With Affordable Storage Options Dwindling, Where To Store Our Data?

These days our appetite for more data storage is larger than ever, with video files larger, photo resolutions higher, and project files easily zipping past a few hundred MB. At the same time our options for data storage are becoming more and more limited. For the longest time we could count on there always being a newer, roomier, faster, and cheaper form of storage to come along, but those days would seem to be over.

We can look back and laugh at low capacity USB Flash drives of the early 2000s, yet the first storage drive to hit 1 TB capacity did so in 2007, with a Hitachi Deskstar 7k100, only for that level of capacity in PCs to not really be exceeded nineteen years later.

We also had Blu-ray discs (BD) promise to cram the equivalent of dozens of DVDs onto a single BD, with two- and even four-layer BDs storing up to a one-hundred-and-twenty-eight GB. Yet today optical media is dying a slow death as the sole remaining cheap storage option. NAND Flash storage has only increased in price, and the options for those of us who have large cold storage requirements would seem to be decreasing every day.

So what is the economical solution here? Invest in LTO tapes using commercial left-overs, or give up and sign up for Cloud Storage™ for the low-low price of a monthly recurring fee?

Continue reading “With Affordable Storage Options Dwindling, Where To Store Our Data?”

Ask Hackaday: How Much Compute Is Enough?

Over the history of this business, a lot of people have foreseen limits that look rather silly in hindsight– in 1943, IBM President Thomas Watson declared that “I think there is a world market for maybe five computers.” That was more than a little wrong. Depending on the definition of computers– particularly if you include microcontrollers, there’s probably trillions of the things.

We might as well include microcontrollers, considering how often we see projects replicating retrocomputers on them. The RP2350 can do a Mac 128k, and the ESP32-P4 gets you into the Quadra era. Which, honestly, covers the majority of daily tasks most people use computers for.

The RP2350 and ESP32-P4 both have more than 640kB of RAM, so that famous Bill Gates quote obviously didn’t age any better than Thomas Watson’s prediction. As Yogi Berra once said: predictions are hard, especially about the future. Continue reading “Ask Hackaday: How Much Compute Is Enough?”

The Most Secure, Modern Computer Might Be A Mac

The Linux world is currently seeing an explosion in new users, thanks in large part to Microsoft turning its Windows operating system into the most intrusive piece of spyware in modern computing. For those who value privacy and security, Linux has long been the safe haven where there’s reasonable certainty that the operating system itself isn’t harvesting user data or otherwise snooping where it shouldn’t be. Yet even after solving the OS problem, a deeper issue remains: the hardware itself. Since around 2008, virtually every Intel and AMD processor has included coprocessors running closed-source code known as the Intel Management Engine (IME) or AMD Platform Security Processor (PSP).

M1 MacBook Air, now with more freedom

These components operate entirely outside the user’s and operating system’s control. They are given privileged access to memory, storage, and networking and can retain that access even when the CPU is not running, creating systemic vulnerabilities that cannot be fully mitigated by software alone. One practical approach to minimizing exposure to opaque management subsystems like the IME or PSP is to use platforms that do not use x86 hardware in the first place. Perhaps surprisingly, the ARM-based Apple M1 and M2 computers offer a compelling option, providing a more constrained and clearly defined trust model for Linux users who prioritize privacy and security.

Before getting into why Apple Silicon can be appealing for those with this concern, we first need to address the elephant in the room: Apple’s proprietary, closed-source operating system. Luckily, the Asahi Linux project has done most of the heavy lifting for those with certain Apple Silicon machines who want to go more open-source. In fact, Asahi is one of the easiest Linux installs to perform today even when compared to beginner-friendly distributions like Mint or Fedora, provided you are using fully supported M1 or M2 machines rather than attempting an install on newer, less-supported models. The installer runs as a script within macOS, eliminating the need to image a USB stick. Once the script is executed, the user simply follows the prompts, restarts the computer, and boots into the new Linux environment. Privacy-conscious users may also want to take a few optional steps, such as verifying the Asahi checksum and encrypting the installation with LUKS but these steps are not too challenging for experienced users. Continue reading “The Most Secure, Modern Computer Might Be A Mac”

German Fireball’s 15 Minutes Of Fame

Sunday night, around 7:00 PM local time, a bright fireball streaked across the western German sky, exploded, and rained chunks of space rock down on the region around Koblenz. One of the largest known chunks put a soccer-ball-sized hole in someone’s roof, landing in their bedroom. Fortunately, nobody was hurt. But given the apparent size of the explosion, there must be many more pieces out there for the finding, and a wave of hopeful meteorite hunters has descended upon the region.

But if you wanted a piece of the action, where exactly would you start looking? How do scientists find meteorites anyway? And what should you do if you happen to see a similar fireball in the night sky?

Citizen Science

Meteorite video-bombs a boring parking lot in Heerlen, NL.

In the age of always-on dashboard cameras, ubiquitous smartphones, and other video recording devices, it’s hard for a shy meteorite to find a quiet spot out of the public eye. That makes them a lot easier to find than they were in the past. Indeed, the International Meteor Organization, which aggregates amateur meteor observations, received more than 3,200 reports of this one, including several with video documentation. Some are stunning, and others may not even be of the event at all.

By collecting reports from many locations, they can hope to piece together the meteorite’s trajectory. However, if you look at the individual reports, it’s clear that this is a difficult task. Nobody is expecting a bright fireball to streak across the night sky, so many of the reports are reasonably vague on the details and heavy on the awe.

This report from [Sophie Z], for instance, is typical. She records where she was and roughly the location in the night sky where the meteorite passed, along with the comment “I’ve never seen anything so amazing and large before in my life.” Other amateur observers are more precise. [David C] (“I have a Ph.D in physics”) managed to record the start and the end heading of the meteorite to a couple of decimal places. He must have had a camera.

Continue reading “German Fireball’s 15 Minutes Of Fame”

Secure Communication, Buried In A News App

Cryptography is a funny thing. Supposedly, if you do the right kind of maths to a message, you can send it off to somebody else, and as long as they’re the only one that knows a secret little thing, nobody else will be able to read it. We have all sorts of apps for this, too, that are specifically built for privately messaging other people.

Only… sometimes just having such an app is enough to get you in trouble. Even just the garbled message itself could be proof against you, even if your adversary can’t read it. Enter The Guardian. The UK-based media outlet has deployed a rather creative and secure way of accepting private tips and information, one which seeks to provide heavy cover for those writing in with the hottest scoops.

Continue reading “Secure Communication, Buried In A News App”

Reflections On Ten Years With The Wrencher

An auspicious anniversary passed for me this week, as it’s a decade since I started writing for Hackaday. In that time this job has taken me all over  Europe, it’s shown me the very best and most awesome things our community has to offer, and I hope that you have enjoyed my attempts to share all of that with you. It’s worth a moment to reflect on the last ten years in terms of what has made our world during that time. Continue reading “Reflections On Ten Years With The Wrencher”

The Curse Of The Everything Device

In theory having a single device that combines the features of multiple dedicated devices is a great idea, saving a lot of space, time and money. However, in reality it mostly means that these features now conflict with each other, force us to deal with more complex devices that don’t last nearly as long, and become veritable vampires for your precious attention.

Whereas in the olden days a phone was just used for phone calls, now it’s also a video and photo camera, multimedia computer, pager, and more, but at any point an incoming phone call can interrupt what you are doing. There’s also always the temptation of doom scrolling on one of the infinite ‘social media’ apps. Even appliances like televisions and refrigerators are like that now, adding ‘smarts’ that also vie for your attention, whether it’s with advertisements, notifications, or worse.

Meanwhile trying to simply do some writing work on your PC is a battle against easy distractions, leading people to flee to the digital equivalent of typewriters out of sheer desperation. Similarly, we increasingly see ‘dumb’ phones, and other single-task devices making a comeback, both as commercial options and as DIY projects by the community.

Are we seeing the end of the ‘everything device’ and the return to a more simple time?

Continue reading “The Curse Of The Everything Device”