A New Commodore C128 Cartridge

A new Commodore C128 cartridge in 2023?  That’s what [idun-projects] set out to do and, as you can see in the video below, did. I did the original C128 hardware design and worked with the amazing team that turned this home computer out in 1985. Honestly, I am amazed that any of them are still working 38 years later, let alone that someone is making new cartridges for it.

I also never thought I would hear about someone’s in-depth experience designing for the ‘128. The post takes us through [idun-project’s] decision to use the ‘128 and how modern expectations apply to all computers, even the old ones. Hot on the list was connectivity and reasonable storage (looking at you, floppy disks).

Continue reading “A New Commodore C128 Cartridge”

Uranium-241 Isotope Created And Examined Via Multinucleon Transfer Reactions And Mass Spectrometry

A recent paper (PDF) in Physical Review Letters by T. Niwase and colleagues covers a fascinating new way to both create and effectively examine isotopes by employing a cyclotron and a mass spectrograph. In the paper, they describe the process of multinucleon transfer (MNT) and analysis at the recently commissioned KEK Isotope Separation System (KISS), located at the RIKEN Nishina Center in Japan.

Sketch of the KISS experimental setup. The blue- and yellow-colored areas are filled with Ar and He gases, respectively. Differential pumping systems are located after the doughnut-shaped gas cell as well as before and after the GCCB. (Credit: Niwase et al., 2023)
Sketch of the KISS experimental setup. The blue- and
yellow-colored areas are filled with Ar and He gases, respectively. Differential pumping systems are located after the doughnut-shaped gas cell as well as before and after the GCCB. (Credit: Niwase et al., 2023)

The basic process which involves the RIKEN Ring Cyclotron, which was loaded for this particular experiment with Uranium-238 isotope. Over the course of four days, 238U particles impinged on a 198Pt target, after which the resulting projectile-like fragments (PLF) were led through the separation system (see sketch). This prepared the thus created ions to be injected into the multi-reflection time-of-flight mass spectrograph (MRTOF MS), which is a newly installed and highly refined mass spectrograph which was also recently installed at the facility.

Using this method, the researchers were able to establish that during the MNT process in the cyclotron, the transfer of nucleons from the collisions had resulted in the production of 241U as well as 242U. Although the former had not previously been produced in an experimental setting, the mass of 242U had not been accurately determined. During this experiment, the two uranium as well as neptunium and other isotopes were led through the MRTOF MS instrument, allowing for the accurate measurement of the characteristics of each isotope.

The relevance of producing new artificial isotopes of uranium lies not so much in the production of these, but rather in how producing these atoms allows us to experimentally confirm theoretical predictions and extrapolations from previous data. This may one day lead us to amazing discoveries such as the famously predicted island of stability, with superheavy, stable elements with as of yet unknown properties.

Even if such astounding discoveries are not in the future for theoretical particle physics, merely having another great tool like MNT to ease the burden of experimental verification would seem to be more than worth it.

This Week In Security: QueueJumper, JS VM2 Escape, And CAN Hacking

You may not be familiar with the Microsoft Message Queuing (MSMQ) service, a store and forward sort of inter-process and inter-system communication service. MSMQ has become something of a legacy product, but is still available as an optional component in Windows. And in addition to other enterprise software solutions, Microsoft Exchange turns the service on by default. That’s why it’s a bit spooky that there’s a one packet Remote Code Execution (RCE) vulnerability that was just patched in the service.

CVE-2023-21554, also known as QueueJumper, is this unauthenticated RCE with a CVSS score of 9.8. It requires sending a packet to the service on TCP port 1801. The Check Point Research team scanned for listening MSMQ endpoints on the public Internet, and found approximately 360,000 of them. And no doubt far more are listening on internal networks. A one packet exploit is a prime example of a wormable problem, and now that the story has broken, and the patch is available, expect a rapid reverse engineering. Beware, the queue jumpers are coming.

JavaScript VM Escape

The VM2 library is a rather important JavaScript package that sandboxes code, letting a project run untrusted code securely. Or, that’s the idea. CVE-2023-29017 is an example of how hard sandboxing is to get right. It’s another CVSS 9.8 vulnerability, and this one allows a sandbox escape and code execution.

This one now has public Proof of Concept code, and this package has over 16 million monthly installs, so the attack surface is potentially pretty wide. The flaw is fixed in version 3.9.15. Continue reading “This Week In Security: QueueJumper, JS VM2 Escape, And CAN Hacking”

Congratulations Low-Power Winners

Congratulations to the winners of the 2023 Hackaday.io Low Power Contest! We challenged you to show us how much you could do with how little, and you did not disappoint. Our judges have put their heads together, and thanks to Digi-Key, our contest sponsor, the top three entries will be taking home a $150 gift certificate for yet more hacking supplies.

We saw a great diversity of ideas here, all on the low-power theme. So without further ado…

The Prize Winners

[Christoph]’s Ultra Low Power RF-Sensor arose out of necessity. Having just repaired a shower drain, he couldn’t be sure that it wouldn’t start leaking again at some point in the future, but couldn’t go ripping up the floor under the shower tray every week to check. He needed a remote moisture sensor that would do the job for a long time with no intervention.

This superb solution combines an Atmel ATmega328P, an HDC1080 humidity sensor, a 433 MHz radio transmitter, and an RTC to keep power consumption super-low when everything else is shut down. Idling at 600 nA total most of the time, taking a reading every 15 minutes, this device should last for 12 years, and it’s been installed and running for five so far, so we’d say that it’s already proven itself very worthy of taking home the prize here.

[BleakyTex]’s Compact, low-power Geiger counter is absolutely the lowest power Geiger counter we’ve ever seen and maybe also the cutest. With the ambitious goal of running up to two years on two tiny LR44 batteries and a proven runtime of about six months by now, this is the radiation detector you can take with you every day, should you need to. The key is a custom HV section that’s designed for efficiency and the screen – even today, it’s still hard to beat the low power consumption of the humble LCD screen. All this, and it still makes those satisfying clicks when it’s enabled. [BleakyTex] says he might make a kit from this, and we absolutely hope he does!

[mircemk]’s Microwatt Pulse Motor took one of our suggestions in the announcement of the contest and ran with it. This eight-pole handmade electric motor doesn’t actually do anything other than spin, but it does that when hooked up to a literal potato. Pulling around 40 mA at 600 mV, it can easily run on solar power with enough power left over to charge up a battery for when the sun doesn’t shine. All of this is made with extremely simple circuitry and parts scavenged from old relays with a sewing needle held up by a magnet for the bearing. This is pure ingenuity and a sweet low-power demo.

Continue reading “Congratulations Low-Power Winners”

This Week In Security: Cookie Monster, CyberGhost, NEXX, And Dead Angles

“Operation Cookie Monster” ranks as one of the best code names in recent memory. And it’s apropo, given what exactly went down. Genesis Market was one of those marketplaces where criminals could buy and sell stolen credentials. This one was a bit extra special.

Websites and services are getting better about detecting logins from unexpected computers. Your Google account suddenly logs in from a new computer, and a two-factor authentication challenge launches. Why? Your browser is missing a cookie indicating you’ve logged in before. But there’s more. Providers have started rolling out smart analytics that check for IP address changes and browser fingerprints. Your mix of time zone, user string, installed fonts, and selected language make a pretty unique identifier. So sites like Genesis offer Impersonation-as-a-Service (IMPaaS), which is session hijacking for the modern age.

A victim computer gets owned, and credentials are collected. But so are cookies and a browser fingerprint. Then a criminal buyer logs in, and runs a virtual browser with all that collected data. Run through a proxy to get a IP that is geolocated close enough to the victim, and Mr. Bad Guy has a cloned machine with all accounts intact.

And now back to Operation Cookie Monster, a multi-organization takedown of Genesis. It’s apparently a partial takedown, as the latest word is that the site is still online on the Tor network. But the conventional domains are down, and something like eight million credentials have been captured and added to the Have I Been Pwned database.

Another researcher team, Sector 7, has been working the case with Dutch authorities, and has some interesting details. The vector they cover was a fake activation crack for an antivirus product. Ironic. There are several extensions that get installed on the victim computer, and one of the most pernicious is disguised as Google Drive. This extension looks for a Command and Control server, using Bitcoin as DNS. A hardcoded Bitcoin address is polled for its latest transaction, and the receiving address is actually an encoded domain name, you-rabbit[.]com as of the latest check.

This extension will look for and rewrite emails that might be warning the victim about compromise. Get an email warning about a cryptocurrency withdrawal? It modifies it in the browser to be a sign-in warning. It also allows Genesis customers to proxy connections through the victim’s browser, bypassing IP address security measures. Continue reading “This Week In Security: Cookie Monster, CyberGhost, NEXX, And Dead Angles”

a flexible film with a matrix of illuminated color LEDs being stretched

Truly Flexible Circuits Are A Bit Of A Stretch

Flexible PCBs have become increasingly common in both commercial devices and DIY projects, but Panasonic’s new stretchable, clear substrate for electrical circuits called Beyolex takes things a step further. The material is superior to existing stretchable films like silicone, TPU, or PDMS due to its high heat tolerance (over 160° C) for the purposes of sintering printable circuit traces.

But, a flexible substrate isn’t very useful for electronics without some conductive traces. Copper and silver inks make for good electrical circuits on stretchable films, and are even solderable, but increase resistance each time they are stretched. Recently, a team out of the University of Coimbra in Portugal has developed a liquid metal ink that can stretch without the resistance issues of existing inks, making it a promising pair with Panasonic’s substrate. There’s also certain environmental benefits of printing circuits in this manner over traditional etching and even milling, as you’re only putting conductive materials where needed.

a flexible film with a strip of LEDs connected by a novel liquid metal ink circuit

After the break, check out Panasonic’s earlier videos showing some of their demo circuits that include a stretchable NFC antenna harvesting electricity even while submerged in water and an LED matrix performing while being, bent, rolled, and stretched. We’re excited to see where this technology leads and when we hackers will be able to create our own stretchable projects.

A great many flexible PCB projects have graced Hackaday, from early experiments to sophisticated flexible PCB projects. Heck, we had a whole Flexible PCB Contest with some awesome flexible projects.

Continue reading “Truly Flexible Circuits Are A Bit Of A Stretch”

Visual Ear Demonstrates How The Cochlea Works

The cochlea is key to human hearing, and it plays an important role in our understanding of complex frequency content. The Visual Ear project aims to illustrate the cochlear mechanism as an educational tool.

The cochlea itself is the part of the ear that converts the pressure waves of sound into electrical signals for the brain. Different auditory frequencies excite different parts of the cochlea. The cells in the different parts of the cochlea then send signals to the brain corresponding to the sound it has picked up.

The Visual Ear demonstrates similar behavior on a strip of addressable LEDs. Lower LEDs coded in the red part of the color spectrum respond to low frequency audio. Higher LEDs step through yellow, green, and up to blue, and respond to the higher frequencies in turn. This is achieved at a high response rate with the use of a Teensy 4.0 running a Fast Fourier Transform on incoming audio, and then outputting signals to run a string of WS2812B LEDs. The result is a visual band display of 104 bands spanning 43 Hz up to 16,744 Hz, which covers most but not all of the human range of hearing.

It’s an impressive display, and one that makes a great music visualizer, too. When teaching the physics of human hearing and the cochlea, we can imagine such a tool would be quite useful.

Continue reading “Visual Ear Demonstrates How The Cochlea Works”