Alan Turing To Be The Face Of Fifty Quid

The Bank of England has announced that the new face of the £50 note is to be Alan Turing. This news follows a round of public nominations for a scientist to fill the space, and Turing was in the running with some stiff competition from the likes of Stephen Hawking and Ada, Countess Lovelace.

The fifty is not a note you’ll see very often even if you’re a Brit, it’s the one you’ll usually only come into contact with if you’ve bought a second-hand car, but the importance of this move goes beyond whether or not the note will be proffered at the bar for a foaming pint of mild ale. It’s not an honour that is handed out lightly, and it is particularly poignant in the case of Turing who despite his wartime codebreaking and genesis of the discipline of computer science was disgraced and pushed to suicide in the 1950s when he was discovered to be gay.

Will Hardware Pictured on the Bill Be as Famous as Turing Himself?

The bank has not yet set the engravers to work, but they have generated this mock-up that features alongside Turing himself a table from a Turing machine example superimposed on a picture of an early computer rack. We don’t think it’s EDSAC or Manchester Baby, it’s not a Bombe and it definitely shouldn’t be Colossus as he had little to do with it, but we are sure that among our readers will be someone who can provide a positive identification. We hope that whatever the final design may be, it does justice to Turing’s legacy.

Continue reading “Alan Turing To Be The Face Of Fifty Quid”

You Are Probably Using NASA Technology

You often hear people — especially non-hacker types — complain that money spent on space travel would be better off spent here on Earth. Of course that ignores one big factor, that space programs have resulted in a host of spin off technologies, many of which you use every day. JPL has an infographic that covers twenty things we wouldn’t have without space travel, and while it could be said that some of these things might have been invented anyway it would doubtless have taken much longer without the necessity and the income from space programs. If you want more detail, Tech Briefs has an interesting interview on the subject of what tech spun off the Apollo program.

Some of the inventions are pretty obvious, and others are more refinements of things that already existed. We all knew NASA pioneered freeze drying for food, for instance. However, some of them are pretty surprising. For example, according to the infographic, NASA asking Black and Decker to develop a moon sample collector led to the Dust Buster.

Continue reading “You Are Probably Using NASA Technology”

This Week In Security: Censoring Researchers, The Death Of OpenPGP, Dereferencing Nulls, And Zoom Is Watching You

Last week the schedule for our weekly security column collided with the Independence Day holiday. The upside is that we get a two-for-one deal this week, as we’re covering two weeks worth of news, and there is a lot to cover!

[Petko Petrov], a security researcher in Bulgaria, was arrested last week for demonstrating an weakness he discovered in a local government website. In the demonstration video, he stated that he attempted to disclose the vulnerability to both the software vendor and the local government. When his warnings were ignored, he took to Facebook to inform the world of the problem.

From the video, it appears that a validation step was performed on the browser side, easily manipulated by the end user. Once such a flaw is discovered, it becomes trivial to automate the process of scraping data from the vulnerable site. The vulnerability found isn’t particularly interesting, though the amount of data exposed is rather worrying. The bigger story is that as of the latest reports, the local government still intends to prosecute [Petko] for downloading data as part of demonstrating the attack.

Youtube Censorship

We made a video about launching fireworks over Wi-Fi for the 4th of July only to find out @YouTube gave us a strike because we teach about hacking, so we can't upload it. YouTube now bans: "Instructional hacking and phishing: Showing users how to bypass secure computer systems"

In related news, Google has begun cracking down on “Instructional Hacking and Phishing” videos. [Kody] from the Null Byte Youtube channel found himself locked out of his own channel, after receiving a strike for a video discussing a Wifi vulnerability.

The key to getting a video unblocked seems to be generating lots of social media attention. Enough outcry seems to trigger a manual review of the video in question, and usually results in the strike being rescinded.

Improved Zip Bomb

A zip bomb is a small zip file that unzips into a ridiculously large file or collection of files. While there are obvious nefarious uses for such a file, it has also become something of a competition, crafting the most extreme zip bomb. The previous champion was 42.zip, a recursive zip file that when fully extracted, weighs in at 42 petabytes. A new contender may have just taken the crown, and without using zip file recursion.

[David Fifield] discovered a pair of ZIP tricks. First being that multiple files can be constructed from a single “kernel” of compressed data. The second is that file headers could also be part of files to be decompressed. It’s clever work, and much easier to understand when looking at the graphics he put together. From those two points, the only task left is to optimize. Taking advantage of the zip64 format, the final compression ratio was approximately 98 million to one.

Breaking OpenPGP Keyservers

OpenPGP as we know it is on the ropes. OpenPGP is the technique that allows encryption and verification of emails through cryptographic signatures. It’s the grandaddy of modern secure communication, and still widely used today. One of the features of OpenPGP is that anyone can upload their public key to keyservers hosted around the world. Because of the political climate in the early 90’s when OpenPGP was first developed, it was decided that a baked-in feature of the keyserver was that uploaded keys could never be deleted.

Another feature of OpenPGP keys is that one user can use their key to sign another user’s key, formally attesting that it is valid. This creates what is known as a “web of trust”. When an OpenPGP instance validates a signature, it also validates all the attestations attached to that signature. Someone has spammed a pair of OpenPGP certificates with tens of thousands of signatures. If your OpenPGP client refreshes those signatures, and attempts to check the validations, it will grind to a halt under the load. Loading the updated certificate permanently poisons the offline key-store. In some cases, just the single certificate can be deleted, but some users have had to delete their entire key store.

It’s now apparent that parts of the OpenPGP infrastructure hasn’t been well maintained for quite some time. [Robert J. Hansen] has been spearheading the public response to this attack, not to mention one of the users directly targeted. In a follow-up post, he alluded to the need to re-write the keyserver component of OpenPGP, and the lack of resources to do so.

It’s unclear what will become of the OpenPGP infrastructure. It’s likely that the old keyserver network will have to be abandoned entirely. An experimental keyserver is available at keys.openpgp.org that has removed the spammed signatures.

Beware the QR Codes

Link shorteners are a useful way to avoid typing out a long URL, but have a downside — you don’t know what URL you’re going to ahead of time. Thankfully there are link unshorteners, like unshorten.it. Paste a shortlink and get the full URL, so you don’t accidentally visit a shady website because you clicked on a shortened link. [Nick Guarino] over at cofense.com raises a new alarm: QR codes can similarly lead to malicious or questionable websites, and are less easily examined before scanning. His focus is primarily how a QR code can be used to bypass security products, in order to launch a fishing attack.

Most QR scanners have an option to automatically navigate to the web page in the code. Turn this option off. Not only could scanning a QR code lead to a malicious web site, but URLs can also launch actions in other apps. This potential problem of QR codes is very similar to the problem of shortened links — the actual payload isn’t human readable prior to interacting with it, when it’s potentially too late.

Dereferencing Pointers for Fun and Profit

On the 10th, the Eset blog, [welivesecurity], covered a Windows local priveledge escalation 0-day being actively exploited in the wild. The exploit highlights several concepts, one of which we haven’t covered before, namely how to use a null pointer dereference in an exploit.

In C, a pointer is simply a variable that holds a memory location. In that memory location can be a data structure, a string, or even a callable function. By convention, when pointers aren’t referring to anything, they are set to NULL. This is a useful way to quickly check whether a pointer is pointing to live data. The process of interacting with a pointer’s data is known a dereferencing the pointer. A NULL pointer dereference, then, is accessing the data referred to by a pointer that is set to NULL. This puts us in the dangerous territory of undefined behavior.

Different compilers, architectures, and even operating systems will potentially demonstrate different behavior when doing something undefined. In the case of C code on 32-bit Windows 7, NULL is indistinguishable from zero, and memory location zero is a perfectly valid location. In this case, we’re not talking about the physical location zero, but logical address zero. In modern systems, each process has a dedicated pool of memory, and the OS manages the offset and memory mapping, allowing the process to use the simpler logical memory addressing.

Windows 7 has a function, “NtAllocateVirtualMemory”, that allows a process to request access to arbitrary memory locations. If a NULL, or zero, is passed to this function as the memory location, the OS simply picks a location to allocate that memory. What many consider a bug is that this function will effectively round down small memory locations. It’s quite possible to allocate memory at logical address 0/NULL, but is considered to be bad behavior. The important takeaway here is that in Windows 7, a program can allocate memory at a location referred to by a null pointer.

On to the vulnerability! The malicious program sets up a popup menu and submenu as part of its GUI. While this menu is still being initialized, the malicious program cancels the request to set up the menu. By timing the cancellation request precisely, it’s possible for the submenu to still be created, but to be a null pointer instead of the expected object. A second process can then trigger the system process to call a function expected to be part of the object. Because Windows allows the allocation of memory page zero, this effectively hands system level execution to the attacker. The full write-up is worth the time to check out.

Zoom Your Way to Vulnerability

Zoom is a popular web-meeting application, aimed at corporations, with the primary selling point being how easy it is to join a meeting. Apparently they worked a bit too hard on easy meeting joins, as loading a malicious webpage on a Mac causes an automatic meeting join with the mic and webcam enabled, so long as that machine has previous connected to a Zoom meeting. You would think that uninstalling the Zoom client would be enough to stop the madness, but installing Zoom also installs a local webserver. Astonishingly, uninstalling Zoom doesn’t remove the webserver, but it was designed to perpetually listen for a new Zoom meeting attempt. If that sounds like a Trojan to you, you’re not wrong.

The outcry over Zoom’s official response was enough to inform them of the error of their ways. They have pushed an update that removes the hidden server and adds a user interaction before joining a meeting. Additionally, Apple has pushed an update that removes the hidden server if present, and prompts before joining a Zoom meeting.

Wireless Keyboards Letting You Down

Have you ever typed your password using a wireless keyboard, and wondered if you just broadcast it in the clear to anyone listening? In theory, wireless keyboards and mice use encryption to keep eavesdroppers out, but at least Logitech devices have a number of problems in their encryption scheme.

Part of the problem seems to be Logitech’s “Unifying” wireless system, and the emphasis on compatibility. One receiver can support multiple devices, which is helpful when eliminating cable clutter, but also weakens the encryption scheme. An attacker only has to be able to monitor the radio signals during pairing, or even monitoring signals while also observing keypresses. Either way, a few moments of processing, and an attacker has both read and write access to the wireless gear.

Several even more serious problems have fixed with firmware updates in the past years, but [Marcus Mengs], the researcher in question, discovered that newly purchased hardware still doesn’t contain the updated firmware. Worse yet, some of the effected devices don’t have an officially supported firmware update tool.

Maybe wired peripherals are the way to go, after all!

Maker Media Reboots Itself As Make Community

At a community meeting this week, Dale Dougherty, former CEO of Maker Media announced the relaunch of the Make brand. Maker Media is dead, but the brand may live on as Make Community, LLC. Dougherty will remain the CEO of Make Community, and Todd Sotkicwicz, former CFO of Maker Media, was identified as the current CFO of Make Community. This is the same organization that brought you Make Magazine and the Maker Faires gearing up to give you even more Make Magazines and more Maker Faires.

Early this year, we heard rumors about the future of Maker Media and its flagship Maker Faires. Then in May, just before the Bay Area Maker Faire, Dougherty told the San Francisco Chronicle that it was ‘quite possible this could be the last Bay Area Maker Faire’. The Bay Area Faire came and went, and early last month we received news that employees were let go and Maker Media had ceased operations.

Now, according to Dougherty’s summary at the meeting, what remained has now been reformed into a new LLC, Make Community, and he was holding this meeting to gauge how much the community would be willing to contribute. The official launch of Make Community will supposedly be next week, but you can check out the future home of the Make Community at make.co.
Continue reading “Maker Media Reboots Itself As Make Community”

Using Super-Efficient Solar Cells To Keep Your Electric Car’s Battery Topped Up

Who hasn’t thought of sticking a couple of solar panels onto an electric car’s roof to keep its battery at 100% charge while it’s parked out in the sun? While usually deemed impossible due to the large number and weight of PV solar cells required to get the necessary amount of energy, this hasn’t kept Toyota’s engineers from covering one of their Prius cars with 34+% efficient solar cells.

Some may remember the solar roof option which Toyota previously offered years ago. That system produced a mere 50 W and was only used for things like running the AC fans, indirectly extending the battery charge. In 2016 Toyota brought back this system, in a much improved version. This upped the power output to 180 W, allowing it to power all secondary electronics in the Prius, even allowing it to add a few extra kilometers (roughly 6.1 km/day) to the Prius’ range if one were so inclined.

This newest prototype pretty much goes for broke, reminding us of the cars used in the World Solar Challenge, such as the Dutch Stella and Stella Lux positive-energy solar cars by the team at the University of Eindhoven. Who coincidentally have done a spin-off, setting up a company to produce the Lightyear One, which at least on paper sounds amazing, and potentially may never have to plug it in.

Continue reading “Using Super-Efficient Solar Cells To Keep Your Electric Car’s Battery Topped Up”

DJI Fights Back Over Sensationalist Drone Reporting

Over the past few years the number of reported near misses between multirotors, or drones as they are popularly referred to, and aircraft has been on the rise. While evidence to back up these reports has been absent time and again.

We’ve looked at incident reports, airport closures, and media reporting. The latest chapter comes in the form of a BBC documentary, “Britain’s Next Air Disaster? Drones” whose angle proved too sensational and one-sided for the drone manufacturing giant DJI. They have penned an acerbic open letter to the broadcaster (PDF link to the letter itself) that says that they will be launching an official complaint over the programme’s content. The letter begins with the following stinging critique:

As the world’s leader in civilian drones and aerial imaging technology, we feel it is our duty on behalf of the millions of responsible drone users around the globe, to express our deep disappointment at the BBC’s negative portrayal of drone technology and one-sided reporting based on hearsay.

It then goes on to attack the tone adopted by the presenter in more detail : “overwhelmingly negative, with the presenter frequently using the words ‘catastrophic’ and ‘terrifying’.“, before attacking the validity of a series of featured impact tests and highlighting the questionable basis for air proximity incident reports. They round the document off with a run through the safety features that they and other manufacturers are incorporating into their products.

DJI have pulled no punches in their condemnation of the standard of reporting on drone incidents in this document, and it is a welcome and rare sight in an arena in which the voices of people who know something of multirotors have been rather lonely and ignored. The BBC in turn have responded by saying “its investigation had shown positive uses of drones and that its programmes were fair“.

Over the past few years we have reported on this issue we have continually made the plea for a higher quality of reporting on drone stories. While Britain has been the center of reporting that skews negatively on the hobby, the topic is relevant wherever in the world there are nervous airspace regulators with an eye to any perceived menace. These incidents have pushed the industry to develop additional safety standards, as DJI mentions in their letter: “the drone industry itself has implemented various features to mitigate the risks described”. Let’s hope this first glimmer of a fight-back from an industry heavyweight (with more clout than the multirotor community) will bear the fruit of increased awareness from media, officials, and the general public.

If you’d like to see the BBC documentary in question it will be available for the next few weeks to people who see the Internet through a British IP address.

Thanks [Stuart] for the tip!

Earthquake Detection On A Chip

If you’ve ever been in an earthquake you’d assume it would be pretty easy to detect one. If things are shaking, there’s an earthquake. In reality, though, a lot of things can shake a sensitive instrument that is detecting shaking, so — for example — mechanical sensors will produce a lot of false positives. Now, however, you can filter out errant vibrations and reliably detect earthquakes on a chip.

The Rohm BP3901 has two primary features. First, it supposedly eliminates false detections due to things like a heavy truck rumbling by. In addition, while most sensors must be mounted completely flat, the BP3901 has a compensation method for angle which lets you mount it as much as 15 degrees rotated in either direction and still get good results. That’s because the BP3901 is based on the combination of an accelerometer and a microcontroller in one package to detect movement, characterize it based on an algorithm and reacting through an I2C bus and an INT pin.

Rohm suggests you could power the BP3901 for about 5 years with two AA batteries with the example of averaging 10 three-minute wake up events a month. We aren’t sure why we want to detect an earthquake, but we think we do. Imagine a large sensor network sending back real-time data as an earthquake happens — something we saw last year using Raspberry Pi. That project used a Geophone as the detector, which could be replaced by this chip. Rohm plans to have “OEM quantities” for sale next month which we hope means we can get smaller quantities from distributors.

A lot of people spend a lot of time thinking about how to predict earthquakes, as we’ve seen before. Of interest, the ancient Romans may have had a way to deflect earthquakes, so they probably didn’t care as much about detecting them.