So far in this brief series on in-band signaling, we looked at two of the common methods of providing control signals along with the main content of a transmission: DTMF for Touch-Tone dialing, and coded-squelch systems for two-way radio. For this installment, we’ll look at something that far fewer people have ever used, but almost everyone has heard: Quindar tones.
Original Art1195 Articles
AI: This Decade’s Worst Buzz Word
In hacker circles, the “Internet of Things” is often the object of derision. Do we really need the IoT toaster? But there’s one phrase that — while not new — is really starting to annoy me in its current incarnation: AI or Artificial Intelligence.
The problem isn’t the phrase itself. It used to mean a collection of techniques used to make a computer look like it was smart enough to, say, play a game or hold a simulated conversation. Of course, in the movies it means HAL9000. Lately, though, companies have been overselling the concept and otherwise normal people are taking the bait.
The Alexa Effect
Not to pick on Amazon, but all of the home assistants like Alexa and Google Now tout themselves as AI. By the most classic definition, that’s true. AI techniques include matching natural language to predefined templates. That’s really all these devices are doing today. Granted the neural nets that allow for great speech recognition and reproduction are impressive. But they aren’t true intelligence nor are they even necessarily direct analogs of a human brain.
Sneakers: A Love-Fest
“A TURNIP CURES ELVIS” begins the opening credits, an intriguing beginning to a smart and still timely film that was released around 25 years ago. If you’ve never seen the movie, I’m about to spoil the hell out of it.
Sneakers features the title characters, hackers who work the 1992 gig economy as freelance penetration testers. They work for Martin Bishop, a hippie hacker Obi Wan who works San Francisco’s gray market, doing good deeds and helping banks improve their security.
While there is a fair amount of cheese in Sneakers, a lot of the problems the characters face — physical security and cryptography come to mind — remain the problems of today. Securing our digital business? Check. Surveillance? Check? Gray operators? Absolutely. At the same time, the movie does a good job of exploring different categories of hacker. The various characters seem to offer glimpses of people I see all the time at the hackerspace. Bigger than life, certainly, but they are in a Hollywood movie, after all.
Finally, the movie is just smart. Those opening credits offer a preview: the anagrams that begin the movie (“A TURNIP KILLS ELVIS” translates to Universal Pictures) are not just some art director’s conceit for the opening credits. The anagrams end up being important later on in the film, where there is a key clue hidden but if you think about it, shuffling letters on your Scrabble tray could be taken as a metaphor for hacker thinking — taking the same information as everyone else but looking at it in a different way.
A Noob’s Guide To McMaster-Carr
For the penny-pinching basement hacker, McMaster-Carr seems like a weird go-to resource for hardware. For one, they’re primarily a B2B company; and, for two, their prices aren’t cheap. Yet their name is ubiquitous among the hacker community. Why? Despite the price, something makes them too useful to ignore by everyday DIY enthusiasts. Those of us who’ve already been enlightened by the McMaster-Carr can design wonders with a vocabulary of parts just one day away at the click of a button.
Today, this article is for those of us who have yet to receive that enlightenment. When used wisely, this source of mechanical everything brings us a world of fast parts at our fingertips. When used poorly, we find nothing but overpriced stock components in oversized shipping boxes.
Since we, the McMaster-Carr sages, are forever doomed to stuff our desk drawers with those characteristic yellow baggies till the end of time, we thought we’d give an intro to the noobs that are just beginning to flex their muscles with this almighty resource. Grab another cup of coffee as we take you on a tour of the good and good-grievances of McMaster-Carr.
Video Streaming Like Your Raspberry Pi Depended On It
The Raspberry Pi is an incredibly versatile computing platform, particularly when it comes to embedded applications. They’re used in all kinds of security and monitoring projects to take still shots over time, or record video footage for later review. It’s remarkably easy to do, and there’s a wide variety of tools available to get the job done.
However, if you need live video with as little latency as possible, things get more difficult. I was building a remotely controlled vehicle that uses the cellular data network for communication. Minimizing latency was key to making the vehicle easy to drive. Thus I set sail for the nearest search engine and begun researching my problem.
My first approach to the challenge was the venerable VLC Media Player. Initial experiments were sadly fraught with issues. Getting the software to recognize the webcam plugged into my Pi Zero took forever, and when I did get eventually get the stream up and running, it was far too laggy to be useful. Streaming over WiFi and waving my hands in front of the camera showed I had a delay of at least two or three seconds. While I could have possibly optimized it further, I decided to move on and try to find something a little more lightweight.
Continue reading “Video Streaming Like Your Raspberry Pi Depended On It”
Hack Space Debris At Your Peril
Who has dibs on space debris? If getting to it were a solved problem, it sure would be fun to use dead orbital hardware as something of a hacker’s junk bin. Turns out there is some precedent for this, and regulations already in place in the international community.
To get you into the right frame of mind: it’s once again 2100 AD and hackers are living in mile-long space habitats in the Earth-Moon system. But from where do those hackers get their raw material, their hardware? The system abounds with space debris, defunct satellites from a century of technological progress. According to Earth maritime law, if space is to be treated like international waters then the right of salvage would permit them to take parts from any derelict. But is space like international waters? Or would hacking space debris result in doing hard time in the ice mines of Ceres?
Hacker Heroism: Building Your Way Out Of AV Hell
Many years ago, in a rainy concrete jungle on the west coast of Australia, I worked for a medium-sized enterprise doing a variety of office-based tasks. Somehow, I found myself caught up in planning a product launch event outside the official remit of my position. We got through it, but not before the audiovisual (AV) setup of the event turned into one giant hack.
The initial planning stages went remarkably smoothly until less than a month out from the big day when three weeks of frantic changes and revisions to the presentation rained down. These were some of the hardest days of my working life to date, as it seemed that we would lock in a new arrangement, only to tear it up days later as some new vital criteria came to light, throwing everything back into disarray.
Things came to a head on the night before the event. Working with two different AV teams we had planned for four projection screens and five flat screen televisions spread throughout the venue and controlled from the central AV desk. But somewhere in all those changes the televisions were set up to all display a still image, or nothing at all. I needed to show different videos on each and have the ability to black them all out.
It was at this point I realized we were screwed. The production team simply didn’t have the hardware to drive another five screens, but they could source it — for the sum of $5000. Management were furious, and were under the impression, like myself that this was what we had asked and paid for already. I was at an impasse, and beginning to wonder if I’d have a job come Monday. I wandered off to a corner to curse, and more importantly, think. After all, I’m a hacker — I can get through this.
Continue reading “Hacker Heroism: Building Your Way Out Of AV Hell”






