Revive A Sony Vaio P-Series With KiCad’s Background Bitmaps

You might remember that KiCad 7 came out this February, with a multitude of wonderful features. One of them was particularly exciting to see, and the KiCad newsletter even had an animated GIF to properly demo it – a feature called “Background Bitmaps”, which is the ability to add existing board images into your board editor, both front and back, and switch between them as you design the board. With it, you can draw traces, recreate the outline and place connectors over these images, giving you a way to quickly to reproduce everything on an existing PCB! I’ve seen some friends of mine use this feature, and recently, I’ve had a project come up that’s a perfect excuse for me to try it.

By [Yoggy], CC-BY-2.0
Back in 2020, I managed to get a Sony Vaio P from a flea market, for about 20€. It’s a beloved tiny laptop from 2009, now a collectors item, and we’ve covered a few hacks with it! The price was this wonderful only because it was not fit for regular flea market customers – it was in bad condition, with the original DC jack lost and replaced by some Molex-like power connector, no hard drive, and no battery in sight.

In short, something worth selling to a known tinkerer like me, but not particularly interesting otherwise. Nevertheless, about half a year later, when I fed it the desired 10.5 V from a lab PSU and gave the power button a few chances, it eventually booted up and shown me the BIOS menu on the screen! I’ve disassembled and reassembled it a few times, replaced the DC jack with an original one from a different Vaio ultrabook I happened to have parts from, and decided to try to bring it back to original condition.

Continue reading “Revive A Sony Vaio P-Series With KiCad’s Background Bitmaps”

Hackaday Links Column Banner

Hackaday Links: November 19, 2023

Two RUDs are better than one, right? That might be the line on Saturday morning’s briefly spectacular second attempt by SpaceX to launch their Starship vehicle atop a Super Heavy booster, which ended with the “rapid unscheduled disassembly” of both vehicles. The first attempt, back in April, had trouble from the get-go, including the rapid unscheduled partial disassembly of their Stage Zero launch pad, followed by rapid but completely predictable disassembly of a lot of camera gear and an unfortunate minivan thanks to flying chunks of concrete.

Starship’s first “hot” separation

Engineering changes helped keep Stage Zero more or less intact this time, and the Super Heavy booster performed flawlessly — for about three minutes. It was at that point, right after the start of the new “hot staging” process, where Starship’s six engines light before the booster actually drops away, that the problems started. The booster made a rapid flip maneuver to get into the correct attitude for burn-back and landing before disappearing in a massive ball of flame.

Reports are that the flight termination system did the deed, but it’s not yet exactly clear why. Ditto the Starship, which was also snuffed by the FTS after continuing to fly for about another five minutes. Still in all, the SpaceX crew seem to be ecstatic about the results, which is understandable for a company with a “move fast, break things” culture. Nailed it.

Continue reading “Hackaday Links: November 19, 2023”

Procrastineering And Simulated Annealing

The software for the Supercon badge went down to the wire this year, with user-facing features being coded up as late as Thursday morning. This left “plenty of time” to flash the badges on Thursday afternoon, but they were admittedly still warm as the first attendees filed in on Friday morning. While I’ve always noted that the last minute is the best minute, this was a little close, and frankly there was an uncaught bug that we would have noticed if we had a few more hours to just play with it before showtime.

But we were by no means slacking. On the contrary, a few of us were putting in nights and full weekend days for six or eight weeks beforehand. The problem was hard, and the path to a solution was never clear, and changed depending on the immovability of the roadblocks hit along the way. This is, honestly, a pretty normal hacker development pattern.

What was interesting to me was how similar the process was to simulated annealing. This is an optimization method where you explore more of the solution space in the beginning, when the metaphorical “temperature” is hot. Later, as you’re getting closer to a good solution, you want to refine in smaller and smaller steps – it cools down. This rate of “cooling” is a tremendously important parameter in practice.

And this is exactly the way the badge development felt. We were searching in a very big solution space in the beginning, and many aspects of the firmware infrastructure were in flux. As it got closer and closer to a working solution, more and more of the code settled down, and the changes got smaller. In retrospect, this happened naturally, and you can’t always control or plan for the eureka moments, but I wonder if it’s worth thinking of a project this way. Instead of milestones, temperatures? Instead of a deadline, a freeze date.

Hackaday Podcast 244: Fake Chips, Drinking Radium, And Spotting Slippery Neutrinos

This week, Editor-in-Chief Elliot Williams and Kristina Panos met up to discuss the best hacks of the previous week, at least in our opinions.

After chasing the angry bird away from Kristina’s office, we go to the news and learn that we’re in the middle of a solar conjunction Essentially, the Sun has come between Earth and Mars, making communication impossible for about another week. Did you know that this happens every two years?

Then it’s time for a new What’s That Sound, and although Kristina had an interesting albeit somewhat prompted guess, she was, of course, wrong.

And then it’s on to the hacks, beginning with a really cool digital pen that packs all the sensors. We learned about the world’s largest musical instrument, and compared it to the Zadar Sea Organ in Croatia, which if you’ll recall was once a What’s That Sound.

From there we take a look at fake buck converters, radioactive water as a health fad, and a garage door company that has decided to take their ball and go home. Finally we talk about how slippery neutrinos are, and discuss Tom’s time at JawnCon.

Check out the links below if you want to follow along, and as always, tell us what you think about this episode in the comments!

Download and savor at your leisure.

Continue reading “Hackaday Podcast 244: Fake Chips, Drinking Radium, And Spotting Slippery Neutrinos”

This Week In Security: SSH, FTP, And Reptar

It’s time to strap on our propeller beanies, because we’re going to talk crypto. The short version is that some SSH handshakes can expose enough information for a third party to obtain the host’s private signing key. That key is the one that confirms you are connecting to the SSH server you think you are, and if the key validation fails, you get a big warning:

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY!

The math that makes this warning work is public-private key cryptography. The problem we’re talking about today only shows up in RSA authentication. Specifically those that use the Chinese Remainder Theorem (CRT) to quickly calculate the modulos needed to generate the cryptographic signature. If something goes wrong during that calculation, you end up with a signature that is mathematically related to the secret key in a different way than intended. The important point is that knowing this extra value *significantly* weakens the security of the secret key.

This attack has been known for quite some time, but the research has been aimed at causing the calculation fault through power vaults or even memory attacks like Rowhammer. There has also been progress on using a lattice attack against captured handshakes, to make the attack practical with less known information. The real novel element of this week’s approach (pdf) is that it has been tested against SSH.

The paper’s authors performed weekly scans of the entire IPv4 public network space, capturing the handshake from any listening SSH server, and also had 5 years of historic data to draw from. And the results are mixed. There is a Cisco SSH server string that is extremely common in the dataset, and only once did one of these machines send a miscalculated handshake. Possibly a random ram bit flip to blame. And on the other hand, the string “SSH-2.0-Zyxel SSH server” had so many bad signatures, it suggests a device that *always* sends a miscalculated signature. Continue reading “This Week In Security: SSH, FTP, And Reptar”

Tech In Plain Sight: What Does A Yellow Light Mean?

Ghigleri’s traffic light

The traffic light is a ubiquitous feature of modern life and is quite old — dating back to 1868 London, although that device was a modified railroad semaphore operated by a policeman, but it was the same idea. The initial test of the signal proved disastrous.

The semaphore had gas lamps to illuminate the signs in the dark. A gas leak caused one of the lamps to explode, badly burning the operator and ending the nascent invention for a while. In 1910, American inventor Ernest Sirrine worked out an automatically controlled traffic signal. Two years later, Lester Wire, a police officer, developed a different version powered by overhead trolley wires to light the signal. A 1917 patent by William Ghiglieri also had two lights — red and green. But where was the yellow light?

Continue reading “Tech In Plain Sight: What Does A Yellow Light Mean?”

A Brief History Of Weather Control

It used to be a common expression to say that something would happen when “people walked on the moon.” That is, something that was never going to happen. Of course, by 1960, it was clear that someone was going to walk on the moon eventually. There were many other things everyone “knew” would happen in the future. Some of them came true, but many of them didn’t. Some, like video phones and robot factory workers, came true in a way, but not as people imagined. For example, people were confident that computers would easily translate between human languages, something we still have trouble doing entirely reliably. Another standard prediction is that people would control the weather.

Controlling the weather, in some ways, seems even less likely than walking on the moon. After all, we know where the moon is and where it will be. We still don’t understand precisely what causes the weather to behave the way it does. We have models and plenty of scientific theories. But you still can’t know exactly what’s going to happen, where, or when.

History

If you farm or live in a hut, weather is especially important. You want rain but not too much rain. Without scientific knowledge, many cultures had rain-making superstitions like a rain dance or other rituals meant to encourage rain. Some think that loud noises like cannon fire prevent hail.  Charlatans would promise rain in exchange for donations.

However, science would eventually surface, and in the 1800’s James Espy — the first U.S. meteorologist — theorized that convection was what really caused rain. He had bold plans to set massive fires to encourage rain but could not convince Congress to go along.

Half a century later, Robert St. George Dyrenforth tested the effect of explosions on rainfall. There is no evidence that his cannon and fireworks did anything. He did, however, claim credit for any rain that happened to occur nearby. There have been many reports that explosions cause rain — rain often falls after a heated battle, apparently.  The government in Thailand tried to induce rain using dry ice flakes dropped into clouds with, reportedly, some success. Abu Dhabi, Russia, and China’s governments claim to have working weather control today.

Continue reading “A Brief History Of Weather Control”