Italy Proposes Minimalist Lunar Outpost For Artemis

When humanity first step foot on the Moon, they couldn’t stay around for very long. The Apollo program was limited by the technology of the era — given the incredible cost per kilogram to put a payload down on the lunar surface, it wasn’t feasible to bring down enough consumables for a lengthy stay. Even if they could have carried sufficient food and water to last more than a few days, the limiting factor would have become how long the crew could realistically remain cooped up in the tiny Lunar Excursion Module (LEM).

In comparison, the Artemis program is far more ambitious. NASA wants to establish a long-term, and perhaps even permanent, human presence on our nearest celestial neighbor. This will be made possible, at least in part, to the greatly reduced launch costs offered by current and near-future launch vehicles compared to legacy platforms like the Saturn V or Space Shuttle. But cheaper rides to space is only part of the equation. NASA will also be leaning heavily on the lessons learned during the International Space Program; namely, the advantages of modular design and international cooperation.

While NASA and their commercial partners will still end up providing the bulk of the hardware for the Artemis program, many modules and components are being provided by other countries. From the Orion’s European Service Module (ESM) to the Japanese life support systems to be installed on the Lunar Gateway Station, America won’t be going to the Moon alone this time.

The latest international contribution to the Artemis program comes from the Italian Space Agency (ASI), who have announced their intention to develop a lunar habitation module they’re calling the Multi-Purpose Habitat (MPH) in collaboration with Thales Alenia Space.

Continue reading “Italy Proposes Minimalist Lunar Outpost For Artemis”

Falsified Photos: Fooling Adobe’s Cryptographically-Signed Metadata

Last week, we wrote about the Leica M11-P, the world’s first camera with Adobe’s Content Authenticity Initiative (CAI) credentials baked into every shot. Essentially, each file is signed with Leica’s encryption key such that any changes to the image, whether edits to the photo itself or the metadata, are tracked. The goal is to not only prove ownership, but that photos are real — not tampered with or AI-generated. At least, that’s the main selling point.

Although the CAI has been around since 2019, it’s adoption is far from widespread. Only a handful of programs support it, although this list includes Photoshop, and its unlikely anybody outside the professional photography space was aware of it until recently. This isn’t too surprising, as it really isn’t relevant to the casual shooter — when I take a shot to upload to Instagram, I’m rarely thinking about whether or not I’ll need cryptographic proof that the photo wasn’t edited — usually adding #nofilter to the description is enough. Where the CAI is supposed to shine, however, is in the world of photojournalism. The idea is that a photographer can capture an image that is signed at the time of creation and maintains a tamper-proof log of any edits made. When the final image is sold to a news publisher or viewed by a reader online, they are able to view that data.

At this point, there are two thoughts you might have (or, at least, there are two thoughts I had upon learning about the CAI)

  1. Do I care that a photo is cryptographically signed?
  2. This sounds easy to break.

Well, after some messing around with the CAI tools, I have some answers for you.

  1. No, you don’t.
  2. Yes, it is.

Continue reading “Falsified Photos: Fooling Adobe’s Cryptographically-Signed Metadata”

How To Talk To Your Scope

It used to be only high-end test equipment that had some sort of remote control port. These days, though, they are quite common. Historically, test gear used IEEE-488 (also known as GPIB or, from the originator, HPIB). But today, your device will likely talk over a USB port, a serial port, or a LAN connection. You’d think that every instrument had unique quirks, and controlling it would be nothing like controlling another piece of gear, especially one from another company. That would be half right. Each vendor and even model indeed has its unique command language. There has been a significant effort to standardize some aspects of test instrument control, and you can quickly write code to control things on any platform using many different programming languages. In a few posts, I will show you just how easy it can be.

The key is to use VISA. This protocol is defined by the IVI Foundation that lets you talk to instruments regardless of how they communicate. You do have to build an address that tells the VISA library how to find your device. For example: “TCPIP::192.168.1.92::INSTR.” But once you have that, it is easy to talk to any instrument anywhere.

I say that thinking it is a problem is half right because talking to the box is one task of the two you need to complete. The other is what to say to the box and what it will say back to you. There are a few standards in this area, but this is where you get into problems. Continue reading “How To Talk To Your Scope”

2023 Halloween Hackfest: This Year’s Spooky Winners

With the zombies, ghouls, and ghosts now safely returned to their crypts until next October, it’s time to unveil this year’s winners for the 2023 Halloween Hackfest.

For this contest, sponsors DigiKey and Arduino challenged the community to come up with their best creations for what’s arguably the most hacker-friendly of holidays. Pretty much everything was fair game, from costumes to decorations. The top three winners will get $150 credit from DigiKey and some treats from Arduino — just don’t try to eat them.

Continue reading “2023 Halloween Hackfest: This Year’s Spooky Winners”

The Case For A Technology Aware Lobby Correspondent

We cover all manner of stories here at Hackaday, including awesome hardware hacks, the latest trends and inventions, and in-depth guides to fascinating technologies. We also cover a few news stories from the wider world outside our community, usually when they have some knock-on effect that has an impact on us. Recently this last category of stories has included laws which present a threat to online encryption and privacy in the UK and in the European Union, for example. They’re not the most joyful of news, but it’s vital for everyone with an interest in online matters to be informed about them.

A Long And Inglorious History

A quad flat-pack computer chip, made by VLSI
The infamous Clipper chip. Travis Goodspeed, CC BY 2.0

Those of us who have followed the world of technology will know that badly thought out laws with a negative impact on technology have a long and inglorious history. Some like the infamous backdoored Clipper chip encryption device die an inglorious death as industry or the public succeed in making them irrelevant, but others such as the Digital Millennium Copyright Act or DMCA live on for decades and present an ongoing malign influence. Most recently our ongoing coverage of dubious drone stories included a hefty dose of equally dubious action from lawmakers.

When considering these pieces of legislation it’s easy to characterise the politicians who advance them as gullible idiots easily swayed by any commercial lobbyist with a fistful of cash. But the reality is far more nuanced, while some of them may well be tempted by those lobbyists  they are in most cases neither gullible nor foolish. Instead they are better characterised as clueless on technical issues, and thus easily swayed by received opinion rather than by technological reality. If there’s a fault in the system it’s that the essential feedback which provides the checks and balances is missing, and oddly while sitting here writing this story, the responsibility for this comes close to home. The solution doesn’t lie in changing the politicians, but in changing how they are treated by journalists. Continue reading “The Case For A Technology Aware Lobby Correspondent”

Detecting Neutrinos, The Slippery Ghost Particles That Don’t Want To Interact

Neutrinos are some of the most elusive particles that are well-known to science. These tiny subatomic particles have no electric charge and an extremely small mass, making them incredibly difficult to detect. They are produced in abundance by the sun, as well as by nuclear reactions on Earth and in supernovae. Despite their elusive nature, scientists are keen to detect neutrinos as they can provide valuable information about the processes that produce them.

Neutrinos interact with matter so rarely that it takes a very special kind of detector to catch them in the act. These detectors come in a few different flavors, each employing its unique method to spot these elusive particles. In this article, we’ll take a closer look at how these detectors work and some of the most notable examples of neutrino detectors in the world today.

Continue reading “Detecting Neutrinos, The Slippery Ghost Particles That Don’t Want To Interact”

JawnCon 0x0: A Strong Start With A Bright Future

Last month, I had the pleasure witnessing a birth. No, not of a child. What I’m talking about is something far rarer, though arguably, just as loud and danger fraught — the birth of a new hacker convention.

The very first JawnCon took place on October 19th and 20th at Arcadia University, just outside of Philadelphia. If you’re in the Northeast US and suddenly find yourself surprised to learn that a hacker con managed to slip under your radar, don’t be. The organizers, who previously helped launch the WOPR Summit back in 2019, wisely decided to keep the scale of this first outing in check. Just a single track of talks, a chill out room, and 130 or like-minded individuals.

Although, even if they’d hatched a more ambitious plan, it’s hard to imagine they’d have had enough time to pull it off. Due to various circumstances, JawnCon had to come together at a breakneck pace, with less than 100 days separating the con’s inception and kickoff. That an event such as this could not only be organized so quickly, but go off without a hitch, is a testament to the incredible folks behind the scenes.

As for what a Jawn is…well, that might take a bit more explaining. It’s regional slang that’s perhaps best described as a universal noun in that it can be used to refer to basically anything or anyone. Think “smurf” or “da kine”. According to organizer Russell Handorf, the all-encompassing nature of the word describes not only his personal ethos but the spirit of the event. Rather than focusing too closely on any one aspect of hacking, JawnCon set out to explore a diverse array of tech topics from both the new and old schools. It would be an event where you could listen to a talk on payphone remote management, try your hand at lock picking, and learn about the latest in anti-drone technology, all under the same roof.

To that end, the team did an incredible job. Everyone I spoke to, young or old, newbie or vet, had a fantastic time. What’s more, as revealed in the Closing Remarks, the con actually managed to stay in the black — no mean feat for a first attempt. With a little luck, it seems like JawnCon is well on its way to becoming one of the Northeast’s can’t-miss hacker events. Continue reading “JawnCon 0x0: A Strong Start With A Bright Future”