Hackaday Podcast 203: Flashlight Fuel Fails, Weird DMA Machines, And A 3D Printed Prosthetic Hand Flex

This week, Editor-in-Chief Elliot Williams and Managing Editor Tom Nardi meet up virtually to talk about all the hacks that are fit to print. This week’s episode starts off with a discussion about the recently unveiled 2023 Hackaday.io Low-Power Challenge, and how hackers more often than not thrive when forced to work within these sort of narrow parameters. Discussion then continues to adding a virtual core to the RP2040, crowd-sourced device reliability information, and mechanical Soviet space computers. We’ll wrap things up by wondering what could have been had Mattel’s ill-fated ThingMaker 3D printer actually hit the market, and then engage in some wild speculation about the issues plaguing NASA’s latest Moon mission.

Check out the links below if you want to follow along, and as always, tell us what you think about this episode in the comments!

Available in the cloud, or as download!

Continue reading “Hackaday Podcast 203: Flashlight Fuel Fails, Weird DMA Machines, And A 3D Printed Prosthetic Hand Flex”

This Week In Security: GTA, Apple And Android, And Insecure Boot

When we first saw tweets about a security issue in Grand Theft Auto V, it sounded a bit like a troll. “Press ‘alt and f4’ to unlock a cheat mode”, or the hacker that claims to be able to delete your character. [Tez2]’s warning tweet that you shouldn’t play GTA Online without a firewall sounds like another of these online urban legends. But this one actually seems legit. NIST is even in on the fun, assigning CVE-2023-24059 for the exploit.

When playing an online game, other users send a “join request” to join the active session. This packets can contain malformed data which has been observed to crash the game client remotely. It’s believed, though not publicly confirmed, that it’s also a Remote Code Execution (RCE) vulnerability. It seems likely that this aspect will be added to some of the various cheat panels that are already widely used for this 10-year-old game. So now, rather than just giving your own character infinite ammo and health, you can inflict some havoc on other players, possibly up to corrupting their character files and getting them banned.

But why stop there? If we have code execution inside the game, what stops another player from launching a real attack? A video game isn’t sandboxed like a browser, and there’s nothing preventing a disk wiper attack or even a worm from compromising a bunch of players. The worst part is that it’s an old game, and even though there’s a large playerbase, it’s not guaranteed to get a fix. There’s at least one project aiming to be a firewall to prevent the issue. Continue reading “This Week In Security: GTA, Apple And Android, And Insecure Boot”

All About USB-C: Framework Laptop

Talking about high-quality USB-C implementations, there’s a product that has multiple selling points designed around USB-C, and is arguably a shining example of how to do USB-C right. It’s the Framework laptop, where the USB-C expansion cards take the center stage.

Full disclosure – this article is being typed on a Framework laptop, and I got it free from Framework. I didn’t get it for Hackaday coverage – I develop Framework-aimed hardware as hobby, specifically, boards that hack upon aspects of this laptop in fun ways. As part of their community developer support effort, they’ve provided me with a laptop that I wouldn’t otherwise be able to get for such a hobby. By now, I’m part of the Framework community, I have my own set of things I like about this laptop, and a set of things I dislike.

This is not an article about how I’m satisfied or dissatisfied with the Framework laptop – there’s plenty of those around, and it would not be fair for me to write one – I haven’t paid for it in anything except having lots of fun designing boards and hanging out with other people designing cool things, which is something I do willingly. I’m an all-things-laptops enthusiast, and the reason I’d like to talk about Framework is that there is no better example of USB-C, and everything you can do with it, in the wild. Continue reading “All About USB-C: Framework Laptop”

Supercon 2022: Sophy Wong Is Making An Impact With Artistic Wearables

Prolific designer and maker Sophy Wong is always looking toward the future, and that goes for everything from the costume pieces she makes to the idea of making itself. In her excellent and highly-visual Supercon talk, Sophy explores both, and gives the viewer a window on her evolved-and-evolving design philosophy.

You likely know Sophy as That Maker Who 3D Prints On Fabric, a label she is quick to dismiss, pointing animatedly toward the seminal work of one David Shorey, who also happened to be at Supercon 2022. As Sophy explains, the process begins by modeling disconnected bodies to be printed, then printing the first layer and pausing the print. At this point, a piece of nylon mesh is inserted, and the print is resumed. The result is that the mesh is trapped between the first and second layers, and the bodies are now connected by a common thread. Carefully remove the sandwich from the print bed and you have a highly-flexible, mesmerizing piece of material that almost acts like chain maille.

Continue reading “Supercon 2022: Sophy Wong Is Making An Impact With Artistic Wearables”

Open-Sourcing The Lisa, Mac’s Bigger Sister

Forty years ago, on January 19th of 1983, Apple released the Lisa, which was in many ways a revolutionary system. On January 19th of 2023, to celebrate the system’s 40th birthday, the Computer History Museum released the source code for Lisa OS version 3.1 under the Apple Academic License Agreement. Written in Pascal, the source includes over 1,300 source files, covering the OS itself, the Lisa Toolkit development system and a number of applications. The questions one might ask at this point include what the Apple Lisa even is, and why it was such an important system in computer history.

This especially in light of the terrible flop that the Lisa turned out to be, with only 10,000 units sold over two years. Part of this failure was definitely due to the introductory price, that was set at $9,995 (over $27,000 in 2021 dollars). Although it featured an OS with memory protection, despite the lack of an MMU on the Motorola 68k, among other advanced features that placed it well beyond other desktop computers of the time, it got quickly crushed in the market by Apple’s MacIntosh, even after successive Lisa successor releases that sought to address its shortcomings.

Continue reading “Open-Sourcing The Lisa, Mac’s Bigger Sister”

Hackaday.io Low-Power Challenge Begins Today

How low can you go? The 2023 Hackaday.io Low-Power Challenge is about doing the most with the least juice – bang for the power-budget buck, if you get our drift. And with three $150 gift certificates from Digi-Key on the line, you’ll be able to keep your projects going forever. The Challenge runs until March 21st, but with low-power, the devil is often in the details, so get started today!

More and more projects need to run on their own power, and more often than not, that means getting by without access to a wall plug. This contest is to encourage your designs that run on solar, small batteries, and generally energy harvested from wherever you can get it. But the power generation mechanism is taking the back seat here – we want to see what you can do with a few good electrons. Surprise us with your maximum minimalism!

Continue reading “Hackaday.io Low-Power Challenge Begins Today”

Broken Genes And Scrambled Proteins: How Radiation Causes Biological Damage

If decades of cheesy sci-fi and pop culture have taught us anything, it’s that radiation is a universally bad thing that invariably causes the genetic mutations that gifted us with everything from Godzilla to Blinky the Three-Eyed Fish. There’s a kernel of truth there, of course. One only needs to look at pictures of what happened to Hiroshima survivors or the first responders at Chernobyl to see extreme examples of what radiation can do to living tissues.

But as is usually the case, a closer look at examples a little further away from the extremes can be instructive, and tell us a little more about how radiation, both ionizing and non-ionizing, can cause damage to biochemical structures and processes. Doing so reveals that, while DNA is certainly in the crosshairs for damage by radiation, it’s not the only target — proteins, carbohydrates, and even the lipids that form the membranes within cells are subject to radiation damage, both directly and indirectly. And the mechanisms underlying all of this end up revealing a lot about how life evolved, as well as being interesting in their own right.

Continue reading “Broken Genes And Scrambled Proteins: How Radiation Causes Biological Damage”