You Can’t Put The Toothpaste Back In The Tube, But It Used To Be Easier

After five years of research, Colgate-Palmolive recently revealed Australia’s first recyclable toothpaste tube. Why is this exciting? They are eager to share the design with the rest of the toothpaste manufacturers and other tube-related industries in an effort to reduce the volume of plastic that ends up in landfills. It may not be as life-saving as seat belts or the Polio vaccine, but the move does bring Volvo and OG mega open-sourcer Jonas Salk to mind.

Today, toothpaste tubes are mostly plastic, but they contain a layer of aluminum that helps it stay flattened and/or rolled up. So far, multi-layer packaging like this isn’t accepted for recycling at most places, at least as far as Australia and the US are concerned. In the US, Tom’s of Maine was making their tubes entirely out of aluminum for better access to recycling, but they have since stopped due to customer backlash.

Although Colgate’s new tubes are still multi-layered, they are 100% HDPE, which makes them recyclable. The new tubes are made up of different thicknesses and grades of HDPE so they can be easily squeezed and rolled up.

Toothpaste Before Tubes

Has toothpaste always come in tubes? No it has not. It also didn’t start life as a paste. Toothpaste has been around since 5000 BC when the Egyptians made tooth powders from the ashes of ox hooves and mixed them with myrrh and a few abrasives like powdered eggshells and pumice. We’re not sure what they kept it in — maybe handmade pottery with a lid, or a satchel made from an animal’s pelt or stomach.

The ancient Chinese used ginseng, salt, and added herbal mints for flavoring. The Greeks and Romans tried crushed bones, oyster shells, tree bark, and charcoal, which happens to be back in vogue. There is evidence from the late 1700s showing that people once brushed with burnt breadcrumbs.

Continue reading “You Can’t Put The Toothpaste Back In The Tube, But It Used To Be Easier”

John McAfee’s Wild Ride Is Over

John McAfee, the founder of McAfee Associates and pioneer in the antivirus field, was found dead today, June 23, 2021, of an apparent suicide in a Barcelona prison cell.

Born in 1945, the term “colorful” doesn’t begin to describe the life of McAfee. His entree into the nascent computer industry began with a degree in mathematics, followed by choice assignments at places like Xerox PARC, NASA, Univac, Booz Allen Hamilton, and Lockheed. He built up an impressive resume of programming skills until serendipity struck, in the form of one of the earliest computer viruses: the Brain virus. First found in the mid-1980s, Brain infected the boot sector of floppy disks and was originally intended as a somewhat heavy-handed form of copy protection by its authors. The virus rubbed McAfee the wrong way, and he threw himself into writing software to protect PCs from such infections. These were the roots of McAfee Associates, which opened its doors in 1987.

Continue reading “John McAfee’s Wild Ride Is Over”

Graphene lattice

How Graphene May Enable The Next Generations Of High-Density Hard Drives

After decades of improvements to hard disk drive (HDD) technology, manufacturers are now close to taking the next big leap that will boost storage density to new levels. Using laser-assisted writes, manufacturers like Seagate are projecting 50+ TB HDDs by 2026 and 120+ TB HDDs after 2030. One part of the secret recipe is heat-assisted magnetic recording (HAMR).

One of the hurdles with implementing HAMR is finding a protective coating for the magnetic media that can handle this frequent heating while also being thinner than current coatings, so that the head can move even closer to the surface. According to a recent paper by N. Dwivedi et al. published in Nature Communications, this new protective coating may have been found in the form of sheets of graphene.

Continue reading “How Graphene May Enable The Next Generations Of High-Density Hard Drives”

The Compromises Of Raspberry Pi Hardware Documentation

[Rowan Patterson] informed us about a recent ticket he opened over at the Raspberry Pi Documentation GitHub repository. He asked about the the lack of updates to the Raspberry Pi 4’s USB-C power schematics for this board. You may recall that the USB-C power issue was covered by us back in July of 2019, yet the current official  Raspberry Pi 4 schematics still show the flawed implementation, with the shorted CC pins, nearly two years later.

[Alasdair Allan], responsible for the Raspberry Pi  documentation, mentioned that they’re in the process of moving their documentation from Markdown to AsciiDoc, and said that they wouldn’t have time for new changes until that was done. But then [James Hughes], Principal Software Engineer at Raspberry Pi,  mentioned that the schematics may not be updated even after this change due to a of lack of manpower.

As [James] emphasized, their hardware will probably never be open, due to NDAs signed with Broadcom. The compromise solution has always been to publish limited peripheral schematics. Yet now even those limited schematics may not keep up with board revisions.

An easy fix for the Raspberry Pi 4’s schematics would be for someone in the community to reverse-engineer the exact changes made to the Raspberry Pi 4 board layout and mark these up in a revised schematic. This should be little more than the addition of a second 5.1 kΩ resistor, so that CC1 and CC2 each are connected to ground via their own resistor, instead of being shorted together.

Still, you might wish that Raspberry Pi would update the schematics for you, especially since they have updated versions internally. But the NDAs force them to duplicate their efforts, and at least right now that means that their public schematics do not reflect the reality of their hardware.

1700 Regulatory Approvals Revoked In South Korea

For the first time since its inception, the Korea Communications Commission this week revoked the regulatory approvals of 1,696 telecommunications devices from 378 companies, both foreign and domestic. Those companies must recall unsold inventory from the shelves, and prove conformity of existing products already sold. In addition, the companies may not submit new applications for these items for one year. It’s not clear what would happen to already-sold equipment if the manufacturer is unable to prove conformity as requested — perhaps a recall? Caught up in this are CCTV products, networking equipment, Bluetooth speakers, and drones from companies like Huawei, DJI, and even Samsung.

The heart of the issue are what’s known as Mutual Recognition Agreements (MRAs) between countries to officially recognize of each other’s certification testing laboratories (or Conformity Assessment Bodies, CAB, in the lingo of the industry). Currently ten countries (USA, Canada, Mexico, UK, Israel, Japan, Korea, Singapore, Vietnam, and Australia), the 27 member states of the EU, Taiwan and Hong Kong all have MRAs with each other. Based on these MRAs, a Korean manufacturer could have a product tested by a laboratory in Israel, for example, and all would be kosher with the KCC.

At the center of attention is the Bay Area Compliance Laboratories (BACL), established in 1996 and headquartered in Sunnyvale, California. BACL has laboratories all over the world (USA, Taiwan, Hong Kong, Vietnam, and mainland China). Except for those in mainland China, all BACL laboratories are acceptable per the MRAs. The KCC received a tip last year that some compliance test reports for some products might be defective.

A six-month investigation in cooperation with the US National Institute of Standards and Technology (NIST) resulted in the announcement this week. Korean companies, 378 of them to be exact, had submitted test reports from BACL Sunnyvale which appeared to be appropriate. But on further investigation, it was learned that the actual testing was done by BACL laboratories in mainland China and only the reports were prepared in Sunnyvale.

It’s not clear whether these companies were knowingly playing fast and loose with the rules, whether BACL was complicit, if it was just a misunderstanding of the intricacies of the regulations and MRAs, or a combination of all three. Regardless, the KCC said that intent doesn’t matter according the their rules. It also has not been suggested that the products themselves are problematic, nor has anyone suggested that BACL’s Chinese laboratories performed slipshod work — rather, the KCC says it has no choice but to proceed with the revocation based on the applicable laws.

This Week In Security: Updates, Leaks, Hacking Old Hardware, And Making New

First off, Apple has issued an update for some very old devices. Well, vintage 2013, but that’s a long time in cell-phone years. Fixed are a trio of vulnerabilities, two of which are reported to be exploited in the wild. CVE-2021-30761 and CVE-2021-30762 are both flaws in Webkit, allowing for arbitrary code execution upon visiting a malicious website.

The third bug fixed is a very interesting one, CVE-2021-30737, memory corruption in the ASN.1 decoder. ASN.1 is a serialization format, used in a bunch of different crypto and telecom protocols, like the PKCS key exchange protocols. This bug was reported by [xerub], who showed off an attack against locked iPhone immediately after boot. Need to break into an old iPhone? Looks like there’s an exploit for that now. Continue reading “This Week In Security: Updates, Leaks, Hacking Old Hardware, And Making New”

Cloned Memory Module Fixes Broken Scopemeter

Finding broken test gear and fixing it up to work again is a time-honored tradition among hackers. If you’re lucky, that eBay buy will end up being DOA because of a popped fuse or a few bad capacitors, and a little work with snips and a soldering iron will earn you a nice piece of test gear and bragging rights to boot.

Some repairs, though, are in a class by themselves, like this memory module transplant for a digital scopemeter. The story began some time ago when [FeedbackLoop] picked up a small lot of broken Fluke 199C scopemeters from eBay. They were listed as “parts only”, which is never a good sign, and indeed the meters were in various states of disassembly and incompleteness.

The subject of the video below was missing several important bits, like a battery and a power connector, but most critically, its memory module. Luckily, the other meter had a good module, making reverse engineering possible. That effort started with liberating the two RAM chips and two flash chips, all of which were in BGA packages, from the PCB. From there each chip went into a memory programmer to read its image, which was then written to new chips. The chip-free board was duplicated — a non-trivial task for a six-layer PCB — and new ones ordered. After soldering on the programmed chips and a few passives, the module was plugged in, making the meter as good as new.

While we love them all, it’s clear that there are many camps of test gear collectors. You’ve got your Fluke fans, your H-P aficionados, the deep-pocketed Keithley crowd — but everyone loves Tektronix.

Continue reading “Cloned Memory Module Fixes Broken Scopemeter”