close up hands holding lighting pcb

Circuit Secrets: Exploring A $5 Emergency Light

Who would’ve thought a cheap AliExpress emergency light could be packed with such crafty design choices? Found for about $5, this unit uses simple components yet achieves surprisingly sophisticated behaviors. Its self-latching feature and decisive illumination shut-off are just the beginning. A detailed analysis by [BigCliveDotCom] reveals a smart circuit that defies its humble price.

The circuit operates via a capacitive dropper, a cost-effective way to power low-current devices. What stands out, though, is its self-latching behavior. During a power failure, transistors manage to keep the LEDs illuminated until the battery voltage drops below a precise threshold, avoiding the dreaded fade-to-black. Equally clever is the automatic shut-off when the voltage dips too low, sparing the battery from a full drain.

Modifications are possible, too. For regions with 220V+ mains, swapping the dropper capacitor with a 470nF one can reduce heat dissipation. Replacing the discharge resistor (220k) with a higher value improves longevity by running cooler. What remarkable reverse engineering marvels have you come across? Share it in the comments!  After all, it is fun to hack into consumer stuff. Even if it is just a software hack.

Continue reading “Circuit Secrets: Exploring A $5 Emergency Light”

This Week In Security: License Plates, TP-Link, And Attacking Devs

We’re covering two weeks of news today, which is handy, because the week between Christmas and New Years is always a bit slow.

And up first is the inevitable problem with digital license plates. Unless very carefully designed to be bulletproof, they can be jailbroken, and the displayed number can be changed. And the Reviver plates were definitely not bulletproof, exposing a physical programming port on the back of the plate. While it’s not explicitly stated, we’re guessing that’s a JTAG port, given that the issue is considered unpatchable, and the port allows overwriting the firmware. That sort of attack can be hardened against with signed firmware, and using an MCU that enforces it.

This does invite comparisons to the James Bond revolving license plate — and that comparison does put the issue into context. It’s always been possible to swap license plates. If someone really wants to cause mischief, traditional plates can be stolen, or even faked. What a digital plate adds to the equation is the ability to switch plate numbers on the fly, without stopping or turning a screwdriver. Regardless, this seems like it will be an ongoing problem, as so many manufacturers struggle to create secure hardware.

Malicious RDP

There’s a clever attack, that uses Microsoft’s Remote Desktop Protocol (RDP), to give away way too much control over a desktop. That’s accomplished by sending the target a .rdp file that shares local resources like the clipboard, filesystem, and more. What’s new is that it seems this theoretical attack has now shown up in the wild.

The attack campaign has been attributed to APT29, CozyBear, a threat actor believed to be associated with Russia’s Foreign Intelligence Service. This attribution tracks with the victims of choice, like government, research, and Ukrainian targets in particular. To escape detection, the malicious RDP endpoints are set up behind RDP proxies, running on services like AWS. The proxies and endpoints are accessed through TOR and other anonymous proxies. The .rdp files were spread via spear-phishing emails sent through compromised mail servers. The big push, with about 200 targets, was triggered on October 22nd. Researchers at TrendMicro believe this was the end of a targeted campaign. The idea being that at the end of the campaign, it no longer matters if the infrastructure and methods get discovered, so aim for maximum impact.

Free* Mcdonalds?

Here we learn that while McDonald’s USA dosn’t have a bug bounty program, McDonald’s India does — and that’s why researcher [Eaton Zveare] looked there. And found a series of Broken Object Level Authorization (BOLA) bugs. That’s a new term to this column, but a concept we’ve talked about before. BOLA vulnerabilities happen when a service validates a user’s authentication token, but doesn’t properly check that the user is authorized to access the specific resources requested.

In the McDonald’s case, any user of the web app is issued a guest JWT token, and that token is then valid to access any Order ID in the system. That allows some interesting fun, like leaving reviews on other users’ orders, accessing delivery maps, and getting copies of receipts. But things got really interesting when creating an account, and then ordering food. A hidden, incomplete password login page allowed breaking the normal user verification flow, and creating an account. Then after food is added to the cart, the cart can be updated to have a total price of a single rupee, about the value of a penny.

This research earned [Eaton] a $240 Amazon gift card, which seems a little stingy, but the intent behind the gesture is appreciated. The fixes landed just over 2 months after reported, and while [Eaton] notes that this is slower than some companies, it’s significantly faster than some of the less responsive vendors that we’ve seen.

Banning TP-Link

The US Government has recently begun discussing a plan to ban TP-Link device purchases in the United States. The reported reason is that TP-Link devices have shipped with security problems. One notable example is a botnet that Microsoft has been tracking, that primarily consists of TP-Link devices.

This explanation rings rather hollow, particularly given the consistent security failings from multiple vendors that we’ve covered on this very column over the years. Where it begins to make more sense is when considered in light of the Chinese policy that all new vulnerabilities must first be reported to the Chinese government, and only then can fixes be rolled out. It suggests that the US Commerce Department suspects that TP-Link is still following this policy, even though it’s technically now a US company.

I’m no stranger to hacking TP-Link devices. Many years ago I wrote a simple attack to put the HTTPD daemon on TP-Link routers into debug mode, by setting the wifi network name. Because the name was used to build a command run with bash, it was possible to do command injection, build a script in the device’s /tmp space, and then execute that script. Getting to debug mode allowed upgrading to OpenWRT on the device. And that just happens to be my advice for anyone still using TP-Link hardware: install OpenWRT on it.

Developers Beware

We have two separate instances of malware campaigns directly targeting developers. The first is malicious VSCode extensions being uploaded to the marketplace. These fakes are really compelling, too, with lots of installs, reviews, and links back to the real pages. These packages seem to be droppers for malware payloads, and seem to be targeting cryptocurrency users.

If malware in your VSCode extensions isn’t bad enough, OtterCookie is a campaign believed to come from North Korea, spreading via fake job interviews. The interview asks a candidate to run a Node.js project, or install an npm package as part of prep. Those are malicious packages, and data stealers are deployed upon launch. Stay frosty, even on the job hunt.

Bits and Bytes

PHP has evolved over the years, but there are still a few quirks that might trip you up. One of the dangerous ones is tied up in $_SERVER['argv'], a quick way to test if PHP is being run from the command line, or on a server. Except, that relies on register_argc_argv set to off, otherwise query strings are enough to fool a naive application into thinking it’s running on the command line. And that’s exactly the footgun that caught Craft CMS with CVE-2024-56145.

Australia may know something we don’t, setting 2030 as the target for retiring cryptography primitives that aren’t quantum resistant. That’s RSA, Elliptic-curve, and even SHA-256. It’s a bit impractical to think that those algorithms will be completely phased out by then, but it’s an interesting development to watch.

Fuzzing is a deep subject, and the discovery of 29 new vulnerabilities found in GStreamer is evidence that there’s still plenty to discover. This wasn’t coverage-guided fuzzing, where the fuzzer mutates the fuzzing input to maximize. Instead, this work uses a custom corpus generator, where the generator is aware of how valid MP4 files are structured.

Close up of a Dutch etymology dictionary showing Esperanto, and a candle

Esperanto: The Language That Hoped To Unite The World

Christmas: a good time to broach a topic of hope. We’re talking Esperanto. This language that spurred the hope it one day could hack the barriers between people, eliminating war and miscommunication. The video below unpacks the history of this linguistic marvel. Esperanto was a constructed language dreamed up in 1887 by Ludwik Zamenhof, a Polish-Russian eye doctor with a knack for linguistics and great ideals. If you’re a little into linguistics yourself, you’ll sure know the name stems from the Latin sperare: to hope.

Inspired by the chaos of multilingual strife in his hometown, Zamenhof created Esperanto to unite humanity under a single, simple, easy-to-learn tongue. With just 16 grammar rules, modular word-building, and no pesky exceptions — looking at you, English — Esperanto was a linguistic hack ahead of its time.

But Esperanto wasn’t just a novelty—it almost became the lingua franca of diplomacy. In 1920, Iran proposed Esperanto as the official language of the League of Nations, but the French vetoed it, fearing their language’s global dominance was at risk. From there, Esperanto’s journey took a darker turn as both Nazi Germany and Stalinist Russia persecuted its speakers. Despite this, Esperanto persisted, surfacing in quirky corners of culture, from William Shatner’s Esperanto-only horror film Incubus to its inclusion on NASA’s Voyager Golden Record.

Fast-forward to the digital age: Esperanto is thriving on online learning platforms, where over a million learners explore its minimalist elegance. It appears at places in various editions of Grand Theft Auto. It has even inspired modern makers to create new constructed languages, like Loglan, Toki Pona, and even Klingon. Could Esperanto—or any reimagined language—rise again to unite us? For curious minds, watch the video here.

Continue reading “Esperanto: The Language That Hoped To Unite The World”

close up of a TI-84 Plus CE running custom software

Going Digital: Teaching A TI-84 Handwriting Recognition

You wouldn’t typically associate graphing calculators with artificial intelligence, but hacker [KermMartian] recently made it happen. The innovative project involved running a neural network directly on a TI-84 Plus CE to recognize handwritten digits. By using the MNIST dataset, a well-known collection of handwritten numbers, the calculator could identify digits in just 18 seconds. If you want to learn how, check out his full video on it here.

The project began with a proof of concept: running a convolutional neural network (CNN) on the calculator’s limited hardware, a TI-84 Plus CE with only 256 KB of memory and a 48 MHz processor. Despite these constraints, the neural network could train and make predictions. The key to success: optimizing the code, leveraging the calculator’s C programming tools, and offloading the heavy lifting to a computer for training. Once trained, the network could be transferred to the calculator for real-time inference. Not only did it run the digits from MNIST, but it also accepted input from a USB mouse, letting [KermMartian] draw digits directly on the screen.

While the calculator’s limited resources mean it can’t train the network in real-time, this project is a proof that, with enough ingenuity, even a small device can be used for something as complex as AI. It’s not just about power; it’s about resourcefulness. If you’re into unconventional projects, this is one for the books.

Continue reading “Going Digital: Teaching A TI-84 Handwriting Recognition”

Intel Terminates X86S Initiative After Formation Of New Industry Group

Although the world of the X86 instruction set architecture (ISA) and related ecosystem is often accused of being ‘stale’ and ‘bloated’, we have seen a flurry of recent activity that looks to shake up and set the future course for what is still the main player for desktop, laptop and server systems. Via Tom’s Hardware comes the news that the controversial X86S initiative is now dead and buried. We reported on this proposal when it was first announced and a whitepaper released. This X86S proposal involved stripping 16- and 32-bit features along with rings 1 and 2, along with a host of other ‘legacy’ features.

This comes after the creation of a new x86 advisory group that brings together Intel, AMD, as well as a gaggle of industry giants ranging from HP and Lenovo to Microsoft and Meta. The goal here appears to be to cooperate on any changes and new features in the ISA, which is where the unilateral X86S proposal would clearly have been a poor fit. This means that while X86S is dead, some of the proposed changes may still make it into future x86 processors, much like how AMD’s 64-bit extensions to the ISA, except this time it’d be done in cooperation.

In an industry where competition from ARM especially is getting much stronger these days, it seems logical that x86-oriented companies would seek to cooperate rather than compete. It should also mean that for end users things will get less chaotic as a new Intel or AMD CPU will not suddenly sneak in incompatible extensions. Those of us who remember the fun of the 1990s when x86 CPUs were constantly trying to snipe each other with exclusive features (and unfortunate bugs) will probably appreciate this.

It’s Official: The North Pole Is Moving

Every scout knows how to read a compass, and that there is a magnetic north and a true north. That’s because the Earth’s magnetic field isn’t exactly aligned with the North Pole. Every five years, the US National Oceanic and Atmospheric Administration (NOAA) and the British Geological Survey (BGS) get together to decide if magnetic north is still the same as it was before. This time, it isn’t.

The update is to the WMM — the World Magnetic Model. Magnetic north has shifted away from Canada and towards Siberia, a trend that has been ongoing for the last 20 years.

Continue reading “It’s Official: The North Pole Is Moving”

Fairey Rotodyne in flight

Versatile, Yet Grounded: The Rotodyne Revisited

When it comes to aviation curiosities, few machines captivate the imagination like the Fairey Rotodyne. This British hybrid aircraft was a daring attempt to combine helicopter and fixed-wing efficiency into a single vehicle. A bold experiment in aeronautical design, the Rotodyne promised vertical takeoffs and landings in cramped urban spaces while offering the speed and range of a regional airliner. First flown in 1957, it captured the world’s attention but ultimately failed to realize its potential. Despite featured before, new footage keeps fascinating us. If you have never heard about this jet, keep reading.

The Rotodyne’s innovative design centered around a massive, powered rotor that utilized a unique tip-jet system. Compressed air, mixed with fuel and ignited at the rotor tips, created lift without the need for a tail rotor. The result: a smoother transition between vertical and forward flight modes. Inside, it offered spacious seating for 50 passengers and even had clamshell doors for cargo. Yet its futuristic approach wasn’t without drawbacks—most notably, the thunderous noise produced by its rotor jets, earning complaints from both city planners and residents.

Despite these hurdles, the helicopter-plane crossover demonstrated its versatility, setting a world speed record and performing groundbreaking intercity flights. Airlines and militaries expressed interest, but escalating development costs and noise concerns grounded this ambitious project.

To this day, the Rotodyne remains a symbol of what could have been—a marvel of engineering ahead of its time. Interested in more retro-futuristic aircraft tales? Read our previous story on it, or watch the original footage below and share your thoughts.

Continue reading “Versatile, Yet Grounded: The Rotodyne Revisited”