It’s Critical: Don’t Pile Up Your Fissionable Material

Nuclear fission is a powerful phenomenon. When the conditions are right, atomic nuclei split, releasing neutrons that then split other nuclei in an ongoing chain reaction that releases enormous amounts of energy. This is how nuclear weapons work. In a more stable and controlled fashion, it’s how our nuclear reactors work too.

However, these chain reactions can also happen accidentally—with terrifying results. Though rare, criticality incidents – events where an accidental self-sustaining nuclear chain reaction occurs – serve as sobering reminders of the immense and unwieldy forces we attempt to harness when playing with nuclear materials.

Continue reading “It’s Critical: Don’t Pile Up Your Fissionable Material”

The Hovercraft Revolution And Finding The Right Niche For A Technology

In the world of transportation, some technologies may seem to make everything else appear obsolete, whether it concerns airplanes, magnetic levitation or propelling vehicles and craft over a cushion of air. This too seemed to be the case with hovercraft when they exploded onto the scene in the 1950s and 1960s, seemingly providing the ideal solution for both commercial and military applications. Freed from the hindrances of needing a solid surface to travel upon, or a deep enough body of water to rest in, hovercraft gave all the impressions of combining the advantages of aircraft, ships and wheeled vehicles.

Yet even though for decades massive passenger and car-carrying hovercraft roared across busy waterways like the Channel between England & mainland Europe, they would quietly vanish again, along with their main competition in the form of super fast passenger catamarans. Along the English Channel the construction of the Channel Tunnel was a major factor here, along with economical considerations that meant a return to conventional ferries. Yet even though one might think that the age of hovercraft has ended before it ever truly began, the truth may be that hovercraft merely had to find its right niches after a boisterous youth.

An example of this can be found in a recent BBC article, which covers the British Griffon Hoverwork company, which notes more interest in new hovercraft than ever, as well as the continued military interest, and from rescue workers.

Continue reading “The Hovercraft Revolution And Finding The Right Niche For A Technology”

Illustrated Kristina with an IBM Model M keyboard floating between her hands.

Keebin’ With Kristina: The One With The Funny Keyboard

What’s the most important keyboard macro you know? Honestly, it’s probably Ctrl-S. But do you use that one often enough? Chances are, you do not. What you need is a giant, dedicated Save keyboard that looks like a floppy disk.

A physical Save button that looks like a floppy disk and sends Ctrl-S over USB-C.
Image by [Makestreme] via Hackaday.IO
[Makestreme] recently started creating YouTube videos, but wasn’t pressing Save often enough. Couple that with editing software that crashes, and the result is hours of lost work.

Just like you’d expect, pressing the floppy icon triggers Ctrl-S when connected over USB-C. Internally, it’s a Seeeduino Xiao, a push button, and some wires.

The floppy disk itself is made of foam board, and everything is encased in a picture frame. If you want to make one for yourself, [Makestreme] has some great instructions over on IO.

Continue reading “Keebin’ With Kristina: The One With The Funny Keyboard”

Finally Putting The RK1 Through Its Paces

The good folks at Turing Pi sent me a trio of RK1 modules to put through their paces, to go along with the single unit I bought myself. And the TLDR, if you need some real ARM processing power, and don’t want to spend an enterprise budget, a Turing Pi 2 filled with RK1s is a pretty compelling solution. And the catch? It’s sporting the Rockchip RK3588 processor, which means there are challenges with kernel support.

For those in the audience that haven’t been following the Turing Pi project, let’s recap. The Turing Pi 1 was a mini ITX carrier board for the original Raspberry Pi compute module, boasting 7 nodes connected with onboard Gigabit.

That obviously wasn’t enough power, and once Raspberry Pi released the CM4, the Turing Pi 2 was conceived, boasting 4 slots compatible with the Nvidia Jetson compute units, as well as the Raspberry Pi CM4 with a minimal adapter. We even covered it shortly after the Kickstarter. And now we have the RK1, which is an 8-core RK3588 slapped on a minimal board, pin compatible with the Nvidia Jetson boards. Continue reading “Finally Putting The RK1 Through Its Paces”

Hackaday Links Column Banner

Hackaday Links: December 8, 2024

For some reason, we never tire of stories highlighting critical infrastructure that’s running outdated software, and all the better if it’s running on outdated hardware. So when we learned that part of the San Francisco transit system still runs on 5-1/4″ floppies, we sat up and took notice. The article is a bit stingy with the technical details, but the gist is that the Automatic Train Control System was installed in the Market Street subway station in 1998 and uses three floppy drives to load DOS and the associated custom software. If memory serves, MS-DOS as a standalone OS was pretty much done by about 1995 — Windows 95, right? — so the system was either obsolete before it was even installed, or the 1998 instance was an upgrade of an earlier system. Either way, the San Francisco Municipal Transportation Agency (SFMTA) says that the 1998 system due to be replaced originally had a 25-year lifespan, so they’re more or less on schedule. Replacement won’t be cheap, though; Hitachi Rail, the same outfit that builds systems that control things like the bullet train in Japan, is doing the job for the low, low price of $212 million.

Continue reading “Hackaday Links: December 8, 2024”

Tis The Season

’Tis the season for soldering! At least at my house. My son and I made some fairly LED-laden gifts for the immediate relatives last year, and he’s got the blinky bug. We were brainstorming what we could make this year, and his response was “I don’t care, but it needs to have lots of LEDs”.

It’s also the season for reverse engineering, apparently, because we’re using a string of WS2812-alike “fairy lights”. These are actually really neat, they look good and are relatively cheap. It’s a string of RGB LEDs with drivers, each dipped in epoxy, and run on a common three-enameled-wire bus. Unlike WS2812s, which pass the data on to the next unit in the line and then display them with a latching pulse at the end of a sequence, these LED drivers seem to count how many RGB packets have been sent down the wire, and only respond to their own number.

This means that if you cut up a string of 200 LEDs, it behaves like a string of 200 WS2812s. But if you cut say 10 LEDs off the string, where you cut them matters. If you cut it off the front of the string, you only have to send 10 color packets. If you cut them off the other end, you need to send 290 dummy packets before they even start listening. Bizarre, but ’tis the season for bizarre hacks.

And finally, ’tis the season for first steps into “software architecture”. Which is to say that my son is appreciating functions for the first time in his life. Controlling one LED is easy, but making a light show is about two more abstraction layers on top of that. We’ve been having fun making them dim, twinkle, and chase so far. We only have two more weekends, though, and we don’t have a final light show figured out yet, but after all, ’tis the season for last minute present hacking.

This Week In Security: National Backdoors, Web3 Backdoors, And Nearest Neighbor WiFi

Maybe those backdoors weren’t such a great idea. Several US Telecom networks have been compromised by a foreign actor, likely China’s Salt Typhoon, and it looks like one of the vectors of compromise is the Communications Assistance for Law Enforcement Act (CALEA) systems that allow for automatic wiretapping at government request.

[Jeff Greene], a government official with the Cybersecurity and Infrastructure Security Agency (CISA), has advised that end-user encryption is the way to maintain safe communications. This moment should forever be the touchstone we call upon when discussing ideas like mandated encryption backdoors and even the entire idea of automated wiretapping systems like CALEA. He went on to make a rather startling statement:

I think it would be impossible for us to predict a time frame on when we’ll have full eviction

There are obviously lots of unanswered questions, but with statements like this from CISA, this seems to be an extremely serious compromise. CALEA has been extended to Internet data, and earlier reports suggest that attackers have access to Internet traffic as a result. This leaves the US telecom infrastructure in a precarious position where any given telephone call, text message, or data packet may be intercepted by an overseas attacker. And the FCC isn’t exactly inspiring us with confidence as to its “decisive steps” to fix things. Continue reading “This Week In Security: National Backdoors, Web3 Backdoors, And Nearest Neighbor WiFi”