Hackaday Links Column Banner

Hackaday Links: September 5, 2021

Good news from Jezero crater as the Mars rover Perseverance manages to accomplish for the first time what it was sent to do: collect and cache core samples from rocks. Space buffs will no doubt recall that Perseverance’s first attempt at core sampling didn’t go as planned — the rock that planetary scientists selected ended up being too soft, and the percussive coring bit just turned the core sample into powder. The latest attempt went exactly as planned: the cylindrical coring bit made a perfect cut, the core slipped into the sample tube nested inside the coring bit, and the core broke off cleanly inside the sample tube when it was cammed off-axis. Operators were able to provide visible proof that the core sample was retained this time using the Mastcam-Z instrument, which clearly shows the core in the sample tube. What’s neat is that they then performed a “percuss to ingest” maneuver, where the coring bit and sample tube are vibrated briefly, so that the core sample and any dust grains left around the sealing rim slide down into the sample tube. The next step is to transfer the sample tube to the belly of the rover where it’ll be hermetically sealed after some basic analysis.

Did any Android users perhaps oversleep this week? If you did, you’re not alone — lots of users of the Google Clock app reported that their preset alarms didn’t go off. Whether it was an actual issue caused by an update or some kind of glitch is unclear, but it clearly didn’t affect everyone; my phone mercilessly reminded me when 6:00 AM came around every day last week. But it apparently tripped up some users, to the point where one reported losing his job because of being late for work. Not to be judgmental, but it seems to me that if your job is so sensitive to you being late, it might make sense to have a backup alarm clock of some sort. We all seem to be a little too trusting that our phones are going to “just work,” and when they don’t, we’re surprised and appalled.

There seem to be two kinds of people in the world — those who hate roller coasters, and those who love them. I’m firmly in the latter camp, and will gladly give any coaster, no matter how extreme, a try. There have been a few that I later regretted, of course, but by and large, the feeling of being right on the edge of bodily harm is pretty cool. Crossing over the edge, though, is far less enjoyable, as the owners of an extreme coaster in Japan are learning. The Dodon-pa coaster at the Fuji-Q Highland amusement park is capable of hitting 112 miles (180 km) per hour and has racked up a sizable collection of injuries over the last ten months, including cervical and thoracic spine fractures. The ride is currently closed for a safety overhaul; one has to wonder what they’re doing to assess what the problem areas of the ride are. Perhaps they’re sending crash test dummies on endless rides to gather data, a sight we’d like to see.

And finally, you may have thought that phone phreaking was a thing of the past; in a lot of ways, you’d be right. But there’s still a lot to be learned about how POTS networks were put together, and this phone switch identification guide should be a big help to any phone geeks out there. Be ready to roll old school here — nothing but a plain text file that describes how to probe the switch that a phone is connected just by listening to things like dial tones and ring sounds. What’s nice is that it describes why the switches sound the way they do, so you get a lot of juicy technical insights into how switches work.

Getting Back Into Hackerspaces

Last week, I got my first chance to get out and about among the hackers in what feels like forever. Hackerspaces here in Germany are finally able to re-open for business-as-almost-usual, allowing access to reasonable numbers of people providing they’re immunized or tested, and wearing masks of course. And that meant that I got to take up [Andreas’] invitation to come see his Stereo Ninja inspection microscope project in person.

Stereo Ninja basically makes clever use of two Raspberry Pi cameras, swaps out the optics for greater enlargement, and displays the results on a 3D monitor — to be viewed with shutter glasses. This is one of those projects that you really have to see in person to “get it”. He’s still working on stripping the build down to make it simpler and more affordable, to make the project more accessible to the average hacker.

We talked about DIYing a 3D monitor. It turns out that the shutter glasses are cheap, and it looks like they’re synced by an IR pulse to the monitor. There should be a hacker solution for 3D to work with a fast gaming monitor at least. [Andreas] also pointed me to this great breakout board for the Raspberry Pi CM4 that breaks out both camera lanes for easy stereo / 3D capture. I got the tour of the FabLab, and we talked welding, metal 3D printing, software, hardware and assorted nerdy stuff. [Alex] showed up on his way out of town for the weekend — it’d been ages since we hung out.

In short, I remembered how it used to be in the before-times, when visits with other hackers, and to other hackerspaces, were possible. There’s this spontaneous and mutually inspirational kind of chat that’s just impossible remotely, and is tremendously important.

We’re not done with the COVID pandemic yet, I fear, and different parts of the world have entirely different trajectories. If you told me two years ago that I would be visiting hackerspaces with a mask and proof-of-vaccination, I would have thought you were crazy. But at the same time this brief visit gave me a little boost of hope for the future. We will get through all of this, and we’ll all meet up again at our local hackerspaces.

Hackaday Podcast 134: Hackers Camping, Metal Detecting, 360° Hearing, And Pocket Computing

Hackaday editors Elliot Williams and Mike Szczys are joined by contributing editor Jenny List to talk about her adventure at Born Hack last week. We also discuss the many capacitor values that go into regen receivers, the quest for a Raspberry Pi handheld that includes a slide-out keyboard, and how capacitive touch might make mice (mouses?) and touchpads better. There’s a deep dive into 3D printer bed leveling, a junk-box metal detector build, and an ambisonic microphone which can listen any-which-way.

Take a look at the links below if you want to follow along, and as always, tell us what you think about this episode in the comments!

Direct download (60 MB or so.)

Continue reading “Hackaday Podcast 134: Hackers Camping, Metal Detecting, 360° Hearing, And Pocket Computing”

This Week In Security: Ransomware Decryption, OpenSSL, And USBGadget Spoofing

We’ve covered a lot of ransomware here, but we haven’t spent a lot of time looking at the decryptor tools available to victims. When ransomware gangs give up, or change names, some of them release a decryption tool for victims who haven’t paid. It’s not really a good idea to run one of those decryptors, though. The publishers don’t have a great track record for taking care of your data, after all. When a decryptor does get released, and is verified to work, security researchers will reverse engineer the tool, and release a known-good decryption program.

The good folks at No More Ransom are leading the charge, building such tools, and hosting a collection of them. They also offer Crypto Sheriff, a tool to identify which ransomware strain got your files. Upload a couple encrypted files, and it will inform you exactly what you’re dealing with, and whether there is a decryptor available. The site is a cooperation between the Dutch police, Interpol, Kaspersky, and McAfee. It may surprise you to know that they recommend reporting every ransomware case to the authorities. I can confirm that at the very least, the FBI in the US are very interested in keeping track of the various ransomware attacks — I’ve fielded a surprise call from an agent following up on an infection.

OpenSSL

The OpenSSL project has fixed a pair of vulnerabilities, CVE-2021-3711 and CVE-2021-3712 with release 1.1.11l. The first is a possible buffer overflow caused by a naive length calculation function. A “fixed” length header is actually dynamic, so a carefully crafted plaintext can overflow the allocated buffer. Continue reading “This Week In Security: Ransomware Decryption, OpenSSL, And USBGadget Spoofing”

Image of detonation engine firing

Japanese Rocket Engine Explodes: Continuously And On Purpose

Liquid-fuelled rocket engine design has largely followed a simple template since the development of the German V-2 rocket in the middle of World War 2. Propellant and oxidizer are mixed in a combustion chamber, creating a mixture of hot gases at high pressure that very much wish to leave out the back of the rocket, generating thrust.

However, the Japan Aerospace Exploration Agency (JAXA) has recently completed a successful test of a different type of rocket, known as a rotating detonation engine. The engine relies on an entirely different method of combustion, with the aim to produce more thrust from less fuel. We’ll dive into how it works, and how the Japanese test bodes for the future of this technology.

Deflagration vs. Detonation

Humans love combusting fuels in order to do useful work. Thus far in our history, whether we look at steam engines, gasoline engines, or even rocket engines, all these technologies have had one thing in common: they all rely on fuel that burns in a deflagration. It’s the easily controlled manner of slow combustion that we’re all familiar with since we started sitting around campfires. Continue reading “Japanese Rocket Engine Explodes: Continuously And On Purpose”

So How Does A Rocket Fly Sideways, Anyway?

It’s often said that getting into orbit is less about going up, and more about going sideways very fast. So in that sense, the recent launch conducted by aerospace startup Astra could be seen as the vehicle simply getting the order of operations wrong. Instead of going up and then burning towards the horizon, it made an exceptionally unusual sideways flight before finally moving skyward.

As you might expect, the booster didn’t make it to orbit. But not for lack of trying. In fact, that the 11.6 meter (38 feet) vehicle was able to navigate through its unprecedented lateral maneuver and largely correct its flight-path is a testament to the engineering prowess of the team at the Alameda, California based company. It’s worth noting that it was the ground controller’s decision to cut the rocket’s engines once it had flown high and far enough away to not endanger anyone on the ground that ultimately ended the flight; the booster itself was still fighting to reach space until the very last moment.

Astra’s rocket on the launch pad.

There’s a certain irony to the fact that this flight, the third Astra has attempted since their founding in 2016, was the first to be live streamed to YouTube. Had the company not pulled back their usual veil of secrecy, we likely wouldn’t have such glorious high-resolution footage of what will forever be remembered as one of the most bizarre rocket mishaps in history. The surreal image of the rocket smoothly sliding out of frame as if it was trying to avoid the camera’s gaze has already become a meme online, arguably reaching a larger and more diverse audience than would have resulted from a successful launch. As they say, there’s no such thing as bad press.

Naturally, the viral clip has spurred some questions. You don’t have to be a space expert to know that the pointy end of the rocket is usually supposed to go up, but considering how smooth the maneuver looks, some have even wondered if it wasn’t somehow intentional. With so much attention on this unusual event, it seems like the perfect time to take a close look at how Astra’s latest rocket launch went, quite literally, sideways.

Continue reading “So How Does A Rocket Fly Sideways, Anyway?”

Linux Fu: User Space File Systems — Now For Windows, Too!

One of the nice things about the Unix philosophy that Linux inherited is that the filesystem is very modular. That’s good, too, because a typical system might want a choice of filesystems like ext4, reiserfs, btrfs, and even network systems like nfs. Besides that, there are fake file systems like /sys and /dev that help Linux make everything look like a file. The downside is that building a filesystem required changing the kernel or, at least, writing a loadable module. That’s not as hard as it sounds, but it is a little more difficult than writing a normal program. Then came FUSE — file system in user space. This is a single file system module that allows you to create new file systems by writing ordinary code.

Continue reading “Linux Fu: User Space File Systems — Now For Windows, Too!”