The Chaos Communication Camp is an international, five-day open-air event for hackers and associated life-forms. It provides a relaxed atmosphere for free exchange of technical, social, and political ideas. The Camp has everything you need: power, internet, food and fun. Bring your tent and participate!CCCamp 2019 Wiki
It has been 2005 that I had the time and chance to attend an international open-air meeting of normal people. Of course I am talking about the 2005 What-the-hack I wrote about back then.
This year it’s time again for the Chaos Communication Camp in Germany. Sadly still I won’t be attending. Clearly that needs to change with one of the next iterations. With the CCC events becoming highly valuable also for families maybe it’s a chance in the future to meet up with old and valued friends (wink-wink Andreas Heil).
The Chaos Communication Camp (also known as CCCamp) is an international meeting of hackers that takes place every four years, organized by the Chaos Computer Club (CCC). So far all CCCamps have been held near Berlin, Germany.
The camp is an event for providing information about technical and societal issues, such as privacy, freedom of information and data security. Hosted speeches are held in big tents and conducted in English as well as German. Each participant may pitch a tent and connect to a fast internet connection and power.
Enjoy the intro-movie that has just been made available to us, alongside the whole design material:
The Android tablets I am using for my kitchen scale display and for myfitnesspal data-entry are aging quite bad and apart from the near-display death of one of the tablets both are not supported and updated anymore.
Using them therefore poses an increasing risk. After one of them almost died on me I was determined to replace them both. Looking at alternatives at the lowest possible price quickly showed that I am not going to get another Android tablet.
Instead I was ready to give a chinese company a chance:
I ordered it on 24th of June and it was delivered today. All in all I’ve paid 136 Euro for the tablet and 45 Euro for the keyboard attachement.
Despite the ridiculously low price this thing is quite impressive. It’s sporting a fast-enough Intel Atom processor with 1.4 ghz and 4 Gbyte of RAM. The 64 Gb of solid-state storage where quickly upgraded by an additional 400 Gb MicroSD card for local data storage.
As of writing this it’s still installing and updating the Windows 10 to 1903 but so far I am beyond impressed.
I’ll write more about the device when I’ve had more time to use it. One word for the keyboard attachement: the keyboard is good-enough. Not great but better than for example that on the Pinebook. The touchpad is very small but works – the thing has a Touchscreen anyway.
For big parts of my VPN needs I use OpenVPN. Especially on iOS devices the deep integration just works. Even to a degree that you enable the VPN once and the device will transparently keep it up / reestablish connections when required.
OpenVPN protocol has emerged to establish itself as a de- facto standard in the open source networking space with over 50 million downloads. OpenVPN is entirely a community-supported OSS project which uses the GPL license.VISIT THE OPENVPN COMMUNITY
I am using the dockerized version of OpenVPN. From there I’ve got several ways to get telemetry data (like connections, traffic, …) out of it. One way is the management interface provided by OpenVPN. Another way is by using the default openvpn-status.log file.
Since the easiest way out-of-the-box was to use the logfile I sat down and wrote a little 2mqtt bridge for the contents of the logfile.
It’s also dockerized so you can easily set it up by pointing the openvpn-status.log to the right volume/mount-point.
When done it’ll produce MQTT messages like this:
The set-up and start-up is rather simple:
docker run -d --restart=always --volume /openvpnstatus2mqttconfiglocation/:/configuration --volume /openvpnstatusloglocation/:/openvpn openvpn-status2mqtt
MQTT Broker, Topic-Prefix and so on are configured with the .json configuration file found along the project.
Of course everything I wrote is available on GitHub as open-source.
The immediate outcome of this is that with the always-on VPN I am now getting statistics about, for example, the data consumption of my iPhone.
The big traffic spike at 1 AM is the backup that my iPhone does every night. Very interesting also how often the connection is closed and opened again even without me using the phone…
Archive.org is the place to find out about our common internet past. It’s the another project, besides Wikipedia and …, that started it’s life with a bold claim it so far holds true to:
The Internet Archive, a 501(c)(3) non-profit, is building a digital library of Internet sites and other cultural artifacts in digital form. Like a paper library, we provide free access to researchers, historians, scholars, the print disabled, and the general public. Our mission is to provide Universal Access to All Knowledge.Internet Archive: About IA
And when you freely roam around the archive you will find many gems, like this one:
Another recommendation / starting point on the archive would be Computer Chronicles:
There’s countless hours of material to dig into and be amazed!
How to build security into your software? It’s always simple to find examples where things gone wrong. Where security was compromised and things did not work out as the software authors envisioned.
As always there are new concepts and operating systems being implemented.
A particularly interesting example of security software design can be observed here:
In contrast to prior Google-developed operating systems such as Chrome OS and Android, which are based on the Linux kernel, Fuchsia is based on a new microkernel called Zircon. The name Zircon refers to the mineral of the same name.Google Fuchsia
So you now know what Fuchsia is. Now on to the actual example. For this we have to take a look into the developer documentation of Zircon:
So this describes a method to get random numbers from the systems cryptocraphically-secure-random-number-generator (CPRNG). It takes a pointer to a memory location as a parameter.
Now. What’s secure about that? It’s the behaviour of the method when it is encountering an unsecure situation:
It’ll kill the calling process when the pointer is not valid.
When you walk around in Tokyo you will find that many buildings have red-triangle markings on some of the windows / panels on the outside.
I noticed them as well but I could not think of an explanation. Digging for information brought up this:
Panels to fire access openings shall be indicated with either a red or orange triangle of equal sides (minimum 150mm on each side), which can be upright or inverted, on the external side of the wall and with the wordings “Firefighting Access – Do Not Obstruct” of at least 25mm height on the internal side.Singapore Firefighting Guide 2018
The red triangles on the buildings/hotel windows in Japan are the rescue paths to be used in case of fire. All fire fighters know the meaning of this red triangle on the windows. Red in color makes it prominent, to be located easily by the fire fighters in case of a fire incident. During a fire incident, windows are generally broken to allow for smoke and other gases to come out of the building.Triangles in Japan
“The only thing we can say is that data show a number of people rent cars without driving them.”Growing number of car-sharing users don’t rent cars for driving
“Usually the only place I can take a nap while visiting my clients is a cybercafe in front of the station, but renting a car to sleep in is just a few hundred yen (several dollars), almost the same as staying in the cybercafe.”Growing number of car-sharing users don’t rent cars for driving
Hmm… I’ve set-up a script to automatically download a TV show about a year ago and just remembered it…
Apparently 1 year of this show is 167 Gbyte…
For completeness the download script – ignore my bad scripting:
#!/bin/bash # parameter 1: month # parameter 2: from day # parameter 3: to day # parameter 4: year # data -dmonday +%d next_monday=$(date -dmonday +%d) next_monday_month=$(date -dmonday +%m) next_monday_year=$(date -dmonday +%y) previous_monday=$(date -d'monday-7 days' +%d) previous_monday_month=$(date -d'monday-7 days' +%m) previous_monday_year=$(date -d'monday-7 days' +%y) next_friday=$(date -dfriday +%d) next_friday_month=$(date -dfriday +%m) next_friday_year=$(date -dfriday +%y) previous_friday=$(date -d'friday-7 days' +%d) previous_friday_month=$(date -d'friday-7 days' +%m) previous_friday_year=$(date -d'friday-7 days' +%y) for i in `seq 1 7`; do day=$(date -d'today+'$i' days' +%d) month=$(date -d'today+'$i' days' +%m) year=$(date -d'today+'$i' days' +%y) wget -c "https://rodlzdf-a.akamaihd.net/none/zdf/"$year"/"$month"/"$year$month$day"_sendung_dku/1/"$year$month$day"_sendung_dku_3328k_p36v14.mp4" done
Picture yourself in this situation. You connect to a network and nothing works. Except for this:
It is quite common to have DNS working in networks while everything else is not. Sometimes the network requires a log-in to give you access to a small portion of the internet.
Now, with the help of a tool called iodine, you can get access to the full internet with only DNS working in your current network:
iodine lets you tunnel IPv4 data through a DNS server. This can be usable in different situations where internet access is firewalled, but DNS queries are allowed.
It runs on Linux, Mac OS X, FreeBSD, NetBSD, OpenBSD and Windows and needs a TUN/TAP device. The bandwidth is asymmetrical with limited upstream and up to 1 Mbit/s downstream.iodine
Setting it up is a bit of work but given that you are anyway having access to a well connected server on the free portion of the internet it can be easily done.
Of course the source is on github.
Imagine you’ve got this ancient piece of technology in front of you. You clearly understand how the hardware works and you are even able to emulate the hardware on your modern-world computer.
Unfortunately hardware is only one half of the story. Software is the other half. And software at this time of the past was burned into chips which do not easily give their secret software away.
But let’s start with the hardware:
The IBM 5100 Portable Computer is a portable computer (one of the first) introduced in September 1975, six years before the IBM Personal Computer. It was the evolution of a prototype called the SCAMP (Special Computer APL Machine Portable) that was developed at the IBM Palo Alto Scientific Center in 1973. In January 1978, IBM announced the IBM 5110, its larger cousin, and in February 1980 IBM announced the IBM 5120. The 5100 was withdrawn in March 1982.
When the IBM PC was introduced in 1981, it was originally designated as the IBM 5150, putting it in the “5100” series, though its architecture was not directly descended from the IBM 5100.
And now on to the software:
The IBM 5100 portable computer came with some of its built-in programs stored in a read-only memory called the “non-executable ROS”. (ROS = “read-only storage”.) In contrast with the “executable ROS”, which supplies instructions to the 5100’s processor directly, the non-executable ROS is accessed using sequential I/O operations, a bit like a tape.
Most notably, the non-executable ROS holds the interactive interpreters for the APL and BASIC programming languages. These are not “native” 5100 programs but were expressed instead in System/370 mainframe and System/3 minicomputer machine code respectively. The 5100 runs emulator programs for those computers in order to host the interpreters, so perhaps it’s just as well that the non-executable ROS is non-executable.DATA
So this write-up is all about how the bits where pushed to the screen and recorded as pictures of the said screen. The characters in these pictures then where analyzed and with the help of machine learning the data could be successfully extracted. It is mind-boggling. And it is all on Github.
The middle day of the year. Use only middle names, stay to the middle of the road, pat or rub your or someone else’s middle (this is a great day to apply to join The Order of the Holy Chao Belly Rubbers). Point to things with your middle finger. Visit a middle school and talk about the good old days of the Middle Ages. (If you want to get technical, on Leap Year this day would run from noon of July 2 to noon of July 3, but you don’t have to get that anal unless you really want to).Mid Year’s Day
Seemingly short-message services are becoming the standard mode of communication for the powerful and rich. It seems that especially Twitter is capable of bringing the worst in those among us to the outside.
Of course the most controversial statements are being washed away by the sheer throughput. The next one always comes up quicker than you expect.
Helping the masses to keep track is a main task of journalism. That being said traditional journalism (as in newspapers, television) sees great difficulties to keep track as well. Too much, too quick.
So new forms of journalism develop. Often more tendentious then helpful for the cause so they require the cautious mind of the reader to add some more perspective.
Editor’s note: others have done great work exposing Musk’s shameless charlatan carnival barking. If you enjoy this sort of thing, I highly recommend Niya White’s excellent article Musk Misses: The Stories You Don’t Hear About Tesla Anymore …
There are lists of things all over the internet. I’ve linked to some of these food related lists and maps already on this blog.
And of course there’s this list of craft beer breweries missing:
A microbrewery or craft brewery is a brewery that produces small amounts of beer, typically much smaller than large-scale corporate breweries, and is independently owned. Such breweries are generally characterized by their emphasis on quality, flavor and brewing technique.Wikipedia
If there is any discussion or argument about electric mobility these days the topic of range and battery-aging is coming up rather quick.
Every once in a while you also hear these awesome stories about electric cars achieving total-driven-distances outrageously huge compared to combustion engine cars…
But what is it then, how does a battery in an electric car age over time and mileage? Given that car manufacturers seem to settle on a ca. 150.000km total-driven-miles baseline for giving a battery-capacity percentage guarantee. Something like…
The future owners of ID. models won’t need to worry about the durability of their batteries either, as Volkswagen will guarantee that the batteries will retain at least 70 per cent of their usable capacity even after eight years or 160,000 kilometres.Volkswagen Newsroom
Model S and Model X – 8 years (with the exception of the original 60 kWh battery manufactured before 2015, which is covered for a period of 8 years or 125,000 miles, whichever comes first).
Model 3 – 8 years or 100,000 miles, whichever comes first, with minimum 70% retention of Battery capacity over the warranty period.
Model 3 with Long-Range Battery – 8 years or 120,000 miles, whichever comes first, with minimum 70% retention of Battery capacity over the warranty period.Tesla
So. Guarantees are one thing. Reality another. There’s an interesting user-driven survey set-up where Tesla owners can hand in their cars data thus participate in the survey.
And it yields results (getting updated as you read…):
In a nutshell: It seems there is a good chance that your Tesla car might have an above 90% original-specified-battery-capacity after the guaranteed 100.000 miles and even after 150.000 miles (241.000km)…
Good news that is! Given that the average household will do about or less than 20.000 km/year it would mean over 12 years of use and the car still would hold 90% of battery charge. The battery being the most expensive single component on an electric car this is extremely good news as it’s unlikely that the battery will be the reason for the car to be scraped after this mileage.
tr -cd '0-9A_Za-z_-' < /dev/urandom|more
Thank you Joel for bringing it up!
“We show that tilting one’s head downward systematically changes the way the face is perceived, such that a neutral face—a face with no muscle movement or facial expression—appears to be more dominant when the head is tilted down,” explain researchers Zachary Witkower and Jessica Tracy of the University of British Columbia.A Facial-Action Imposter
A very nice use of 3D printing technology: Print your own set of “Settlers of Catan” board game!
This is my new low-poly settlers of catan-style boardgame. Especially made for multicolor printers like the prusa mk2 multimaterial upgrade ore the palette from mosaic.https://www.thingiverse.com/thing:2525047
The 27th Day of the Season of Confusion: The Day of the Sloth, Holy Day of Slothage. Kick back. Hang around. Grow Moss.
Recognize and credit your imaginary friend, whom you blame for everything on all the other days of the year. Or help someone anonymously, but in a way they’d never expect. (“Captain Tuttle” was the made-up buddy of Benjamin Franklin “Hawkeye” Pierce and “Trapper John” McIntire on the TV show M*A*S*H. They used the mythical captain’s identity to get supplies and funds from the U. S. Military which were then sent to help an orphanage).Imaginary Friend Day
TOKYO — Japan’s government will allow NTT Docomo and its three major mobile rivals to set up 5G base stations on traffic signals, hoping to reduce the cost and time it takes to roll out the ultrafast networks by taking advantage of the nation’s high density of traffic lights.Nikkei
Interesting. It seems that there is another way of doing things when you want to see success. Japan always seems very determined when the decision has been made to adopt something. In the curious case of the mobile communication standard 5G they have chosen a different way over countries like Germany.
Last year when I had asked for a new mobile plan here in Germany and I expressed my surprise about the enormous prices for just data quota I was told “That’s because we had to bid on the frequencies and that was soooo expensive that now we cannot offer the service cheaper”.
drop in replacement for tail -F that asks you if you are still watching
Just like Laura I am also was having a moment when I stumbled across tailflix.
For those not understanding the reference: At the end of an episode you’ve watched on Netflix you will be shown another one, and so on, and so on. Until if you have not touched the remote at all for several episodes Netflix will ask you “Are you still watching?”.
The Jupyter Notebook is an open-source web application that allows you to create and share documents that contain live code, equations, visualizations and narrative text. Uses include: data cleaning and transformation, numerical simulation, statistical modeling, data visualization, machine learning, and much more.
Voila serves live Jupyter notebook including Jupyter interactive widgets.
Unlike the usual HTML-converted notebooks, each user connecting to the Voila tornado application gets a dedicated Jupyter kernel which can execute the callbacks to changes in Jupyter interactive widgets.https://github.com/QuantStack/voila
I am a happy user of the Apple Watch and iPhones in general. It’s working out great for me so far.
There are a couple of features that I would wish where there. And simple things like an hour-chime or hour/half-hour tap are frequently included into the WatchOS updates.
But some of the more specific features just won’t materialize on Apple Watch.
Think of this: You are doing your thing, you know, being a productive member of the society. And apart from the information “What’s next” the information of “When’s next and how long until then” is equally important.
I already had all information – like upcoming events – in my calendar. Why not have the watch display directly on the watch face how long I’ve got until then?!
You’re downloading it on your iPhone and when opened up first it will show you a list of your calendars.
You can turn on/off any of them in this app and by doing so you are selecting which of the calendars will be included in the calculation “how long until the next meeting”.
I’ve only selected one calendar which holds those appointments that I need to know how long until then. So it’s not the next work meeting. It’s important things.
On the watch, however many calendars you’ve selected, it will show you something like this:
So in this case it’ll show the hours until I have to wake-up. Whatever I put into this calendar will show up there. If I want with the name of the event, but most commonly I am using the bottom right version: just the hours/minutes until.
Unfortunately Rachel is quite busy and so there’s no update for the app to also support the new Modular Infograph complications of WatchOS 5 and up.
If you don’t know how those look like, here is a picture I’ve put together from Apples developer documentation:
So I am thinking to rewrite the app and include the new complications. In fact: I’ve implemented my “Discordian Calendar Apple Watch Complication” app as a test and exercise to learn how I would be able to rewrite “Time Till”.
Now the only thing I need is to be kissed by the muse that fuels the urge to just get it done :-).
Addresses in Japan are fascinating. There’s a system to it, with lots of exceptions and special cases. And just recently there was an announcement about the city I am technically considering home-base when in Japan: Kawasaki (川崎).
As you see in the title of this post there’s a kanji character missing:
川崎 means “Kawasaki” – just the name itself, like used on signs and such.
川崎市 means “Kawasaki-shi” – the name got extended by -shi which in itself will signal that the name before is a city.
And then there is this other kanji in the title: 区. It is spoken as “ku” and basically means “ward”. It’s a bigger city broken down into separate wards.
Not all cities in Japan are required to differentiate into wards – just the ones considered big enough. Kawasaki was considered big enough by 1972 to name out it’s wards.
And so its the Nakahara-ward (中原区) I am usually staying to be more specific on the Kawasaki-home-base-statement at the beginning of this post.
And the designated cities are somehow ranked according to their population. The news here is that apparently given the 2019 population numbers Kawasaki has improved it’s position among all big designated cities by one rank:
Some more details then to the japanese addressing system:
Japanese addresses begin with the largest division of the country, the prefecture. Most of these are called ken (県), but there are also three other special prefecture designations: to (都) for Tokyo, dō (道) for Hokkaidō and fu (府) for the two urban prefectures of Osaka and Kyoto.
Following the prefecture is the municipality. For a large municipality this is the city (shi, 市). Cities with a large enough population, called designated cities, can be further broken down into wards (ku, 区). (In the prefecture of Tokyo, the designation special ward or tokubetsu-ku, 特別区, is also used for municipalities within the former city of Tokyo.) For smaller municipalities, the address includes the district (gun, 郡) followed by the town (chō or machi, 町) or village(mura or son, 村). In Japan, a city is separate from districts, which contain towns and villages.Japanese addressing system
So let’s make an example, since it’s always great fun for me to figure out the address again when I try to order the SIM card to the hotel address. A good example would be a randomly selected and nice hotel in Nakahara-ku:
The typical english-language online order form / address entry form for shipping SIM cards to hotels gives you this interface:
Ha! Now that’s a challenge, right? At first glance its not obvious but if you take a look at the structure of the address it opens up:
And so, this will reach it’s destination:
Our deep learning engineers at Dessa built a model to replicate Joe Rogan’s voice to showcase current AI techniques. To understand how we developed the technology and to discuss the ethical implications of this work, read our announcement article.fakejoerogan.com
They’ve got 8 example sound snippets and it’s up to you to identify the fake or the real file:
As tools get better artists really polish out what technology enables them to do with computers nowadays.
This eye above made me awww. It’s from a user “ChrisJones” in the Blender Forum who posted his progress on modelling a human head in upmost detail.
Go there and be awwd as well. And while you’re there grab a copy of Blender and give it a go.
We are using computers every day and we are doing this in many different environments. Some of us give their desk space and work environment some more thoughts.
If you want some inspiration regarding your desk and work space, take a look at this great Twitter Hashtag: #絵描きさんの作業環境が見たい
It means “I want to see artists’ work environments” and is used for some years now for japanese artists to post pictures of their work environments…
I also had posted mine, yet not being an artist.