Solar And Wind Could Help Support Ethiopia’s Grand Dam Project

Ethiopia is in the midst of a major nation-building project, constructing the Grand Ethiopian Renaissance Dam (GERD). Upon completion, GERD will become the largest hydropower plant in Africa, providing much needed electricity for the country’s growing population.

The project dams the Blue Nile, a river which later flows into neighbouring Sudan, where it merges with the White Nile and then flows on to Egypt. Like all rivers that flow across political boundaries, concerns have been raised about the equitable management of the water resources to the benefit of those upstream and down. Too much water dammed upstream in GERD could have negative effects on Egyptian agriculture reliant on river flows, for example. Efforts are ongoing to find a peaceful solution that suits all parties. Recently, suggestions have been made to supplement the dam’s power output with solar and wind to minimise disruption to the river’s users.

Continue reading “Solar And Wind Could Help Support Ethiopia’s Grand Dam Project”

Alone, But Not Lonely: Remembering Astronaut Michael Collins

With many of the achievements of the Space Race now more than half a century behind us, it’s no wonder that we’re steadily losing the men who rode the rockets of the Mercury, Gemini, and Apollo programs into space. They were all very much in their primes at the time, but no matter what you’ve accomplished in life, even if it includes a trip to the Moon, time eventually catches up to you.

Still, it was quite a shock to learn today that astronaut Michael Collins passed away today at the age of 90. Collins made his trip to the Moon aboard Apollo 11, the mission which would see his crewmates Neil Armstrong and Edwin “Buzz” Aldrin descend to the surface in the Lunar Module Eagle and take the historic first steps on its surface in July of 1969.

Continue reading “Alone, But Not Lonely: Remembering Astronaut Michael Collins”

Ask Hackaday: Why Make Modular Hardware?

In the movies, everything is modular. Some big gun fell off the spaceship when it crashed? Good thing you can just pick it up and fire it as-is (looking at you, Guardians of the Galaxy 2). Hyperdrive dead? No problem, because in the Star Wars universe you can just drop a new one in and be on your way.

Of course, things just aren’t that simple in the real world. Most systems, be they spaceships or cell phones, are enormously complicated and contain hundreds or thousands of interconnected parts. If the camera in my Samsung phone breaks, I can’t exactly steal the one from my girlfriend’s iPhone. They’re simply not interchangeable because the systems were designed differently. Even if we had the same phone and the cameras were interchangeable, they wouldn’t be easy to swap. We’d have to crack open the phones and carefully perform the switch. Speaking of switches, the Nintendo Switch is a good counterexample here. Joycon break? Just buy a new one and pop it on.

What if more products were like the Nintendo Switch? Is its modularity just the tip of the iceberg?

Continue reading “Ask Hackaday: Why Make Modular Hardware?”

Fertilizing Plants With A Custom 3D-Printed Pump

For all but the most experienced gardeners and botanists, taking care of the soil around one’s plants can seem like an unsolvable mystery. Not only does soil need the correct amount of nutrients for plants to thrive, but it also needs a certain amount of moisture, correct pH, proper temperature, and a whole host of other qualities. And, since you can’t manage what you can’t measure, [Jan] created a unique setup for maintaining his plants, complete with custom nutrient pumps.

While it might seem like standard plant care on the surface, [Jan]’s project uses a peristaltic pump for the nutrient solution that is completely 3D printed with the exception of the rollers and the screws that hold the assembly together. With that out of the way, it was possible to begin adding this nutrient solution to the plants. The entire setup from the pump itself to the monitoring of the plants’ soil through an array of sensors is handled by an ESP32 running with help from ESPHome.

For anyone struggling with growing plants indoors, this project could be a great first step to improving vegetable yields or even just helping along a decorative houseplant. The real gem is the 3D printed pump, though, which may have wider applications for anyone with a 3D printer and who also needs something like an automatic coffee refilling machine.

WSPR May Hold The Key To MH370 Final Position

The disappearance of Malaysia Airlines flight MH370 after an unexplained course change sent it flying south over the Indian Ocean in March 2014 still holds the mystery of the wreck’s final location. There have been a variety of efforts to narrow down a possible search area over the years, and now we have news of a further angle from an unexpected source. It’s possible that the aircraft’s path could show up in radio scatter detectable as anomalously long-distance contacts using the amateur radio WSPR protocol.

WSPR is a low-power amateur radio mode designed to probe and record the radio propagation capabilities of the atmosphere. Transmit beacons and receiving stations run continuously, and all contacts however fleeting are recorded to an online database. This can be mined by researchers with an interest in the atmosphere, but in this case it might also provide clues to the missing airliner’s flightpath. By searching for anomalously long-distance WSPR contacts whose path crosses the expected position of MH370 it’s possible to spot moments when the aircraft formed a reflector for the radio waves. These contacts can then either confirm positions already estimated using other methods, or even provide further course points. It’s an impressive demonstration of the unexpected data that can lurk in a trove such as the WSPR logbook, and also that while messing about on the airwaves the marks we leave behind us can have more benefit than simply bragging rights over the DX we’ve worked.

If this WSPR business intrigues you, then have a read of the piece in our $50 Ham series about it.

Header: Laurent ERRERA from L’Union, France, CC BY-SA 2.0.

[via Southgate ARC]

“Paper” Bottles For Your Fizzy Drinks (And Bottle Rockets)

A story that passed almost unnoticed was that the Coca-Cola company plan to run a limited trial of paper bottles. Wait, paper for a pressurized beverage? The current incarnation still uses a plastic liner and cap but future development will focus on a “bio-based barrier” and a bio composite or paper cap tethered to the vessel.

Given that plastic pollution is now a major global concern this is interesting news, as plastic drinks bottles make a significant contribution to that problem. But it raises several questions, first of all why are we seemingly unable to recycle the bottles in the first place, and given that we have received our milk and juice in paper-based containers for decades why has it taken the soda industry so long?

Plastic soft drink bottles are made from Polyethylene terephthalate or PET, the same polyester polymer as the one used in Dacron or Terylene fabrics. They’re blow-moulded, which is to say that an injection-moulded preform something like a plastic test tube with a screw top fitting is expanded from inside in a mould by compressed gas. As anyone who has experimented with bottle rockets will tell you, they are immensely strong, and as well as being cheap to make and transport they are also readily recyclable when separated from their caps.

Continue reading ““Paper” Bottles For Your Fizzy Drinks (And Bottle Rockets)”

This Week In Security: NAME:WRECK, Signal Hacks Back, Updates, And More

NAME:WRECK is a collection of vulnerabilities in DNS implementations, discovered by Forescout and JSOF Research. This body of research can be seen as a continuation of Ripple20 and AMNESIA:33, as it builds on a class of vulnerability discovered in other network stacks, problems with DNS message compression.

Their PDF Whitepaper contains a brief primer on the DNS message format, which is useful for understanding the class of problem. In such a message, a DNS name is encoded with a length-value scheme, with each full name ending in a null byte. So in a DNS Request, Hackaday.com would get represented as [0x08]Hackaday[0x03]com[0x00]. The dots get replaced by these length values, and it makes for an easily parsable format.

Very early on, it was decided that continually repeating the same host names in a DNS message was wasteful of space, so a compression scheme was devised. DNS compression takes advantage of the maximum host/domain length of 63 characters. This max size means that the binary representation of that length value will never contain “1”s in the first two digits. Since it can never be used, length values starting with a binary “11” are used to point to a previously occurring domain name. The 14 bits that follow this two bit flag are known as a compression pointer, and represent a byte offset from the beginning of the message. The DNS message parser pulls the intended value from that location, and then continues parsing.

The problems found were generally based around improper validation. For example, the NetX stack doesn’t check whether the compression pointer points at itself. This scenario leads to a tight infinite loop, a classic DoS attack. Other systems don’t properly validate the location being referenced, leading to data copy past the allocated buffer, leading to remote code execution (RCE). FreeBSD has this issue, but because it’s tied to DHCP packets, the vulnerability can only be exploited by a device on the local network. While looking for message compression issues, they also found a handful of vulnerabilities in DNS response parsing that aren’t directly related to compression. The most notable here being an RCE in Seimens’ Nucleus Net stack. Continue reading “This Week In Security: NAME:WRECK, Signal Hacks Back, Updates, And More”