The Most Secure, Modern Computer Might Be A Mac

The Linux world is currently seeing an explosion in new users, thanks in large part to Microsoft turning its Windows operating system into the most intrusive piece of spyware in modern computing. For those who value privacy and security, Linux has long been the safe haven where there’s reasonable certainty that the operating system itself isn’t harvesting user data or otherwise snooping where it shouldn’t be. Yet even after solving the OS problem, a deeper issue remains: the hardware itself. Since around 2008, virtually every Intel and AMD processor has included coprocessors running closed-source code known as the Intel Management Engine (IME) or AMD Platform Security Processor (PSP).

M1 MacBook Air, now with more freedom

These components operate entirely outside the user’s and operating system’s control. They are given privileged access to memory, storage, and networking and can retain that access even when the CPU is not running, creating systemic vulnerabilities that cannot be fully mitigated by software alone. One practical approach to minimizing exposure to opaque management subsystems like the IME or PSP is to use platforms that do not use x86 hardware in the first place. Perhaps surprisingly, the ARM-based Apple M1 and M2 computers offer a compelling option, providing a more constrained and clearly defined trust model for Linux users who prioritize privacy and security.

Before getting into why Apple Silicon can be appealing for those with this concern, we first need to address the elephant in the room: Apple’s proprietary, closed-source operating system. Luckily, the Asahi Linux project has done most of the heavy lifting for those with certain Apple Silicon machines who want to go more open-source. In fact, Asahi is one of the easiest Linux installs to perform today even when compared to beginner-friendly distributions like Mint or Fedora, provided you are using fully supported M1 or M2 machines rather than attempting an install on newer, less-supported models. The installer runs as a script within macOS, eliminating the need to image a USB stick. Once the script is executed, the user simply follows the prompts, restarts the computer, and boots into the new Linux environment. Privacy-conscious users may also want to take a few optional steps, such as verifying the Asahi checksum and encrypting the installation with LUKS but these steps are not too challenging for experienced users. Continue reading “The Most Secure, Modern Computer Might Be A Mac”

German Fireball’s 15 Minutes Of Fame

Sunday night, around 7:00 PM local time, a bright fireball streaked across the western German sky, exploded, and rained chunks of space rock down on the region around Koblenz. One of the largest known chunks put a soccer-ball-sized hole in someone’s roof, landing in their bedroom. Fortunately, nobody was hurt. But given the apparent size of the explosion, there must be many more pieces out there for the finding, and a wave of hopeful meteorite hunters has descended upon the region.

But if you wanted a piece of the action, where exactly would you start looking? How do scientists find meteorites anyway? And what should you do if you happen to see a similar fireball in the night sky?

Citizen Science

Meteorite video-bombs a boring parking lot in Heerlen, NL.

In the age of always-on dashboard cameras, ubiquitous smartphones, and other video recording devices, it’s hard for a shy meteorite to find a quiet spot out of the public eye. That makes them a lot easier to find than they were in the past. Indeed, the International Meteor Organization, which aggregates amateur meteor observations, received more than 3,200 reports of this one, including several with video documentation. Some are stunning, and others may not even be of the event at all.

By collecting reports from many locations, they can hope to piece together the meteorite’s trajectory. However, if you look at the individual reports, it’s clear that this is a difficult task. Nobody is expecting a bright fireball to streak across the night sky, so many of the reports are reasonably vague on the details and heavy on the awe.

This report from [Sophie Z], for instance, is typical. She records where she was and roughly the location in the night sky where the meteorite passed, along with the comment “I’ve never seen anything so amazing and large before in my life.” Other amateur observers are more precise. [David C] (“I have a Ph.D in physics”) managed to record the start and the end heading of the meteorite to a couple of decimal places. He must have had a camera.

Continue reading “German Fireball’s 15 Minutes Of Fame”

Secure Communication, Buried In A News App

Cryptography is a funny thing. Supposedly, if you do the right kind of maths to a message, you can send it off to somebody else, and as long as they’re the only one that knows a secret little thing, nobody else will be able to read it. We have all sorts of apps for this, too, that are specifically built for privately messaging other people.

Only… sometimes just having such an app is enough to get you in trouble. Even just the garbled message itself could be proof against you, even if your adversary can’t read it. Enter The Guardian. The UK-based media outlet has deployed a rather creative and secure way of accepting private tips and information, one which seeks to provide heavy cover for those writing in with the hottest scoops.

Continue reading “Secure Communication, Buried In A News App”

Reflections On Ten Years With The Wrencher

An auspicious anniversary passed for me this week, as it’s a decade since I started writing for Hackaday. In that time this job has taken me all over  Europe, it’s shown me the very best and most awesome things our community has to offer, and I hope that you have enjoyed my attempts to share all of that with you. It’s worth a moment to reflect on the last ten years in terms of what has made our world during that time. Continue reading “Reflections On Ten Years With The Wrencher”

The Curse Of The Everything Device

In theory having a single device that combines the features of multiple dedicated devices is a great idea, saving a lot of space, time and money. However, in reality it mostly means that these features now conflict with each other, force us to deal with more complex devices that don’t last nearly as long, and become veritable vampires for your precious attention.

Whereas in the olden days a phone was just used for phone calls, now it’s also a video and photo camera, multimedia computer, pager, and more, but at any point an incoming phone call can interrupt what you are doing. There’s also always the temptation of doom scrolling on one of the infinite ‘social media’ apps. Even appliances like televisions and refrigerators are like that now, adding ‘smarts’ that also vie for your attention, whether it’s with advertisements, notifications, or worse.

Meanwhile trying to simply do some writing work on your PC is a battle against easy distractions, leading people to flee to the digital equivalent of typewriters out of sheer desperation. Similarly, we increasingly see ‘dumb’ phones, and other single-task devices making a comeback, both as commercial options and as DIY projects by the community.

Are we seeing the end of the ‘everything device’ and the return to a more simple time?

Continue reading “The Curse Of The Everything Device”

What One-Winged Squids Can Teach The Airship Renaissance

It’s a blustery January day outside Lakehurst, New Jersey. The East Coast of North America is experiencing its worst weather in decades, and all civilian aircraft have been grounded the past four days, from Florida to Maine. For the past two days, that order has included military aircraft, including those certified “all weather” – with one notable exception. A few miles offshore, rocking and bucking in the gales, a U.S. Navy airship braves the storm. Sleet pelts the plexiglass windscreen and ice sloughs off the gasbag in great sheets as the storm rages on, and churning airscrews keep the airship on station.

If you know history you might be a bit confused: the rigid airship USS Akron was lost off the coast of New Jersey, but in April, not January. Before jumping into the comments with your corrections, note the story I’ve begun is set not in 1933, but in 1957, a full generation later.

The airship caught in the storm is no experimental Zeppelin, but an N-class blimp, the workhorse of the cold-war fleet. Yes, there was a cold war fleet of airships; we’ll get to why further on. The most important distinction is that unlike the last flight of the Akron, this story doesn’t end in tragedy, but in triumph. Tasked to demonstrate their readiness, five blimps from Lakehurst’s Airship Airborne Early-Warning Squadron 1 remained on station with no gaps in coverage for the ten days from January 15th to 24th. The blimps were able to swap places, watch-on-watch, and provide continuous coverage, in spite of weather conditions that included 60 knot winds and grounded literally every other aircraft in existence at that time. Continue reading “What One-Winged Squids Can Teach The Airship Renaissance”

How Safe Are Old Airbags, Anyway?

Automotive airbags are key safety devices that aim to reduce injuries and mortality in the event of motor vehicle accidents. These rapidly-inflating cushions act to soften the blow of an impact, catching occupants of the vehicle and preventing them from hitting hard parts of the vehicle’s interior.

Airbags are rigorously tested to perform as faultlessly as possible under all conditions. However, no system is perfect, and every automotive component has an expected service life. The question is—how old is too old when it comes to airbags? The answer is not exactly straightforward.
Continue reading “How Safe Are Old Airbags, Anyway?”