Australia’s Second Largest Telco Went Dark, And Chaos Reigned

Engineers tend to worry about uptime, whether it’s at a corporate server farm or just our own little hobby servers at home. Every now and then, something will go wrong and take a box offline, which requires a little human intervention to fix. Ideally, you’ll still have a command link that stays up so you can fix the problem. Lose that, though, and you’re in a whole lick of trouble.

That’s precisely what happened to Australia’s second largest telecommunications provider earlier this month. Systems went down, millions lost connectivity, and company techs were left scrambling to put the pieces back together. Let’s dive in and explore what happened on Optus’s most embarrassing day in recent memory.

Continue reading “Australia’s Second Largest Telco Went Dark, And Chaos Reigned”

How To Talk To Your Scope

It used to be only high-end test equipment that had some sort of remote control port. These days, though, they are quite common. Historically, test gear used IEEE-488 (also known as GPIB or, from the originator, HPIB). But today, your device will likely talk over a USB port, a serial port, or a LAN connection. You’d think that every instrument had unique quirks, and controlling it would be nothing like controlling another piece of gear, especially one from another company. That would be half right. Each vendor and even model indeed has its unique command language. There has been a significant effort to standardize some aspects of test instrument control, and you can quickly write code to control things on any platform using many different programming languages. In a few posts, I will show you just how easy it can be.

The key is to use VISA. This protocol is defined by the IVI Foundation that lets you talk to instruments regardless of how they communicate. You do have to build an address that tells the VISA library how to find your device. For example: “TCPIP::192.168.1.92::INSTR.” But once you have that, it is easy to talk to any instrument anywhere.

I say that thinking it is a problem is half right because talking to the box is one task of the two you need to complete. The other is what to say to the box and what it will say back to you. There are a few standards in this area, but this is where you get into problems. Continue reading “How To Talk To Your Scope”

2023 Halloween Hackfest: This Year’s Spooky Winners

With the zombies, ghouls, and ghosts now safely returned to their crypts until next October, it’s time to unveil this year’s winners for the 2023 Halloween Hackfest.

For this contest, sponsors DigiKey and Arduino challenged the community to come up with their best creations for what’s arguably the most hacker-friendly of holidays. Pretty much everything was fair game, from costumes to decorations. The top three winners will get $150 credit from DigiKey and some treats from Arduino — just don’t try to eat them.

Continue reading “2023 Halloween Hackfest: This Year’s Spooky Winners”

The Case For A Technology Aware Lobby Correspondent

We cover all manner of stories here at Hackaday, including awesome hardware hacks, the latest trends and inventions, and in-depth guides to fascinating technologies. We also cover a few news stories from the wider world outside our community, usually when they have some knock-on effect that has an impact on us. Recently this last category of stories has included laws which present a threat to online encryption and privacy in the UK and in the European Union, for example. They’re not the most joyful of news, but it’s vital for everyone with an interest in online matters to be informed about them.

A Long And Inglorious History

A quad flat-pack computer chip, made by VLSI
The infamous Clipper chip. Travis Goodspeed, CC BY 2.0

Those of us who have followed the world of technology will know that badly thought out laws with a negative impact on technology have a long and inglorious history. Some like the infamous backdoored Clipper chip encryption device die an inglorious death as industry or the public succeed in making them irrelevant, but others such as the Digital Millennium Copyright Act or DMCA live on for decades and present an ongoing malign influence. Most recently our ongoing coverage of dubious drone stories included a hefty dose of equally dubious action from lawmakers.

When considering these pieces of legislation it’s easy to characterise the politicians who advance them as gullible idiots easily swayed by any commercial lobbyist with a fistful of cash. But the reality is far more nuanced, while some of them may well be tempted by those lobbyists  they are in most cases neither gullible nor foolish. Instead they are better characterised as clueless on technical issues, and thus easily swayed by received opinion rather than by technological reality. If there’s a fault in the system it’s that the essential feedback which provides the checks and balances is missing, and oddly while sitting here writing this story, the responsibility for this comes close to home. The solution doesn’t lie in changing the politicians, but in changing how they are treated by journalists. Continue reading “The Case For A Technology Aware Lobby Correspondent”

A Look At All The Badge Hacks Of Supercon 2023

For those of you who’ve had the opportunity to join us in Pasadena for Supercon, you’ll know it’s a wild ride from start to finish. Singling out a single moment as our favorite is pretty much impossible, but certainly the Sunday Badge Hacking Ceremony has to rank up there. It’s the culmination of ~78 hours of intense hardware and software hacking, and that’s not even counting the pre-show work that attendees often put into their creations. Every year, without fail, this community manages to pull off badge hacks that are beyond anything we could have imagined — and we’re the ones who made the thing in the first place.

Unfortunately, in the mad rush, we’ve never had a chance to actually photograph the hacked badges and share them with the Hackaday readers. This year, at the urging of some of the badge hackers themselves, we were able to throw together a suitable overhead light at the last minute and actually snapped shots of each badge after it was presented to the audience.

The resulting images, sorted by badge hacking category, are below. While some proved difficult to photograph, especially with an impromptu setup, we’re happy to at least have a complete record of this year’s creations. Hopefully we’ll be able to improve on our technique for 2024 and beyond. If yours shows up, or if you’d like to share your appreciation, sound off in the comments below!

Continue reading “A Look At All The Badge Hacks Of Supercon 2023”

Detecting Neutrinos, The Slippery Ghost Particles That Don’t Want To Interact

Neutrinos are some of the most elusive particles that are well-known to science. These tiny subatomic particles have no electric charge and an extremely small mass, making them incredibly difficult to detect. They are produced in abundance by the sun, as well as by nuclear reactions on Earth and in supernovae. Despite their elusive nature, scientists are keen to detect neutrinos as they can provide valuable information about the processes that produce them.

Neutrinos interact with matter so rarely that it takes a very special kind of detector to catch them in the act. These detectors come in a few different flavors, each employing its unique method to spot these elusive particles. In this article, we’ll take a closer look at how these detectors work and some of the most notable examples of neutrino detectors in the world today.

Continue reading “Detecting Neutrinos, The Slippery Ghost Particles That Don’t Want To Interact”

JawnCon 0x0: A Strong Start With A Bright Future

Last month, I had the pleasure witnessing a birth. No, not of a child. What I’m talking about is something far rarer, though arguably, just as loud and danger fraught — the birth of a new hacker convention.

The very first JawnCon took place on October 19th and 20th at Arcadia University, just outside of Philadelphia. If you’re in the Northeast US and suddenly find yourself surprised to learn that a hacker con managed to slip under your radar, don’t be. The organizers, who previously helped launch the WOPR Summit back in 2019, wisely decided to keep the scale of this first outing in check. Just a single track of talks, a chill out room, and 130 or like-minded individuals.

Although, even if they’d hatched a more ambitious plan, it’s hard to imagine they’d have had enough time to pull it off. Due to various circumstances, JawnCon had to come together at a breakneck pace, with less than 100 days separating the con’s inception and kickoff. That an event such as this could not only be organized so quickly, but go off without a hitch, is a testament to the incredible folks behind the scenes.

As for what a Jawn is…well, that might take a bit more explaining. It’s regional slang that’s perhaps best described as a universal noun in that it can be used to refer to basically anything or anyone. Think “smurf” or “da kine”. According to organizer Russell Handorf, the all-encompassing nature of the word describes not only his personal ethos but the spirit of the event. Rather than focusing too closely on any one aspect of hacking, JawnCon set out to explore a diverse array of tech topics from both the new and old schools. It would be an event where you could listen to a talk on payphone remote management, try your hand at lock picking, and learn about the latest in anti-drone technology, all under the same roof.

To that end, the team did an incredible job. Everyone I spoke to, young or old, newbie or vet, had a fantastic time. What’s more, as revealed in the Closing Remarks, the con actually managed to stay in the black — no mean feat for a first attempt. With a little luck, it seems like JawnCon is well on its way to becoming one of the Northeast’s can’t-miss hacker events. Continue reading “JawnCon 0x0: A Strong Start With A Bright Future”