2600 And Why Publishing Sucks

26002600: The Hacker Quarterly is the premier (print) infosec publication out there, and depending on who you talk to, the best publication out there that has anything to do with modifying electronics, infiltrating networks, and all the other goodies we post on a daily basis. They’ve also been around for longer than most of our readership, and to lose them would be a terrible loss for anyone who calls themselves a hacker.

Being a print publication, they are completely at the mercy of their distributors. Any sort of media is a very, very dirty business, so when 2600’s distributors recently decided to not pay them for a few previous issues… well, that’s a problem.

2600’s most recent distributor, Source Interlink, was recently dropped as the distributor for Time, throwing the entire company into panic mode. Source Interlink then rebranded itself as TEN: The Enthusiast Network, distributing a disturbing amount of hotrod magazines to bookstores across the country. With this change in names and a little corporatespeak, TEN: The Enthusiast Network has yet to pay 2600 what they’re due.

This isn’t the first time 2600 has faced near oblivion thanks to a distributor. They almost went out of business in 1997 when their distributor declared bankruptcy. 2600 have proven themselves to be resilient folk, though, and all bets are on them making it through this little impasse. Still, they’re still out six months worth of revenue, deep in debt, and they’re putting on a huge conference in a few weeks. It’s really not good timing.

If you’d like to help 2600, buy July’s issue, make them number 1 on Kindle, or buy a ticket for HOPE X. Hackaday is going to have a booth there (awesome!), and we’ll be putting a post up on that when  the already amazing list of speakers is finalized.

2600 Magazine Runs A Sale For The 20th Century Back Issues

In an effort to clear out some warehouse space, 2600 magazine has dropped the price for issues from 1984 to 2000 down to $2.50 each. If you haven’t read 2600, the Hacker Quarterly, shame on you. Pick some up and get reading. They are a resource beyond any other magazine out there for hacking and security related issues. They don’t gloss over the good bits either, they give detail because they know what they are talking about.  Just to further prove that point, we present to you, the image above. Yes that is a schematic of a bluebox on a child and yes, you can buy it in their store(the shirt).

HOPE Badge Proximity Sensor

The HOPE conference was last weekend and [Nathan] spent some time with fellow members of Makers Local 256 developing this badge proximity sensor. They took one of the HOPE badges, which have a radio on board for the tracking network, and wrote code for its MSP430 to detect other badges nearby. It uses a Geiger counter they brought with them as an enclosure, re-purposing the analog gauge to reflect the level of active radio signals in the area. You’ll find their demo clip embedded after the break.

If you managed to get your hands on one of these badges, don’t be shy about sharing your hacks. We want to see them.

Continue reading “HOPE Badge Proximity Sensor”

Impressioning At LockCon

impressioning

[Steffen Wernéry] has published a video of the impressioning contest at LockCon. We learned about key impressioning at this year’s HOPE conference. You start the process by inserting a key blank into the lock. By turning the lock until it stops and then moving the key up and down you create marks on the blank’s face. Take a file to those marks to remove the extra material and then repeat the process. Once the pins are set properly, they’ll stop leaving marks on the blank. It takes a lot of skill to do this right, but you end up with a perfectly functional key. [Barry Wels] managed to win the competition in 5:30 with second place coming in at 6 minutes.

HOPE 2008: YouTomb, A Free Culture Hack


YouTomb is a research project designed by the MIT Free Culture group to track video take downs on YouTube. To succeed, the team needed to track every single video on YouTube… which is close to impossible. Instead, they built several “explorer” scripts to track what videos were interesting. One explorer tracks all of YouTube’s lists: recommended, featured, most active, and more. Another explorer picks up every video submitted to YouTube, and a third crawls Technorati.

The explorers just find the videos; a separate group of scanner scripts checks the current status of videos. It checks both the new videos and ones that have been killed to see if they return. YouTomb archives every video it finds. They display the thumbnail of the video under fair use, but they’re still determining whether they can display each video in full.

Continue reading “HOPE 2008: YouTomb, A Free Culture Hack”

HOPE 2008: Methods Of Copying High Security Keys


[Barry Wels] is well known for his lockpicking talks, but this year he wanted to talk about how he copies high security keys. If a key blank is available, you could make a copy just by viewing the original. High security keys generally have profiles with more side cuts, which means you can guess at how deep a specific pin is by observing how many cuts it crosses. He also showed that you could imprint your arm with the key and use that as a guide. If a blank isn’t available, you could fill a similar key with solder and file that down.

[Barry] showed two different kits for casting keys. The first used soft clay in a clam shell to make an imprint of the original key. The form is then filled with a low melting point alloy (probably Wood’s metal) to create the new key. A second style uses a metal form and two part silicone to create the mold. This method works for most high security keys, but will not work on keys with active elements like sliders or magnets.

Finally, [Barry] talked about his favorite method: impressioning. Unlike picking a lock, when you’re done impressioning you have a funtional key. You start with key blank and file off the top layer. Place the blank in the lock and turn it till it jams. Then, you rock the key up and down. Observing the key under light you’ll see a small mark where each pin is. File a bit where the marks appear and repeat the process. You can’t use too much force or you might break the blank. This also works on dimple keys and as this video shows, laser cut keys. [Barry] highly recommends the impressioning book by [Oliver Diederichsen].

[photo: Rija 2.0]