Remember that “PhoneDrone” scam from a while back? With two tiny motors and props that could barely lift a microdrone, it was pretty clearly a fake, but that doesn’t mean it wasn’t a pretty good idea. Good enough, in fact, that [Nick Rehm] came up with his own version of the flying phone case, which actually works pretty well.
In the debunking collaboration between [Mark Rober], [Peter Sripol], and the indispensable [Captain Disillusion], you’ll no doubt recall that after showing that the original video was just a CGI scam, they went on to build exactly what the video purported to do. But alas, the flying phone they came up with was manually controlled. While cool enough, [Nick Rehm], creator of dRehmFlight, can’t see such a thing without wanting to make it autonomous.
To that end, [Nick] came up with the DroneCase — a bicopter design that allows the phone to hang vertically. The two rotors are on a common axis and can swivel back and forth under control of two separate micro-servos; the combination of tilt rotors and differential thrust gives the craft full aerodynamic control. A modified version of dRehmFlight runs on a Teensy, while an IMU, a lidar module, and a PX4 optical flow sensor round out the sensor suite. The lidar and flow sensor both point down; the lidar is used to sense altitude, while the flow sensor, which is basically just the guts from an optical mouse, watches for translation in the X- and Y-axes.
After a substantial amount of tuning and tweaking, the DroneCase was ready for field tests. Check out the video below for the results. It’s actually quite stable, at least as long as the batteries last. It may not be as flexible as a legit drone, but then again it probably costs a lot less, and does the one thing it does quite well without any inputs from the user. Seems like a solid win to us.
Continue reading “Bicopter Phone Case Might Be Hard To Pocket, But Delivers Autonomous Selfies”
Mass storage has come a long way since the introduction of the personal computer. [Tech Time Traveller] has an interesting video about the dawn of PC hard drives focusing on a company called MiniScribe. After a promising start, they lost an IBM contract and fell on hard times.
Apparently, the company was faking inventory to the tune of $15 million because executives feared for their jobs if profits weren’t forthcoming. Once they discovered the incorrect inventory, they not only set out to alter the company’s records to match it, but they also broke into an outside auditing firm’s records to change things there, too.
Senior management hatched a plan to charge off the fake inventory in small amounts to escape the notice of investors and government regulators. But to do that, they need to be able to explain where the balance of the nonexistent inventory was. So they leased a warehouse to hold the fraud inventory and filled it with bricks. Real bricks like you use to build a house. Around 26,000 bricks were packaged in boxes, assigned serial numbers, and placed on pallets. Auditors would see the product ready to ship and there were even plans to pretend to ship them to CompuAdd and CalAbco, two customers, who had agreed to accept and return the bricks on paper allowing them to absorb the $15 million write off a little at a time.
Unfortunately, the fictitious excellent financial performance led to an expectation of even better performance in the future which necessitated even further fraud. The company had turned around, but only on paper. A downturn in the computer business and maxed-out credit signaled the beginning of the end. Suppliers and employees weren’t getting paid. A senior manager violated insider trader rules and dumped a lot of stock.
The turnaround CEO finally resigned and a new CEO found the fraud and released the findings that they were in the hole for $100 million. Bankruptcy pushed the company’s assets to Maxtor and criminal charges against 16 people ensued ending in fines and jail time. It isn’t clear if any of the boxed bricks were shipped to anyone by accident or by a disgruntled employee with a rubber paycheck. [Tech Time Traveller] speculates that if someone has one, it would be quite the collector’s item.
We hear about companies doing questionable things, of course, but this really is impressive in scope. At least they weren’t scamming end users as some tech companies have done.
Continue reading “We’ve Heard Of Bricking A Hard Drive, But…”
If you are in the market for web hosting in 2021 and you sign up with one of the cloud computing providers, you’ll soon see how the different resources are priced. Storage and bandwidth are cheap, while CPU time is expensive. This reflects the state of a modern computer, in which a typical disk drive now holds a terabyte or more and rising by the year while a new processor is becoming a bottleneck whose performance hasn’t increased as much as the manufacturers would like over models from years ago.
Twice As Much Hardware From A Bit Of Software?
In the early 1990s though it was a different matter. A 486 or early Pentium processor was pretty powerful compared to the DOS or Windows 3.1 software it was expected to run, and it was the memory and disk space attached to it that limited performance… and cost an arm and a leg. There was a period in about 1995 when a supposed fire in a chip factory somewhere sent RAM prices into the hundreds of dollars per megabyte, briefly causing an epidemic of RAM raiding in which criminals would break into offices and take only the SIMs from the computers.
A solution to this problem came perhaps surprisingly from the software industry. Disk Doubler was a DOS driver that promised more disk space, achieving this seemingly impossible feat by compressing the disk to fit more data on it. Processor power swapped for disk space was a reasonable trade at the time so it became extremely popular, and eventually Microsoft incorporated their own disk compression into DOS. In some cases it could even speed up a computer with a slow disk drive, as I found out as a student with a 286 packing an MFM drive.
Something For Nothing, Perhaps It’s Too Good To Be True.
If compression could increase disk space then couldn’t it do the same for RAM? The industry came to the rescue once more with an array of RAM doubler products, first applying the disk doubling technique to on-disk virtual memory, and then doing the same with the contents of the memory itself. The first approach worked at the expense of a system slow-down, while the second, not so much. In fact it was little more than a scam, with software products promising much but delivering absolutely nothing behind the scenes.
Continue reading “Retrotechtacular: Double For Nothing”
Don’t send bitcoin to celebrities… or to random people for that matter. This afternoon a number of high profile Twitter accounts were taken over, including Joe Biden, Bill Gates, Elon Musk, Apple, Jeff Bezos, and Kanye West, and the event appears to be ongoing. Each displayed a message saying they wanted to “give back” by doubling the bitcoin that they are sent. The messages all appear to have the same bitcoin wallet address.
This is reminiscent of the “Nigerian prince” scams, a form of advance-fee scam where an email asks for help with a small sum of money in order to obtain a larger sum. Those usually come in as spam emails which most people are wise to at this point. However, blindly following celebrities on Twitter may still deliver a good dose of naïveté when those platforms are misused.
Bitcoin transactions can be viewed publicly and this wallet is showing 11.8 BTC in and 5.8 BTC out in a total of 288 transactions. The net is roughly 6 bitcoin or $55k USD at the time of writing. Twitter’s response appears to have locked down all verified accounts from publishing new tweets. They retain the ability to retweet and delete existing tweets.
Main image screenshot sources:
We all love new tech. Some of us love getting the bleeding edge, barely-on-the-market devices and some enjoy getting tech thirty years after the fact to revel in nostalgia. The similarity is that we assume we know what we’re buying and only the latter category expects used parts. But, what if the prior category is getting used parts in a new case? The University of Alabama in Huntsville has a tool for protecting us from unscrupulous manufacturers installing old flash memory.
Flash memory usually lasts longer than the devices where it is installed, so there is a market for used chips which are still “good enough” to pass for new. Of course, this is highly unethical. You would not expect to find a used transmission in your brand new car so why should your brand new tablet contain someone’s discarded memory?
The principles of flash memory are well explained by comparing them to an ordinary transistor, of which we are happy to educate you. Wear-and-tear on flash memory starts right away and the erase time gets longer and longer. By measuring how long it takes to erase, it is possible to accurately determine the age of chip in question.
Pushing the limits of flash memory’s life-span can tell a lot about how to avoid operation disruption or you can build a flash drive from parts you know are used.
Yet another Internet of Things service has left its customers in the lurch. IoT devices (mostly lightbulbs)
made sold by Greenwave Systems stopped talking to the outside world on July 1. More specifically, the server to which they all connected (ahem, “the cloud”) has been turned off, which rules out using the bulbs with Internet-based services like IFTTT, which was a major selling point of the Things in the first place.
[Edit: We were contacted by Greenwave, and they pointed out that they merely sold the IoT devices in question. They are made by TCP, which is also responsible for cancelling the service. And TCP has a history of doing this sort of thing before.]
It’s not the first time we’ve seen IoT companies renege on their promises to provide service, and it’s surely not going to be the last. We’re preaching to the choir here, but when even Google is willing to take the PR hit to effectively brick your devices, the only protection that you’ve got against obsolescence is an open protocol.
At least the users of
Greenwave’s TCP’s devices will continue to be able to control them from within the home. That, plus some clever hacking, will make them workable into the future. But it’s not like the convenience that was sold with the devices.
Boo to shady IoT companies! But thanks to [Adrian] for the tip.
Summer is nearly here, and with that comes the preparations for the largest gathering of security researchers on the planet. In early August, researchers, geeks, nerds, and other extremely cool people will descend upon the high desert of Las Vegas, Nevada to discuss the vulnerabilities of software, the exploits of hardware, and the questionable activities of government entities. This is Black Hat and DEF CON, when taken together it’s the largest security conference on the planet.
These conferences serve a very important purpose. Unlike academia, security professionals don’t make a name for themselves by publishing in journals. The pecking order of the security world is determined at these talks. The best talks, and the best media coverage command higher consultancy fees. It’s an economy, and of course there will always be people ready to game the system.
Like academia, these talks are peer-reviewed. Press releases given before the talks are not, and between the knowledge of security researchers and the tech press is network security theatre. In this network security theatre, you don’t really need an interesting exploit, technique, or device, you just need to convince the right people you have one.
Continue reading “Network Security Theatre”