Mitch Altman Mentors Manufacturing With Hackaday Prize Expert Session

For whatever you have built, there is someone who has done it longer, and knows more about it. That is the basic premise of expertise, and for this year’s Hackaday Prize we’re rolling out with a series of mentor sessions. These are master classes that match up experts in product development with the people behind the projects in the Hackaday Prize. We’ve been recording all of these so everyone can benefit from the advice, guidance, and mentorship presented in these fantastic recordings.

The DrumKid, a random drum synthesizer

Mitch Altman is someone who should be very familiar to all Hackaday readers. He’s the inventor of the TV-B-Gone, that wonderful device that simultaneously turns you into a hero and a villain in any sports bar. He’s the President and CEO of Cornfield Electronics and co-founder of the Noisebridge hackerspace in San Francisco. Mitch is an author and teacher, and seems to be at just about every conference and workshop around the world promoting hackerspaces, Open Source hardware, and mentorship where ever he goes.

The first hardware creator to meet Mitch is Matt Bradshaw, creator of the DrumKid. This is a pocket-sized drum machine that is heavily inspired by Teenage Engineering’s Pocket Operators. Years ago, Matt built a web app that generated drum tracks, and this project is simply taking that idea into the physical realm. For Mitch, this is well-tread territory; years ago, Mitch also built an Arduino-based synth, and for the most part, both Mitch and Matt’s projects are remarkably similar. There were, however, some improvements to be made with Matt’s circuit. The power supply was two AAA batteries and a switching regulator that introduced noise and added cost. Mitch suggested that the ATMega328 could be run directly from three AA batteries reducing the cost and the noise.

eAgrar, a system for monitoring conditions of plants and weather conditions at agricultural fields

The next project up for review is eAgrar, a system for monitoring conditions of plants and the weather in fields. This project comes from Slaven Damjanovic and Marko Čalić. They’ve been developing this device for almost two years building the entire system around the ATMega328. Slaven ran into a problem with this chip in that he didn’t have enough inputs and outputs. The firmware is already written, but thanks to the Arduino IDE, there’s no reason to keep using that ATMega. Mitch suggested using an STM32 or another ARM core. That’s what he’s using for one of his synthesizer projects, and you get more than enough inputs and outputs for the same price as an ATMega.

Finally, we come to Joseph, with his project, the Pilates Reformer. A Pilates Reformer is a bit of exercise equipment that’s only made by three companies and everything costs thousands of dollars. Joseph is bringing that cost down, but there’s a problem: how do you build a hundred or two hundred of these? Mitch suggested simply finding another manufacturer that could build this design, and not necessarily one that builds Pilates machines. This makes sense — if all you’re doing is cutting and connecting structural beams, any manufacturer can do this, that’s what manufacturers do.

This is the third in our series of Hackaday Prize mentor sessions this year, and we have far more we need to edit, and many more we need to record. That doesn’t mean you can’t get help from experts from your prize entry; we’re looking for people who need help with their project and we have a lot of mentors willing to dispense advice. If you’re interested in having someone look over your shoulder, sign up your entry.

Continue reading “Mitch Altman Mentors Manufacturing With Hackaday Prize Expert Session”

Hackaday Podcast 025: Of Cheese Graters, Fauxberries, Printed Gears, Power Latching, And Art-Loving AI

Hackaday Editors Mike Szczys and Elliot Williams dish their favorite hacks from the past week. Seems like everyone is trying to mill their own Mac Pro grille and we love seeing how they go about it. Elliot is gaga over a quintet of power latching circuits, Mike goes crazy for a dough sheeter project, and we dig through the news behind methane on Mars, the Raspberry Pi 4 release, and spoofing Presidential text alerts with SDR. If you like mini-keyboards you need to see the Fauxberry, Artificial Intelligence became an art critic this week, and poorly-lit rooms have been solved with a massive mirror system.

Take a look at the links below if you want to follow along, and as always tell us what you think about this episode in the comments!

And note: next week we’re taking a break to go outside and shoot off some 4th of July fireworks, so there will be no podcast and you’ve got some time to listen through our 24 previous episodes for anything you’ve missed.  You’ll hear from us again the week after.

Take a look at the links below if you want to follow along, and as always, tell us what you think about this episode in the comments!

Direct download (60 MB or so.)

Continue reading “Hackaday Podcast 025: Of Cheese Graters, Fauxberries, Printed Gears, Power Latching, And Art-Loving AI”

This Week In Security: Invalid Curve Attacks, OpenSSH Shielded, And More Details On Coinbase

AMD Epyc processors support Secure Encrypted Virtualization (SEV), a technique that prevents even a hypervisor reading memory belonging to a virtual machine. To pull this off, the encryption and decryption is handled on the fly by the Platform Security Processor (PSP), which is an ARM core that handles processor start-up and many security features of modern AMD processors. The vulnerability announced this week is related to the encryption scheme used. The full vulnerability is math heavy, and really grokking it requires a deeper understanding of elliptical curve cryptography (ECC) than your humble author currently possesses.

During the process of starting a virtual machine, the VM process goes through a key-sharing process with the PSP, using an ECC Diffie-Hellman key exchange. Rather than raising prime numbers to prime exponents, an ECC-DH process bounces around inside an elliptical curve in order to find a shared secret. One of the harder problems to solve when designing an ECC based cryptographic system, is the design of the curve itself. One solution to this problem is to use a published curve that is known to be good. AMD has taken this route in their SEV feature.

The attack is to prime the key exchange with invalid data, and observing the shared key that is generated. A suitably simple initial value will leak information about the PSP’s secret key, allowing an attacker to eventually deduce that key and decrypt the protected memory. If you’d like to bone up on invalid curve attacks, here’s the seminal paper. (PDF)

OpenSSH Shielding

[Damien Miller] of OpenSSH was apparently tired of seeing that project tied to vulnerabilities like Rambleed and Rowhammer, so added a technique he’s calling key-shielding. OpenSSH now encrypts private keys in memory using a 16 kB pre-key. While an attacker with full knowledge of the process’s memory wouldn’t be deterred, the error rate of Rambleed and similar attacks is high enough that the 16 kB of randomness is likely to thwart the attempt to recover the secret key.

Firefox and Coinbase

We mentioned Firefox vulnerabilities and updates last week, and as anticipated, more information is available. [Philip Martin] from Coinbase shared more information on Twitter. Coinbase employees, as well as other cryptocurrency companies, were targeted with fishing emails. These lured employees to a malicious page that attempted to exploit a pair of Firefox vulnerabilities. Coinbase has a security system in place that was able to prevent the exploit, and their security team was able to reverse engineer the attack.

The first vulnerability has been dissected in some detail by a Google security researcher. It’s a weakness in Firefox’s Javascript engine related to type handling. An object is created with one data type, and when that data is changed to another type, not all the data handlers are appropriately updated. Under the hood, a value is assumed to be a pointer, but is actually a double-length value, controlled by the attacker.

The second vulnerability is in the functions used to prompt for user interaction. Specifically the call to “Prompt:Open” isn’t properly validated, and can result in the un-sandboxed Firefox process loading an arbitrary web location. I suspect the sandbox escape is used to run the initial exploit a second time, but this time it’s running outside the sandbox.

Odds and Ends

[Tom] wrote a great intro into how to Impersonate The President With Consumer-Grade SDR, go check it out!

Another city, more ransomware. Riviera Beach, Florida was hit with a ransomware attack, and paid $600,000 in an attempt to get their data back. For a city of 35,000 inhabitants, that’s $17.14 in ransom per man, woman, and child. According to the linked article, though, the city was insured.

Brett Smith Makes Your Life Easier With Hidden Microcontroller Features

There was a time when microprocessors were slow and expensive devices that needed piles of support chips to run, so engineers came up with ingenious tricks using extra hardware preprocessing inputs to avoid having to create more code. It would be common to find a few logic gates, a comparator, or even the ubiquitous 555 timer doing a little bit of work to take some load away from the computer, and engineers learned to use these components as a matter of course.

The nice thing is that many of these great hardware hacks have been built into modern microcontrollers through the years. The problem is you know to know about them. Brett Smith’s newly published Hackaday Superconference talk, “Why Do It The Hard Way?”, aims to demystify the helpful hardware lurking in microcontrollers.

Join us below for a deeper dive and the embedded video of this talk. Supercon is the Ultimate Hardware con — don’t miss your chance to attend this year, November 15-17 in Pasadena, CA.

Continue reading “Brett Smith Makes Your Life Easier With Hidden Microcontroller Features”

What’s The Deal With Square Traces On PCBs

When designing a printed circuit board, there are certain rules. You should place decoupling capacitors near the power pins to each chip. Your ground planes should be one gigantic fill of copper; two ground planes connected by a single trace is better known as an antenna. Analog sections should be kept separate from digital sections, and if you’re dealing with high voltage, that section needs to be isolated.

One that I hear a lot is that you must never put a 90-degree angle on a trace. Some fear the mere sight of a 90-degree angle on a PCB tells everyone you don’t know what you’re doing. But is there is really no greater sin than a 90-degree trace on a circuit board?

This conventional wisdom of eschewing 90-degree traces is baked into everything we know about circuit board design. It is the first thing you’re taught, and it’s the first thing you’ll criticize when you find a board with 90-degree traces. Do square traces actually matter? The short answer is no, but there’s still a reason we don’t do it.

Continue reading “What’s The Deal With Square Traces On PCBs”

You’re Sitting On An Engineering Masterpiece: Chairs As A Design Challenge

If you move as a hardware hacker through the sometimes surprisingly similar world of artists, craftspeople, designers, blacksmiths, and even architects, there’s one piece of work that you will see time and time again as an object that exerts a curious fascination. It seems that designing and building a chair is a rite of passage, and not just a simple chair, but in many cases an interesting chair.

An American-made Windsor chair from the turn of the 19th century. Los Angeles County Museum of Art [Public domain]
An American-made Windsor chair from the turn of the 19th century. Los Angeles County Museum of Art [Public domain]
Some of the most iconic seating designs that you will be instantly familiar with through countless mass-produced imitations began their lives as one-off design exercises. Yet we rarely see them in our community of hackers and makers, a search turns up only a couple of examples. This is surprising, not least because there is more than meets the eye to this particular piece of furniture. Your simple seat can be a surprisingly complex challenge.

Moving Charis From Artisan to Mass Market

The new materials and mass production techniques of the 19th and 20th centuries have brought high-end design into the hands of the masses, but while wealthy homes in earlier centuries had high-quality bespoke furniture in the style of the day, the traditional furniture of the masses was hand-made in the same way for centuries often to a particular style dependent on the region in which it was produced.

Continue reading “You’re Sitting On An Engineering Masterpiece: Chairs As A Design Challenge”

Preserving Computer History Hack Chat

Join us on Wednesday 26 June 2019 at noon Pacific for the Preserving Computer History Hack Chat with Dag Spicer!

In our age of instant access to the seeming total of human knowledge at the swipe of a finger, museums may seem a little anachronistic. But the information available at our fingertips is often only the tip of the iceberg, and institutions like the Computer History Museum in Mountain View, California are dedicated to collecting and preserving the artifacts of the information age, capturing the intellectual capital that went into making them, and perhaps more importantly, providing context and making everything accessible.

The CHM is an incredible resource for anyone doing research involving the early days of computing. Dag Spicer is the Senior Curator at CHM, or “Chief Content Officer” as he likes to put it. Dag has been collecting, cataloging, and overseeing the largest collection of computer artifacts in the world for almost 25 years, and he has some stories to tell. He’ll stop by the Hack Chat this week to share them, and to answer your questions about the history of computers and how studying the past shapes the future of computing.

join-hack-chatOur Hack Chats are live community events in the Hackaday.io Hack Chat group messaging. This week we’ll be sitting down on Wednesday June 26 at 12:00 PM Pacific time. If time zones have got you down, we have a handy time zone converter.

Click that speech bubble to the right, and you’ll be taken directly to the Hack Chat group on Hackaday.io. You don’t have to wait until Wednesday; join whenever you want and you can see what the community is talking about.