Here at Hackaday, we’re always working as hard as we can to bring you the latest and most exciting technologies, and like so many people we’ve become convinced that the possibilities offered by the rise of the Blockchain present unrivaled opportunities for humanity to reinvent itself unfettered by the stifling regulations of a dying system. This is why today we’ve decided to join in with the digital cognoscenti and celebrities embracing Non-Fungible Tokens, or NFTs, as a new promise of non-corporeal digital investment cryptoasset that’s taking the world by storm.
Crypto Non-Fungible Investment Gains!
An NFT is a digital token representing something in the real world, and coupled to a unique ID held in a secure entry in the Blockchain. It’s non-fungible, which means that it’s unique and not interchangeable in the manner of a traditional old-style cryptoasset such as Bitcoin. As it allows a real-world object to be tokenised in digital form it represents a way to own something that provides an irrefutable connection to it as as a digital cryptoasset.
It’s a complex system that’s maybe too difficult to explain fully in a single article, but think of an NFT as a way to invest in a cryptoasset in digital form with its uniqueness guaranteed by Blockchain security, without having the inconvenience of physically owning it. Instead your NFT is safely held on a server on the Internet, and can’t be physically stolen as it would from a bank vault because it has the Blockchain cryptosecurity baked in.
Non Fungible Blockchain Cryptoassets!
NFTs have so far found a space in the creative markets, where they have provided a revolutionary opportunity for artists to expand their sales in the digital realm by selling NFTs of their work. A struggling artist can now access buyers all over the world, who can in turn now invest with confidence in creative talent to which they would never otherwise be exposed. It’s a win-win situation in which both cryptoinvestor and artist benefit from The Power of the Blockchain.
Hackaday is excited to offer a once-in-a-lifetime chance to acquire a Blockchain-cryptosecured NFT representing one of our own articles; our first ever NFT is the only officially sanctioned digital copy of a Hackaday article presenting a novel method of handling toilet paper shortages. The original article will continue to exist on Hackaday.com with all rights reserved, but we will not make any other NFTs of it. We may also decide to update the original article to let everyone know you are the lucky owner of the only digital copy of this piece of greatness. That’s right, this NFT will let you prove you own a screenshot!
Having today sold you on the incredible cryptoinvestment opportunity offered by NFTs, we’ll be back on another date with a more sober and in-depth technical examination of the technology behind them. Meanwhile should our brief foray into NFTs garner any interest (and we really hope it does not), we will donate proceeds to the excellent Girls Who Code, a truly solid investment with a tangible bright future.
Thanks [Micah Scott] for some NFT consultancy during the making of this piece.
It’s 2100 AD, and hackers and normals live together in mile-long habitats in the Earth-Moon system. The habitat is spun up so that the gravity inside is that of Earth, and for exercise, the normals cycle around on bike paths. But the hackers do their cycling outside, in the vacuum of space.
How so? With ion thrusters, rocketing out xenon gas as the propellant. And the source of power? Ultimately that’s the hackers’ legs, pedaling away at a drive system that turns two large Wimshurst machines.
Those Wimshurst machines then produce the high voltage needed for the thruster’s ionization as well as the charge flow. They’re also what gives the space bike it’s distinctly bicycle-like appearance. And based on the calculations below, this may someday work!
It’s been 6 years since the hacker’s treat of a book, “The Martian” by Andy Weir, was self-published, and 2 years since the movie came out. We’ve talked about it briefly before, but enough time has passed that we can now write-up the book’s juicier hacks while being careful to not give away any plot spoilers. The book has more hacks than the movie so we’re using the book as the source.
For anyone unfamiliar with the story, Mark Watney is an astronaut who’s left for dead, by himself, on Mars. To survive, he has a habitat designed for six, called the Hab, two rovers, the Mars Descent Vehicle (MDV) they arrived in, and the bottom portion of the Mars Ascent Vehicle (MAV), the top portion of which was the rocket that his five crewmates departed in when they left him alone on the inhospitable desert planet. If you haven’t read it yet, it’s easy to finish over a long weekend. Do yourself a favor and pick it up after work today.
Watney’s major concern is food. They sent up some potatoes with the mission which will sprout roots from their eyes. To grow potatoes he needs water.
One component of the precious H2O molecule is of course the O, oxygen. The bottom portion of the MAV doesn’t produce oxygen, but it does collect CO2 from the Martian atmosphere and stores it in liquid form. It does this as one step in producing rocket fuel used later to blast off from the surface.
There are innumerable password hacking methods but recent advances in acoustic and accelerometer sensing have opened up the door to side-channel attacks, where passwords or other sensitive data can be extracted from the acoustic properties of the electronics and human interface to the device. A recent and dramatic example includes the hacking of RSA encryption simply by listening to the frequencies of sound a processor puts out when crunching the numbers.
Now there is a new long-distance hack on the scene. The Cerebrum system represents a recent innovation in side-channel password attacks leveraging acoustic signatures of mobile and other electronic devices to extract password data at stand-off distances.
At Hackaday, we’re tapped into Hacker Culture. This goes far beyond a choice of operating system (Arch Linux, or more correctly, ‘Arch GNU/Linux’, or as I’ve recently taken to calling it, ‘Arch GNU plus Linux’). This culture infects every fiber of our soul, from music (DEF CON’s station on Soma FM), our choice in outerwear (black hoodies, duh), and our choice in laptops (covered in stickers). We all wear uniforms, although a gaggle of computer science and electronics nerds all wearing black t-shirts won’t tell you that. We all conform, whether we’re aware of it or not.
Despite a standardized uniform for this subculture, one small detail of this Hacker Uniform has remained unresolved for decades. Are one-hole or three-hole balaclavas best for hacking? Which balaclava is best for stealing bank accounts and hacking into NASA computers? What offers the best protection from precipitating ones and zeros in a real-life Matrix screensaver?