Ask Hackaday: Could Rating Airlines Stop Flights From Spreading Diseases?

 

A few weeks ago, I found myself the victim of flights from hell. My first flight was cancelled, leaving me driving home late at night, only to wake again for a red-eye the next morning. That was cancelled as well, with the second replacement delayed by a further hour. All in all I ended up spending a good ten hours extra in the airport surrounded by tired, sick, and coughing individuals, and ended up a full 16 hours late to my destination. On the return, I’d again tangle with delays, and by the weekend’s close, I’d contracted a nasty flu for my trouble.

All this had me riled up and looking for revenge. I had lost hours of my life to these frustrations, and the respiratory havoc claimed a further week of my working life. It had me realizing that we could surely improve the performance and hygiene of our airliners with a simple idea: a website called Flights From Hell.

Continue reading “Ask Hackaday: Could Rating Airlines Stop Flights From Spreading Diseases?”

Italy Proposes Minimalist Lunar Outpost For Artemis

When humanity first step foot on the Moon, they couldn’t stay around for very long. The Apollo program was limited by the technology of the era — given the incredible cost per kilogram to put a payload down on the lunar surface, it wasn’t feasible to bring down enough consumables for a lengthy stay. Even if they could have carried sufficient food and water to last more than a few days, the limiting factor would have become how long the crew could realistically remain cooped up in the tiny Lunar Excursion Module (LEM).

In comparison, the Artemis program is far more ambitious. NASA wants to establish a long-term, and perhaps even permanent, human presence on our nearest celestial neighbor. This will be made possible, at least in part, to the greatly reduced launch costs offered by current and near-future launch vehicles compared to legacy platforms like the Saturn V or Space Shuttle. But cheaper rides to space is only part of the equation. NASA will also be leaning heavily on the lessons learned during the International Space Program; namely, the advantages of modular design and international cooperation.

While NASA and their commercial partners will still end up providing the bulk of the hardware for the Artemis program, many modules and components are being provided by other countries. From the Orion’s European Service Module (ESM) to the Japanese life support systems to be installed on the Lunar Gateway Station, America won’t be going to the Moon alone this time.

The latest international contribution to the Artemis program comes from the Italian Space Agency (ASI), who have announced their intention to develop a lunar habitation module they’re calling the Multi-Purpose Habitat (MPH) in collaboration with Thales Alenia Space.

Continue reading “Italy Proposes Minimalist Lunar Outpost For Artemis”

Falsified Photos: Fooling Adobe’s Cryptographically-Signed Metadata

Last week, we wrote about the Leica M11-P, the world’s first camera with Adobe’s Content Authenticity Initiative (CAI) credentials baked into every shot. Essentially, each file is signed with Leica’s encryption key such that any changes to the image, whether edits to the photo itself or the metadata, are tracked. The goal is to not only prove ownership, but that photos are real — not tampered with or AI-generated. At least, that’s the main selling point.

Although the CAI has been around since 2019, it’s adoption is far from widespread. Only a handful of programs support it, although this list includes Photoshop, and its unlikely anybody outside the professional photography space was aware of it until recently. This isn’t too surprising, as it really isn’t relevant to the casual shooter — when I take a shot to upload to Instagram, I’m rarely thinking about whether or not I’ll need cryptographic proof that the photo wasn’t edited — usually adding #nofilter to the description is enough. Where the CAI is supposed to shine, however, is in the world of photojournalism. The idea is that a photographer can capture an image that is signed at the time of creation and maintains a tamper-proof log of any edits made. When the final image is sold to a news publisher or viewed by a reader online, they are able to view that data.

At this point, there are two thoughts you might have (or, at least, there are two thoughts I had upon learning about the CAI)

  1. Do I care that a photo is cryptographically signed?
  2. This sounds easy to break.

Well, after some messing around with the CAI tools, I have some answers for you.

  1. No, you don’t.
  2. Yes, it is.

Continue reading “Falsified Photos: Fooling Adobe’s Cryptographically-Signed Metadata”

How To Talk To Your Scope

It used to be only high-end test equipment that had some sort of remote control port. These days, though, they are quite common. Historically, test gear used IEEE-488 (also known as GPIB or, from the originator, HPIB). But today, your device will likely talk over a USB port, a serial port, or a LAN connection. You’d think that every instrument had unique quirks, and controlling it would be nothing like controlling another piece of gear, especially one from another company. That would be half right. Each vendor and even model indeed has its unique command language. There has been a significant effort to standardize some aspects of test instrument control, and you can quickly write code to control things on any platform using many different programming languages. In a few posts, I will show you just how easy it can be.

The key is to use VISA. This protocol is defined by the IVI Foundation that lets you talk to instruments regardless of how they communicate. You do have to build an address that tells the VISA library how to find your device. For example: “TCPIP::192.168.1.92::INSTR.” But once you have that, it is easy to talk to any instrument anywhere.

I say that thinking it is a problem is half right because talking to the box is one task of the two you need to complete. The other is what to say to the box and what it will say back to you. There are a few standards in this area, but this is where you get into problems. Continue reading “How To Talk To Your Scope”

2023 Halloween Hackfest: This Year’s Spooky Winners

With the zombies, ghouls, and ghosts now safely returned to their crypts until next October, it’s time to unveil this year’s winners for the 2023 Halloween Hackfest.

For this contest, sponsors DigiKey and Arduino challenged the community to come up with their best creations for what’s arguably the most hacker-friendly of holidays. Pretty much everything was fair game, from costumes to decorations. The top three winners will get $150 credit from DigiKey and some treats from Arduino — just don’t try to eat them.

Continue reading “2023 Halloween Hackfest: This Year’s Spooky Winners”

The Case For A Technology Aware Lobby Correspondent

We cover all manner of stories here at Hackaday, including awesome hardware hacks, the latest trends and inventions, and in-depth guides to fascinating technologies. We also cover a few news stories from the wider world outside our community, usually when they have some knock-on effect that has an impact on us. Recently this last category of stories has included laws which present a threat to online encryption and privacy in the UK and in the European Union, for example. They’re not the most joyful of news, but it’s vital for everyone with an interest in online matters to be informed about them.

A Long And Inglorious History

A quad flat-pack computer chip, made by VLSI
The infamous Clipper chip. Travis Goodspeed, CC BY 2.0

Those of us who have followed the world of technology will know that badly thought out laws with a negative impact on technology have a long and inglorious history. Some like the infamous backdoored Clipper chip encryption device die an inglorious death as industry or the public succeed in making them irrelevant, but others such as the Digital Millennium Copyright Act or DMCA live on for decades and present an ongoing malign influence. Most recently our ongoing coverage of dubious drone stories included a hefty dose of equally dubious action from lawmakers.

When considering these pieces of legislation it’s easy to characterise the politicians who advance them as gullible idiots easily swayed by any commercial lobbyist with a fistful of cash. But the reality is far more nuanced, while some of them may well be tempted by those lobbyists  they are in most cases neither gullible nor foolish. Instead they are better characterised as clueless on technical issues, and thus easily swayed by received opinion rather than by technological reality. If there’s a fault in the system it’s that the essential feedback which provides the checks and balances is missing, and oddly while sitting here writing this story, the responsibility for this comes close to home. The solution doesn’t lie in changing the politicians, but in changing how they are treated by journalists. Continue reading “The Case For A Technology Aware Lobby Correspondent”

Detecting Neutrinos, The Slippery Ghost Particles That Don’t Want To Interact

Neutrinos are some of the most elusive particles that are well-known to science. These tiny subatomic particles have no electric charge and an extremely small mass, making them incredibly difficult to detect. They are produced in abundance by the sun, as well as by nuclear reactions on Earth and in supernovae. Despite their elusive nature, scientists are keen to detect neutrinos as they can provide valuable information about the processes that produce them.

Neutrinos interact with matter so rarely that it takes a very special kind of detector to catch them in the act. These detectors come in a few different flavors, each employing its unique method to spot these elusive particles. In this article, we’ll take a closer look at how these detectors work and some of the most notable examples of neutrino detectors in the world today.

Continue reading “Detecting Neutrinos, The Slippery Ghost Particles That Don’t Want To Interact”