Bringing The Blockchain To Network Monitoring

If you need to make sure your computer isn’t being messed with, you’ll have a look at the log files. If something seems fishy, that’s grounds for further investigation. If you run a large network of computers, you’ll probably want to look over all of the logs, but you won’t want to run around to each computer individually. Setting up a central server to analyze the logs exposes an additional attack surface: the logs in transit. How do you make sure that the attackers aren’t also intercepting and sanitizing your log file reports?

The answer to this question, and nearly everything else, is blockchain! Or maybe it’s not, but in this short presentation from the 2019 Hackaday Superconference, Shanni Prutchi, Jeff Wood, and six other college students intend to find out. While Shanni “rolls her eyes” at much of blockchain technology along with the rest of us, you have to admit one thing: recursively hashing your log data to make sure they’re not tampered with doesn’t sound like such a bad idea. Continue reading “Bringing The Blockchain To Network Monitoring”

Testing Your Grit: Tales Of Hacking In Difficult Situations

What’s your work area like? Perhaps you’re mostly a software person, used to the carpeted land of cubicles or shared workspaces, with their stand-up desks and subdued lighting. Or maybe you’ve got a lab bench somewhere, covered with tools and instruments. You might be more of a workshop person, in a cavernous bay filled with machine tools and racks of raw material. Wherever you work, chances are pretty good that someone is paying good money to keep a roof over your head, keeping the temperature relatively comfortable, and making sure you have access to the tools and materials you need to get the job done. It’s just good business sense.

Now, imagine you’ve lost all that. Your cushy workspace has been stripped away, and you’ve got to figure out how to get your job done despite having access to nothing but a few basic tools and supplies and your own wits. Can you do it? Most of us would answer “Yes,” but how many of us have ever tested ourselves like that? Someone who has tested her engineering chops under difficult conditions — and continues to do so regularly — is Laurel Cummings, who stopped by the 2019 Hackaday Superconference to tell us all about her field-expedient life with a talk aptly titled, “When It Rains, It Pours”.

Continue reading “Testing Your Grit: Tales Of Hacking In Difficult Situations”

Jen Costillo Explains Why Hackers Thrive In A Recession

If you haven’t noticed, this is an absolutely fantastic time to be a hacker. The components are cheap, the software is usually free, and there’s so much information floating around online about how to pull it all together that even beginners can produce incredible projects their first time out of the gate. It’s no exaggeration to say that we’re seeing projects today which would have been all but impossible for an individual to pull off ten years ago.

But how did we get here, and perhaps more importantly, where are we going next? While we might arguably be in the Golden Age of DIY, creative folks putting together their own hardware and software is certainly nothing new. As for looking ahead, the hacker and maker movement is showing no signs of slowing down. If anything, we’re just getting started. With a wider array of ever more powerful tools at our disposal, the future is very literally whatever we decide it is.

In her talk at the 2019 Hackaday Superconference, The Future is Us: Why the Open Source And Hobbyist Community Drive Consumer Products, Jen Costillo not only presents us with an overview of hacker history thus far, but throws out a few predictions for how the DIY movement will impact the mainstream going forward. It’s always hard to see subtle changes over time, and it’s made even more difficult by the fact that most of us have our noses to the proverbial grindstone most of the time. Her presentation is an excellent way for those of us in the hacking community to take a big step back and look at the paradigm shifts that put such incredible power in the hands of so many.

Continue reading “Jen Costillo Explains Why Hackers Thrive In A Recession”

The Way Of The PCB Artist: How To Make Truly Beautiful Circuit Boards

Getting your own PCBs made is a rite of passage for the hardware hacker. Oftentimes, it’s a proud moment, and many of us choose to immortalise the achievement with a self-aggrandizing credit on the silk screen, or perhaps a joke or personal logo. However, as far as artistically customized PCBs go, the sky really is the limit, and this is the specialty of [TwinkleTwinkie], whose Supercon talk covers some of the pitfalls you can run into when working at the edges of conventional PCB processes. 

[TwinkleTwinkie]’s creations are usually badges of one type or other — they’re meant to be worn on a lanyard around your neck, as a pin, or as a decoration added to another badge. The whole point is the aesthetic, and style is just as important as functionality. With diverse inspirations like Futurama, Alice in Wonderland and the shenanigans of the GIF community, his badges blend brightly colored boards with a big helping of LEDs and artistic silkscreening to create electronic works of art.

Keeping PCB Fab Houses from Upsetting the Artwork

These days, PCB fab houses offer more choice than ever, in terms of silkscreens, soldermask colors, and other options.  However, fundamentally, their primary concern is to produce reliable, accurate, electronically functional boards — and it’s something that can cause problems for #badgelife hackers designing for more aesthetic reasons.
Continue reading “The Way Of The PCB Artist: How To Make Truly Beautiful Circuit Boards”

Using Lookup Tables To Make The Impossible Possible

Embarrassing confession time: I never learned my multiplication tables in grade school. Sure, I had the easy tables like the twos and the fives down, but if asked what 4 x 7 or 8 x 6 was, I’d draw a blank. As you can imagine, that made me a less than stellar math student, and I was especially handicapped on time-limited tests with lots of long multiplication problems. The standard algorithm is much faster when you’ve committed those tables to memory, as I discovered to my great woe.

I was reminded of this painful memory as I watched Charles Lohr’s 2019 Supercon talk on the usefulness and flexibility of lookup tables, or LUTs, and their ability to ease or even completely avoid computationally intensive operations. Of course most LUT implementations address problems somewhat more complex than multiplication tables, but they don’t have to. As Charles points out, even the tables of sines and logarithms that used to populate page after page in reference books have been ported to silicon, where looking up the correct answer based on user input is far easier than deriving the answer computationally.

Yes, this is a Minecraft server all thanks to LUTs.

One of the most interesting examples of how LUTs can achieve the seemingly impossible lies in an old project where Charles attempted to build a Minecraft server on an ATMega168. Sending chunks (the data representations of a portion of the game world) to clients is the essential job of a Minecraft server, and on normal machines that involves using data compression. Rather than trying to implement zlib on an 8-bit microcontroller, he turned to a LUT that just feeds the raw bytes to the client, without the server having the slightest idea what any of it means. A similar technique is used by some power inverters, which synthesize sine wave output by feeding one full cycle of values to a DAC from a byte array. It’s brute force, but it works.

Another fascinating and unexpected realization is that LUTs don’t necessarily have to be software. Some can be implemented in completely mechanical systems. Charles used the example of cams on a shaft; in a car’s engine, these represent the code needed to open and close valves at the right time for each cylinder. More complicated examples are the cams and gears once found in fire control computers for naval guns, or the programming cards used for Jacquard looms. He even tips his hat to the Wintergatan marble machine, with its large programming drum and pegs acting as a hardware LUT.

I found Charles’ talk wide-ranging and fascinating. Originally I thought it would be an FPGA-heavy talk, but he didn’t actually get to the FPGA-specific stuff until the very end. That worked out fine, though — just hearing about all the cool problems a LUT can solve was worth the price of admission.

And for the curious, yes, I did eventually end up memorizing the multiplication tables. Oddly, it only clicked for me after I started playing with numbers and seeing their relationships using my first calculator, which ironically enough probably used LUTs to calculate results.

Continue reading “Using Lookup Tables To Make The Impossible Possible”

Engineering Your Way To Better Sourdough (and Other Fermented Goods)

Trent Fehl is an engineer who has worked for such illustrious outfits as SpaceX and Waymo. When he got into baking, he brought those engineering skills home to solve a classic problem in the kitchen: keeping a sourdough starter within the ideal, somewhat oppressive range of acceptable temperatures needed for successful fermentation.

A sourdough starter is a wad of wild yeasts that you make yourself using flour, water, and patience. It’s good for a lot more than just sourdough bread — you can scoop some out of the jar and use it to make pancakes, waffles, pretzels, and a host of other bread-y delights. A starter is a living thing, a container full of fermentation that eats flour and has specific temperature needs. Opinions differ a bit, but the acceptable temperature range for active growth is about 60 F to 82 F. Too cold, and the starter will go dormant, though it can be revived with a little love. But if the starter gets too hot, all the yeasts and bacteria will die.

While there are of course commercial products out there that attempt to solve this problem of temperature control, most of them seem to be aimed at people who live in some wonderland that never gets warmer than 80F. Most of these devices can’t cool, they only provide heat. But what if you live in a place with seasons where the climate ranges from hot and humid to cold and dry?

The answer lies within Chamber, a temperature-regulated haven Trent created that lets these wild yeasts grow and thrive. It uses a Peltier unit to heat and cool the box as needed to keep the mixture fermenting at 26°C /78.8°F.

Thanks to the Peltier unit, Trent can change the temperature inside the chamber simply by alternating the direction of current flow through the Peltier. He’s doing this with an H-bridge module driven by a Raspberry Pi Zero. When it starts to get too warm in the chamber, the fan on the outside wall vents the heat away. A second fan inside the chamber pulls warm air in when it gets too cold.

Trent says that Chamber performs really well, and he’s recorded temperatures as low as 60F and as high as 82F. He mostly uses it for sourdough, but it could work for other temperature-sensitive food sciences like pickling, growing mushrooms, or making yogurt. We think it could be ideal for fermenting kombucha, too.

Chamber works well enough that Trent has put further development on the back burner while he makes use of it. He does have several ideas for improvements, so if you want to help, check out his website and Github repo.

Continue reading “Engineering Your Way To Better Sourdough (and Other Fermented Goods)”

The Hacker History Of Music Technologies

Music throughout history has been inspired and changed by hackers and makers, and never moreso than in the 20th century. Helen Leigh is one such hacker, who brought a talk to Supercon to give us a crash course in the history of recording, electronics and music, and what the maker movement is doing in the music world today.

The tape recorder was an invention that kicked off a golden period of exploration in sound. Beginning in World War II, the Nazi propaganda machine cut and spliced recorded materials and disseminated them across broadcasting stations in Europe. To the astonishment of the Allies, certain German officials appeared to be making broadcasts from different studios at the same time, due to the high quality of the recording hardware. After the war, this technology was discovered by a group of Parisian recording artists who began to experiment with an art that became known as musique concrète, using tape hardware in weird and wonderful ways to create new sounds heretofore unheard in nature.

Continue reading “The Hacker History Of Music Technologies”