circuits, the first thing that comes to mind is often the use of high-voltage power supplies. It wasn’t a given for tube circuits, though, as a range of low-voltage devices were developed for applications such as car radios. It’s one of these, an ECH83 triode-heptode, which [mircemk] has taken as the basis of an audio preamplifier circuit.

The preamp circuit is pretty simple, being a two-stage single-ended design using both halves of the tube. Between the two is a three-band tone control circuit as used in classic guitar amplifiers, making for a serviceable and easily achievable way to chase that elusive “valve sound.”

There is much discussion among audio enthusiasts about the supposed benefits of vacuum technology as opposed to transistors in an amplifier. Much of it centres around the idea that tubes distort in the even harmonics while semiconductors are supposed to do so in the odd harmonics. Still, we’d be inclined to spot a bit of snake oil instead and point to early transistor amplifiers simply being not very good compared to the tube amps of the day. That said, a well-made tube amplifier set-up will sound just as amazing as it always did, and since this one is paired with a matching power amp we wouldn’t say no to it ourselves.

If you fancy messing about with tubes for not a lot, there’s a cheap module for that.

Hackaday Podcast 244: Fake Chips, Drinking Radium, And Spotting Slippery Neutrinos

This week, Editor-in-Chief Elliot Williams and Kristina Panos met up to discuss the best hacks of the previous week, at least in our opinions.

After chasing the angry bird away from Kristina’s office, we go to the news and learn that we’re in the middle of a solar conjunction Essentially, the Sun has come between Earth and Mars, making communication impossible for about another week. Did you know that this happens every two years?

Then it’s time for a new What’s That Sound, and although Kristina had an interesting albeit somewhat prompted guess, she was, of course, wrong.

And then it’s on to the hacks, beginning with a really cool digital pen that packs all the sensors. We learned about the world’s largest musical instrument, and compared it to the Zadar Sea Organ in Croatia, which if you’ll recall was once a What’s That Sound.

From there we take a look at fake buck converters, radioactive water as a health fad, and a garage door company that has decided to take their ball and go home. Finally we talk about how slippery neutrinos are, and discuss Tom’s time at JawnCon.

Check out the links below if you want to follow along, and as always, tell us what you think about this episode in the comments!

Download and savor at your leisure.

Continue reading “Hackaday Podcast 244: Fake Chips, Drinking Radium, And Spotting Slippery Neutrinos”

This Week In Security: SSH, FTP, And Reptar

It’s time to strap on our propeller beanies, because we’re going to talk crypto. The short version is that some SSH handshakes can expose enough information for a third party to obtain the host’s private signing key. That key is the one that confirms you are connecting to the SSH server you think you are, and if the key validation fails, you get a big warning:

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY!

The math that makes this warning work is public-private key cryptography. The problem we’re talking about today only shows up in RSA authentication. Specifically those that use the Chinese Remainder Theorem (CRT) to quickly calculate the modulos needed to generate the cryptographic signature. If something goes wrong during that calculation, you end up with a signature that is mathematically related to the secret key in a different way than intended. The important point is that knowing this extra value *significantly* weakens the security of the secret key.

This attack has been known for quite some time, but the research has been aimed at causing the calculation fault through power vaults or even memory attacks like Rowhammer. There has also been progress on using a lattice attack against captured handshakes, to make the attack practical with less known information. The real novel element of this week’s approach (pdf) is that it has been tested against SSH.

The paper’s authors performed weekly scans of the entire IPv4 public network space, capturing the handshake from any listening SSH server, and also had 5 years of historic data to draw from. And the results are mixed. There is a Cisco SSH server string that is extremely common in the dataset, and only once did one of these machines send a miscalculated handshake. Possibly a random ram bit flip to blame. And on the other hand, the string “SSH-2.0-Zyxel SSH server” had so many bad signatures, it suggests a device that *always* sends a miscalculated signature. Continue reading “This Week In Security: SSH, FTP, And Reptar”

Taking A Public Transit Display From Project To Product

We’ve noticed an uptick in “project to product” stories lately, which seems like a fantastic trend to us. It means that hackers are turning out projects that really resonate with people, to the degree that taking the leap and scaling up from a one-off to a marketable product is worth the inherent risk. And luckily enough for the rest of us, we get to learn from their experiences.

The latest example of this comes to us from [Stefan Schüller], who from the sound of things only reluctantly undertook the conversion of his LED matrix public transit sign into an actual product. The original project had a lot going for it; it looked fantastic, it was technologically simple, and it provided a valuable service. But as a project, it made certain assumptions and concessions that would cause problems when in the hands of a customer. Chief among these was the physical protection of the fragile LEDs, which could easily shear off the display modules if bumped or dropped. There were also firmware issues, such as access to the backend API that serves the transit data; requiring each customer to sign up for and configure their own API key is a non-starter for a product.

In the article, [Stefan] enumerates a long list of problems that going from project to product raises, as well as how he addressed them. The API issue was solved by implementing his own service, which acts as a middleman between the official API and his customers. A nice plexiglass and sheet-metal frame serves to protect the display, too. Design changes were made as well, not only to provide better functionality but to make manufacturing easier. [Stefan] also relates a tale of woe with regard to getting the display’s app into the app stores, something that few of us have to deal with when we’re just fiddling around with something on the bench.

All in all, [Stefan] does a great job walking us through the trials and tribulations of bringing a product to market. There are similar lessons in this production run scale-up, too, but with an entirely different level of project complexity.

XMems Cowell MEMS-based tweeter on top of dynamic driver. (Credit: xMEMS)

After MEMS Microphones, MEMS Speakers Enter The Market

These days it’s hard to not come across solid-state (micro-electromechanical systems, MEMS) microphones, as they are now displacing electret microphones almost everywhere due to their small size and low cost. Although MEMS speakers are not impossible, creating a miniature speaker that can both displace a lot of air (‘volume’) and accurately reproduce a wide range of frequencies – unlike simple piezo buzzers – is a lot tougher. Here a startup called xMEMS figures that they have at least partially cracked the code with their piezoMEMS speakers, with Creative using the Cowell version in their brand-new Aurvana Ace in-ear monitors. Continue reading “After MEMS Microphones, MEMS Speakers Enter The Market”

Don’t Look Up, Or You’ll See The Time From This VFD Projection Clock

Ceiling clocks were a bit of a thing back in the days when clock radios were a fixture of nightstands. The idea was to project the time onto the ceiling so you’d only have to roll over onto your back and open your eyes to check the time, instead of potentially disturbing your slumber by craning your neck around to see the front of the clock.

As we recall, what sounded like a good idea was iffy in practice, with low-end optics and either weak incandescent bulbs or blazing LEDs. This nifty VFD projection clock by [Thomas Shupfs] seeks to fix those problems, and from the look of it does a pretty good job. It takes advantage of something else that fell out of favor with consumers — analog photography — by tapping into the ready supply of unwanted lenses. He paired that up with an IVL2-7/5 vacuum fluorescent display inside a 3D printed case with a cone-shaped extension to hold the lens at the right distance above the display. [Thomas] says that the STM32 software only supports JSON-RPC over USB at this time, and includes a couple of Python programs with examples of how to set the time and check the accuracy of the clock.

[Thomas] compares the clock head-to-head against his old LED projection clock, as seen in the featured image above; we flipped it for a better idea of what it would look like from bed. We’ve got to say the soft blue glow of the VFD would be a lot more pleasant to wake up to than the bright red LED projection. But this soft white projection clock is nice too.

Thanks to [skymab] for the tip.