When it comes to cryptocurrency security, what’s the best way to secure the private key? Obviously, the correct answer is to write it on a sticky note and put it on the bezel of your monitor; nobody’ll ever think of looking there. But, if you’re slightly more paranoid, and you have access to a Falcon 9, you might just choose to send it to the Moon. That’s what is supposed to happen in a few months’ time, as private firm Lunar Outpost’s MAPP, or Mobile Autonomous Prospecting Platform, heads to the Moon. The goal is to etch the private key of a wallet, cheekily named “Nakamoto_1,” on the rover and fund it with 62 Bitcoins, worth about $1.5 million now. The wallet will be funded by an NFT sale of space-themed electronic art, because apparently the project didn’t have enough Web3.0 buzzwords yet. So whoever visits the lunar rover first gets to claim the contents of the wallet, whatever they happen to be worth at the time. Of course, it doesn’t have to be a human who visits.
easter egg7 Articles
Hackaday Links: July 24, 2022
OK, maybe that won’t buff right out. NASA has released a more detailed analysis of the damage suffered by the James Webb Space Telescope in a run-in with a micrometeoroid, and has deemed the damage “uncorrectable”. Not that any damage to JWST is correctable, at least in the sense that the Hubble Space Telescope was able to be fitted with optics to fix its precisely-yet-inaccurately-ground main mirror. JWST is far too remote for a service call, so correctability in this case refers to a combination of what can be accomplished by tweaking the shape and position of the affected mirror segment, and what can be taken care of with image processing. The damage to segment C3, as well as damage to the other segments in a total of six collisions in the half year Webb has been on station, are assessed via “wavefront sensing”, which looks at how out of phase the light coming from each mirror segment is. The damage sounds bad, and it certainly must hurt for the techs and engineers who so lovingly and painstakingly built the thing to see it dinged up already, but in the long run, this damage shouldn’t hamper Webb’s long-term science goals.
In other space news, we hear that the Perseverance rover has taken its first chunk out of the ancient river delta in Jezero Crater. The rover has been poking around looking for something interesting to sample, but everything it tried out with its abrading tool was either too brittle, too hard to get at, or scientifically dull. Eventually the rover found a good spot to drill, and managed to bring up a 6.7-cm core sample. This makes the tenth core sample collected overall, and the first from the delta area, which is thought to have the best chance to contain evidence of ancient Martian life.
Closer to home, we’ve all likely heard of robotic surgery, but the image that conjures up doesn’t really comport with reality. Robot-assisted surgery is probably a better term, since surgical robots are generally just ultra-precise remote manipulators that are guided by a skilled surgeon. But if a study on surgery robot performance is any indication, the days of human surgeons might be numbered. The study compared accuracy and speed of both a human surgeon controlling a standard Da Vinci surgical robot and an autonomous version of the robot alone, using a depth camera for sensing. Using a standard surgical skills test, the autonomous system matched the human surgeons in terms of failures — thankfully, no “oopsies” for either — but bested the humans in speed and positional accuracy. It’ll probably be a while before fully autonomous surgeons are a thing, but we wouldn’t be betting against it in the long run.
Most readers will no doubt have heard the exciting news that Supercon will be back this year as an in-person event! Make sure you set aside the first weekend in November to make the pilgrimage to Pasadena — it’ll be great seeing everyone again after the long absence. But if you just can’t wait till November for an IRL con, consider dropping by SCALE 19X, coming up this week in Los Angeles. The Southern California Linux Expo is being held July 28 through 31, and features a ton of speakers, including a keynote by Vint Cerf. Hackaday readers can save 50% on tickets with promo code HACK.
And finally, as a lover of Easter eggs of all kinds, but specifically of the hidden message in software variety, we appreciated this ode to the Easter egg, the embedded artistry that has served as a creative outlet for programmers over the years. The article lists a few great examples of the art form, along with explaining why they’re actually important artifacts of the tech world and what they’re good for. We tried out a few of the ones listed in the article that we hadn’t heard of before; some hits, some misses, but they’re all appreciated. Well, most of them — the corporate rah-rah kind can bugger straight off as far as we’re concerned.
Finding A Secret Message From A Gaming Legend
Satoru Iwata is perhaps best remembered for leading Nintendo through the development of the DS and Wii, two wildly successful systems which undeniably helped bring gaming to a wider and more mainstream audience. But decades before becoming the company’s President in 2002, he got his start in the industry as a developer working on many early console and computer games. [Robin Harbron] recently decided to dig into one of the Iwata’s earliest projects, Star Battle for the VIC-20.
It’s been known for some time that Iwata, then just 22 years old, had hidden his name and a message in the game’s source code. But [Robin] wondered if there was more to the story. Looking at the text in memory, he noticed the lines were actually null-terminated. Realizing the message was likely intended to get printed on the screen at one point during the game’s development, he started hunting for a way to trigger the nearly 40 year old Easter Egg.
As it turns out, it’s hidden behind a single flag in the code. Just change it from 0 to 1, and the game will display Iwata’s long-hidden credit screen. That proved the message was originally intended to be visible to players, but it still didn’t explain how they were supposed to trigger it during normal game play.
That’s where things really get interesting. As [Robin] gives us a guided tour through Star Battle’s inner workings, he explains that Iwata originally intended the player to hit a special combination of keys to tick over the Easter Egg’s enable flag. All of the code is still there in the commercial release of the game, but it’s been disabled. As Iwata’s life was tragically cut short in 2015 due to complications from cancer, we’ll perhaps never know the reason he commented out the code in question before the game was released. But at least we can now finally see this hidden message from one of gaming’s true luminaries.
Last time we heard from [Robin], he’d uncovered a secret C64 program hidden on a vinyl record. With his track record so far, we can’t wait to see what he digs into next. Continue reading “Finding A Secret Message From A Gaming Legend”
BASIC Interpreter Hidden In ESP32 Silicon
We’ve been keeping up with the ongoing software developed for the ESP32 WiFi chip, and that means a lot of flashing, hooking up random wires, and rebooting. Along the way, we stumbled on an Easter egg: the ESP32 processor has a built-in BASIC interpreter to fall back on.
That’s a cool little hack to find, but we couldn’t find some crucial functions that would have made it a lot more useful. Still, it’s great fun to play around in real-time with the chip. And you’ll absolutely get an LED blinking faster in ESP32 BASIC than you will on an Arduino!
Continue reading “BASIC Interpreter Hidden In ESP32 Silicon”
Playing Tetris On An Oscilloscope
Have engineers stopped putting Easter eggs into technology lately? It’s always been a fun way to connect with your more advanced customer base (i.e. hackers) — anyway, here’s a great Easter egg you can find on the Hewlett Packard 54600B Oscilloscop — Tetris!
[RaffttaM] discovered this trick when a coworker let him know that one of the oscilloscopes in the lab had the hidden feature. A little fiddling later and a game of Tetris was revealed. If you press the Print/Utility button on the 54600B oscilloscope, followed by pressing the second and third button below the screen at the same time, you can launch the game!
Another cool embedded Easter egg is in the Game Boy Printer — If you hold the feed button during power up it spits out a Mario themed image! One of our readers even managed to hack the printer to show the Hack a Day Logo instead!
Do you know of any more modern tech with cool (and sneaky!) Easter eggs? Let us know by sending in a tip!
[Thanks Gregory!]
New Contest: Win One Of 20 Microchip Fubarino SD Boards
We had a blast with the Trinket Contest in October and November and can’t wait to see what you can come up with for this month’s competition. Microchip Technology is one of our advertisers and they offered us 20 Fubarino SD boards to give away as prizes. The challenge for you is to add our URL as an Easter Egg in your own microcontroller project. Rise to the top of our seemingly arbitrary system for picking winners and one will be delivered to your door for your future hacking pleasure.
Obviously we mean http://hackaday.com when we say URL, but what constitutes an Easter Egg? We figure it’s anything that is not apparently obvious in a piece of hardware. We built a quick example to get you thinking. Shown off in the clip after the break is a clock that displays our web address every day at 1:37pm. What did we pick that time? Because our clock displays in 24-hour time format and 13:37 is leet. See the code we used in our repo.
We thought of a few others, like making an embedded gaming that uses the Konami Code to reveal the Easter Egg, or a man-in-the-middle device that attaches to your keyboard and redirects your feeble attempts to load Facebook by closing the tab and opening Hackaday. The sky’s the limit with how creative these things can be!
Follow these rules to submit your qualifying entry:
- You must somehow hide http://hackaday.com in your microcontroller project (embedded Linux doesn’t count unless you do some type of bare-metal programming)
- Preference will be given to projects that are both clever and well documented. Notice we made a video, and posted code and an explanation of our project.
- Write an email that has “[Fubarino]” in the title, includes the information on your documented entry, and lists your name and mailing address. Your name and mailing address will be used for shipping only and NOT for anything else. Emails should be sent to: contests@hackaday.com
- Entries must be received before 12:00am Pacific time on 12/19/2013.
- Employees and their families of Hackaday, SupplyFrame, and Microchip Technology are not eligible to win.
What are you waiting for? Dust off those chips and get hacking!
Continue reading “New Contest: Win One Of 20 Microchip Fubarino SD Boards”
Uncovering Easter Eggs In Old Mac ROMs
The picture you see above is taken from the ROM of a Macintosh SE made in the late 1980s. This black and white image remained buried inside old Macs until [Adam] and [Trammell] at NYC Resistor reverse engineered these old Mac ROMs and found a few really cool Easter eggs.
[Adam] and [Trammell] have been dumping ROMs from old computers for a while now. Their modus operandi is finding old 27C-series EPROMs on old computers, prying the out of their comfortable home, slapping them in a breadboard, and wiring up an Arduino clone to dump the data to a computer.
Recently, the guys found an old Mac SE lying on the side of a road in Brooklyn and brought it over to NYC Resistor. They had known about images hidden in the SE ROM, but the guys wanted to know how and where these pictures were stored. After carefully inspecting the binary file generated from dumping the ROM, [Adam] was able to recover three images hidden in every Macintosh SE.
The folks at Apple – especially in the heady days of the Apple II and 68k Macs – hid quite a few Easter eggs in the ROMs of their computers. For instance, the Apple IIgs has audio data stored in the ROM, and the Macintosh Classic hid an entire operating system – System 6.0.3 – in the ROM of the machine.
via Make