In case you don't know, HackSpace is a terrific monthly maker magazine from the U.K. Published by the Raspberry Pi Foundation, HackSpace includes articles by bunnie huang, Andrew Lewis, Marc de Vinck, Sophy Wong, Bob Knetzger, and many other authors you many recognize from the pages of Make: magazine and other domains of the maker movement. — Read the rest
Last month, the legendary hardware hacker and entrepreneur Andrew "bunnie" Huang (who is also a talented science communicator) published a great explainer on the quirks of the Trump China tariff plan, which exempts finished goods (like TVs), but imposes stiff taxes on components that are shipped from China to US factories for final assembly, a tactic common to the most innovative, cutting edge companies who fear having their trade secrets stolen by Chinese manufacturing contractors.
This is my last day at my desk until Labor Day: tomorrow, we're driving to Burning Man to get our annual dirtrave fix! If you're heading to the playa, here's three places and times you can find me:
This year for Burning Man, my lovely campmates and I at Liminal Labs are running a big, playa-wide squirt-gun game called Assassination Army: come and get a gifted squirter from us (or bring your own!), don a brightly colored wristband, undergo our rigorous strategy-and-tactics training, and then go and soak other players out in the world, collecting trophies when you zap 'em!
Last October, Bloomberg published a blockbuster story claiming that some of the largest tech companies in the world, as well as sensitive US government and military systems, had been attacked through minute hardware implants that had been inserted at a subcontractor facility during the manufacture of servers from the world's leading server company, Supermicro.
In 2016, EFF sued
the US Government on behalf of Andrew "bunnie" Huang
and Matthew Green, both of whom wanted to engage in normal technological
activities (auditing digital security, editing videos, etc)
that put at risk from Section 1201 of the Digital Millennium
Bunnie Huang (previously) is a legendary hardware hacker, and one of his claims to fame are his annual trips to Shenzhen — China's electronics manufacturing hub — with groups of MIT students to show them how electronic production actually works in the field, both so they can design projects with that reality in mind, and so that they can get an appreciation of what's happening behind the scenes when they order parts, tool up a line, or otherwise interact with the factories — tiny and massive — of the Pearl River Delta.
How can a single, ill-conceived law wreak havoc in so many ways? It prevents you from making remix videos. It blocks computer security research. It keeps those with print disabilities from reading ebooks. It makes it illegal to repair people's cars. It — Read the rest
For the second year in a row, the MIT Media Lab is giving out a no-strings-attached cash award of $250,000 for "disobedience" that benefits society; the prize is a reaction to MIT's shameful historic instances of throwing disobedient researchers under the bus, from Aaron Swartz to Star Simpson to bunnie Huang.
With Trump poised to exact high tariffs on goods from China, it's tempting to declare the gadget party over: everyone is going to pay through the nose for electronics, from makers to Apple, and that's the end of the story, right?
Legendary hardware hacker Andrew "bunnie" Huang (previously) has an open-source hardware company called Chibitronics; anyone can make their own version of a Chibitronics product, because Bunnie is convinced that his versions will be better and cheaper than theirs.
1977's Apple ][+ was the first successful personal computer, inspiring a generation of hackers and makers and coders; famously, it shipped with a schematic that showed how the boards and their components worked together, to allow hobbyists to improve and service their PCs (hardware-hacking legend Bunnie Huang credits these schematics with igniting his interest in electronics and computing).
The legendary hardware hackers speak for two hours about gender, participation and representation in tech, teaching electronics with papercraft, and the joys of open source hardware.
In July 2016, Andrew "bunnie" Huang and Edward Snowden presented their research on journalist-friendly mobile surveillance resistance at the first MIT Media Lab Forbidden Research conference; a little over a year later, they have published an extensive scholarly paper laying out the problems of detecting and interdicting malware in a mobile device, and presenting a gorgeously engineered hardware overlay that can be installed in an Iphone to physically monitor the networking components and report on their activity via a screen on a slim external case.
Back in 2016, we published a good technological explainer about Intel's Management Engine, an evolution of the decade-plus old idea of "Trusted Computing," in which a separate, isolated system-on-a-chip lives alongside of your computer, performing cryptographic work and overseeing the functions of your computer.
In cryptographic and security circles, the "evil maid" problem describes a class of attacks in which a piece of unguarded hardware, is tampered with by someone who gains physical access to it: for example, a hotel chambermaid who can access your laptop while you're out of the room.
On Hackaday, Alasdair Allan documents the ingenious techniques employed in the creation of the Beat the Boss Phone, a tiny, lozenge-shaped phone (with a voice-changer) that is designed to be smuggled past the BOSS metal detectors used in UK prisons in the rectums of prisoners.
Last December, I published my review of Andrew "bunnie" Huang's astoundingly great book The Hardware Hacker: Adventures in Making and Breaking Hardware — without realizing that the book's release had been delayed because the published decided to do some very fancy and cool stuff with the printing process.
In the first of a series of documentary videos about 'Future Cities,' WIRED UK has released a wonderful short doc on Huaqiangbei, the vast market district in Shenzhen, China.
Exiled NSA whistleblower Edward Snowden and legendary hardware hacker Andrew bunnie" Huang have published a paper detailing their new "introspection engine" for the Iphone, an external hardware case that clips over the phone and probes its internal components with a miniature oscilloscope that reads all the radio traffic in and out of the device to see whether malicious software is secretly keeping the radio on after you put it in airplane mode.