Raspberry Pi PoE Redux

[Martin Rowan] was lucky enough to get his hands on the revised Power Over Ethernet (PoE) hat for the Raspberry Pi. Lucky for us, he wrote it up for our benefit, including inspection of the new hat, it’s circuit, and electrical testing to compare to the original hardware.

You may remember the original release of the PoE hat for the Raspberry Pi, as well as the subsequent recall due to over-current issues. In testing the revised board, [Martin] powered a test load off the USB ports, and pulled over an amp — The first iteration of the PoE hat would often trip the over-current protection at 300 milliamps.

This afternoon, the redesigned PoE board was officially released, and the post mortem of the problem documented in a blog post. It’s a lesson in the hidden complexity of hardware design, as well as a cautionary tale about the importance of thorough testing, even when the product is late and the pressure is on.

The PoE hat converts 48 volt power down to a 5 volt supply for the Pi using a flyback transformer. The problem was that this transformer setup doesn’t deliver clean steady 5 volt power, but instead provides power as a series of spikes. While these spikes were theoretically in spec for powering the Pi and usb devices, some Raspberry Pis were detecting those spikes as too much current pushed through the USB ports. The official solution essentially consists of better power filtering between the hat and the Pi, flattening that power draw.

We’re looking forward to getting our hands on this new and improved PoE Hat, and using it in many project to come.

Did We Just Get Buzzed By Alien Space Junk?

Perhaps you heard about Oumuamua (don’t ask us how to pronounce that). The cigar-shaped object is the first item found by astronomers that is known to have come from outside the solar system and is continuing to pass through, not being captured by the sun’s gravitational field. A recent paper from [Shmuel Bialy] and [Abraham Loeb] from Harvard suggests that the thing could be a discarded light sail from an alien spacecraft.

Of course, it is fun to speculate that anything in space we don’t understand could be alien. However, the paper is doing more than just speculating. The rotation rate of the object suggests it is fairly flat (pancake-like, was the exact phrase used). In addition, it appears to experience “non-gravitational” acceleration — that is, it is accelerating due to some force other than gravity.

Others have suggested that the acceleration is due to material boiling off as the sun warms it. However, there’s no indication of that happening and activity like that ought to also change the spin rate which does not appear to be happening. Solar wind pressure could explain the changes, though. You might think that proves nothing since the solar wind pushes on everything. However, it is just like the wind in the atmosphere — sure it pushes on your car, your house, and a sailboat, but only the sailboat moves appreciably from it.

Continue reading “Did We Just Get Buzzed By Alien Space Junk?”

It Happened At Supercon: Six Days Of Fun In A Three Day Con

A weekend for people who love hardware, by people who love hardware. It’s a simple recipe and it makes a delicious event that we call the Hackaday Superconference. If you made it to Pasadena last weekend, I’m sure going back to work on Monday was difficult after three days of far too little sleep and way too much fun. (It was for me.) If you didn’t make it to the con, set a reminder for July 1st to start watching for next year’s early bird tickets. Don’t believe me? Okay, let’s step through the hype of a weekend we’ll all remember.

Check out the recap video above and then join me after the break for a photo-heavy expose of the weekend’s highlights.

Continue reading “It Happened At Supercon: Six Days Of Fun In A Three Day Con”

Dexter Robotic Arm Wins The 2018 Hackaday Prize

Dexter, an open-source, high-precision, trainable robotic arm has just been named the Grand Prize winner of the 2018 Hackaday Prize. The award for claiming the top place in this nine-month global engineering initiative is $50,000. Four other top winners were also named during this evening’s Hackaday Prize Ceremony, held during the Hackaday Superconference in Pasadena, California.

This year’s Hackaday Prize featured challenges with five different themes. Entrants were asked to show their greatest Open Hardware Design, to build a Robotics Module, to design a Power Harvesting Module, to envision a Human Computer Interface, or to invent a new Musical Instrument. Out of 100 finalists, the top five are covered below. Over $200,000 in cash prizes have been distributed as part of this year’s initiative where thousands of hardware hackers, makers and artists compete to build a better future.

Dexter: High Precision Robotic Arm

Dexter is the Grand Prize winner of the 2018 Hackaday Prize. This remarkable robotic arm design brings many aspects of high-end automation to an open source design which you can utilize and adapt for your own needs. In addition to impressive precision, the design is trainable — you can move the joints of the arm and record the motion for playback.

The image here shows position data from one arm being moved by a human, controlling another arm in real time. Each joint utilizes a clever encoder design made up of a wheel with openings for UV sensors. Sensing is more than merely “on/off”. It tracks the change in light intensity through each opening for even greater granularity. The parallel nature of an FPGA is used to process this positioning data in real time.

Hack a $35 Wearable to Build Mental Health Devices

Manufacturing custom electronics is a tricky, costly, and time-consuming process. What if you could sidestep most of that by starting with a powerful, proven consumer good that is modified to your specifications? This project takes existing fitness trackers and customizes the hardware and software to become sensor suites for mental health research. Dig into this one and see how they can help patients become aware of unconscious behaviors (like trichotillomania which is compulsive hair pulling) and change them over time.

Portal Point Generator

This project focuses on an alternative power source for times when traditional infrastructure is not functioning or simply not available. You may be familiar with generators made using DC motors. The Portal Point Generator replicates that simplicity, but goes beyond with instructions for building the generator itself for far greater efficiency. A winding jig is used to make the coils which are placed inside of the 3D printed generator parts along with permanent magnets to complete the build. Here you can see it in testing as a wind generator in Antarctica, but it is easily adapted to other applications like using water wheels.

EmotiGlass

There is a body of research that suggest a link between cardiac cycle and anxiety-producing visuals; you may have a different emotional reaction to the things you see based on what part of a heartbeat is occurring when your brain process information from your eyes. This could have profound implications in areas like PTSD research. EmotiGlass uses LCD screens to selectively block the wearer’s vision. This can be synchronized with heat beat, avoiding the instant where a negative emotional response is most likely. Think of them as 3D shutter glasses for mental health research.

PR-Holonet: Disaster Area Emergency Comms

Recovering from natural disasters is an enormous challenge. The infrastructure that supports the community is no longer in place and traditional communications simply cease to exist. PR-Holonet was inspired by the recovery process after hurricanes in Puerto Rico. It leverages the availability of commercial electronics, solar power sources, and enclosures to build a communications system that can be deployed and operated without the need for specialized training. Once in place, local devices using WiFi can utilize text-based communications transferred via satellite.

Congratulations to all who entered the 2018 Hackaday Prize. Taking time to apply your skill and experience to making the world better is a noble pursuit. It doesn’t end with the awarding of a prize. We have the ability to change lives by supporting one another, improving on great ideas, and sharing the calling to Build Something that Matters.

Who’s Going On Your Fifty?

You can tell a lot about a country, its history and its politics, by taking a look at its banknotes. Who features on them, or in the case of studiously engineered international compromises such as the Euro, who doesn’t feature on them. Residents of the UK  have over the years been treated to a succession of historical worthies on their cash, and when a new revision of a banknote is announced you can be certain that the choice of famous person to adorn it will be front page news. Today we have a new banknote on the way, and this time the selection is squarely in Hackaday’s sphere of interest because the public is being urged to nominate a scientist for the honour. The note in question is the £50, the one that nobody uses and plenty of shops won’t even accept, but still, it’s an important choice that will replace the incumbents on the present version, steam engine pioneers Matthew Boulton and James Watt.

So, given a blank £50, who would you put on it? Candidates must be British, not fictional, and also no longer alive. Names in the frame include Ada, Countess Lovelace, Stephen Hawking, and Alan Turing, though with such a wide field to choose from there are sure to be many more front-runners. You might, for example, wish to consider Rosalind Franklin, but you can forget Isaac Newton, Charles Darwin, or Michael Faraday as they have all already featured on British banknotes.

Hackaday does not take sides in such endeavors, but it’s still an opportunity to back your most inspiring figure. As your scribe, it’s a tough one between Lovelace and Turing, though Turing probably wins by a short head. Who would you like to see on the next £50 note? The bank has produced a short promotional video which we’ve placed below the break.

Continue reading “Who’s Going On Your Fifty?”

FT8: Saving Ham Radio Or Killing It?

It is popular to blame new technology for killing things. The Internet killed newspapers. Video killed the radio star. Is FT8, a new digital technology, poised to kill off ham radio? The community seems evenly divided. In an online poll, 52% of people responding says FT8 is damaging ham radio.  But ham operator [K5SDR] has an excellent blog post about how he thinks FT8 is going to save ham radio instead.

If you already have an opinion, you have probably already raced down to the comments to share your thoughts. I’ll be honest, I think what we are seeing is a transformation of ham radio and like most transformations, it is probably both killing parts of ham radio and saving others. But if you are still here, let’s talk a little bit about what’s going on in ham radio right now and how it relates to the FT8 question. Oddly enough, our story starts with the strange lack of sunspots that we’ve been experiencing lately. Continue reading “FT8: Saving Ham Radio Or Killing It?”

Apple Kernel Code Vulnerability Affected All Devices

Another day, another vulnerability. Discovered by [Kevin Backhouse], CVE-2018-4407 is a particularly serious problem because it is present all throughout Apple’s product line, from the Macbook to the Apple Watch. The flaw is in the XNU kernel shared by all of these products.

This is a buffer overflow issue in the error handling for network packets. The kernel is expecting a fixed length of those packets but doesn’t check to prevent writing past the end of the buffer. The fact Apple’s XNU kernel powers all their products is remarkable, but issues like this are a reminder of the potential downside to that approach. Thanks to responsible disclosure, a patch was pushed out in September.

Anatomy of a Buffer Overflow

Buffer overflows aren’t new, but a reminder on what exactly is going on might be in order. In low level languages like C, the software designer is responsible for managing computer memory manually. They allocate memory, tagging a certain number of bytes for a given use. A buffer overflow is when the program writes more bytes into the memory location than are allocated, writing past the intended limit into parts of memory that are likely being used for a different purpose. In short, this overflow is written into memory that can contain other data or even executable code.

With a buffer overflow vulnerability, an attacker can write whatever code they wish to that out-of-bounds memory space, then manipulate the program to jump into that newly written code. This is referred to as arbitrary code execution. [Computerphile] has a great walk-through on buffer overflows and how they lead to code execution.

This Overflow Vulnerabilty Strikes Apple’s XNU Kernel

[Kevin] took the time to explain the issue he found in further depth. The vulnerability stems from the kernel code making an assumption about incoming packets. ICMP error messages are sent automatically in response to various network events. We’re probably most familiar with the “connection refused’ message, indicating a port closed by the firewall. These ICMP packets include the IP header of the packet that triggered the error. The XNU implementation of this process makes the assumption that the incoming packet will always have a header of the correct length, and copies that header into a buffer without first checking the length. A specially crafted packet can have a longer header, and this is the data that overflows the buffer.

Because of the role ICMP plays in communicating network status, a closed firewall isn’t enough to mitigate the attack. Even when sent to a closed port, the vulnerability can still trigger. Aside from updating to a patched OS release, the only mitigation is to run the macOS firewall in what it calls “stealth mode”. This mode doesn’t respond to pings, and more importantly, silently drops packets rather than sending ICMP error responses. This mitigation isn’t possible for watchOS and iOS devices.

The good news about the vulnerability is that a packet, malformed in this way, has little chance of being passed through a router at all. An attacker must be on the same physical network in order to send the malicious packet. The most likely attack vector, then, is the public WiFi at the local coffee shop.

Come back after the break for a demonstration of this attack in action.

Continue reading “Apple Kernel Code Vulnerability Affected All Devices”