Calling all hams! Hamvention 2022 is underway and runs through the weekend at the Greene County Fair and Expo Center in Xenia, Ohio. It’s been three long years since Hamvention took place in person, and this year marks the 70th reunion of what has got to be the largest hamfest in the Midwest. If you’re in the area, you don’t want to miss it. You will need a ticket, though, and here are a few places you pick one up.
Indoors, you’ll find six buildings full of commercial vendors. But outside is where the real fun takes place — the flea market. What treasures will you uncover? There’s only one way to find out.
If you want to get into ham radio, there’s no place like a ham fest to kick off your journey. And if you’ve been poring over the ARRL handbook, you’re in luck, because they’re proctoring ham exams for free at the church across the street on Friday and Saturday.
Can’t make it out for whatever reason, but live close to the fairgrounds? Want to get in the mood on your way there? Tune to 1620AM within a five-ish mile radius to hear weather, traffic, and parking info, plus interviews and other assorted radio fun. If you live nowhere near Ohio, don’t despair — they are livestreaming it on YouTube.
[Note: the Hara Arena, pictured in our awesome Joe Kim artwork, is the old home of Hamvention, and was demolished in 2016. Better head off to the Greene County Fairgrounds instead.]
As we gear up for a summer in the field, or more accurately in a series of fields, it’s time to turn our attention towards Eastnor Castle in the Western English county of Herefordshire, venue for the upcoming Electromagnetic Field hacker camp. Sadly we’ve got no badge to tease you with, but they’ve released a list of the talks that will fill their schedule. There are so many to choose from, we can only mention a few in this article.
One feature of this camp we’re very interested in will be CuTEL, a wired copper telephone network on the field. We’ll be taking along our trusty GPO 746 to be part of it of course, but for those without one, there’s [Matthew Harrold]’s talk on building a copper telephone network in a field.
Our cursory scan of the list finishes up with [Alistair MacDonald] on how not to start a hackerspace. We’ve seen our fair share of hackerspace drama over the years, so whether this one causes pain for ex-hackerspace-directors or not, it promises to be informative for anyone in the hackerspace world.
As spring slowly slides into summer here in Europe where this is being written, the warm weather is a reminder that on the horizon are the summer’s crop of hacker camps. The largest European one this year will be the Dutch MCH2022 near the end of July, and to whet our appetite they’ve made public some details of their badge. And true to the past form of Dutch camps, it’s rather an impressive build.
Since this is another piece of work from badge.team it has the expected ESP32 module, but alongside it on the elegantly-designed PCB there’s an RP2040 and a Lattice ICE40UP5K FPGA. The ESP is there to run the badge team firmware which even includes backwards compatibility with the original SHA2017 badge, the RP2040 ties everything together and provides a multitude of USB peripherals, and the FPGA is there to run user code. From the front, the badge has a Game Boy Advance-style form factor with a large colour TFT screen and the usual joystick and buttons. Other peripherals include a brace of addressable LEDs, a pair of nifty sensors from Bosch, and a 16-bit stereo audio channel that even powers a small onboard mono speaker when no headphones are connected.
The hardware may be slick, but it’s the badge.team firmware that makes this as special as all their previous offerings. It offers the chance to easily write apps either in MicroPython for the ESP32, or as payloads for the FPGA, and what makes it special is that it comes with an online app store from which all the apps can be downloaded. We’re told that it will be able to run a range of emulators out of the box, so we’re really looking forward to seeing the final version at the event. Meanwhile they’ve released a demo video that you can see below the break, and if you’re curious you can take a look at its SHA2017 badge ancestor.
When I arrived at the InfoAge Science and History Museum for this year’s Vintage Computer Festival East, I fully expected it to be a reduced event compared to last year. After all, how could it not? Due to the schedule getting shifted around by COVID, show runner Jeffrey Brace and his team had just six months to put together an event that usually gets planned over the course of an entire year. With such a truncated preparation time, they more than deserved a little slack.
But as anyone who attended VCF East 2022 can attest, they didn’t need it. Not only did the event meet the high expectations set by last year’s Festival, it managed to exceed them. There were more workshops, more talks, more vendors, more consignment rooms, more live streams, more…well, everything. This year’s program even got a splash of glossy color compared to the grayscale handout attendees received in October. It was, by any metric you care to use, better than ever.
It does however leave me in somewhat on an unenviable position. As we’ve learned during the pandemic, a virtual representation of an event as extensive as VCF can give you a taste of what’s offered, but all the nuance is lost. Looking at pictures of somebody’s passion project can’t compare to actually meeting the person and seeing that glint of pride in their eye as they walk you through all the details.
So bear that in mind through this rundown of some of the projects that caught my eye. This isn’t a “best of” list, and the Festival is certainly not a competition. But each attendee will invariably come away with their own handful of favorite memories, so I’ll document mine here. If you’d like to make your own memories, I’d strongly suggest making the trek out to the Jersey Shore come April 2023 for the next Vintage Computer Festival East.
This weekend the InfoAge Science and History Museum in Wall, New Jersey will once again play host to the Vintage Computer Festival East — the annual can’t-miss event for anyone who has even a passing interest in the weird and wonderful machines that paved the way for the supercomputers we now all carry around in our pockets. Ticket holders will have access to a program absolutely jam packed with workshops, talks, and exhibits that center around the dual themes of “Women in Computing” and “Computers for the Masses”, plus a consignment and vendor area that almost guarantees you’ll be going home a little poorer than when you got there. But hey, at least you’ll have some new toys to play with.
For those that can’t make the pilgrimage to the tropical wonderland that is the Jersey Shore in April, all three days of the Festival will be live-streamed to the VCF YouTube page. There’s even an official Discord server where you can chat with other remote attendees. We’re glad to see more events adopting a hybrid approach after two years of COVID-19 lockdown, as it gives the far-flung a chance to participate in something they would otherwise miss completely. That said, there’s no virtual replacement for the experience of browsing the exhibits and consignment areas, so if it’s at all possible we recommend you get yourself to InfoAge for at least one of the days.
Incidentally, don’t worry if you’ve got the sneaking feeling that it hasn’t been anywhere near a year since the last time the VCF descended on Wall Township. The 2021 Festival got pushed to October because of the lingering plague, but rather than permanently change the date going forward, the 2022 Festival has returned to its traditional season. Of course that means the wait until VCF 2023 will seem unusually long after this double-shot, so here’s hoping we see another swap meet at the InfoAge campus before the end of the year.
For the electronic badge enthusiast, these last two years have seen something of a famine. While the pandemic may not be over yet, we’re learning to live with it in 2022, and there’s the prospect of a flush of new badges even if not all events are in-person yet. First to reach us is the Carolinacon Online 2 badge, a fairly simple affair which naturally has us pleased as punch because it incorporates the only chip that’s guaranteed to get you through the semiconductor shortage, an NE555 timer. It’s got everything, a flashing LED, and, well, that’s it because with the best will in the world a 555 is no powerhouse on its own. As a memento and a way to support the event it fits the bill, but it’s fair to say that this is no electronic tour de force.
Nobody likes opening up a hacking target and finding a black epoxy blob inside, but all hope is not lost. At least not if you’ve got the dedication and skills of [Jeroen Domburg] alias [Sprite_tm].
It all started when [Big Clive] ordered a chintzy Chinese musical meditation flower and found a black blob. But tantalizingly, the shiny plastic mess also included a 2 MB flash EEPROM. The questions then is: can one replace the contents with your own music? Spoiler: yes, you can! [Sprite_tm] and a team of Buddha Chip Hackers distributed across the globe got to work. (Slides here.)
[Jeroen] started off with binwalk and gets, well, not much. The data that [Big Clive] dumped had high enough entropy that it looks either random or encrypted, with the exception of a couple tiny sections. Taking a look at the data, there was some structure, though. [Jeroen] smelled shitty encryption. Now in principle, there are millions of bad encryption methods out there for every good one. But in practice, naive cryptographers tend to gravitate to a handful of bad patterns.
Bad pattern number one is XOR. Used correctly, XORing can be a force for good, but if you XOR your key with zeros, naturally, you get the key back as your ciphertext. And this data had a lot of zeros in it. That means that there were many long strings that started out the same, but they seemed to go on forever, as if they were pseudo-random. Bad crypto pattern number two is using a linear-feedback shift register for your pseudo-random numbers, because the parameter space is small enough that [Sprite_tm] could just brute-force it. At the end, he points out their third mistake — making the encryption so fun to hack on that it kept him motivated!
Decrypted, the EEPROM data was a filesystem. And the machine language turned out to be for an 8051, but there was still the issue of the code resident on the microcontroller’s ROM. So [Sprite_tm] bought one of these flowers, and started probing around the black blob itself. He wrote a dumper program that output the internal ROM’s contents over SPI. Ghidra did some good disassembling, and that let him figure out how the memory was laid out, and how the flow worked. He also discovered a “secret” ROM area in the chip’s flash, which he got by trying some random functions and looking for side effects. The first hit turned out to be a memcpy. Sweet.
Meanwhile, the Internet was still working on this device, and [Neil555] bought a flower too. But this one had a chip, rather than a blob, and IDing this part lead them to an SDK, and that has an audio suite that uses a derivative of WMA audio encoding. And that was enough to get music loaded into the flower. (Cue a short rick-rolling.) Victory!
Well, victory if all you wanted to do was hack your music onto the chip. As a last final fillip, [Sprite_tm] mashed the reverse-engineered schematic of the Buddha Flower together with [Thomas Flummer]’s very nice DIY Remoticon badge, and uploaded our very own intro theme music into the device on a badge. Bonus points? He added LEDs that blinked out the LSFR that were responsible for the “encryption”. Sick burn!
Editor’s Note: This is the last of the Remoticon 2 videos we’ve got. Thanks to all who gave presentations, to all who attended and participated in the lively Discord back channel, and to all you out there who keep the hacking flame alive. We couldn’t do it without you, and we look forward to a return to “normal” Supercon sometime soon.