For some reason, we never tire of stories highlighting critical infrastructure that’s running outdated software, and all the better if it’s running on outdated hardware. So when we learned that part of the San Francisco transit system still runs on 5-1/4″ floppies, we sat up and took notice. The article is a bit stingy with the technical details, but the gist is that the Automatic Train Control System was installed in the Market Street subway station in 1998 and uses three floppy drives to load DOS and the associated custom software. If memory serves, MS-DOS as a standalone OS was pretty much done by about 1995 — Windows 95, right? — so the system was either obsolete before it was even installed, or the 1998 instance was an upgrade of an earlier system. Either way, the San Francisco Municipal Transportation Agency (SFMTA) says that the 1998 system due to be replaced originally had a 25-year lifespan, so they’re more or less on schedule. Replacement won’t be cheap, though; Hitachi Rail, the same outfit that builds systems that control things like the bullet train in Japan, is doing the job for the low, low price of $212 million.
Hackaday Columns4223 Articles
This excellent content from the Hackaday writing crew highlights recurring topics and popular series like Linux-Fu, 3D-Printering, Hackaday Links, This Week in Security, Inputs of Interest, Profiles in Science, Retrotechtacular, Ask Hackaday, Teardowns, Reviews, and many more.
Tis The Season
’Tis the season for soldering! At least at my house. My son and I made some fairly LED-laden gifts for the immediate relatives last year, and he’s got the blinky bug. We were brainstorming what we could make this year, and his response was “I don’t care, but it needs to have lots of LEDs”.
It’s also the season for reverse engineering, apparently, because we’re using a string of WS2812-alike “fairy lights”. These are actually really neat, they look good and are relatively cheap. It’s a string of RGB LEDs with drivers, each dipped in epoxy, and run on a common three-enameled-wire bus. Unlike WS2812s, which pass the data on to the next unit in the line and then display them with a latching pulse at the end of a sequence, these LED drivers seem to count how many RGB packets have been sent down the wire, and only respond to their own number.
This means that if you cut up a string of 200 LEDs, it behaves like a string of 200 WS2812s. But if you cut say 10 LEDs off the string, where you cut them matters. If you cut it off the front of the string, you only have to send 10 color packets. If you cut them off the other end, you need to send 290 dummy packets before they even start listening. Bizarre, but ’tis the season for bizarre hacks.
And finally, ’tis the season for first steps into “software architecture”. Which is to say that my son is appreciating functions for the first time in his life. Controlling one LED is easy, but making a light show is about two more abstraction layers on top of that. We’ve been having fun making them dim, twinkle, and chase so far. We only have two more weekends, though, and we don’t have a final light show figured out yet, but after all, ’tis the season for last minute present hacking.
Hackaday Podcast Episode 299: Beaming Consciousness, Understanding Holograms, And Dogfooding IPv6
On this episode of the Hackaday Podcast, Editors Elliot Williams and Tom Nardi talk about the optical witchcraft behind holograms, the finer points of designing 3D printable threads, and the challenges of switching your local network over to IPv6. They’ll also cover how a clever software patch improves the graphics in a flight simulator from the 1990s, and why spacecraft flying into orbit powered by the SABRE engine is going to remain a dream for now.
From there you’ll hear about a reproduction VW gas gauge that works better than the real thing, custom ball screws, and the latest and greatest in homebrew battery charging. Finally, they’ll cap the episode off by exploring the conundrum that’s heating up London’s Underground, and diving into the (mostly) fictional history of teleportation.
Check out the links below if you want to follow along, and as always, tell us what you think about this episode in the comments!
This Week In Security: National Backdoors, Web3 Backdoors, And Nearest Neighbor WiFi
Maybe those backdoors weren’t such a great idea. Several US Telecom networks have been compromised by a foreign actor, likely China’s Salt Typhoon, and it looks like one of the vectors of compromise is the Communications Assistance for Law Enforcement Act (CALEA) systems that allow for automatic wiretapping at government request.
[Jeff Greene], a government official with the Cybersecurity and Infrastructure Security Agency (CISA), has advised that end-user encryption is the way to maintain safe communications. This moment should forever be the touchstone we call upon when discussing ideas like mandated encryption backdoors and even the entire idea of automated wiretapping systems like CALEA. He went on to make a rather startling statement:
I think it would be impossible for us to predict a time frame on when we’ll have full eviction
There are obviously lots of unanswered questions, but with statements like this from CISA, this seems to be an extremely serious compromise. CALEA has been extended to Internet data, and earlier reports suggest that attackers have access to Internet traffic as a result. This leaves the US telecom infrastructure in a precarious position where any given telephone call, text message, or data packet may be intercepted by an overseas attacker. And the FCC isn’t exactly inspiring us with confidence as to its “decisive steps” to fix things. Continue reading “This Week In Security: National Backdoors, Web3 Backdoors, And Nearest Neighbor WiFi”
Keebin’ With Kristina: The One With The Folding Keyboard Mod
Let’s face it, failed Kickstarters are no good. But they can spark good things, like real versions of technologies that might have actually been faked for the platform. A touchscreen mouse, for instance, with shortcuts that can be programmed for various applications.
This story is one of scope creep, as [Sam Baker] says in the project details. At first, he thought he could just basically duct tape a touchscreen with shortcuts to an existing mouse. A couple of mouse teardowns later, [Sam] arrived at the conclusion that things would not be so simple.
After some digging around, [Sam] found a repository where someone created a way to communicate with the ADNS-5050 optical sensor, so [Sam] started by creating a breakout board for this sensor. By combining that with an ESP32 dev board and a touchscreen, [Sam] had his shortcut mouse.
Does it work? Yes. Is it useful? Well, yes. And also no. The beauty part of using a regular mouse is that you don’t have to look down at it to know where the buttons are. In the future, [Sam] would like to implement some kind of buttons for tactility. In the meantime, haptic feedback could be nice.
Continue reading “Keebin’ With Kristina: The One With The Folding Keyboard Mod”
FLOSS Weekly Episode 812: Firefox And The Future
This week, Jonathan Bennett and David Ruggles chat with Sylvestre and Brian about Firefox! What’s up in the browser world, what’s coming, and what’s the new feature for Firefox on mobile that has Jonathan so excited? Watch to find out!
- https://www.mozilla.org/en-US/firefox/developer/
- https://briangrinstead.com/blog/firefox-webcomponents/
- https://browserbench.org/announcements/speedometer3/
Subscribe to catch the show live, and come to Hackaday for the rest of the story!
Continue reading “FLOSS Weekly Episode 812: Firefox And The Future”
Hack On Self: Headphone Friend
In the last two articles, I talked about two systems relying on audio notifications. The first one is the Alt-Tab annihilator system – a system making use of my window monitoring code to angrily beep at me when I’m getting distracted. The other is the crash prevention system – a small script that helps me avoid an annoying failure mode where I run out of energy before getting myself comfortable for it.
I’ve been appreciating these two systems quite a bit – not only are they at my fingertips, they’re also pretty effective. To this day, I currently use these two systems to help me stay focused as I hack on my own projects or write articles, and they are definitely a mainstay in my self-hacking arsenal.
There is a particular thing I’ve noticed – audio notifications help a fair bit in a way that phone or desktop notifications never would, and, now I have a framework to produce them – in a way that calls for a purpose-tailored device. It’s just wireless headphones, Pi-powered, connected through WiFi, and a library to produce sounds on my computer, but it turns out I can squeeze out a lot out of this simple combination.
Here’s a pocketable device I’ve developed, using off-the-shelf hardware – an audio receiver/transmitter with extra IO, paired to my laptop. And, here’s how I make use of this device’s capabilities to the fullest.
Audio Output
In the “producing sound out of a Pi” article, I’ve mentioned USB-C 3.5mm soundcards. You can use them with a USB-C host port, and you don’t even need any sort of resistors for that – the soundcard doesn’t try and detect state of the CC pin, and why would it, anyway? Get VBUS, GND, D+, and D-, and you got yourself an audio card with high quality output.