Surfboard Industry Wipes Out, Innovation Soon Follows

For decades, Gordon Clark and his company Clark Foam held an almost complete monopoly on the surfboard blank market. “Blanks” are pieces of foam with reinforcing wood strips (called “stringers”) in a rough surfboard shape that board manufacturers use to make a finished product, and Clark sold almost every single one of these board manufacturers their starting templates in the form of these blanks. Due to environmental costs, Clark suddenly shuttered his business in 2005 with virtually no warning. After a brief panic in the board shaping industry, and a temporary skyrocketing in price of the remaining blanks in existence, what followed next was rather surprising: a boom of innovation across the industry.

Continue reading “Surfboard Industry Wipes Out, Innovation Soon Follows”

This Power Strip Is A Fire Starter

A few weeks ago I needed a power strip in my home office. The outlet in question is located behind a filing cabinet so it would need a low profile plug. I jumped on Amazon to buy a surge suppressor strip. That’s when I noticed strips with rotating plugs. I’ve always had some apprehensions about plugs like that, though I could never quite put my finger on why. Looking at the reviews on this particular plug, I found some scary issues. Photos of melted plugs, melted outlets, and cries of “fire hazard”. So I did what any crazy hacker would do – bought two power strips. One with a fixed right angle plug to use in my office, and one with a rotating plug to tear down.

Failed plug – from Amazon reviews

Surge suppressors, power strips, outlet strips, they have many names. Underwriter’s Laboratories (UL) calls them “Relocatable power taps”. They all have several outlets, most have a circuit breaker of some sort inside, and some have circuits for surge suppression. These are some of the most common devices to find in the modern home. Many of our houses were designed and built before surround sound, cable boxes, computers, modems, cell phone chargers, tablet chargers, and all our other modern conveniences. There weren’t as many electrical loads, so the houses didn’t have many outlets. Power strips solve this problem.

After a couple of days, I had my strips in hand. I expected the plug to rotate once – maybe 270 degrees. That would indicate there were wires connecting the rotating head to rest of the plug. Not so – this plug would spin round and round all day long.

Continue reading “This Power Strip Is A Fire Starter”

Rosalind Franklin Saw DNA First

It’s a standard science trivia question: Who discovered the structure of DNA? With the basic concepts of molecular biology now taught at a fairly detailed level in grade school, and with DNA being so easy to isolate that it makes a good demonstration project for school or home, everyone knows the names of Watson and Crick. But not many people know the story behind one of the greatest scientific achievements of the 20th century, or the name of the scientist without whose data Watson and Crick were working blind: Rosalind Franklin.

Continue reading “Rosalind Franklin Saw DNA First”

What Makes A Hacker

I think I can sum up the difference between those of us who regularly visit Hackaday and the world of non-hackers. As a case study, here is a story about how necessity is the mother of invention and the people who invent.

Hackaday has overlap with sites like Pinterest and Instructables but there is one vital difference, we choose to create something new and beautiful with the materials at hand. Often these tools and techniques are very simple. We look to make things elegant by reducing the unnecessary clutter, not adding glitter. If something could be built with a 555 timer we will let you know. If there is a better choice for a processor, we will tell you.

My first real work commute was a forty-minute eastward drive every morning and a forty-minute westward drive every evening. This route pointed my car directly into the sun twice a day. Staring into a miasma of incandescent plasma for an hour and a half a day isn’t fun, and probably isn’t safe, but we can fix that.

Continue reading “What Makes A Hacker”

Artificial Intelligence At The Top Of A Professional Sport

The lights dim and the music swells as an elite competitor in a silk robe passes through a cheering crowd to take the ring. It’s a blueprint familiar to boxing, only this pugilist won’t be throwing punches.

OpenAI created an AI bot that has beaten the best players in the world at this year’s International championship. The International is an esports competition held annually for Dota 2, one of the most competitive multiplayer online battle arena (MOBA) games.

Each match of the International consists of two 5-player teams competing against each other for 35-45 minutes. In layman’s terms, it is an online version of capture the flag. While the premise may sound simple, it is actually one of the most complicated and detailed competitive games out there. The top teams are required to practice together daily, but this level of play is nothing new to them. To reach a professional level, individual players would practice obscenely late, go to sleep, and then repeat the process. For years. So how long did the AI bot have to prepare for this competition compared to these seasoned pros? A couple of months.

Continue reading “Artificial Intelligence At The Top Of A Professional Sport”

Books You Should Read: The Cuckoo’s Egg

The mid-1980s were a time of drastic change. In the United States, the Reagan era was winding down, the Cold War was heating up, and the IBM PC was the newest of newnesses. The comparatively few wires stitching together the larger university research centers around the world pulsed with a new heartbeat — the Internet Protocol (IP) — and while the World Wide Web was still a decade or so away, The Internet was a real place for a growing number of computer-savvy explorers and adventurers, ready to set sail on the virtual sea to explore and exploit this new frontier.

In 1986, having recently lost his research grant, astronomer Clifford Stoll was made a computer system admin with the wave of a hand by the management of Lawrence Berkeley Laboratory’s physics department. Commanded to go forth and administer, Stoll dove into what appeared to be a simple task for his first day on the job: investigating a 75-cent error in the computer account time charges. Little did he know that this six-bit overcharge would take over his life for the next six months and have this self-proclaimed Berkeley hippie rubbing shoulders with the FBI, the CIA, the NSA, and the German Bundeskriminalamt, all in pursuit of the source: a nest of black-hat hackers and a tangled web of international espionage.

Continue reading “Books You Should Read: The Cuckoo’s Egg”

Inside Two-Factor Authentication Apps

Passwords are in a pretty broken state of implementation for authentication. People pick horrible passwords and use the same password all over the place, firms fail to store them correctly and then their databases get leaked, and if anyone’s looking over your shoulder as you type it in (literally or metaphorically), you’re hosed. We’re told that two-factor authentication (2FA) is here to the rescue.

Well maybe. 2FA that actually implements a second factor is fantastic, but Google Authenticator, Facebook Code Generator, and any of the other app-based “second factors” are really just a second password. And worse, that second password cannot be stored hashed in the server’s database, which means that when the database is eventually compromised, your “second factor” blows away with the breeze.

Second factor apps can improve your overall security if you’re already following good password practices. We’ll demonstrate why and how below, but the punchline is that the most popular 2FA app implementations protect you against eavesdropping by creating a different, unpredictable, but verifiable, password every 30 seconds. This means that if someone overhears your login right now, they wouldn’t be able to use the same login info later on. What 2FA apps don’t protect you against, however, are database leaks.

Continue reading “Inside Two-Factor Authentication Apps”