TrueTape64 Is A PC Interface For Your C64 Datasette

Back in the distant past of the 1980s, software was distributed on audio tape. Ones and zeroes were encoded as tones of different frequencies, and tapes were decoded by specialised hardware which could then spit out raw digital data to an attached computer. While software methods now exist to simply record audio from old tapes and turn them into data, [Francesco] wanted to do it the hardware way, and built a PC interface for his Commodore 64 Datasette.

The TrueTape64, as it has been named, is built around an Atmel ATTiny2313 microcontroller. This interfaces with the original Datasette hardware which takes care of reading the analog tape output and turning it into digital data. From there, the microcontroller communicates with an FTDI232 serial-to-USB adapter to get the data into a modern PC, where it’s compiled into a TAP image file via some Python magic.

It’s a barebones build, which goes so far as to run the Datasette’s motor off the USB power supply via a boost converter; those facing issues with the tape mechanism might do well to look there first. However, it does work, and a done job is a good job at the end of the day. We’ve seen similar hacks before, too – it’s great to see the community keeping cassette software alive!

A Dutch City Gets A €600,000 Fine For WiFi Tracking

It’s not often that events in our sphere of technology hackers have ramifications for an entire country or even a continent, but there’s a piece of news from the Netherlands (Dutch language, machine translation) that has the potential to do just that.

Enschede is an unremarkable but pleasant city in the east of the country, probably best known to international Hackaday readers as the home of the UTwente webSDR and for British readers as being the first major motorway junction we pass in the Netherlands when returning home from events in Germany. Not the type of place you’d expect to rock a continent, but the news concerns the city’s municipality. They’ve been caught tracking their citizens using WiFi, and since this contravenes Dutch privacy law they’ve been fined €600,000 (about $723,000) by the Netherlands data protection authorities.

The full story of how this came to pass comes from Dave Borghuis (Dutch language, machine translation) of the TkkrLab hackerspace, who first brought the issue to the attention of the municipality in 2017. On his website he has a complete timeline (Dutch, machine translation), and in the article he delves into some of the mechanics of WiFi tracking. He’s at pains to make the point that the objective was always only to cause the WiFi tracking to end, and that the fine comes only as a result of the municipality’s continued intransigence even after being alerted multiple times to their being on the wrong side of privacy law. The city’s response (Dutch, machine translation) is a masterpiece of the PR writer’s art which boils down to their stating that they were only using it to count the density of people across the city.

The events in Enschede are already having a knock-on effect in the rest of the Netherlands as other municipalities race to ensure compliance and turn off any offending trackers, but perhaps more importantly they have the potential to reverberate throughout the entire European Union as well.

This Week In Security: BYOVD, Spectre Vx, More Octal Headaches, And ExifTool

I learned a new acronym while reading about a set of flaws in the Dell BIOS update system. Because Dell has patched their driver, but hasn’t yet revoked the signing keys from the previous driver version, it is open to a BYOVD attack.

BYOVD, Bring Your Own Vulnerable Driver, is an interesting approach to Windows privilege escalation. 64-bit versions of Windows have a security feature that blocks unsigned kernel drivers from the kernel. The exploit is to load an older, known-vulnerable driver that still has valid signatures into the kernel, and use the old vulnerabilities to exploit the system. The caveat is that even when a driver is signed, it still takes an admin account to load a driver. So what use is the BYOVD attack, when it takes administrative access to pull off?

SentinelLabs is witholding their proof-of-concept, but we can speculate. The particular vulnerable driver module lives in the filesystem at C:\Windows\Temp, a location that is writable by any process. The likely attack is to overwrite the driver on the filesystem, then trigger a reboot to load the older vulnerable version. If you’re still running Windows on your Dell machines, then make sure to go tend to this issue. Continue reading “This Week In Security: BYOVD, Spectre Vx, More Octal Headaches, And ExifTool”

Prioritising Mechanical Multiplexer

When automating almost any moderately complex mechanical task, the actuators and drive electronics can get expensive quickly. Rather than using an actuator for every motion, mechanical multiplexing might be an option. [James Bruton] has considered using it in some of his many robotics projects, so he built a prioritizing mechanical multiplexer to demonstrate the concept.

The basic idea is to have a single actuator and dynamically switch between different outputs. For his demonstration, [James] used a motor mounted on a moving platform actuated by a lead screw that can engage a number of different output gears. Each output turns a dial, and the goal is to match the position of the dial to the position of a potentiometer. The “prioritizing” part comes in where a number of outputs need to be adjusted, and the system must choose which to do first. This quickly turns into a task scheduling problem, since there are a number of factors that can be used to determine the priority. See the video after the break to see different algorithms in action.

Instead of moving the actuator, all the outputs can connect to a single main shaft via clutches as required. Possible use cases for mechanical multiplexers include dispensing machines and production line automation. Apparently, the Armatron robotic arm sold by Radioshack in the ’80s used a similar system, controlling all its functions with a single motor.

[James] knows or two about robotics, having built many of them over the last few years. Just take a look at OpenDog and his Start Wars robots. Continue reading “Prioritising Mechanical Multiplexer”

Silicon Carbide Chips Can Go To Hell

IEEE Spectrum had an interesting read about circuits using silicon carbide as a substrate. [Alan Mantooth] and colleagues say that circuits based on this or some other rugged technology will be necessary for missions to Venus, which they liken to hell. That might seem like hyperbole, but at about 460C with an atmosphere full of sulphuric acid, maybe it isn’t such a stretch. When the Soviets sent Venera 13 to Venus, it was able to send data for just over two hours before it was gone. You’d hope 40 years later we could do better.

Silicon carbide is a semiconductor made with an even mix of silicon and carbon. The resulting components can operate for at least a year at 500C. This high-temperature operation has earned them a place in solar energy and other demanding applications.  [Alan], with the University of Arkansas along with colleagues from the KTH Royal Insitute of Technology in Stockholm are building test circuits aimed at developing high-temperature radios for use in environments like the one found on Venus.

Continue reading “Silicon Carbide Chips Can Go To Hell”

Genetically Modified Mosquitos: Biohacking For Disease Prevention

Many years ago, I took a summer trip to the Maryland shore with some friends. One of my buddies and I got bored with playing football on the beach, so we decided to take a hike on one of the many trails back into the wooded area behind the dunes. At the trailhead we noticed a prominent sign, warning about the presence of “very aggressive mosquitos” and not to enter without first applying ample insect repellent. We scoffed at the warning as only young idiots could and soldiered on, bare-legged and confident that we’d be fine.

About three minutes into our hike, a small group came pelting down the trail in a panic. “It’s true! Turn back!” they shouted as they flew past us. Undeterred, or at least unwilling to appear that way to each other, we pressed on, only to discover a few minutes later that we were making a substantial blood sacrifice to the next generation of mosquitos on Assateague Island. We couldn’t bear more than a few seconds before turning tail and running back to the beach and jumping into the ocean to get rid of the last few dozen bloodsuckers.

I learned a valuable lesson from that experience, as well as developing a deep and abiding hatred of mosquitos. It turns out I’m in good company — pretty much everyone hates mosquitos, which are not just a nuisance but can be downright dangerous to be around. But if tests with genetically engineered mosquitos currently underway in Florida turn out well, we may be able to finally turn the tide against mosquito-borne diseases, simply by killing all the females before they ever reach adulthood.

Continue reading “Genetically Modified Mosquitos: Biohacking For Disease Prevention”

Ingenuity Completes Fourth Flight On Mars, Gets A New Mission

It’s the same on Mars as it is here — just when you’re getting used to your job, the bosses go and change things up.

At least that’s our read on the situation at Jezero crater, where the Mars Ingenuity helicopter has just had its mission upgraded and extended. In a Friday morning press conference, the Ingenuity flight team, joined by members of the Perseverance team and some NASA brass, made the announcement that Ingenuity had earned an extra 30 sols of flight time, and would be transitioned from a mere “technology demonstrator” to an “operations demonstration” phase. They also announced Ingenuity’s fourth flight, which concluded successfully today, covering 266 meters and staying airborne for 117 seconds.

Continue reading “Ingenuity Completes Fourth Flight On Mars, Gets A New Mission”