The complexity is the attraction - reflections on trying to use crypto


A fiver and some coins on a table.

A few weeks ago, someone wanted to send me some crypto. After spending months studying for a Blockchain exam, I usually avoid such things. But, hey, $20 is $20. So I signed up for a wallet, installed an extension, verified my credentials, saved a seed phrase, and - without too much technical fuss - had some crypto transferred to my account. So far, so good. Compared to a traditional financial institution it had some advantages - there were no KYC checks or ID verification requirements. But…

Continue reading →

The Bite


3D printed jaw with resin scaffolding.

A glistening pool of blood gently wept from the body. Crimson gore sparkled under rapid flash photography as it loosely clung to the wounds. So many wounds. Too many for this to have been an accident. "Bite marks," said the forensics officer. "A lot of bite marks." The detective peered at the ragged corpse. It was barely recognisable as human; just a series of holes where flesh ought to be. "Please tell me a wild animal did this." The forensics officer pointed at a series of incisions…

Continue reading →

Review: dbrand skin for FrameWork laptop


Stickers attacked to the underside of the laptop.

I love putting stickers on my laptops. But when it's time to move to a different laptop, what happens to all those cool stickers? After spending too many nights with a scraper and isopropanol, I decided to get a pre-cut dbrand skin. It'll protect the laptop and it will peel off in one piece, allowing me to preserve all my old stickers. I got the cheapest possible one - it's going to be covered in stickers anyway - which came to US$60 with the deluxe package. Honestly, I wasn't thrilled at the…

Continue reading →

The irony of TicketMaster's breach notification email


What is Ticketmaster doing to protect customers? We have been working with industry-leading cybersecurity experts, the relevant authorities, including law enforcement, as well as credit card companies and banks. No further unauthorised activity has been seen in the cloud database since we began our investigation. We are offering you a free 12-month identity monitoring service with TransUnion. These services will be provided by Cyberscout, a TransUnion company specialising in fraud assistance and remediation services. You can sign up for this service through the following link: https://bit.ly/TU-sign-up What can I do? There is nothing you need to do. However, exposure of personal information can, in some cases, increase the risk of identity theft or fraud, so it’s always a good idea to monitor your bank accounts. If you notice any suspicious activity, contact your bank and/or credit card companies. Be cautious of unsolicited emails from unknown senders, especially those with unusual content, links, attachments, or requests for personal information over the phone. If you have any questions, you can visit https://bit.ly/Ticketmaster-Data-Security-Incident or contact us at ticketmastersupport@ticketmaster.com. Ticketmaster understands the importance of your personal information and we take its protection very seriously. We apologise for having to write to you in these circumstances.

TicketMaster has joined the long list of companies to lose their customers' information. As is common, they sent out an email to warn poor sods like me who might have had our details snaffled. Their email is particularly poor and contains a delightful example of how not to communicate issues like this. See if you can spot it: In the same breath as warning their customers to look out for suspicious links in emails, they include two obfuscated Bit.ly links! Anyone can create a Bit.ly link…

Continue reading →

Book Review: Dystopia X - A.E. Currie


Book cover.

Another one in the Panopticon series. Bouncy sci-fi which scattershoots its plots all over the place. VR, Mission to Mars, evil AI, underwater cities, eyeless technomages - this has it all. It probably has a little too much crammed in. But, hey, it's a great ride. A cliffhanger every other chapter, vaguely plausible science, and mortal danger at every turn. It looked like I was about to be part of my first space battle, and it would be fought with blunt instruments. The series are a great…

Continue reading →

Who can reply?


Who can reply? Choose "Everybody" or "Nobody" Or combine these options: Mentioned users, Followed users.

Vague thoughts as they enter my brainbox. The BlueSky social network has introduced "Reply Gating" - it looks like this: You can write your hot take on Taylor Swift and not be inundated by weirdos replying to you. Nifty! This is nothing new. Twitter has it. Facebook has the concept of "audiences" to restrict who your post is visible to. And, of course, blogging has this! There is a comment form at the bottom of this page - and I moderate it. If you post something stupid, I don't have to…

Continue reading →

Theatre Review: Swan Lake in-the-round


Ballet dancers dressed as swans.

I thought I didn't know Tchaikovsky's Swan Lake. But, like all truly great cultural phenomena, it had disseminated itself through the cultureweb so thoroughly that I felt completely familiar with it. Performed in the round, from our nosebleed seats we had a stunning view of the action. The full floor of the Royal Albert Hall is used - there's so much going on that it become hard to take it all in. The gods'-eye-view makes it feel a little like Virtual Reality - turn your head the wrong way for …

Continue reading →

Mobile Phones of Doctor Who - Season 14


Ruby holding a phone.

Guess who's back, back again! If you're new to the blog series, this is where I attempt to identify all the mobile phones used by The Doctor and their companions. The 2024 series is incredible. Lots of plot, not too much exposition, and a whole bunch of mystery. I love it when Doctor Who goes off in a new direction. Let's take a look at the handsets used in these stories. The Church on Ruby Road First up, bit of a cheeky inclusion, the police officer is packing a TETRA handset - the…

Continue reading →

How to cope with a broken HDMI port during a presentation


Laptop rotated 90 degrees so the screen is on the visualiser and the keyboard is pointing in the air. I'm giving the thumbs up.

Last week, I was part of the BarCamp London Hackathon. It had all the usual ups and downs of a Hackathon - laptops crashing, APIs failing, and HDMI ports breaking. We had a massive projector for participants to show off their work. The HDMI connection was… shit. Sorry, there's no better way to put it. It worked for about 30 seconds and then displayed a green screen. We replaced the HDMI cable. We swapped between a dozen dongles. We tried Linux, Mac, and Windows. In a last ditch attempt at g…

Continue reading →

3D Printing My Teeth


A tiny 3D printed Jaw.

As previously mentioned, I recently had a some dental issues and learned how to view a CT Scan in 3D using Linux. At a hackathon last week, my friend Sidd brought along a 3D printer. How hard is it to convert a CT scan to a file suitable for printing? Slightly trickier than I expected! Most of the guides I found were outdated, or the software didn't work on Linux, or the instructions assumed a level of expertise that I just didn't possess. So here's my simple guide to getting it working. I…

Continue reading →

You can outsource risk, but you can't outsource reputation


Cyber attack hits major London hospitals. ‘Significant impact’ on King’s College Hospital, Guy’s and St Thomas’ and south-east London GP services, say NHS leaders. A cyber attack has crippled three major London hospitals, causing operations, blood tests and transfusions to be delayed for weeks. The National Cyber Security Centre (NCSC) is investigating the source of the ransomware attack, which led to chaos in A&E departments on Tuesday. NHS leaders said there had been a “significant impact” on King’s College Hospital, Guy’s and St Thomas’ and GP services in south-east London. The Telegraph understands that security sources believe the hack to bear the hallmarks of a criminal activity. The attackers behind it are believed to be

Over the last few weeks, I've had several people ask me about the recent hack on the NHS. A ransomware attack has meant that several hospitals have cancelled operations and there is now an urgent demand for blood donors. What does it say about the state of NHS IT that this attack has happened? Nothing. Because the NHS was not hacked. Instead, a company they use to perform blood tests was attacked. Synnovis is the company responsible - they're the ones who have fallen prey to an attacker.…

Continue reading →

Drawing PPM images on the Tildagon in MicroPython


Various circuit boards showing images.

The Tildagon has 2MB of RAM. That's not enough to do... well, most things you'd want to do with a computer! There's not much processing power, so running complex image decoding algorithms might be a bit beyond it. Is there a simple image format which can be parsed and displayed? Yes! The ancient Portable PixMap (PPM) format. The standard is beautiful in its simplicity. Here's the header: P6 # Created by GIMP version 2.10.38 PNM plug-in 120 120 255 ���t�{... The P6 identifies it as a PPM…

Continue reading →