By Andy Orin
Microsoft has released a new version of Outlook for Mac, available to Office 365 subscribers, with a refined interface and better push email support. Read more on …
In the early days of espionage, long before the advent of burner phones, satcoms, and other modern-day spy gadgets, getting word to field agents—especially those working behind the Iron Curtain—proved a dangerous game with global consequences should the agent’s cover be blown. But that’s where number stations, and their uncrackable radio codes, come in.
It was a longshot, a dream, a Google Doc-enabled fantasy. In the end, 82 people used an online spreadsheet to pledge over $122,000 for a ghost town, but alas, it was not enough. Some lucky buyer (I assume it was one person) snatched up all 62 acres of Johnsonville, Connecticut for $1.9 million.
Has anyone ever put on a bandage and had it perfectly match their skin color? No, not even close. That’s why printing bandages with fun or stylish designs makes a lot more sense. Or, if you’re feeling macabre, you can …
By Ethan Zonca
[Paul] designed a new open-hardware RNG (random number generator) that includes two sources of entropy in a small package. The first source of entropy is a typical avalanche diode circuit, which is formed by a pair of transistors. This circuit creates high-speed random pulses which are sampled by the onboard microcontroller.
What makes this design unique is a second entropy source: a CC2531 RF receiver. The RF receiver continuously skips around channels in the 2.5Ghz band and measures the RF signal level. The least-significant bit of the signal level is captured and used as a source of entropy. The firmware can be configured to use either source of entropy individually, or to combine both. The firmware also supports optionally whitening the entropy byte stream, which evens out the number of 1′s and 0′s without reducing entropy.
The OneRNG uses the USB-CDC profile, so it shows up as a virtual serial port in most modern operating systems. With the rngd daemon and a bit of configuration, the OneRNG can feed the system entropy source in Linux. [Paul] also has a good writeup about the
Via: Hack a Day
By Sarah Petkus
Reprogramming the behaviors of a person-sized animatronic dinosaur would have to be among the coolest opportunities to be presented with… This is exactly what [Dr. Lucy Rogers] and a group of fellow techies were tasked to accomplish for the Blackgang Chine park located on the Isle of Wight in the UK.
Before the group arrived, the native dinos didn’t do much else than run a preprogrammed routine when triggered by someone’s presence… which needless to say, lacks the appropriate prehistoric dynamism. Seeing that their dated wag, wiggle, and roar response could use a fresh breath of flair, the park’s technical projects coordinator [Mark Butler] began adapting one of the dinosaur’s control boxes to work with a Raspberry Pi. This is when [Lucy] and her group were called upon for a two-day long excursion of play and development. With help and guidance from Raspberry Pi expert, [Neil Ford], the group learned how to use a ‘drag and build’ programing environment called node-RED in order to choreograph new movement sequences for two of the smaller dinosaurs provided for use. The visual nature of node-RED helped those of the Blackgang staff with little programming experience understand the code at work, which aided in their training. Now they can reprogram the dinosaurs with new actions on the fly if needed.
The Pi in the end turned out to be a cost-effective solution which will give the robot dinosaurs a longer, more fulfilling lifespan to roar and folic on their island home. Check out this video by [Debbie Davies] to see more…
Thanks Ed, for spotting this one!
Via: Hack a Day
A few weeks ago, Anonabox, the ill-conceived router with custom firmware that would protect you from ‘hackers’ and ‘legitimate governments’ drew the ire of tech media. It was discovered that this was simply an off-the-shelf router with an installation of OpenWrt, and the single common thread in the controversy was that, ‘anyone can build that. This guy isn’t doing anything new.’
Finally, someone who didn’t have the terrible idea of grabbing another off the shelf router and putting it up on Kickstarter is doing just that. [Adam] didn’t like the shortcomings of the Anonabox and looked at the best practices of staying anonymous online. He created a Tor dongle in response to this with a Beaglebone Black.
Instead of using wireless like the Anonabox and dozens of other projects, [Andy] is using the Beaglebone as a dongle/Ethernet adapter with all data passed to the computer through the USB port. No, it doesn’t protect your entire network; only a single device and only when it’s plugged in.
The installation process is as simple as installing all the relevent software, uninstalling all the cruft, and configuring a browser. [Adam] was able to get 7Mb/sec down and 250kb/sec up through his Tor-ified Ethernet adapter while only using 40% of the BBB’s CPU.
Via: Hack a Day
By Chris Mills
The latest things to dance out of Samsung’s hyperactive R&D department are the A5 and A3, a pair of all-metal, super-thin phones aimed at teenagers. However, they’re also “optimized for social networking” and feature a “5MP Camera For Unmatched Selfies”, which probably mean that they’ll be shit.