Author Archives: pappp

Welcome 2030 You’ll Own Nothing Have No Privacy and Life Has Never Been Crueler

Source: Hacker News

Article note: It's both a true premise, and almost the entire content is shilling crypto scams that do nothing to work on the problem.
Comments
Posted in News | Leave a comment

Paper Tape Reader Self-calibrates, Speaks USB

Source: Hack a Day

Article note: Neat! It's more-or-less the way I've thought experimented out doing it but never had any need to try.

Input devices consisting of optical readers for punched paper tape have been around since the earliest days of computing, so why stop now? [Jürgen]’s Paper Tape Reader project connects to any modern computer over USB, acting like a serial communications device. Thanks to the device’s automatic calibration, it works with a variety of paper materials. As for reading speed, it’s pretty much only limited to how fast one can pull tape through without damaging it.

Stacked 1.6 mm PCBs act as an enclosure, of sorts.

While [Jürgen]’s device uses LEDs and phototransistors to detect the presence or absence of punched holes, it doesn’t rely on hardware calibration. Instead, the device takes analog readings of each phototransistor, and uses software-adjusted thresholds to differentiate ones from zeros. This allows it to easily deal with a wide variety of tape types and colors, even working with translucent materials. Reading 500 characters per second isn’t a problem if the device has had a chance to calibrate.

Interested in making your own? The build section of the project has all the design files; it uses only through-hole components, and since the device is constructed from a stack of 1.6 mm thick PCBs, there’s no separate enclosure needed.

Paper tape and readers have a certain charm to them. Cyphercon 4.0 badges featured tape readers, and we’ve even seen the unusual approach of encoding an I2C byte stream directly onto tape.

Posted in News | Leave a comment

Intel deprecates SGX on Core series processors

Source: Hacker News

Article note: All Intel's recent transactional memory and hardware security stuff has not actually worked for their intended purpose, so this is better than bullshitting and doubling down. AFIK SPARC is the only current living (...ish) architecture with usable memory tagging of any sort at the moment (ADI features in Solaris), though Arm8.5 specifies Memory Tagging Extensions. Having done an MS in the area, its sort of impressive how many times there have been memory tagging efforts to varying degrees of ambition in computer designs, how useful they can be, and how few of them have panned out.
Comments
Posted in News | Leave a comment

Ask HN: Why isn’t there a standard network audio protocol?

Source: Hacker News

Article note: Because we're building exploitative trinkets instead of technologies. All the mutually incompatible streaming gadgets would be better for consumers if they were just endpoints for a decent agreed upon protocol. But nooo. (and for what used to be called PAN applications, Bluetooth is just awful at everything and sucked all the air out of the room)
Comments
Posted in News | Leave a comment

Atlassian: We estimate the rebuilding effort to last for up to 2 more weeks

Source: Hacker News

Article note: ...speaking of bad trends in infrastructure. Atlassian has been big on the "We're going to transition all our on-prem customers to ~~serfdom~~ cloud" annnnd multi-week outage.
Comments
Posted in News | Leave a comment

More Fakery

Source: Hacker News

Article note: Gaming metrics gets rewarded over intended behaviors until it drives out the intended behaviors: the tragedy of society. Academia is _deep_ in it these days.
Comments
Posted in News | Leave a comment

I must announce the immediate end of service of SSLPing

Source: Hacker News

Article note: "I used hipster tooling (node, docker), it drifted at an unsustainable pace, and now this software is unmaintainable" It's a pretty classy way to go out, but does high-viz display the ecosystem problem. Especially the lie of adding complexity to hide complexity in the container layer actually making things easier long term.
Comments
Posted in News | Leave a comment

Closure of 3M chip coolant plant could upset semiconductor sector

Source: Hacker News

Article note: Ooh. 80% of the IC fab cooling consumable market coming out of one plant making an exotic mildly hazardous material (presumably one of the Novec/Fluorinert type materials). That'll be a fun disruption.
Comments
Posted in News | Leave a comment

Night Vision: Now in Color

Source: Hack a Day

Article note: HAD is the only appropriately skeptical place I saw this pop up. Everyone else went with "COLOR PHOTOS IN COMPLETE DARKNESS VIA AI", every word of which is a lie. They took pictures of inkjet printed pictures. Under three colors of controlled very near IR (if I showed you a 718nm LED you'd call it red) illumination. Then they characterized that particular printer's CMYK inks illuminated under the three frequencies of near-IR light, and used an overgrown parameter fitting tool to generate a linear system to translate the IR image to the visible light image (basically by distinguishing pigments and drawing the appropriate visible colors where they were printed). It would only take a couple hours to find and hand tune the constants from swatches, and you'd probably get better results. It really is an illustration of everything wrong with academia.

We’ve all gotten used to seeing movies depict people using night vision gear where everything appears as a shade of green. In reality the infrared image is monochrome, but since the human eye is very sensitive to green, the false-color is used to help the wearer distinguish the faintest glow possible. Now researchers from the University of California, Irvine have adapted night vision with artificial intelligence to produce correctly colored images in the dark. However, there is a catch, as the method might not be as general-purpose as you’d like.

Under normal illumination, white light has many colors mixed together. When light strikes something, it absorbs some colors and reflects others. So a pure red object reflects red and absorbs other colors. While some systems work by amplifying small amounts of light, those don’t work in total darkness. For that you need night vision gear that illuminates the scene with infrared light. Scientists reasoned that different objects might also absorb different kinds of infrared light. Training a system on what colors correspond to what absorption characteristics allows the computer to reconstruct the color of an image.

The only thing we found odd is that the training was on printed pictures of faces using a four-color ink process. So it seems like pointing the same camera in a dark room would give unpredictable results. That is, unless you had a huge database of absorption profiles. There’s a good chance, too, that there is overlap. For example, yellow paint from one company might look similar to blue paint from another company in IR, while the first company’s blue looks like something else. It is hard to imagine how you could compensate for things like that.

Still, it is an interesting idea and maybe it will lead to some other interesting night vision improvements. There could be a few niche applications, too, where you can train the system for the expected environment and the paper mentions a few of these.

Of course, if you have starlight, you can just use a very sensitive camera, but you still probably won’t get color. You can also build your own night vision gear without too much trouble.

Posted in News | Leave a comment

Raspberry Pi OS no longer defaults to user “pi”

Source: OSNews

Article note: I consider this "mildly unfortunate, but definitely a good call." I've seen the "pi/raspberry" credential in a bunch of brute-forcing attacks. I do wonder if leaving the pi user but having it set nologin with no valid password until one is configured would be more elegant solution, but software assuming the pi user was broken anyway, so meh.

Up until now, all installs of Raspberry Pi OS have had a default user called “pi”. This isn’t that much of a weakness – just knowing a valid user name doesn’t really help much if someone wants to hack into your system; they would also need to know your password, and you’d need to have enabled some form of remote access in the first place. But nonetheless, it could potentially make a brute-force attack slightly easier, and in response to this, some countries are now introducing legislation to forbid any Internet-connected device from having default login credentials.

So with this latest release, the default “pi” user is being removed, and instead you will create a user the first time you boot a newly-flashed Raspberry Pi OS image. This is in line with the way most operating systems work nowadays, and, while it may cause a few issues where software (and documentation) assumes the existence of the “pi” user, it feels like a sensible change to make at this point.

This is a pretty substantial change that might break some applications that assume the default “pi” user exists.

Posted in News | Leave a comment