Over at the Submitterator, lbigbadbob points us to this video of a Sequoia AVC Edge touch-screen DRE voting machine hacked to, er, play Pac-man. This was done without breaking any of the tamper-evident seals. Nice work, J. Alex Halderman, University of Michigan, and Ariel J. Feldman, Princeton University! From the project page:
How did you reprogram the machine?
The original election software used the psOS+ embedded operating system. We reformatted the memory card to boot DOS instead. (Update: Yes, it can also run Linux.) Challenges included remembering how to write a config.sys file and getting software to run without logical block addressing or a math coprocessor. The entire process took three afternoons.
In celebration of the 30th anniversary of the iconic arcade game, we reprogrammed the AVC Edge to run Pac-Man. It uses MAME to emulate the original hardware. (We own the electronics from a real Pac-Man machine.) We could have reprogrammed it to steal votes, but that's been done before, and Pac-Man is more fun!
In 1979, the Duke of Lancaster — a cruise liner turned car ferry — was retired from service and moored at Llanerch-y-Mor, North Wales, where it was made over as a “Fun Ship,” whose car-deck was refitted as a coin-op arcade.
Nintendo continues its long-running campaign of legal harassment against its biggest fans: this time, they’re targeting fan-videos showing gameplay from the official, licensed Mario/Minecraft mashup pack for the Wii U.
If you’ve got a killer app idea, but don’t have the technical expertise to pull it off, get a crash course in all things app development with the Comprehensive Android Development Bundle, now over 90% off in the Boing Boing Store. Across 83 hours of training, you’ll learn to develop for the world’s most popular mobile OS, mastering […]
Jared Sinclair developed the RSS reader app Unread, which made $10,000 in its first 24 hours on the iOS market. And we’ve all heard the story of Flappy Bird developer Dong Nguyen, whose creation was reportedly earning $50,000 a day at the height of its 2013 explosion. While those are rare examples, they’re also testament to the […]
If you or your company’s IT system are besieged by black hat cyber attacks, an ethical hacker might be all that stands between crippling damage and a company’s long-term prosperity. It’s no wonder that the market for IT security specialists is exploding. Certification is the key – so learn the tenets of ethical hacking and get […]