DMCA Takedown Issued Over Casio Code That Wasn’t

Earlier this month, we posted coverage of an ingenious calculator hack that took a Casio calculator and put an ESP8266 module and an OLED display in the space occupied by its solar cell. Controlled by a pair of unobtrusive Hall effect devices, the calculator could have been used as an ingenious cheating device but was to us the epitome of a well-executed hack. We may have liked it but it seems the folks at Casio didn’t, because they’ve issued a DMCA takedown notice for the project’s GitHub repository.

Editor’s Update: [Tom Fleet] reports that GitHub has completed the DMCA review and found the code repo does not infringe on Casio’s IP. However, it appears the copyright claim on the YouTube video has not been resolved and that video remains unavailable. However, that video is still available on the Internet Archive.

This is a picture of Barbra Streisand, who might almost be the patron saint of unintended consequences. Unknown author / Public domain
This is a picture of Barbra Streisand, who might almost be the patron saint of unintended consequences. Unknown author / Public domain.

We’re not lawyers, but if you’d care to visit our original coverage and watch the video in full, you’ll see that the ESP does not in any way tap into the calculator’s functions. The epoxy blob over the Casio processor is intact and no wires connect to the calculator mainboard, so it is difficult to imagine how any Casio code could have found its way into a repository full of ESP8266 code for the Arduino IDE. A quick search for “Hack-Casio-Calculator” on GitHub, at the time of publishing, turned up the relevant code despite Casio’s takedown, and we can’t see what they’re on about. Maybe you can?

Over the years there have been many attempts to use the DMCA on projects in our community. Some have been legitimate, others have been attempts to suppress exposure of woeful security, and still more have been laughably absurd. This one seems to us to edge into the final category, because it is difficult to see how the project described could contain any Casio code at all. It would be entirely legitimate to  issue a DMCA takedown had the epoxy blob been removed and Casio’s code been retrieved from the calculator chip (and we’d certainly cover that story!), but as far as we can see taking a scalpel to a calculator’s case and stuffing a module behind the solar panel window does not come close.

It’s evident that Casio do not like the idea of one of their calculators being turned into a cheating device, and we understand why that might be the case. But to take the DMCA route has served only to bring more publicity to the affair, and those of us with long memories know that this can only lead to one conclusion.

Thanks [Tom] and others for the tip.

Microsoft Releases The Source Code You Wanted Almost 30 Years Ago

In the late 1970s and early 1980s, if you had a personal computer there was a fair chance it either booted into some version of Microsoft Basic or you could load and run Basic. There were other versions, of course, especially for very small computers, but the gold standard for home computer Basic was Microsoft’s version, known then as GW-Basic. Now you can get the once-coveted Microsoft Basic source code for the 8086/8088 directly from Microsoft in the state you would have found it in 1983. They put up a read only GW-BASIC repository, presumably to stop a flood of feature requests for GPU acceleration.

You might wonder why they would do this? It is certainly educational, especially if you are interested in assembly language. For historical reasons, you might want to get a copy you could modify, too, for your latest retrocomputer project.

There are a few tidbits of interest. Some of the source is marked that it was translated. Apparently, Microsoft had a master implementation for some processor — real or imagined — and could translate from that code to 8088, Z-80, 6502, or any other processor they wanted to target.

From what we understand, GW-Basic was identical to IBM’s BASICA, but didn’t require certain IBM PC ROMs to operate. Of course, BASICA, itself, came from MBASIC, Microsoft’s CP/M language that originated with Altair Basic. A long lineage that influenced personal computers for many years. On a side note, there’s debate on what the GW stands for. Gee-Whiz is a popular vote, but it could stand for ‘Gates, William’, Greg Whitten (an early Microsoft employee), or Gates-Whitten. The source code doesn’t appear to answer that question.

We did enjoy the 1975 copyright message, though:

ORIGINALLY WRITTEN ON THE PDP-10 FROM
FEBRUARY 9 TO APRIL 9 1975

BILL GATES WROTE A LOT OF STUFF.
PAUL ALLEN WROTE A LOT OF OTHER STUFF AND FAST CODE.
MONTE DAVIDOFF WROTE THE MATH PACKAGE (F4I.MAC).

It wasn’t long ago that Microsoft released some old versions of MSDOS. If you have the urge to write some Basic, you might pass on GW-Basic and try QB64, instead.

GW-Basic Disk and Manual photo by [Palatinatian] CC-SA-4.0.

Radio’s Sordid History Of Being Blamed For Everything

In the surreal world of a pandemic lockdown, we are surrounded by news stories that defy satire. The idea that 5G cellular networks are to blame for the COVID-19 outbreak and a myriad other ills has the more paranoid corners of social media abuzz with concerned citizens leaping upon random pieces of street furniture as potential 5G infrastructure.

The unanimous advice of the world’s scientists, doctors, and engineers that it is inconceivable for a phone technology to cause a viral outbreak. Amusingly, 5G has not yet been rolled out to some of the places where this is happening. But with conspiracy theory, fact denial only serves to reinforce the idea, however misguided. Here at Hackaday we have already ventured into the technical and scientific side of the story, but there is another side to it that leaves the pandemic behind and reaches back over the decades. Fear of new technology and in particular radio is nothing new, it stretches back almost as long as the public has had access to it.

Continue reading “Radio’s Sordid History Of Being Blamed For Everything”

This Week In Security: DNS DDOS, Revenge Of The 15 Year Old Bug, And More

Another DDOS amplification technique has just recently been disclosed, NXNSAttack (technical paper here) that could be used against DNS servers.

We’ve covered amplification attacks before. The short explanation is that some UDP services, like DNS, can be abused to get more mileage out of a DDoS attack. The attacking machined send messages like this: “Hello Google DNS, This is the Hackaday server. Can you send me a really big DNS response packet?” If the DNS response is bigger than the request, then the overall attack is bigger as a result. The measure of effectiveness is the amplification factor. For every byte of DDoS sent by attacking machines, how much many bytes are actually sent to the victim machine? Mirai, for example, had an amplification factor of something around 2.6.

NXNSAttack has a theoretical per-byte amplification factor of 163. That’s not a missed decimal point, this has the potential to be quite the nasty problem. Continue reading “This Week In Security: DNS DDOS, Revenge Of The 15 Year Old Bug, And More”

Don’t Worry, This Box Will Protect You From 5G!

As part of an investigation into opposition to 5G mobile phone networks in the English town of Glastonbury the BBC reporter [Rory Cellan-Jones] shared details of a so-called 5G protection device that was advertised as casting a bubble of 5G-free space around its owner. This set [The Quackometer] writing, because as part of his probing into the world of snake-oil, he’s bought just such a unit and subjected it to a teardown.

What he has is a plastic project box with a graphic on top, a switch and green LED on the side, and a battery compartment on its rear. Opening the battery compartment reveals a standard 9 V alkaline cell, but the real interest comes when the cover is removed. There is a copper cylinder with a coil of wire round it, though the wires from the coil to the battery have been cut. The active part of the device is simply a battery powering an LED through a switch, as he puts it the device is a £50 ($61) poor quality torch (flashlight). Of more interest is the copper cylinder, which he identifies as a short piece of copper water pipe with two end caps. He doesn’t open it up, leaving us to expect that whatever mystical component deals with the RF must be concealed within it. This is not the usual Hackaday fare, but we know our readers are fascinated by all new technologies and will provide plenty of speculation as to how it might work in the comments.

The BBC story is worth a read to give a little background. If you are a non-Brit and you have heard of Glastonbury it is probably for the famous summer music festival held on a neighbouring farm, but the town is also famous for its connections with Arthurian legend and in recent decades for having become a centre for New Age mysticism. It has also become something of a hotbed of activism against the spread of 5G mobile networks, and has made the news this week because of concerns over the impartiality of a report condemning the technology released by its local government. If you have an interest in the 5G saga then brace yourselves for this document being used to lend a veneer of official credibility.

We’ve spent a while covering 5G issues, and given that some aspects of the story are shaping up to be a gift to technical journalists that keeps on giving, no doubt we’ll bring you more in due course. Devices such as the one featured here could even supplant audiophile products as a source of technical wonderment!

Thanks [Deus Ex Silicium] for the tip.

No, The Nintendo Leak Won’t Help Emulator Developers, And Here’s Why

If you haven’t heard from other websites yet, earlier this year a leak of various Nintendo intellectual properties surfaced on the Internet. This included prototype software dating back to the Game Boy, as well as Verilog files for systems up to the Nintendo 64, GameCube and Wii. This leak seems to have originated from a breach in the BroadOn servers, a small hardware company Nintendo had contracted to make, among other things, the China-only iQue Player.

So, that’s the gist of it out of the way, but what does it all mean? What is the iQue Player? Surely now that a company’s goodies are out in the open, enthusiasts can make use of it and improve their projects, right? Well, no. A lot of things prevent that, and there’s more than enough precedent for it that, to the emulation scene, this was just another Tuesday.

Continue reading “No, The Nintendo Leak Won’t Help Emulator Developers, And Here’s Why”

Open Agriculture Initiative Shuttered Amid Scandal

The MIT Media Lab’s Open Agriculture Initiative (OpenAg) promised to revolutionize urban farming with their Food Computers: essentially miniature automated gardens that could be installed in racks to maximize growing space. Each unit would be provided with a “Recipe” that allowed it to maintain the ideal environmental conditions for the species it contained, which meant that even the novice gardener to produce a bumper crop no whether they lived in the Arctic Circle or the Sahara.

With such lofty goals, success certainly wasn’t assured. But we still didn’t expect to hear that the program had to be permanently closed after a string of startling accusations came to light. From engaging in scientific dishonesty to setting off a minor ecological disaster, the story just gets worse and worse. Who could have imagined that one day we’d have to report on an open source project having direct ties to Jeffrey Epstein?

Food Computer v3.0

According to reports, MIT Media Lab Director Joichi Ito and OpenAg principal researcher Caleb Harper attempted to secure $1.5 million in funding for the program during a 2017 meeting with the disgraced financier. Epstein apparently wasn’t impressed by what he saw, and no money ever changed hands. Given the information we now have about the project, this might actually be the least surprising part of the story.

It has since come to light that the Food Computers never worked consistently, and indeed never made it past the prototype stage. This despite the fact that Harper claimed that functional units had already been deployed to refugee camps during presentation to potential investors. A scientist working with the project has even come forward with claims that staff were instructed to place plants brought from local garden centers into the prototype Food Computers prior to tours of the lab so visitors would think they had been grown in the devices.

A former researcher working on the OpenAg program, Babak Babakinejad, also went public with his concerns over the environmental impact of dumping waste water from the Food Computers. The lab had a permit to pump nitrogen-infused water into an underground disposal well, but according to Babakinejad, internal testing showed the nitrogen levels in the water would occasionally top 20 times the stated limit. After his concerns were ignored by Harper and other MIT staff, he eventually took his concerns directly to the Massachusetts Department of Environmental Protection which led to an investigation and ultimately a fine of $25K.

We first covered the Open Agriculture Initiative back in 2016, and readers expressed doubts about the concept even then. While we certainly don’t relish making an update like this about a project we’ve featured, it’s an important reminder that honesty and integrity can’t take a backseat to technical achievement.