Badge From Diamond Age Comes To DEF CON

We’re huge fans of [Neal Stephenson’s] work and are usually looking to assign some of his vision to the gear that pops up in the real world. But there’s no stretching or squinting necessary with this one. [Kerry Scharfglass] has built a functioning Drummer’s Badge from the foundational Sci-Fi novel The Diamond Age.

The badge is called Sympetrum, which is a genus of dragonfly. In explaining what the badge is and does, [Kerry] instructs you to go and read the book first and we couldn’t agree more. This isn’t recommended reading; if you’re a geek you need to read this book.

The dragonfly badges are from a portion of the book that gets pretty weird, but the gist is that rod-logic (machines build from microscopic carbon nanotubes) is so pervasive that at all times you’re covered in mites that are actually machines. At a party, one of the characters notices everyone is wearing dragonfly pins that begin to pulse with the music and synchronize with each other. They’re actually indicators of what the mites within the wearers’ bodies are doing — synchronizing people with other people.

This badge is a working recreation of that, presumably without the billions of mites controlling people (but who knows, it is DEF CON). At the center of the badge is an STM32 driving ten APA102 modules. Interactivity is based on IR signaling. The badge will cycle random color animations when alone. But each badge also projects clock sync and metadata over infrared, so put some of them in the same room and they’ll tend to synchronize.

Simple, beautiful, and a great geeky backstory. This example of Badgelife proves that hardware badges don’t need to be packed with features, or have a huge BOM cost. If done well, you can do an awful lot with just a little hardware and strong dose of inspiration. It also makes hand-assembly a lot more approachable, which is what you can see in the images above. Thanks [Kerry] for giving us an early look at this badge, can’t wait to see them at the CON.


We’ll be looking for this and all other #Badgelife offerings at DEF CON 25. Join us for a Hackaday meetup on Sunday morning as we once again do Breakfast at DEF CON

Friday Hack Chat: BadgeLife

For the last few years at DEF CON, we’ve seen the emergence of an entire community of badge creators. These aren’t official badges — good news, since the official DEF CON badge will probably be an unpuzzling piece of laser cut acrylic this year. Lucky for us this is the biggest year yet for independent electronic badges. This is BadgeLife, the fine art of designing and building hundreds of badges for eager conference goers.

This Friday, we’ll be hosting a Hack Chat with a few of the folks tapped into BadgeLife. [Whitney Merrill], lawyer, hacker, and overseer of the Crypto & Privacy village will be joining us talking about this year’s badge, the puzzle she designed, and what BadgeLife really means. Also joining us will be [Karl Koscher], research scientist and co-organizer of the Crypto and Privacy village.

Also on deck will be the creators of this year’s Bender Badge. Last year, AND!XOR created one of the most popular electronic conference badges in recent memory. This year, the Bender Badge is getting an upgrade with Blast Processing, a quart of tequila, and two dozen amyls.

We’re proud to note that Hackaday.io has become an unofficial repository for all the best badges from the BadgeLife community. The Hunter S. Rodriguez badge is on there, as is the Ides of DEF CON. As the creator of the most innovative and desirable badge this year, I will also be attending this Hack Chat discussing the trials and tribulations of developing and shipping hardware on a very condensed schedule.

While the focus of this BadgeLife Hack Chat is developing electronic conference badges for DEF CON, it could have easily been called ‘Electronic Design’. There’s a massive amount of work that goes into each of these badges from design to production, and all of it is highly relevant to any hardware developer.

Here’s How To Take Part:

join-hack-chatOur Hack Chats are live community events on the Hackaday.io Hack Chat group messaging. This Hack Chat will take place at noon Pacific time on Friday, July 14th. Confused about where and when ‘noon’ is? Here’s a time and date converter!

Log into Hackaday.io, visit that page, and look for the ‘Join this Project’ Button. Once you’re part of the project, the button will change to ‘Team Messaging’, which takes you directly to the Hack Chat.

You don’t have to wait until Friday; join whenever you want and you can see what the community is talking about.

Hands-On: New AND!XOR Unofficial DEF CON Badge

In just two weeks, we’ll be flooding into the casinos of Las Vegas for DEF CON. By far our favorite part is the unofficial hardware badges which make their way to the con each year. The AND!XOR team has put together an incredible offering this year with what I’m calling the “Bender on a Bender” badge. They sent us two of them, so let’s jump right in and see what this badge is all about.

Continue reading “Hands-On: New AND!XOR Unofficial DEF CON Badge”

DEF CON BadgeLife: Blinky Bling

This is the biggest year yet for unofficial electronic conference badges. We’re calling it the year of Badgelife, and for the next few weeks, we’re going to be taking a look at the unofficial conference badges being deployed at this year’s DEF CON.

[Mr Blinky Bling] a.k.a. [Benn Hibben] has created his own badge for this year’s con. On board is a bunch of LEDs, WiFi, and capacitive buttons. It’s a WiFi badge for all your AP scanning and deauth needs. The electronics for this badge are a bit more complicated than simply throwing an ESP8266 on a board and calling the design done. The capacitive touch functionality is being handled by an ATTiny88, the OLED display is handled by an ATMega32U4, wireless functions are done with an ESP8266, and there are a few bits and bobs for a LiPo battery.

This WiFi Badge is the focus of an astonishingly successful Kickstarter (ending in just a few hours), and [Mr Blinky Badge] already has enough backers to move 200 badges. This is really a spectacular amount of work; it’s one thing to build a single prototype for an electronic conference badge, but it’s another matter entirely to put a badge into production, source all the parts, handle the assembly, and finally ship all these badges to Kickstarter backers and conference attendees.

If the challenge of building and deploying hundreds of electronic conference badges sounds like fun, you’re in luck. This Friday, we’ll be hosting a Hack Chat with some of the creators of this year’s unofficial DEF CON badge creators. There’s a lot you can learn from these folks, and a lot of very cool badges that will make an appearance at this year’s Def Con.

Creating Unbeatable Videogame AI

Super Smash Bros. Melee is a multiplayer fighting game released for the Nintendo GameCube in 2001. For the last decade and a half, it has become one of the premier fighting game eSports, and it is the reason Nintendo still makes a GameCube controller for the Wii U. Smash Melee has an intense following, and for years the idea of an AI that could beat top-tier players at Melee was inconceivable – the game was just far too complex, the strategies too demanding, and the tactics too hard.

[Dan] a.k.a. [AltF4] wasn’t satisfied that a computer couldn’t beat players at Melee, and a few years ago started work on the first Melee AI that could beat any human player. He just released Smashbot at this year’s DEF CON, and while the AI is limited, no human can beat this AI.

Continue reading “Creating Unbeatable Videogame AI”

The 2016 Queercon Badge

What We Learned From The 2016 Queercon Badge

DEF CON has become known for the creative electronic badges, and now we get to see a variety of them dangling from lanyards every year. This year, the Queercon badge stood out as the one that got the most people asking “where did you get that?!” Once again, [Evan Mackay], [George Louthan], [Jonathan Nelson], and [Jason Painter] delivered an awesome badge for this con-within-a-con for LGBT hackers and their friends.

The badge is a squid shape, with a nifty clear solder mask, printed on black FR4, and routed with natural curved traces. The squid eyes consist of sixty cyan LEDs, with RGB LEDs on the tentacles. The eyes make expressions, and the tentacles light up with a selectable pattern. Hitting the “ink” button shoots your pattern out to all nearby devices using the 2.4 GHz radio on board, and a set of small connectors can be used to “mate” with other badges to learn patterns. Yes, the Queercon badge always has suggestive undertones.

After playing with it for the whole con, we think this badge has some good lessons for electronic badge designers:

Variable Brightness

The 2016 Queercon Badge with two hats
The Queercon Badge with Two Hats

This badge used a phototransistor as a light sensor to measure ambient light and set the brightness accordingly. With over 60 LEDs, this helped the two AA batteries last for nearly the entire conference.

Power Switches

This badge has a power switch. That switch turns the badge off. This probably sounds very obvious, but it’s also unfortunately uncommon on electronic badges. The switch means people turn the badge off at night, and don’t have to yank batteries when firmware glitches.

Hats!

The badge had two expansion ports on the squid’s head for adding hats. These were given power, and the connector spec was published before the event. Our favourite? A unicorn horn with a rainbow LED inside.

Social Badges are Fun

This has been the fourth Queercon badge in a row that communicated with other badges to unlock things. This is actually a neat way to get people to interact, and leads to a whole host of suggestive puns. Badginal intercourse, anyone?

We’ve heard that next year’s badge is already in the works, and we look forward to seeing what these folks come up with next. For now, you can grab all the hardware design files and get inspired for your own electronic badge build.

How To Detect And Find Rogue Cell Towers

Software defined radios are getting better and better all the time. The balaclava-wearing hackers know it, too. From what we saw at HOPE in New York a few weeks ago, we’re just months away from being able to put a femtocell in a desktop computer for under $3,000. In less than a year, evil, bad hackers could be tapping into your cell phone or reading your text message from the comfort of a van parked across the street. You should be scared, even though police departments everywhere and every government agency already has this capability.

These rogue cell sites have various capabilities, from being able to track an individual phone, gather metadata about who you have been calling and for how long, to much more invasive surveillance such as intercepting SMS messages and what websites you’re visiting on your phone. The EFF calls them cell-site simulators, and they’re an incredible violation of privacy. While there was most certinaly several of these devices at DEF CON, I only saw one in a hotel room (you catchin’ what I’m throwin here?).

No matter where the threat comes from, rogue cell towers still exist. Simply knowing they exist isn’t helpful – a proper defence against governments or balaclava wearing hackers requires some sort of detection system.. For the last few months [Eric Escobar] has been working on a simple device that allows anyone to detect when one of these Stingrays or IMSI catchers turns on. With several of these devices connected together, he can even tell where these rogue cell towers are.

A Stingray / cell site simulator detector
A Stingray / cell site simulator detector

Stingrays, IMSI catchers, cell site simulators, and real, legitimate cell towers all broadcast beacons containing information. This information includes the radio channel number, country code, network code, an ID number unique to a large area, and the transmit power. To make detecting rogue cell sites harder, some of this information may change; the transmit power may be reduced if a tech is working on the site, for instance.

To build his rogue-cell-site detector, [Eric] is logging this information to a device consisting of a Raspberry Pi, SIM900 GSM module, an Adafruit GPS module, and a TV-tuner Software Defined Radio dongle. Data received from a cell site is logged to a database along with GPS coordinates. After driving around the neighborhood with his rogue-cell-site detector sitting on his dashboard, [Eric] had a ton of data that included latitude, longitude, received power from a cell tower, and the data from the cell tower. This data was thrown at QGIS, an open source Geographic Information System package, revealing a heatmap with the probable locations of cell towers highlighted in red.

This device really isn’t a tool to detect only rogue cell towers – it finds all cell towers. Differentiating between a rogue and legitimate tower still takes a bit of work. If the heatmap shows a cell site on a fenced-off parcel of land with a big tower, it’s a pretty good bet that cell tower is legit. If, however, the heatmap shows a cell tower showing up on the corner of your street for only a week, that might be cause for alarm.

Future work on this cell site simulator detector will be focused on making it slightly more automatic – three or four of these devices sprinkled around your neighborhood would easily allow you to detect and locate any new cell phone tower. [Eric] might also tackle triangulation of cell sites with an RF-blocking dome with a slit in it revolving around the GSM900 antenna.