Product Review: The TinySA, A Shirt-Pocket Sized Spectrum Analyzer

I suppose most of us have had the experience of going to the mailbox and seeing that telltale package in the white plastic bag, the sign that something has just arrived from China. This happened to me the other day, and like many of you it was one of those times when I puzzled to myself: “I wonder what I bought this time?”

With so many weeks or months between the time of your impulsive click on the “Buy Now” button on AliExpress or eBay and the slow boat from China actually getting the package to your door, it’s easy enough to forget what exactly each package contains. And with the price of goods so low, the tendency to click and forget is all the easier. That’s not necessarily a good thing, but I like surprises as much as the next person, so I was happy to learn that I was now the owner of a tinySA spectrum analyzer. Time for a look at what this little thing can do.

Continue reading “Product Review: The TinySA, A Shirt-Pocket Sized Spectrum Analyzer”

Hackaday Links Column Banner

Hackaday Links: November 8, 2020

Saturday, November 7, 2020 – NOT PASADENA. Remoticon, the virtual version of the annual Hackaday Superconference forced upon us by 2020, the year that keeps on giving, is in full swing. As I write this, Kipp Bradford is giving one of the two keynote addresses, and last night was the Bring a Hack virtual session, which I was unable to attend but seems to have been very popular, at least from the response to it. In about an hour, I’m going to participate in the SMD Soldering Challenge on the Hackaday writing crew team, and later on, I’ll be emceeing a couple of workshops. And I’ll be doing all of it while sitting in my workshop/office here in North Idaho.

Would I rather be in Pasadena? Yeah, probably — last year, Supercon was a great experience, and it would have been fun to get together again and see everyone. But here we are, and I think we’ve all got to tip our hacker hats to the Remoticon organizers, for figuring out how to translate the in-person conference experience to the virtual space as well as they have.

The impact of going to a museum and standing in the presence of a piece of art or a historic artifact is hard to overstate. I once went to an exhibit of artifacts from Pompeii, and was absolutely floored to gaze upon a 2,000-year-old loaf of bread that was preserved by the volcanic eruption of 79 AD. But not everyone can get to see such treasures, which is why Scan the World was started. The project aims to collect 3D scans of all kinds of art and artifacts so that people can potentially print them for study. Their collection is huge and seems to concentrate on classic sculptures — Michelangelo’s David is there, as are the Venus de Milo, the Pieta, and Rodin’s Thinker. But there are examples from architecture, anatomy, and history. The collection seems worth browsing through and worth contributing to if you’re so inclined.

For all the turmoil COVID-19 has caused, it has opened up some interesting educational opportunities that probably wouldn’t ever have been available in the Before Time. One such opportunity is an undergraduate-level course in radio communications being offered on the SDRPlay YouTube channel. The content was created in partnership with the Sapienza University of Rome. It’s not entirely clear who this course is open to, but the course was originally designed for third-year undergrads, and the SDRPlay Educators Program is open to anyone in academia, so we’d imagine you’d need some kind of academic affiliation to qualify. The best bet might be to check out the intro video on the SDRPlay Educator channel and plan to attend the webinar scheduled for November 19 at 1300 UTC. You could also plan to drop into the Learning SDR and DSP Hack Chat on Wednesday at noon Pacific, too — that’s open to everyone, just like every Hack Chat is.

And finally, as if bald men didn’t suffer enough disrespect already, now artificial intelligence is having a go at them. At a recent soccer match in Scotland, an AI-powered automatic camera system consistently interpreted an official’s glabrous pate as the soccer ball. The system is supposed to keep the camera trained on the action by recognizing the ball as it’s being moved around the field. Sadly, the linesman in this game drew the attention of the system quite frequently, causing viewers to miss some of the real action. Not that what officials do during sporting events isn’t important, of course, but it’s generally not what viewers want to see. The company, an outfit called Pixellot, knows about the problem and is working on a solution. Here’s hoping the same problem doesn’t crop up on American football.

Fail Of The Week: Roboracer Meets Wall

There comes a moment when our project sees the light of day, publicly presented to people who are curious to see the results of all our hard work, only for it to fail in a spectacularly embarrassing way. This is the dreaded “Demo Curse” and it recently befell the SIT Acronis Autonomous team. Their Roborace car gained social media infamy as it was seen launching off the starting line and immediately into a wall. A team member explained what happened.

A few explanations had started circulating, but only in the vague terms of a “steering lock” without much technical detail until this emerged. Steering lock? You mean like The Club? Well, sort of. While there was no steering wheel immobilization steel bar on the car, a software equivalent did take hold within the car’s systems.  During initialization, while a human driver was at the controls, one of the modules sent out NaN (Not a Number) instead of a valid numeric value. This was never seen in testing, and it wreaked havoc at the worst possible time.

A module whose job was to ensure numbers stay within expected bounds said “not a number, not my problem!” That NaN value propagated through to the vehicle’s CAN data bus, which didn’t define the handling of NaN so it was arbitrarily translated into a very large number causing further problems. This cascade of events resulted in a steering control system locked to full right before the algorithm was given permission to start driving. It desperately tried to steer the car back on course, without effect, for the few short seconds until it met the wall.

While embarrassing and not the kind of publicity the Schaffhausen Institute of Technology or their sponsor Acronis was hoping for, the team dug through logs to understand what happened and taught their car to handle NaN properly. Driving a backup car, round two went very well and the team took second place. So they had a happy ending after all. Congratulations! We’re very happy this problem was found and fixed on a closed track and not on public roads.

[via Engadget]

Hackaday Podcast 092: Orbital Data By Mail, Human Flight On Styrofoam Wings, And Seven Shades Of E-Ink

Hackaday editors Elliot Williams and Mike Szczys catch the best hacks you may have missed. This week we look at the new Raspberry Pi 400, use computer vision to get ready for geeky Christmas, and decypher a negative-space calendar. We get an answer to the question of what happens if you scale up a styrofoam airplane to human-size. Facebook is locking down VR headset, will hackers break them free? And take an excellent stroll down memory lane to find out what it was like to be a space-obsessed ham at the dawn of personal computers.

Take a look at the links below if you want to follow along, and as always, tell us what you think about this episode in the comments!

Direct download (~60 MB)

Places to follow Hackaday podcasts:

Continue reading “Hackaday Podcast 092: Orbital Data By Mail, Human Flight On Styrofoam Wings, And Seven Shades Of E-Ink”

This Week In Security: In The Wild, Through Your NAT, And Brave

Most of the stories from this week are vulnerabilities dropped before fixes are available, many of them actively being exploited. Strap yourselves in!

Windows Kernel Crypto

The first is CVE-2020-17087, an issue in the Windows Kernel Cryptography Driver. The vulnerable system calls are accessible from unprivileged user-space, and potentially even from inside sandboxed environments. The resulting buffer overflow can result in arbitrary code executing in the kernel context, meaning this is a quick jump to root-level control over a victim system.

What exactly is the code flaw here that’s being attacked? It’s in a bit of buffer allocation logic, inside a binary-to-hex conversion routine. The function accepts an unsigned short length argument. That value is used to calculate the output buffer size, by multiplying it by six, and using an unsigned short to hold that value. See the problem? A sufficiently large value will roll over, and the output buffer size will be too small. It’s a value overflow that leads to a buffer overflow.

Because the problem is being actively exploited, the report has been made public just seven days after discovery. The flaw is still unpatched in Windows 10, as of the time of writing. It also seems to be present as far back as Windows 7, which will likely not receive a fix, being out of support. [Editor’s snarky note: Thanks, closed-source software.] Continue reading “This Week In Security: In The Wild, Through Your NAT, And Brave”

Linux Fu: Monitor Disks

If you want a quick view of a Linux system’s process load, you can use top or — slightly nicer — htop. But what if you want a quick snapshot of how the disk system is doing? There are a few tools you can use, some of which are not nearly as common as top.

First, iotop

Most similar to top is iotop. This program shows you the total and current disk read and write numbers for the file system and also shows you who is eating up the most disk I/O.  This screen looks busy:

Continue reading “Linux Fu: Monitor Disks”

Bespoke Storage Technologies: The Alphabet Soup Found In Modern Hard Drives And Beyond

It seems like just yesterday (maybe for some of you it was) we were installing Windows 3.1 off floppy drives onto a 256 MB hard drive, but hard drives have since gotten a lot bigger and a lot more complicated, and there are a lot more options than spinning platters.

The explosion of storage options is the result of addressing a variety of niches of use. The typical torrenter downloads a file, which is written once but read many times. For some people a drive is used as a backup that’s stored elsewhere and left unpowered. For others it is a server frequently reading and writing data like logs or swap files. In all cases it’s physics that sets the limits of what storage media can do; if you choose wisely for your use case you’ll get the bet performance.

The jargon in this realm is daunting: superparamagnetic limit, LMR, PMR, CMR, SMR, HAMR, MAMR, EAMR, XAMR, and QLC to name the most common. Let’s take a look at how we got here, and how the past and present of persistent storage have expanded what the word hard drive actually means and what is found under the hood.

Continue reading “Bespoke Storage Technologies: The Alphabet Soup Found In Modern Hard Drives And Beyond”