The Real John Wick-Style Bullet Proof Suit

If you’ve seen the John Wick movies, you’ve probably had to suspend your disbelief about many things, but the bulletproof suits are perhaps the hardest thing to swallow. They look like stylish suits but are impervious to just about anything at any range. What’s more is when you are hit, they seem to absorb all impact with no effect on the wearer at all.

You can keep running, firing, or karate kicking while the suit takes all of the bullets. You can even pull your jacket up over your face if you want to protect that million-dollar smile. Physics, of course, tells us that a suit like this is pretty much impossible. Except that they actually exist. Granted, the real-life suits don’t have the magic physics-defying powers of Mr. Wick’s suit, but if you have the cash, you can get a smart-looking suit that protects you from getting killed by a bullet.

Real Life, Part I

In the movies, the suits supposedly have Kevlar in them just like a real piece of ballistic body armor. The problem is, Kevlar is bulky. However, most of the real body armor you see — like a vest on a SWAT team operative — is made from Kevlar or similar ballistic fibers like Twaron, Goldflex, or Dyneema. They also have plates made of metal or ceramic. Continue reading “The Real John Wick-Style Bullet Proof Suit”

NFTs Are The Hope For A New Tomorrow!

Here at Hackaday, we’re always working as hard as we can to bring you the latest and most exciting technologies, and like so many people we’ve become convinced that the possibilities offered by the rise of the Blockchain present unrivaled opportunities for humanity to reinvent itself unfettered by the stifling regulations of a dying system. This is why today we’ve decided to join in with the digital cognoscenti and celebrities embracing Non-Fungible Tokens, or NFTs, as a new promise of non-corporeal digital investment cryptoasset that’s taking the world by storm.

Crypto Non-Fungible Investment Gains!

Imagine for a minute, yourself owning a very expensive car. Skievl, CC BY-SA 4.0.
Imagine for a minute, yourself owning a very expensive car. Skievl, CC BY-SA 4.0.

An NFT is a digital token representing something in the real world, and coupled to a unique ID held in a secure entry in the Blockchain. It’s non-fungible, which means that it’s unique and not interchangeable in the manner of a traditional old-style cryptoasset such as Bitcoin. As it allows a real-world object to be tokenised in digital form it represents a way to own something that provides an irrefutable connection to it as as a digital cryptoasset.

It’s a complex system that’s maybe too difficult to explain fully in a single article, but think of an NFT as a way to invest in a cryptoasset in digital form with its uniqueness guaranteed by Blockchain security, without having the inconvenience of physically owning it. Instead your NFT is safely held on a server on the Internet, and can’t be physically stolen as it would from a bank vault because it has the Blockchain cryptosecurity baked in.

Non Fungible Blockchain Cryptoassets!

You don't own this. Yet.
You don’t own this. Yet.

NFTs have so far found a space in the creative markets, where they have provided a revolutionary opportunity for artists to expand their sales in the digital realm by selling NFTs of their work. A struggling artist can now access buyers all over the world, who can in turn now invest with confidence in creative talent to which they would never otherwise be exposed. It’s a win-win situation in which both cryptoinvestor and artist benefit from The Power of the Blockchain.

Hackaday is excited to offer a once-in-a-lifetime chance to acquire a Blockchain-cryptosecured NFT representing one of our own articles; our first ever NFT is the only officially sanctioned digital copy of a Hackaday article presenting a novel method of handling toilet paper shortages. The original article will continue to exist on Hackaday.com with all rights reserved, but we will not make any other NFTs of it. We may also decide to update the original article to let everyone know you are the lucky owner of the only digital copy of this piece of greatness. That’s right, this NFT will let you prove you own a screenshot!

Having today sold you on the incredible cryptoinvestment opportunity offered by NFTs, we’ll be back on another date with a more sober and in-depth technical examination of the technology behind them. Meanwhile should our brief foray into NFTs garner any interest (and we really hope it does not), we will donate proceeds to the excellent Girls Who Code, a truly solid investment with a tangible bright future.

Thanks [Micah Scott] for some NFT consultancy during the making of this piece.

How The Gates (Almost) Stole Christmas

‘Twas the night before Christmas and all through the house
Blue screens were everywhere; no response from the mouse
Windows, it seems, had decided to die
Because it had updated; we didn’t know why
But Santa had a plan while we were all in bed
He reformatted our server and installed Linux instead
In the morning we rushed in and what did we see?
Programs were running, and most of them free!
There was Chrome and Open Office and emacs for me
Not a penny was going to Mr. Gates’ fee
Now we have no more blue screens, ever, of course
Because Santa turned us on to that sweet open source

A Visit From Saint Rich

With apologies to Clement Clarke Moore, Richard Stallman, and the English-speaking world in general — ed.

‘Twas the night before Christmas
While up in my bed,
I stared at the ceiling
With feelings of dread.

I’d really no reason for portents of doom
Lying there, sleepless, in gathering gloom.
We’d wrapped all the presents, and decked out the tree,
But still, there was something niggling at me.

Continue reading “A Visit From Saint Rich”

Bicycle Racing In Space Could Be A Thing

It’s 2100 AD, and hackers and normals live together in mile-long habitats in the Earth-Moon system. The habitat is spun up so that the gravity inside is that of Earth, and for exercise, the normals cycle around on bike paths. But the hackers do their cycling outside, in the vacuum of space.

How so? With ion thrusters, rocketing out xenon gas as the propellant. And the source of power? Ultimately that’s the hackers’ legs, pedaling away at a drive system that turns two large Wimshurst machines.

Those Wimshurst machines then produce the high voltage needed for the thruster’s ionization as well as the charge flow. They’re also what gives the space bike it’s distinctly bicycle-like appearance. And based on the calculations below, this may someday work!

Continue reading “Bicycle Racing In Space Could Be A Thing”

Hacking On Mars In “The Martian”

It’s been 6 years since the hacker’s treat of a book, “The Martian” by Andy Weir, was self-published, and 2 years since the movie came out. We’ve talked about it briefly before, but enough time has passed that we can now write-up the book’s juicier hacks while being careful to not give away any plot spoilers. The book has more hacks than the movie so we’re using the book as the source.

For anyone unfamiliar with the story, Mark Watney is an astronaut who’s left for dead, by himself, on Mars. To survive, he has a habitat designed for six, called the Hab, two rovers, the Mars Descent Vehicle (MDV) they arrived in, and the bottom portion of the Mars Ascent Vehicle (MAV), the top portion of which was the rocket that his five crewmates departed in when they left him alone on the inhospitable desert planet. If you haven’t read it yet, it’s easy to finish over a long weekend. Do yourself a favor and pick it up after work today.

Making Water

Watney’s major concern is food. They sent up some potatoes with the mission which will sprout roots from their eyes. To grow potatoes he needs water.

One component of the precious H2O molecule is of course the O, oxygen. The bottom portion of the MAV doesn’t produce oxygen, but it does collect CO2 from the Martian atmosphere and stores it in liquid form. It does this as one step in producing rocket fuel used later to blast off from the surface.

Continue reading “Hacking On Mars In “The Martian””

Cerebrum: Mobile Passwords Lifted Acoustically With NASB

 

There are innumerable password hacking methods but recent advances in acoustic and accelerometer sensing have opened up the door to side-channel attacks, where passwords or other sensitive data can be extracted from the acoustic properties of the electronics and human interface to the device. A recent and dramatic example includes the hacking of RSA encryption  simply by listening to the frequencies of sound a processor puts out when crunching the numbers.

Now there is a new long-distance hack on the scene. The Cerebrum system represents a recent innovation in side-channel password attacks leveraging acoustic signatures of mobile and other electronic devices to extract password data at stand-off distances.

Continue reading “Cerebrum: Mobile Passwords Lifted Acoustically With NASB”