Want A Break From Hardware Hacking? Try Bitburner

If you ever mention to a normal person that you’re a hacker, and they might ask you if you can do something nefarious. The media has unfortunately changed the meaning of the word so that most people think hackers are lawless computer geniuses instead of us simple folk who are probably only breaking the laws meant to prevent you from repairing your own electronics. However, if you want a break, you can fully embrace the Hollywood hacker stereotype with Bitburner. Since it is all online, you don’t even have to dig out your hoodie.

The game takes place in 2077 where, apparently, people are still using green monochrome terminals and writing JavaScript code. Who knew? The operating system is suspiciously Linux-like with commands like alias, cat, cp, kill, and the like. We were nonplussed that in 2077 they’re still using vim, but you can use nano. We always thought real hackers would be emacs users. Our machine only starts out with 8 MB of RAM, too. Good thing you can virtually buy more.

We won’t quibble that cls is a synonym for clear or that you use help instead of man. It is, after all, a game. This means you don’t have to feel bad using the buy command to purchase a program on the virtual dark web, either. Hey, if you can shoot bad guys in an FPS game, why can’t you do business with fake cyber-criminals. Why should Grand Theft Auto players have all the fun?

You know how in a video game you are a much better shot and can sustain a lot more damage than you probably can in real life? The same principle applies here. Using the scan-analyze command helpfully tells you how many open ports connected computers have and how much hacking skill it will require to break in. That’d be handy in real life, we bet.

We did think it was bad form that the tutorial admonished us for not entering the commands it wanted us to. What kind of hacker wouldn’t try something else? Anyway, it’s probably a better diversion than whatever Facebook or phone game your friends are wasting time with. It probably doesn’t impart any real hacking skills, but not everything has to be useful.

If you want a game that might teach you something, try the Bash crawl adventure. Or, go write and play some BASIC games in your browser.

Hackaday Links Column Banner

Hackaday Links: May 8, 2022

Russia’s loose cannon of a space boss is sending mixed messages about the future of the International Space Station. Among the conflicting statements from Director-General Dmitry Rogozin, the Roscosmos version of Eric Cartman, is that “the decision has been made” to pull out of the ISS over international sanctions on Russia thanks to its war on Ukraine. But exactly when would this happen? Good question. Rogozin said the agency would honor its commitment to give a year’s notice before pulling out, which based on the current 2024 end-of-mission projections, means we might hear something definitive sometime next year. Then again, Rogozin also said last week that Roscosmos would be testing a one-orbit rendezvous technique with the ISS in 2023 or 2024; it currently takes a Soyuz about four orbits to catch up to the ISS. So which is it? Your guess is as good as anyones at this point.

At what point does falsifying test data on your products stop being a “pattern of malfeasance” and become just the company culture? Apparently, something other than the 40 years that Mitsubishi Electric has allegedly been doctoring test results on some of their transformers. The company has confessed to the testing issue, and also to “improper design” of the transformers, going back to the 1980s and covering about 40% of the roughly 8,400 transformers it made and shipped worldwide. The tests that were falsified were to see if the transformers could hold up thermally and withstand overvoltage conditions. The good news is, unless you’re a power systems engineer, these aren’t transformers you’d use in any of your designs — they’re multi-ton, multi-story beasts that run the grid. The bad news is, they’re the kind of transformers used to run the grid, so nobody’s stuff will work if one of these fails. There’s no indication whether any of the sketchy units have failed, but the company is “considering” contacting owners and making any repairs that are necessary.

For your viewing pleasure, you might want to catch the upcoming documentary series called “A League of Extraordinary Makers.” The five-part series seeks to explain the maker movement to the world, and features quite a few of the luminaries of our culture, including Anouk Wipprecht, Bunnie Huang, Jimmy DiResta, and the gang at Makers Asylum in Mumbai, which we assume would include Anool Mahidharia. It looks like the series will focus on the real-world impact of hacking, like the oxygen concentrators hacked up by Makers Asylum for COVID-19 response, and the influence the movement has had on the wider culture. Judging by the trailer below, it looks pretty interesting. Seems like it’ll be released on YouTube as well as other channels this weekend, so check it out.

But, if you’re looking for something to watch that doesn’t require as much commitment, you might want to check out this look at the crawler-transporter that NASA uses to move rockets to the launch pad. We’ve all probably seen these massive beasts before, moving at a snail’s pace along a gravel path with a couple of billion dollars worth of rocket stacked up and teetering precariously on top. What’s really cool is that these things are about as old as the Space Race itself, and still going strong. We suppose it’s easier to make a vehicle last almost 60 years when you only ever drive it at half a normal walking speed.

And finally, if you’re wondering what your outdoor cat gets up to when you’re not around — actually, strike that; it’s usually pretty obvious what they’ve been up to by the “presents” they bring home to you. But if you’re curious about the impact your murder floof is having on the local ecosystem, this Norwegian study of the “catscape” should be right up your alley. They GPS-tagged 92 outdoor cats — which they dryly but hilariously describe as “non-feral and food-subsidized” — and created maps of both the ranges of individual animals, plus a “population-level utilization distribution,” which we think is a euphemism for “kill zone.” Surprisingly, the population studied spent almost 80% of their time within 50 meters of home, which makes sense — after all, they know where those food subsidies are coming from.

Hackers Want Cambridge Dictionary To Change Their Definition

Maybe it’s the silly season of high summer, or maybe a PR bunny at a cybersecurity company has simply hit the jackpot with a story syndicated by the Press Association, but the non-tech media has been earnestly talking about a call upon the Cambridge Dictionary to remove the word “illegal” from their definition of “Hacker”. The weighty tome from the famous British university lists the word as either “a person who is skilled in the use of computer systems, often one who illegally obtains access to private computer systems:” in its learners dictionary, or as “someone who illegally uses a computer to access information stored on another computer system or to spread a computer virus” in its academic dictionary. The cybersecurity company in question argues that hackers in fact do a lot of the work that improves cybersecurity and are thus all-round Good Eggs, and not those nasty computer crooks we hear so much about in the papers.

We’re right behind them on the point about illegality, because while there are those who adopt the hacker sobriquet that wear hats of all colours including black, for us being a hacker is about having the curiosity to tinker with anything presented to us, whatever it is. It’s a word that originated among railway modelers (Internet Archived version), hardly a community that’s known for its criminal tendencies!

Popular Usage Informs Definition

It is however futile to attempt to influence a dictionary in this way. There are two types of lexicography: Prescriptive and Descriptive. With prescriptive lexicography, the dictionary instructs what something must mean or how it should be spelled, while descriptive lexicography tells you how something is used in the real world based on extensive usage research. Thus venerable lexicographers such as Samuel Johnson or Noah Webster told you a particular way to use your English, while their modern equivalents lead you towards current usage with plenty of examples.

It’s something that can cause significant discontent among some dictionary users as we can see from our consternation over the word “hacker”. The administration team at all dictionaries will be familiar with the constant stream of letters of complaint from people outraged that their pet piece of language is not reflected in the volume they regard as an authority. But while modern lexicographers admit that they sometimes walk in an uneasy balance between the two approaches, they are at heart scientists with a rigorous approach to evidence-based research, and are very proud of their efforts.

Big Data Makes for Big Dictionaries

Lexicographic research comes from huge corpora, databases of tens or hundreds of millions of words of written English, from which they can extract the subtlest of language trends to see where a word is going. These can be interesting and engrossing tools for anyone, not just linguists, so we’d urge you to have a go for yourself.

Sadly for us the corpus evidence shows the definition for “Hacker” has very firmly trended toward the tabloid newspaper meaning that associates cybercriminality. All we can do is subvert that trend by doing our best to own the word as we would prefer it to be used, re-appropriating it. At least the other weighty tome from a well-known British university has a secondary sense that we do agree with: An enthusiastic and skilful computer programmer or user“.

Disclosure: Jenny List used to work in the dictionary business.

Field Trip! Hackaday Visits Pimoroni

If you have a Raspberry Pi and have any interest in its peripherals, you may be familiar with the grinning pirate logo of the British company, Pimoroni. The Sheffield, UK based outfit first established a niche for itself as one of the go-to places for much of the essentials of Pi ownership, and has extended its portfolio beyond the Pi into parts, boards, and components across the spectrum of electronic experimentation. Their products are notable for their distinctive and colourful design language as well as their  constant exploration of new ideas, and they have rapidly become one of those companies to watch in our sphere. On our way up to Newcastle for Maker Faire UK, we passed close enough to the Pimoroni HQ to be able to ask nicely if we could drop in and have a tour.

[Paul] showing off some of the Pimoroni attention to design detail. This artwork is hidden behind a display panel on the finished product.
Paul showing off some of the Pimoroni attention to design detail. This artwork is hidden behind a display panel on the finished product.
The Pimoroni HQ can be found in a nondescript unit with a discreetly placed sign on an industrial estate after a short drive through the city from the motorway. Inside it’s the same as thousands of other units, a set of offices at the front and a cavernous warehouse behind, except this one is filled with the kinds of goodies that get our blood pumping! And we’re told this toybox warehouse is soon to be joined by another nearby unit, as the Pimoroni business is expanding.

Our guide was the company co-founder Paul Beech, whose work you will be familiar with even if this is the first time you’ve heard his name;  Paul was the designer of the Raspberry Pi logo! The company is not exclusive to that platform but it’s fair to say they have a strong connection with the Pi, starting in 2012 with as their website puts it: “One laser cutter and a kettle” on which they produced the first of their iconic PiBow laser-cut sandwich Raspberry Pi cases.

Continue reading “Field Trip! Hackaday Visits Pimoroni”

Ourselves As Others See Us Through The Lens Of Traditional Media

When I presented myself at the SHACamp 2017 info desk bright and early on the first full day of the camp, I was surprised to find that I was to be assigned a volunteer along with my press badge. Because of the way our community is sometimes covered by the traditional media, it was necessary that any journalists touring the site have a helping hand to ensure that they respect the privacy of the attendees, gain permission from people likely to be in any photographs, and generally not be idiots about the whole Hacker thing. I pointed out that I was working for Hackaday and not The Sun, and that as an active hackspace member and former hackspace director I was very much a part of the community attending SHA 2017 who would simply be wasting the valuable time of any volunteer assigned to me. Fortunately for the next volunteer in line they agreed with my point of view, so one of the angels was spared a day of my breakneck walking pace and impenetrable British colloquialisms.

It’s interesting therefore a few weeks after the event, to investigate how it was portrayed through the eyes of people who aren’t coming as Hackaday is, from within the bubble. To take a look at that disconnect between what we know about our community and its events, and how the traditional media sometimes like to portray us. Are they imagining the set of a Hollywood “hacker” movie in which assorted geniuses penetrate the computer systems of various international institutions by the simple expedient of banging wildly at a keyboard for a few seconds, or will the reality of a bunch of like-minded technology enthusiasts gathering in a field for several days of tinkering and other fun activities be what makes their reports?

Continue reading “Ourselves As Others See Us Through The Lens Of Traditional Media”

Is Your Child A Hacker?

Parents in Liverpool, UK, are being prepared to spot the signs that their children might be hackers. The Liverpool Echo reports on the launch of a “Hackers To Heroes” scheme targeting youngsters at risk of donning a black hat, and has an expert on hand, one [Vince Warrington], to come up with a handy cut-out-and-keep list. Because you never know when you’re going to need one, and he’s helped the Government so should know what he’s talking about.

Of course, they’re talking about “Hacker” (cybercriminal) while for us the word has much more positive connotations. And it’s yet another piece of ill-informed media scaremongering about technology that probably fits like so many others in the “People are having fun. Something Must Be Done About It!” category. But it’s still something that will probably result in hassle for a few youngsters with an interest in technology, and that’s not encouraging.

The full list is reproduced below, if you’re a parent it seems you will need to watch your children if:

  1. They spend most of their free time alone with their computer
  2. They have few real friends, but talk extensively to online friends about computers
  3. Teachers say the child has a keen interest in computers, almost to the exclusion of all other subjects
  4. They’re online so much it affects their sleeping habits
  5. They use the language of hacking, with terms such as ‘DdoS’ (pronounced D-dos), Dossing, pwnd, Doxing, Bots, Botnets, Cracking, Hash (refers to a type of encryption rather than cannabis), Keylogger, Lulz, Phishing, Spoof or Spoofing. Members of the Anonymous Hackivist group refer to their attacks as ‘Ops’
  6. They refer to themselves and their friends as hackers or script kiddies
  7. They have multiple social media profiles on one platform
  8. They have multiple email addresses
  9. They have an odd sounding nickname (famous ones include MafiaBoy and CyberZeist)
  10. Their computer has a web browser called ToR (The Onion Router) which is used to access hacking forums on the dark web
  11. Monitoring tools you’ve put on the computer might suddenly stop working
  12. They can connect to the wifi of nearby houses (especially concerning if they have no legitimate reason to have the password)
  13. They claim to be making money from online computer games (many hackers get started by trying to break computer games in order to exploit flaws in the game. They will then sell these ‘cheats’ online).
  14. They might know more than they should about parents and siblings, not being able to resist hacking your email or social media
  15. Your internet connection slows or goes off, as their hacker rivals try to take them down
  16. Some circumstantial evidence suggests children with Autism and Asperger’s could be more vulnerable to becoming hackers.

Reading the list, we can’t help wondering how many Hackaday readers would recognise as perfectly normal behaviours from their own formative years. And some of them look ripe for misinterpretation, for example your internet connection slowing down does not automatically mean that little [Jimmy] is selling a billion compromised social media accounts on the Dark Web.

Particularly concerning though is the final association of computer crime with children who are autistic or have Asperger’s Syndrome. Picking on a minority as a scapegoat for a public moral panic is reprehensible, and is not responsible journalism.

Still, you have to laugh. They remembered to include a stock photo of a hacker using a keyboard, but they’ve completely missed the telltale sign of a real hacker, which is of course wr1t1n9 11k3 r341 1337 h4xxx0rzzz.

Via The Register.

Liverpool skyline, G-Man (Public domain) via Wikimedia Commons.

Owning Hacker As A Word

To a casual observer it might seem as though our community is in the news rather a lot at the moment. It’s all about hacks on our TV screens in the soap opera of Washington politics, who hacked this, whether those people over there helped that lot hack the other lot, or even whether that person’s emails could have been hacked on that server. Keeping up with it as an outsider can become a full-time job.

XKCD 932 says it all. (CC BY-NC 2.5)
XKCD 932 says it all. (CC BY-NC 2.5)

Of course, as we all know even if the mainstream journalists (or should I refer to them colloquially as “hacks”?) don’t, it’s not us they’re talking about. Their hackers are computer criminals, while we are people with some of the hardware and software skills to bend technology to our will, even beyond what its designers might have intended. And that divergence between the way we use the word in a sense of reappropriation and they use it in disapprobation sometimes puts us in an odd position. Explaining to a sober-suited businessman as the director of a hackspace, that no, we’re not *those*hackers can sometimes  feel like skating on thin ice.

Continue reading “Owning Hacker As A Word”