- November 2018
- October 2018
- September 2018
- August 2018
- July 2018
- June 2018
- May 2018
- April 2018
- March 2018
- February 2018
- January 2018
- December 2017
- November 2017
- October 2017
- September 2017
- August 2017
- July 2017
- June 2017
- May 2017
- April 2017
- March 2017
- February 2017
- January 2017
- December 2016
- November 2016
- October 2016
- September 2016
Monthly Archives: July 2017
Contactless payments are growing in popularity. Often the term will bring to mind the ability to pay by holding your phone over a reader, but the system can also use NFC tags embedded in credit cards, ID card, passports, and the like. NFC is a reasonably secure method of validating payments as it employs encryption and the functional distance between client and reader is in the tens of centimeters, and often much less. [Haoqi Shan] and the Unicorn team have reduced the security of the distance component by using a hardware proxy to relay NFC interactions over longer distances.
The …read more
Today, we’re excited to announce the winners of the Wheels, Wings, and Walkers portion of The Hackaday Prize. We were looking for the next generation of robots, drones, machines that make machines move, and hackers who now know far too much about inverse kinematics. The results were spectacular.
Hackaday is currently hosting the greatest hardware competition on Earth. We’re giving away thousands of dollars to hardware creators to build the next great thing. Last week, we wrapped up the third of five challenges. It was all about showing a design to Build Something That Matters. Hundreds entered and began …read more
In the waning hours of 2010, a hacking group known as Lulzsec ran rampant across the Internet, leaving a path of compromised servers, a trail of defaced home pages, leaked emails, and login information in their wake. They were eventually busted via human error, and the leader of the group becoming an FBI informant. This handful of relatively young hackers had made a huge mess of things. After the digital dust had settled – researches, journalists, and coders began to dissect just how these seemingly harmless group of kids were able to harness so much power and control over the …read more
Note to self: if you’re going to hack at 4 in the morning, have a plan to deal with the inevitable foul ups. Like being able to whip up an impromptu electromagnetic crane to retrieve an AirPod dropped out a window.
Apartment dweller [Tyler Efird]’s tale of woe began with a wee-hours 3D print in need of sanding. Leaning out his third-story window to blow off some dust, he knocked one AirPod free and gravity did the rest. With little light to search by and a flight to catch, the wayward AirPod sat at the bottom of a 10-foot shaft …read more
Kickstarter and its ilk seem like the Wild West when it comes to claims of being “The world’s most (Insert feature here) device!” It does add something special when you can truly say you have the world record for a device though, and [MellBell Electronics] are currently running a Kickstarter claiming the worlds smallest Arduino compatible board called Pico.
We don’t want to knock them too much, they seem like a legit Kickstarter campaign who have at time of writing doubled their goal, but after watching their promo video, checking out their Kickstarter, and around a couple of minutes research, …read more
What are you doing next weekend? How about going to the Vintage Computer Festival West at the Computer History Museum in Mountain View. Hackaday is sponsoring, and there are always a ton of awesome builds. Last year, someone played Tron on a Commodore PET. Not a video game — the movie.
In case anyone forgot, I created the most desirable independent hardware badge this year at Def Con. It’s a hilarious joke, I got three from OSH Park, thirty more in different colors from Seeed, and something, somewhere, jumped a shark. [Drew Fustini] also shared these PCBs on OSH Park. …read more
There was a time when owning computer meant you probably knew most or all of the instructions it could execute. Your modern PC, though, has a lot of instructions, many of them meant for specialized operating system, encryption, or digital signal processing features.
There are known undocumented instructions in a lot of x86-class CPUs, too. What’s more, these days your x86 CPU might really be a virtual machine running on a different processor, or your CPU could have a defect or a bug. Maybe you want to run sandsifter–a program that searches for erroneous or undocumented instructions. Who knows what …read more
We’re at the start of August, which can only mean one thing. Europe’s hackers and makers are about to converge in a field somewhere for a long weekend of sitting around drinking beer and Club-Mate, eating unhealthy street food, being assaulted by some of the most underground chiptune electronic dance music on the planet, sharing the fruits of their labours with their peers, and gazing lovingly upon other people’s hacks. This year it’s the turn of the Netherlands, for over the first full weekend in August that country will host the SHA2017 outdoor hacker camp in a scouting camp on …read more
[Michael Ossmann] spoke on Friday to a packed house in the wireless hacking village at DEF CON 25. There’s still a day and a half of talks remaining but it will be hard for anything to unseat his Reverse Engineering Direct Sequence Spread Spectrum (DSSS) talk as my favorite of the con.
DSSS is a technique used to transmit reliable data where low signal strength and high noise are likely. It’s used in GPS communications where the signal received from a satellite is often far too small for you to detect visually on a waterfall display. Yet we know that …read more