Build Your Next Dancing Robot From Empty Soda Bottles

When you think about the materials for your next large dancing robot build, soda bottles might not be the first thing that springs to mind. But they could work, according to TrussFab, a project from a group of students at the Hasso Plattner Instituit. Their system uses empty coke bottles and 3D printed connectors to build large structures, modeled in software that checks their load balance and safety. The team has modeled and built designs up to 5 meters high. Now, the project has taken a step further by adding linear actuators and hinges to the mix so you can create things that move, including a 4-meter high animatronic robot.

Continue reading “Build Your Next Dancing Robot From Empty Soda Bottles”

Malicious Component Found On Server Motherboards Supplied To Numerous Companies

This morning Bloomberg is reporting a bombshell for hardware security. Companies like Amazon and Apple have found a malicious chip on their server motherboards. These are not counterfeit chips. They are not part of the motherboard design. These were added by the factory at the time of manufacture. The chip was placed among other signal conditioning components and is incredibly hard to spot as the nature of these motherboards includes hundreds of minuscule components.

Though Amazon and Apple have denied it, according to Bloomberg, a private security contractor in Canada found the hidden chip on server motherboards. Elemental Technologies, acquired by Amazon in 2015 for its video and graphics processing hardware, subcontracted Supermicro (Super Micro Computer, Inc.) to manufacture their server motherboards in China. It is unknown how many of the company’s products have this type of malicious hardware in them, equipment from Elemental Technologies has been supplied to the likes of government contractors as well as major banks and even reportedly used in the CIA’s drone operations.

How the Hack Works

The attacks work with the small chip being implanted onto the motherboard disguised as signal couplers. It is unclear how the chip gains access to the peripherals such as memory (as reported by Bloomberg) but it is possible it has something to do with accessing the bus. The chip controls some data lines on the motherboard that likely provide an attack vector for the baseboard management controller (BMC).

Hackaday spoke with Joe FitzPatrick (a well known hardware security guru who was quoted in the Bloomberg article). He finds this reported attack as a very believable approach to compromising servers. His take on the BMC is that it’s usually an ARM processor running an ancient version of Linux that has control over the major parts of the server. Any known vulnerability in the BMC would be an attack surface for the custom chip.

Data centers house thousands of individual servers that see no physical interaction from humans once installed. The BMC lets administrators control the servers remotely to reboot malfunctioning equipment among other administrative tasks. If this malicious chip can take control of the BMC, then it can provide remote access to whomever installed the chip. Reported investigations have revealed the hack in action with brief check-in communications from these chips though it’s difficult to say if they had already served their purpose or were being saved for a future date.

What Now?

Adding hardware to a design is fundamentally different than software-based hacking: it leaves physical evidence behind. Bloomberg reports on US government efforts to investigate the supply chain attached to these parts. It is worth noting though that the article doesn’t include any named sources while pointing the finger at China’s People’s Liberation Army.

The solution is not a simple one if servers with this malicious chip were already out in the field. Even if you know a motherboard has the additional component, finding it is not easy. Bloomberg also has unconfirmed reports that the next-generation of this attack places the malicious component between layers of the circuit board. If true, an x-ray would be required to spot the additional part.

A true solution for high-security applications will require specialized means of making sure that the resulting product is not altered in any way. This hack takes things to a whole new level and calls into question how we validate hardware that runs our networks.

Update: We changed the penultimate paragraph to include the word if: “…simple one if servers with…” as it has not been independently verified that servers were actually out in the field and companies have denied Bloomberg’s reporting that they were.

[Note: Image is a generic photo and not the actual hardware]

Robot Solves Rubik’s Cube With One Hand Tied Behind Its Back

For all those who have complained about Rubik’s Cube solving robots in the past by dismissing purpose-built rigs that hold the cube in a non-anthropomorphic manner: checkmate.

The video below shows not only that a robot can solve the classic puzzle with mechanical hands, but it can also do it with just one of them – and that with only three fingers. The [Yamakawa] lab at the University of Tokyo built the high-speed manipulator to explore the kinds of fine motions that humans perform without even thinking about them. Their hand, guided by a 500-fps machine vision system, uses two opposing fingers to grip the lower part of the cube while using the other finger to flick the top face of the cube counterclockwise. The entire cube can also be rotated on the vertical axis, or flipped 90° at a time. Piecing these moves together lets the hand solve the cube with impressive speed; extra points for the little, “How’s that, human?” flick at the end.

It might not be the fastest cube solver, or one that’s built right into the cube itself, but there’s something about the dexterity of this hand that we really appreciate.

Continue reading “Robot Solves Rubik’s Cube With One Hand Tied Behind Its Back”

A New Tilt On RC Car Controllers

If you are a lover of all-things remote-conteolled, it’s likely that you know a thing or two about controllers. You’ll have one or two of the things, both the familiar two-joystick type and the pistol-grip variety. But had you ever considered that there m ight be another means to do it? [Andrei] over at ELECTRONOOBS has posted a guide to a tilt-controlled RC car. It is a good example of how simple parts can be linked together to make something novel and entertaining, and a great starter project for an aspiring hacker.

An Arduino Nano reads from an accelerometer over an I2C bus, and sends commands over a wireless link, courtesy of a pair of HC-12 wireless modules.  Another Nano mounted to the car decodes the commands, and uses a pair of H-bridges, which we’ve covered in detail, to control the motors.

The tutorial is well done, and includes details on the hardware and all the code you need to get rolling.  Check out the build and demo video after the break.

Continue reading “A New Tilt On RC Car Controllers”

Free ARM Cores For Xilinx FPGAs

In a surprising move, ARM has made two Cortex-M cores available for FPGA development at no cost.

In the over three decades since [Sophie Wilson] created the first ARM processor design for the Acorn Archimedes home computer, the architecture has been managed commercially such that it has become one of the most widely adopted on the planet. From tiny embedded microcontrollers in domestic appliances to super-powerful 64-bit multi-core behemoths in high-end mobile phones, it’s certain you’ll own quite a few ARM processors even if you don’t realise it. Yet none of those processors will have been made by ARM, instead the Cambridge-based company will have licenced the intellectual property of their cores to another semiconductor company who will manufacture the device around it to their specification. ARM core licences cost telephone-number sums, so unless you are a well-financed semiconductor company, until now you probably need not apply.

You will still have to shell out the dough to get your hands on a core for powerful chips like those smartphone behemoths, but if your tastes are more modest and run only to a Cortex M1 or M3 you might be in luck. For developers on Xilinx FPGAs they have extended the offer of those two processor cores at zero cost through their DesignStart Programme.

It’s free-as-in-beer rather than something that will please open-source enthusiasts, But it’s certainly a fascinating development for experimenters who want to take ARM for a spin on their own gate array. Speculation is swirling that this is a response to RISC-V, but we suspect it may be more of a partial lifting of the skirts to entice newbie developers such as students or postgraduates. If you arrive in the world of work already used to working with ARM IP at the FPGA level then you are more likely to be on their side of the fence when those telephone-number deals come up.

Thanks [Rik] for the tip!

Creating Antimatter On The Desktop — One Day

If you watch Star Trek, you will know one way to get rid of pesky aliens is to vent antimatter. The truth is, antimatter is a little less exotic than it appears on TV, but for a variety of reasons there hasn’t been nearly as much practical research done with it. There are well over 200 electron accelerators in labs around the world, but only a handful that work with positrons, the electron’s anti-counterpart. [Dr. Aakash Sahai] would like to change that. He’s got a new design that could bring antimatter beams out of the lab and onto the desktop. He hasn’t built a prototype, but he did publish some proof-of-concept simulation work in Physical Review Accelerators and Beams.

Today, generating high-energy positron beams requires an RF accelerator — miles of track with powerful electromagnets, klystrons, and microwave cavities. Not something you are going to build in your garage this year. [Sahai] is borrowing ideas from electron laser-plasma accelerators (ELPA) — a technology that has allowed electron accelerators to shrink to mere inches — and turned it around to create positrons instead.

Continue reading “Creating Antimatter On The Desktop — One Day”

Antennas That You Install With A Spray-Can

With the explosion in cell phones, WiFi, Bluetooth, and other radio technologies, the demand for antennas is increasing. Everything is getting smaller and even wearable, so traditional antennas are less practical than ever. You’ve probably seen PCB antennas on things like ESP8266s, but Drexel University researchers are now studying using titanium carbide — known as MXene — to build thin, light, and even transparent antennas that outperform copper antennas. Bucking the trend for 3D printing, these antennas are sprayed like ink or paint onto a surface.

A traditional antenna that uses metal carries most of the current at the skin (something we’ve discussed before). For example, at WiFi frequencies, a copper antenna’s skin depth is about 1.33 micrometers. That means that antennas have to be at least thick enough to carry current at that depth from all surfaces –practically 5 micrometers is about the thinnest you can reasonably go. That doesn’t sound like a lot, but when you are trying to make something thin and flexible, it is pretty thick. Using MXene, the researchers made antennas as thin as 100 nanometers thick — that’s 10% of a micrometer and only 2% of a conventional antenna.

Continue reading “Antennas That You Install With A Spray-Can”