Hackaday Links Column Banner

Hackaday Links: January 17, 2021

Sad news from Mars, where the InSight lander’s “mole” was officially declared dead. The self-drilling probe, the centerpiece of the Heat Flow and Physical Properties Package (HP3) experiment, was designed to ram itself 5 meters into the Martian regolith while deploying a sensor-laden tail. The mole would then explore heat flow from within the planet. But the unexpected properties of the soil beneath the lander, including lower-than-expected friction on the hull of the mole and a cement-like “duricrust” layer, confounded the probe’s downward progress for the last two years. We covered the design of the mole, which is similar to an impact drill, as well as the valiant efforts to save the mission, but after one last try on January 9 where the mole gave 500 more whacks without any progress, controllers threw in the towel. It just goes to show that space travel and exploration are anything but routine, and that there’s far, far more we don’t know about even our nearest solar neighbor than what we do know.

Sad news, too, from closer to home, this time — Ohio, to be exact: the 2021 Hamvention has been canceled. It’s not exactly a surprise given the ongoing COVID-19 pandemic, but it’s still a blow to have ham radio’s biggest party canceled for two years running. We expect a lot of cons and meetings will suffer a similar fate in 2021. We’ll be sure to bring you any announcements we hear about.

One event that hasn’t been canceled is iQuHACK, a quantum hackathon hosted by MIT. We don’t pretend to fully understand quantum computing, or even to have scratched the surface of the subject in any meaningful way. Following up on what comes out of iQuHACK after it runs next weekend might be interesting for the quantum-curious, though. But really, just the fact that we’re in an age where quantum hackathons are a thing is pretty cool.

Back on the COVID-19 theme, managing editor Elliot Williams gave us the heads up on a story about gorillas at the San Diego Zoo Safari Park testing positive for the virus. It’s not exactly surprising that some of our evolutionarily closest relatives would be susceptible to the disease, and it’s not exactly a funny story, but the conversation in the morning meeting at the zoo must have been priceless:

“Hey, that gorilla looks sick. We’d better test him for COVID.”
“Yeah, probably. Here’s the brain-tickling swab, you go stick it up his nose.”
“Nu-uh, you stick it up his nose!”
“Nope. Hey, where’s the intern?”

And speaking of dangerous work environments, behold yet another classic of corporate safety propaganda: The Color of Danger. Like Shake Hands with Danger, this film was produced by heavy equipment manufacturer Caterpillar. But this time, instead of concentrating on the various opportunities maintaining heavy equipment presents for traumatic amputations, the subject matter is forklift safety. We’ve spent a fair number of hours in the driver’s seat of a lift truck, so we know full well how quickly things can go wrong, and this film does a great job of showing a lot of them. But what you’ve got to admire is the trick driving and stunt work that went into these vignettes; not too many people can pull off forklift drifting safely (12:30), and putting the truck in the drink without drowning was a neat trick (13:00). And of course, with any film on forklift safety, we’d be remiss not to tip our hardhat to Staplefahrer Klaus and his oft-bloodied co-workers.

Continue reading “Hackaday Links: January 17, 2021”

Hackability Matters

The Unix Way™ provides extreme hackability. The idea is that software should be written as tools to accomplish discrete tasks, and that it should be modular, extensible, and play well with others. It’s like software as a LEGO set — you can put the blocks together however you want, within limits, and make stuff that’s significantly cooler than any of the individual blocks alone.

Clearly this doesn’t work for all applications — things like graphics editors and web browsers don’t really lend themselves to being elegant tools that integrate well with others, right? It’s only natural that they’re bloaty walled gardens. What happens in the browser must stay in the browser, right?

But how sad is it that the one piece of software you use all day, your window into cyberspace, doesn’t play well with the rest of your system? I’d honestly never really been bothered by that fact until stumbling on TabFS. It’s an extension to Chrome that represents the tabs on your browser as if they were files on your local system — The Unix Way™. And what this means is that any other program that can read from or write to a file can open tabs, collect them, change webpages on the fly, and so on. It opens up the browser to you.

This is tremendously powerful. Don’t like the bookmarking paradigm of your particular browser? Writing your own would be a snap in Python — and you could do cleverer things like apply a little machine learning to handle putting them in categories. Want to pop open (or refresh) a set of webpages at a particular time every day? Cron, or its significantly more complicated counterpart systemd, and a couple lines of code will do that. Want to make a hardware button that converts dark mode to light mode and vice-versa for every website starting with “H”? Can do.

I’m picking on browsers, but many large pieces of software are inaccessible in the same way — even if they’re open source, they don’t open up channels for interaction with user code or scripts. (Everything “in the cloud” or “as a service”, I’m looking at you! But that’s a further rant for another day.) And that’s a shame, because most of these “big” pieces of software actually do the coolest things.

So please, if you’re working on a big software package, or even just writing a plug-in for one, do think about how you can make more of its abilities available to the casual scripter. Otherwise, it’s just plastic blocks that don’t fit with the rest of the set.

Circuit VR: Even More Op Amps

In the last Circuit VR we looked at some basic op amp circuits in a simulator, including the non-inverting amplifier. Sometimes you want an amplifier that inverts the signal. That is a 5V input results in a -5V output (or -10V if the amplifier has a gain of 2). This corresponds to a 180 degree phase shift which can be useful in amplifiers, filters, and other circuits. Let’s take a look at an example circuit simulated with falstad.

Remember the Rules

Last time I mentioned two made up rules that are good shortcuts for analyzing op amp circuits:

  1. The inputs of the op amp don’t connect to anything internally.
  2. The output mysteriously will do what it can to make the inputs equal, as far as it is physically possible.

As a corollary to the second rule, you can easily analyze the circuit shown here by thinking of the negative (inverting) terminal as a virtual ground. It isn’t connected to ground, yet in a properly configured op amp circuit it might as well be at ground potential. Why? Because the + terminal is grounded and rule #2 says the op amp will change conditions to make sure the two terminals are the same. Since it can’t influence the + terminal, it will drive the voltage through the resistor network to ensure the – terminal is at 0V.

Continue reading “Circuit VR: Even More Op Amps”

Hackaday Podcast 101: Lasering And Milling Absolutely Everything

Hackaday editors Mike Szczys and Elliot Williams discuss our favorite hacks of the past week. We accidentally chose a theme, as most of the projects use lasers and are about machining work. We lead off with a really powerful laser that can directly etch circuit boards, only to be later outdone by an even more powerful laser using a chemistry trick to etch glass. We look at how to mix up your own rocket motors, bootstrap your own laser tag, and go down the rabbit hole of building tools for embedded development. The episode wraps up as we discuss what exactly NVMe is and where hardware hacking might take it.

Take a look at the links below if you want to follow along, and as always, tell us what you think about this episode in the comments!

Direct download (~65 MB)

Places to follow Hackaday podcasts:

Continue reading “Hackaday Podcast 101: Lasering And Milling Absolutely Everything”

This Week In Security: Ubiquiti, Nissan, Zyxel, And Dovecot

You may have been one of the many of us who received an email from Ubiquiti this week, recommending a password change. The email stated that there was an unauthorized access of Ubiquiti systems, and while there wasn’t evidence of user data being accessed, there was also not enough evidence to say emphatically that user data was not accessed. Ubiquiti has mentioned that the database that may have been accessed contains a user’s name, email address, hashed password, and optionally the mailing address and phone number.

Depending on how the Ubiquiti authentication system is designed, that hashed password may be enough to log in to someone’s account. In any case, updating your password would invalidate the potentially compromised hash. This event underscores a complaint voiced by Ubiquiti users: Ubiquiti has been making it difficult to administrate hardware without a cloud-enabled account. Continue reading “This Week In Security: Ubiquiti, Nissan, Zyxel, And Dovecot”

Basics Of Remote Cellular Access: Connecting Via VPN

You’ve got a machine hooked up to the Internet via a shiny new cellular modem, which you plan to administer remotely. You do a quick check on the external IP, and try and log in from another PC. Try as you might, SSH simply won’t connect. What gives?

The reality of the modern internet is that most clients no longer get their own unique IPv4 address. There simply aren’t enough to go around anymore. Instead, most telecommunications operators use Carrier Grade Network Address Translation which allows a single external address to be shared by many customers. This can get in the way of direct connection attempts from the outside world. Even if that’s not the case, most cellular operators tend to block inbound connections by default. However, there is a way around this quandary – using a VPN. Continue reading “Basics Of Remote Cellular Access: Connecting Via VPN”

Teardown: Tap Trapper

The modern consumer is not overly concerned with their phone conversations being monitored. For one thing, Google and Amazon have done a tremendous job of conditioning them to believe that electronic gadgets listening to their every word isn’t just acceptable, but a near necessity in the 21st century. After all, if there was a better way to turn on the kitchen light than having a recording of your voice uploaded to Amazon so they can run it through their speech analysis software, somebody would have surely thought of it by now.

But perhaps more importantly, there’s a general understanding that the nature of telephony has changed to the point that few outside of three letter agencies can realistically intercept a phone call. Sure we’ve seen the occasional spoofed GSM network pop up at hacker cons, and there’s a troubling number of StingRays floating around out there, but it’s still a far cry from how things were back when folks still used phones that plugged into the wall. In those days, the neighborhood creep needed little more than a pair of wire strippers to listen in on your every word.

Which is precisely why products like the TA-1356 Tap Trapper were made. It was advertised as being able to scan your home’s phone line to alert you when somebody else might be listening in, whether it was a tape recorder spliced in on the pole or somebody in another room lifting the handset. You just had to clip it onto the phone distribution panel and feed it a fresh battery once and awhile.

If the red light came on, you’d know something had changed since the Tap Trapper was installed and calibrated. But how did this futuristic defender of communications privacy work? Let’s open it up and take a look.

Continue reading “Teardown: Tap Trapper”