They’re back! The San Francisco autonomous vehicle hijinks, that is, as Waymo’s fleet of driverless cars recently took up the fun new hobby of honking their horns in the wee hours of the morning. Meat-based neighbors of a Waymo parking lot in the South Market neighborhood took offense at the fleet of autonomous vehicles sounding off at 4:00 AM as they shuffled themselves around in the parking lot in a slow-motion ballet of undetermined purpose. The horn-honking is apparently by design, as the cars are programmed to tootle their horn trumpets melodiously if they detect another vehicle backing up into them. That’s understandable; we’ve tootled ourselves under these conditions, with vigor, even. But when the parking lot is full of cars that (presumably) can’t hear the honking and (also presumably) know where the other driverless vehicles are as well as their intent, what’s the point? Luckily, Waymo is on the case, as they issued a fix to keep the peace. Unfortunately, it sounds like the fix is just to geofence the lot and inhibit honking there, which seems like just a band-aid to us.
Hackaday Columns4283 Articles
This excellent content from the Hackaday writing crew highlights recurring topics and popular series like Linux-Fu, 3D-Printering, Hackaday Links, This Week in Security, Inputs of Interest, Profiles in Science, Retrotechtacular, Ask Hackaday, Teardowns, Reviews, and many more.
Retrotechtacular: Powerline Sagging And Stringing In The 1950s
While high-voltage transmission lines are probably the most visible components of the electrical grid, they’re certainly among the least appreciated. They go largely unnoticed by the general public — quick, name the power line closest to you right now — at least until a new one is proposed, causing the NIMBYs and BANANAs to come out in force. To add insult to injury, those who do notice the megastructures that make modern life possible rarely take a moment to appreciate the engineering that goes into stringing up hundreds of miles of cable and making sure it stays up.
Not so the Bonneville Power Administration, the New Deal-era federal agency formed to exploit the hydroelectric abundance of the Pacific Northwest of the United States, which produced this 1950 gem detailing the stringing and sagging of power lines. Unsurprisingly, the many projects needed to wire together the often remote dams to the widely distributed population centers in an area that was only just starting to see growth began in the BPA’s offices, where teams of engineers hunched over desks worked out the best routes. Paper, pencil, and slide rules were the tools of the trade, along with an interesting gadget called a conductor sag template, a hardware implementation of the catenary equation that allowed the “sagger” to determine the height of each tower. The conductors, either steel-cored aluminum or pure copper, were also meticulously selected based on tensile strength, expected wind and ice loading, and the electrical load the line was expected to carry.
Once the engineers had their say, the hard work of physically stringing the wires began out in the field. One suspects that the work today is much the same as it was almost eighty years ago, save for much more stringent health and safety regulations. The prowess needed to transfer the wires from lifting sheaves to the insulators is something to behold, and the courage required to work from ladders hanging from wires at certain death heights is something to behold. But to our mind, the real heroes were the logistics fellows, who determined how much wire was needed for each span and exactly where to stage the reels. It’s worth sparing a moment’s thought for the daring photographer who captured all this action, likely with little more than a leather belt and hemp rope for safety.
Continue reading “Retrotechtacular: Powerline Sagging And Stringing In The 1950s”
Your Data In The Cloud
I try not to go off on security rants in the newsletter, but this week I’m unable to hold back. An apparent breach of a data aggregator has resulted in a monster dataset of US, UK, and Canadian citizens names, addresses, and social security numbers. As a number of reports have pointed out, the three billion records in the breach likely contain duplicate individuals, because they include all the addresses where you’ve lived, and there have only been on the order of 450 million US social security numbers issued anyway.
But here’s the deal. Each of these data aggregators, and each of the other companies that keep tons of data on you, are ticking time bombs. Maybe not every one of them gets breached, but there’s certainly enough incentive for the bad guys to try to do so. (They are looking to sell the NPD dataset mentioned above for $3.5 million.)
My gut feeling is that eventually all of the information on everyone will be released. Maybe then it will cease to be interesting to new crops of crooks, because there’s nothing new to learn.
On the other hand, the sheer quantity of identity thefts that this, and future breaches, will unleash on us all is mind-boggling. In the case of legitimate data aggregators like this one, requesting to have had your data out of their dataset appears to have been a viable defense. But for every one legit operator, there are others that simply track you. When they get hacked, you lose.
This breach is likely going to end in a large lawsuit against the company in question, but it almost certainly won’t be big enough to cover the damage to everyone in the affected countries. Is it time that companies that hold large datasets will have to realize that the data is a liability as well as an asset?
This Week In Security: Three Billion SS Numbers, IPv6 RCE, And Ring -2
You may have heard about a very large data breach, exposing the Social Security numbers of three billion individuals. Now hang on. Social Security numbers are a particularly American data point, and last time we checked there were quite a few Americans shy of even a half of a billion’s worth. As [Troy Hunt] points out, there are several things about this story that seem just a bit odd.
First up, the claim is that this is data grabbed from National Public Data, and there’s even a vague notice on their website about it. NPD is a legitimate business, grabbing data on as many people as possible, and providing services like background checks and credit checks. It’s not impossible that this company has records on virtually every citizen of the US, UK, and Canada. And while that’s far less than 2.9 billion people, it could feasibly add up to 2.9 billion records as was originally claimed.
The story gets strange as we consider the bits of data that have been released publicly, like a pair of files shared with [Troy] that have names, birthdays, addresses, phone numbers, and social security numbers. Those had a total of 2.69 billion records, with an average of 3 records for each ID number. That math is still just a little weird, since the US has to date only generated 450 million SSNs and change.
So far all we have are partial datasets, and claims on the Internet. The story is that there’s a grand total of 4 TB of data once uncompressed. The rest of the details are unclear, and it’s likely to take some time for the rest of the story to come out. Continue reading “This Week In Security: Three Billion SS Numbers, IPv6 RCE, And Ring -2”
Hackaday Podcast Episode 284: Laser Fault Injection, Console Hacks, And Too Much Audio
The summer doldrums are here, but that doesn’t mean that Elliot and Dan couldn’t sift through the week’s hack and find the real gems. It was an audio-rich week, with a nifty microsynth, music bounced off the moon, and everything you always wanted to know about Raspberry Pi audio but were afraid to ask. We looked into the mysteries of waveguides and found a math-free way to understand how they work, and looked at the way Mecanum wheels work in the most soothing way possible. We also each locked in on more classic hacks, Elliot with a look at a buffer overflow in Tony Hawks Pro Skater and Dan with fault injection user a low-(ish) cost laser setup. From Proxxon upgrades to an RC submarine to Arya’s portable router build, we’ve got plenty of material for your late summer listening pleasure.
Worried about attracting the Black Helicopters? Download the DRM-free MP3 and listen offline, just in case.
FLOSS Weekly Episode 796: Homebrew, I’m More Of A Whopper Guy
This week Jonathan Bennett and David Ruggles chat with John Britton and Mike McQuaid about Homebrew! That’s the missing package manager for macOS; and Workbrew, the commercial offering built on top of it. We cover lots of territory, like why the naming scheme sounds like it was conceived during a pub visit, how Workbrew helps businesses actually use Homebrew, and why you might even want to run Homebrew on a Linux machine!
Continue reading “FLOSS Weekly Episode 796: Homebrew, I’m More Of A Whopper Guy”
Hacker Tactic: Pimp Your Probes
Is your multimeter one of your trusty friends when building up boards, repairing broken gadgets, and reverse-engineering proprietary ones? Is it accompanied by a logic analyzer or an oscilloscope at times?
Having a proper probing setup is crucial for many a task, and the standard multimeter probes just won’t do. As a PCB is slipping under your grip as you’re trying to hold the standard multimeter probes on two points at once, inevitably you will ponder whether you could be doing things differently. Here’s an assortment of probing advice I have accumulated.
Beyond The Norm
There’s the standard advice – keep your board attached firmly to a desk, we’ve seen gadgets like the Stickvise help us in this regard, and a regular lightweight benchtop vise does wonders. Same goes for using fancy needle probes that use gravity to press against testpoints – they might be expensive, but they are seriously cool, within limits, and you can even 3D-print them!