NASA Are Squaring Up Against The Asteroid Threat

The world faces many terrestrial crises right now, so it’s easy to forget that giant space rocks may one day threaten the very existence of entire civilizations. Yes, the threat of asteroid strikes is a remote one, but nevertheless something humanity may have to face one day, and one day soon.

NASA takes the issue seriously, and has staffed its Planetary Defence Coordination Office since 2016. In service to these efforts, it’s also developing a mission to research how dangerous androids may be deflected. The Double Asteroid Redirection Test, or DART, is set to launch within the next year. Continue reading “NASA Are Squaring Up Against The Asteroid Threat”

The Postmortem Password Problem

Death and passwords: two things we just can’t avoid. With so much of our lives tied up in cloud services nowadays, there’s good reason to worry about what happens to these accounts if we drop dead tomorrow. For many of us, important documents, photos, financial information and other data will be locked behind a login prompt. Your payment methods will also expire shortly after you have, which could lead to data loss if not handled promptly. The most obvious way to address this is to give a trusted party access in case of emergency.

A Bad Solution

Let’s start with the simplest solution: using the same password everywhere.  Great, all you need to do is put this on a Post-it note, stuff it in an envelope, and let someone know where to find it. Unfortunately, using a single password for many services is a terrible idea. Password breaches happen, and if you’re using a single password across the internet, they can be disastrous.

Password breaches are usually the result of an attacker finding a vulnerability that allows reading password data from an application’s database. Odds are high that your information has been leaked in one of these breaches. You can check if your email is on a list of known breaches with Have I Been Pwned. Don’t feel bad if you’ve been pwned, my email shows up on six different breaches, and this service only indexes publicly known breaches!

Depending on the competency of the company that was breached, your password may have been stolen in a few different formats. In the worst case, the passwords were stored as-is (i.e., cleartext), and the breach contains your actual password. Nowadays, storing passwords in cleartext is never considered acceptable. A hash of the password is stored instead. Attackers need to use a tool like hashcat to try to recover the passwords via brute force hash cracking. This is slow for complex passwords, but is always getting faster as GPUs improve.

So we really need to use different passwords everywhere, or our Tumblr account from 2013 could give access to our bank account. Given the large number of services we use and our inability to remember passwords, we’re going to need to use a password manager. Continue reading “The Postmortem Password Problem”

Ask Hackaday: What Is Amazon Thinking By Entering The Palm-Reading Business?

Have you heard about this One? At least three United States senators have, and they want to know what Amazon plans to do with all the biometric data collected by the Amazon One program. It’s their new contactless payment method that uses your unique palm print instead of cards or phones to make purchases, gain access to venues of work and play, and enter or pay in whatever other spaces Amazon can invade down the line. The idea is that one day, we’ll all be able to leave our homes without any form of money or ID of any kind, because we’ll all be stored away in Bezos’ big biometric file cabinet.

We tossed this one around in the writer’s room back when the Amazon One concept was nothing but a pile of buzzwords and a render or two, but these kiosks are now active in 50+ Whole Foods and Amazon 4-Star locations across the US. Here’s the deal: you can only sign up at a participating store that has a kiosk, because they have to scan your palms into the system. We were worried that the signup kiosk could easily take fingerprint scans at the same time, but according to the gifs in Morning Brew’s review, it just uses another of their point-of-sale palm scanners along with a touch screen and a card reader. But you still have to hover your entire hand over it, so who’s to say that the scan ends where the fingers begin?

Continue reading “Ask Hackaday: What Is Amazon Thinking By Entering The Palm-Reading Business?”

Bar code shown in a 3D plain in Vaporwave Aesthetic

Tech In Plain Sight: Check Digits And Human Error

Computers in working order and with correct software don’t make mistakes. People, however, make plenty of mistakes (including writing bad software or breaking computers). In quality circles, there’s a Japanese term, poka yoke, which roughly means ‘error avoidance’. The idea is to avoid errors by making them too obvious for them to occur. For example, consider a SIM card in your phone. The little diagonal corner means it only goes in one way. If you put it in the wrong way, it is obviously wrong.

To be successful at poka yoke, you have to be able to imagine what a user might do wrong and then come up with some way to make it obvious that it is wrong. There are examples of this all around us and we sometimes don’t even know it. For example, what do your credit card number, your car’s VIN code, and a UPC code on a can of beans have in common?

Continue reading “Tech In Plain Sight: Check Digits And Human Error”

Open-Source Insulin: Biohackers Aiming For Distributed Production

When you’ve got a diabetic in your life, there are few moments in any day that are free from thoughts about insulin. Insulin is literally the first coherent thought I have every morning, when I check my daughter’s blood glucose level while she’s still asleep, and the last thought as I turn out the lights, making sure she has enough in her insulin pump to get through the night. And in between, with the constant need to calculate dosing, adjust levels, add corrections for an unexpected snack, or just looking in the fridge and counting up the number of backup vials we have on hand, insulin is a frequent if often unwanted intruder on my thoughts.

And now, as my daughter gets older and seeks like any teenager to become more independent, new thoughts about insulin have started to crop up. Insulin is expensive, and while we have excellent insurance, that can always change in a heartbeat. But even if it does, the insulin must flow — she has no choice in the matter. And so I thought it would be instructional to take a look at how insulin is made on a commercial scale, in the context of a growing movement of biohackers who are looking to build a more distributed system of insulin production. Their goal is to make insulin affordable, and with a vested interest, I want to know if they’ve got any chance of making that goal a reality.

Continue reading “Open-Source Insulin: Biohackers Aiming For Distributed Production”

Neuromorphic Computing: What Is It And Where Are We At?

For the last hundred or so years, collectively as humanity, we’ve been dreaming, thinking, writing, singing, and producing movies about a machine that could think, reason, and be intelligent in a similar way to us. The stories beginning with “Erewhon” published in 1872 by Sam Butler, Edgar Allan Poe’s “Maelzel’s Chess Player,” and the 1927 film “Metropolis” showed the idea that a machine could think and reason like a person. Not in magic or fantastical way. They drew from the automata of ancient Greece and Egypt and combined notions of philosophers such as Aristotle, Ramon Llull, Hobbes, and thousands of others.

Their notions of the human mind led them to believe that all rational thought could be expressed as algebra or logic. Later the arrival of circuits, computers, and Moore’s law led to continual speculation that human-level intelligence was just around the corner. Some have heralded it as the savior of humanity, where others portray a calamity as a second intelligent entity rises to crush the first (humans).

The flame of computerized artificial intelligence has brightly burned a few times before, such as in the 1950s, 1980s, and 2010s. Unfortunately, both prior AI booms have been followed by an “AI winter” that falls out of fashion for failing to deliver on expectations. This winter is often blamed on a lack of computer power, inadequate understanding of the brain, or hype and over-speculation. In the midst of our current AI summer, most AI researchers focus on using the steadily increasing computer power available to increase the depth of their neural nets. Despite their name, neural nets are inspired by the neurons in the brain and share only surface-level similarities.

Some researchers believe that human-level general intelligence can be achieved by simply adding more and more layers to these simplified convolutional systems fed by an ever-increasing trove of data. This point is backed up by the incredible things these networks can produce, and it gets a little better every year. However, despite what wonders deep neural nets produce, they still specialize and excel at just one thing. A superhuman Atari playing AI cannot make music or think about weather patterns without a human adding those capabilities. Furthermore, the quality of the input data dramatically impacts the quality of the net, and the ability to make an inference is limited, producing disappointing results in some domains. Some think that recurrent neural nets will never gain the sort of general intelligence and flexibility that our brains offer.

However, some researchers are trying to creating something more brainlike by, you guessed it, more closely emulates a brain. Given that we are in a golden age of computer architecture, now seems the time to create new hardware. This type of hardware is known as Neuromorphic hardware.

Continue reading “Neuromorphic Computing: What Is It And Where Are We At?”

radio direction finding

Where’s That Radio? A Brief History Of Direction Finding

We think of radio navigation and direction finding as something fairly modern. However, it might surprise you that direction finding is nearly as old as radio itself. In 1888, Heinrich Hertz noted that signals were strongest when in one orientation of a loop antenna and weakest 90 degrees rotated. By 1900, experimenters noted dipoles exhibit similar behavior and it wasn’t long before antennas were made to rotate to either maximize signal or locate the transmitter.

British radio direction finding truck from 1927; public domain
British radio direction finding truck from 1927; public domain

Of course, there is one problem. You can’t actually tell which side of the antenna is pointing to the signal with a loop or a dipole. So if the antenna is pointing north, the signal might be to the north but it could also be to the south. Still, in some cases that’s enough information.

John Stone patented a system like this in 1901. Well-known radio experimenter Lee De Forest also had a novel system in 1904. These systems all suffered from a variety of issues. At shortwave frequencies, multipath propagation can confuse the receiver and while longwave signals need very large antennas. Most of the antennas moved, but some — like one by Marconi — used multiple elements and a switch.

However, there are special cases where these limitations are acceptable. For example, when Pan Am needed to navigate airplanes over the ocean in the 1930s, Hugo Leuteritz who had worked at RCA before Pan Am, used a loop antenna at the airport to locate a transmitter on the plane. Since you knew which side of the antenna the airplane must be on, the bidirectional detection wasn’t a problem.

Continue reading “Where’s That Radio? A Brief History Of Direction Finding”