Over the history of this business, a lot of people have foreseen limits that look rather silly in hindsight– in 1943, IBM President Thomas Watson declared that “I think there is a world market for maybe five computers.” That was more than a little wrong. Depending on the definition of computers– particularly if you include microcontrollers, there’s probably trillions of the things.
We might as well include microcontrollers, considering how often we see projects replicating retrocomputers on them. The RP2350 can do a Mac 128k, and the ESP32-P4 gets you into the Quadra era. Which, honestly, covers the majority of daily tasks most people use computers for.
The RP2350 and ESP32-P4 both have more than 640kB of RAM, so that famous Bill Gates quote obviously didn’t age any better than Thomas Watson’s prediction. As Yogi Berra once said: predictions are hard, especially about the future. Continue reading “Ask Hackaday: How Much Compute Is Enough?”→
The Linux world is currently seeing an explosion in new users, thanks in large part to Microsoft turning its Windows operating system into the most intrusive piece of spyware in modern computing. For those who value privacy and security, Linux has long been the safe haven where there’s reasonable certainty that the operating system itself isn’t harvesting user data or otherwise snooping where it shouldn’t be. Yet even after solving the OS problem, a deeper issue remains: the hardware itself. Since around 2008, virtually every Intel and AMD processor has included coprocessors running closed-source code known as the Intel Management Engine (IME) or AMD Platform Security Processor (PSP).
M1 MacBook Air, now with more freedom
These components operate entirely outside the user’s and operating system’s control. They are given privileged access to memory, storage, and networking and can retain that access even when the CPU is not running, creating systemic vulnerabilities that cannot be fully mitigated by software alone. One practical approach to minimizing exposure to opaque management subsystems like the IME or PSP is to use platforms that do not use x86 hardware in the first place. Perhaps surprisingly, the ARM-based Apple M1 and M2 computers offer a compelling option, providing a more constrained and clearly defined trust model for Linux users who prioritize privacy and security.
Before getting into why Apple Silicon can be appealing for those with this concern, we first need to address the elephant in the room: Apple’s proprietary, closed-source operating system. Luckily, the Asahi Linux project has done most of the heavy lifting for those with certain Apple Silicon machines who want to go more open-source. In fact, Asahi is one of the easiest Linux installs to perform today even when compared to beginner-friendly distributions like Mint or Fedora, provided you are using fully supported M1 or M2 machines rather than attempting an install on newer, less-supported models. The installer runs as a script within macOS, eliminating the need to image a USB stick. Once the script is executed, the user simply follows the prompts, restarts the computer, and boots into the new Linux environment. Privacy-conscious users may also want to take a few optional steps, such as verifying the Asahi checksum and encrypting the installation with LUKS but these steps are not too challenging for experienced users. Continue reading “The Most Secure, Modern Computer Might Be A Mac”→
Sunday night, around 7:00 PM local time, a bright fireball streaked across the western German sky, exploded, and rained chunks of space rock down on the region around Koblenz. One of the largest known chunks put a soccer-ball-sized hole in someone’s roof, landing in their bedroom. Fortunately, nobody was hurt. But given the apparent size of the explosion, there must be many more pieces out there for the finding, and a wave of hopeful meteorite hunters has descended upon the region.
But if you wanted a piece of the action, where exactly would you start looking? How do scientists find meteorites anyway? And what should you do if you happen to see a similar fireball in the night sky?
Citizen Science
Meteorite video-bombs a boring parking lot in Heerlen, NL.
In the age of always-on dashboard cameras, ubiquitous smartphones, and other video recording devices, it’s hard for a shy meteorite to find a quiet spot out of the public eye. That makes them a lot easier to find than they were in the past. Indeed, the International Meteor Organization, which aggregates amateur meteor observations, received more than 3,200 reports of this one, including several with video documentation. Some are stunning, and others may not even be of the event at all.
By collecting reports from many locations, they can hope to piece together the meteorite’s trajectory. However, if you look at the individual reports, it’s clear that this is a difficult task. Nobody is expecting a bright fireball to streak across the night sky, so many of the reports are reasonably vague on the details and heavy on the awe.
Cryptography is a funny thing. Supposedly, if you do the right kind of maths to a message, you can send it off to somebody else, and as long as they’re the only one that knows a secret little thing, nobody else will be able to read it. We have all sorts of apps for this, too, that are specifically built for privately messaging other people.
Only… sometimes just having such an app is enough to get you in trouble. Even just the garbled message itself could be proof against you, even if your adversary can’t read it. Enter The Guardian. The UK-based media outlet has deployed a rather creative and secure way of accepting private tips and information, one which seeks to provide heavy cover for those writing in with the hottest scoops.
An auspicious anniversary passed for me this week, as it’s a decade since I started writing for Hackaday. In that time this job has taken me all over Europe, it’s shown me the very best and most awesome things our community has to offer, and I hope that you have enjoyed my attempts to share all of that with you. It’s worth a moment to reflect on the last ten years in terms of what has made our world during that time. Continue reading “Reflections On Ten Years With The Wrencher”→
In theory having a single device that combines the features of multiple dedicated devices is a great idea, saving a lot of space, time and money. However, in reality it mostly means that these features now conflict with each other, force us to deal with more complex devices that don’t last nearly as long, and become veritable vampires for your precious attention.
Whereas in the olden days a phone was just used for phone calls, now it’s also a video and photo camera, multimedia computer, pager, and more, but at any point an incoming phone call can interrupt what you are doing. There’s also always the temptation of doom scrolling on one of the infinite ‘social media’ apps. Even appliances like televisions and refrigerators are like that now, adding ‘smarts’ that also vie for your attention, whether it’s with advertisements, notifications, or worse.
Meanwhile trying to simply do some writing work on your PC is a battle against easy distractions, leading people to flee to the digital equivalent of typewriters out of sheer desperation. Similarly, we increasingly see ‘dumb’ phones, and other single-task devices making a comeback, both as commercial options and as DIY projects by the community.
Are we seeing the end of the ‘everything device’ and the return to a more simple time?
It’s a blustery January day outside Lakehurst, New Jersey. The East Coast of North America is experiencing its worst weather in decades, and all civilian aircraft have been grounded the past four days, from Florida to Maine. For the past two days, that order has included military aircraft, including those certified “all weather” – with one notable exception. A few miles offshore, rocking and bucking in the gales, a U.S. Navy airship braves the storm. Sleet pelts the plexiglass windscreen and ice sloughs off the gasbag in great sheets as the storm rages on, and churning airscrews keep the airship on station.
If you know history you might be a bit confused: the rigid airship USS Akron was lost off the coast of New Jersey, but in April, not January. Before jumping into the comments with your corrections, note the story I’ve begun is set not in 1933, but in 1957, a full generation later.
The airship caught in the storm is no experimental Zeppelin, but an N-class blimp, the workhorse of the cold-war fleet. Yes, there was a cold war fleet of airships; we’ll get to why further on. The most important distinction is that unlike the last flight of the Akron, this story doesn’t end in tragedy, but in triumph. Tasked to demonstrate their readiness, five blimps from Lakehurst’s Airship Airborne Early-Warning Squadron 1 remained on station with no gaps in coverage for the ten days from January 15th to 24th. The blimps were able to swap places, watch-on-watch, and provide continuous coverage, in spite of weather conditions that included 60 knot winds and grounded literally every other aircraft in existence at that time. Continue reading “What One-Winged Squids Can Teach The Airship Renaissance”→