The Sunspots Are Coming (Again)

There are a bunch of ways to estimate the age of a radio amateur, by the letters in their callsign, by their preferred choice of homebrewing technology, or sometimes by their operating style. One that perhaps doesn’t immediately come to mind is to count how many solar cycles they remember, and since the current cycle 25 is my fourth I guess I’ve seen a few. Cycle 25 is so far shaping up to be quite an active one especially of late, which popular media are describing as bombarding us with flares from a “sunspot archipelago” and the more measured tones of spaceweather.com giving us warning of X-class flares heading in our direction, today!

Jean-Claude Roy, VP, Hydro Quebec
We wouldn’t be this guy for anything. From CBC’s coverage of the 1989 power outage.

As the technology for solar observation has increased in sophistication and the Internet has allowed anyone to follow the events above us as they unfold, the awareness of solar phenomena has shifted away from the relatively small numbers of astronomers and radio amateurs who would once have been eagerly awaiting a solar cycle to a wider audience. Ever since a particularly severe event in March 1989  during cycle 22 caused disruptions including the blackout of a significant part of Canada it’s been a periodic topic of mild doom in slow news moments. But what lies behind the reports of solar activity? Perhaps it’s time to take a look.

The solar cycle refers to the 11-year period of solar activity from a maximum of observed sunspots through a minimum to a new maximum. The sunspots are the visible evidence of the solar magnetic field changing its polarity, and appear as darker areas where there is a greater strength of magnetic flux in the sun’s photosphere. We refer to solar cycles by number with solar cycle 1 occurring in 1755 because that year represents the earliest cycle which can be found in modern astronomical observation data, but previous cycles have been deduced over millennia through dendrochronology, sediment analysis, isotope observations, and other methods. Continue reading “The Sunspots Are Coming (Again)”

Falsified Photos: Fooling Adobe’s Cryptographically-Signed Metadata

Last week, we wrote about the Leica M11-P, the world’s first camera with Adobe’s Content Authenticity Initiative (CAI) credentials baked into every shot. Essentially, each file is signed with Leica’s encryption key such that any changes to the image, whether edits to the photo itself or the metadata, are tracked. The goal is to not only prove ownership, but that photos are real — not tampered with or AI-generated. At least, that’s the main selling point.

Although the CAI has been around since 2019, it’s adoption is far from widespread. Only a handful of programs support it, although this list includes Photoshop, and its unlikely anybody outside the professional photography space was aware of it until recently. This isn’t too surprising, as it really isn’t relevant to the casual shooter — when I take a shot to upload to Instagram, I’m rarely thinking about whether or not I’ll need cryptographic proof that the photo wasn’t edited — usually adding #nofilter to the description is enough. Where the CAI is supposed to shine, however, is in the world of photojournalism. The idea is that a photographer can capture an image that is signed at the time of creation and maintains a tamper-proof log of any edits made. When the final image is sold to a news publisher or viewed by a reader online, they are able to view that data.

At this point, there are two thoughts you might have (or, at least, there are two thoughts I had upon learning about the CAI)

  1. Do I care that a photo is cryptographically signed?
  2. This sounds easy to break.

Well, after some messing around with the CAI tools, I have some answers for you.

  1. No, you don’t.
  2. Yes, it is.

Continue reading “Falsified Photos: Fooling Adobe’s Cryptographically-Signed Metadata”

Ejector Seats: The Rocket Chairs That Save Lives

Once upon a time, escaping an aircraft was a tricky business. You had to unstrap yourself, fling open a heavy glass canopy, and try to wrench yourself out of a small opening without getting smacked by the tail or chopped up by the propeller. Many pilots failed this difficult task, to the tragic loss of their lives.

Eventually, the human cost was heavy enough and militaries grew strained at having to train new pilots to replace the experienced ones lost to accidents and enemy fire. The ejection seat was developed to make escaping a plane as simple as tucking yourself in and pulling a big red handle. Let’s dive in and learn how it came to be.

Continue reading “Ejector Seats: The Rocket Chairs That Save Lives”

Mobile Phones And The Question Of Declining Sperm Quality

In a world increasingly reliant on technology, a pressing question arises: can our dependence on gadgets, particularly mobile phones, be affecting our health in unexpected ways? A growing body of research is now pointing towards a startling trend – declining sperm quality in the human population – with mobile phones emerging as a potential culprit.

Recent studies have been sounding the alarm over a noticeable decline in sperm counts and quality across the globe. This decline isn’t just about quantity; it’s about the vitality, motility, and overall health of sperm cells. The implications of this trend are profound, affecting fertility rates and possibly even the long-term viability of populations. The situation is murky and complicated, but new studies suggest that cellular phones could have a role to play.

Continue reading “Mobile Phones And The Question Of Declining Sperm Quality”

How Do You Prove An AI Didn’t Make Your Art?

In the world of digital art, distinguishing between AI-generated and human-made creations has become a significant challenge. Almost overnight, tool sets for generating AI artworks became commonly available to the public, and suddenly, every digital art competition had to contend with potential submissions. Some have welcomed AI, while others demand competitors create artworks by their own hand and no other.

The problem facing artists and judges alike is just how to determine whether an artwork was created by a human or an AI. So what can be done?

Continue reading “How Do You Prove An AI Didn’t Make Your Art?”

Australia’s Second Largest Telco Went Dark, And Chaos Reigned

Engineers tend to worry about uptime, whether it’s at a corporate server farm or just our own little hobby servers at home. Every now and then, something will go wrong and take a box offline, which requires a little human intervention to fix. Ideally, you’ll still have a command link that stays up so you can fix the problem. Lose that, though, and you’re in a whole lick of trouble.

That’s precisely what happened to Australia’s second largest telecommunications provider earlier this month. Systems went down, millions lost connectivity, and company techs were left scrambling to put the pieces back together. Let’s dive in and explore what happened on Optus’s most embarrassing day in recent memory.

Continue reading “Australia’s Second Largest Telco Went Dark, And Chaos Reigned”

How To Talk To Your Scope

It used to be only high-end test equipment that had some sort of remote control port. These days, though, they are quite common. Historically, test gear used IEEE-488 (also known as GPIB or, from the originator, HPIB). But today, your device will likely talk over a USB port, a serial port, or a LAN connection. You’d think that every instrument had unique quirks, and controlling it would be nothing like controlling another piece of gear, especially one from another company. That would be half right. Each vendor and even model indeed has its unique command language. There has been a significant effort to standardize some aspects of test instrument control, and you can quickly write code to control things on any platform using many different programming languages. In a few posts, I will show you just how easy it can be.

The key is to use VISA. This protocol is defined by the IVI Foundation that lets you talk to instruments regardless of how they communicate. You do have to build an address that tells the VISA library how to find your device. For example: “TCPIP::192.168.1.92::INSTR.” But once you have that, it is easy to talk to any instrument anywhere.

I say that thinking it is a problem is half right because talking to the box is one task of the two you need to complete. The other is what to say to the box and what it will say back to you. There are a few standards in this area, but this is where you get into problems. Continue reading “How To Talk To Your Scope”