Following the people and events that make up the research community at Duke

Students exploring the Innovation Co-Lab

Category: Computers/Technology Page 1 of 18

Origami Robots: How Technology Moves at the Micro Level

Sticky post

Imagine a robot small enough to fit on a U.S. penny. Or even small enough to rest on Lincoln’s chest. It sounds preposterous enough. Now, imagine a robot small enough to rest on the chest of Lincoln – not the Lincoln whose head decorates the front side of the penny, but the even tinier version of him on the back. 

Before it was changed to a Union Shield, the tail side of pennies contained the Lincoln Memorial, including a miniscule representation of the seated Lincoln statue that rests inside. Barely visible to the naked eye, this miniature Lincoln is on the order of a few hundred micrometers wide. As incredible as it sounds, this is the scale of robots being built by Professor Itai Cohen and his lab at Cornell University. On February 22, Cohen shared several of his lab’s cutting-edge technologies with an audience in Duke’s Schiciano Auditorium. 

Dr. Itai Cohen from Cornell University begins his presentation by demonstrating the scale of the microrobots being developed by his lab.

To begin, Cohen describes the challenge of building robots as consisting of two distinct parts: the brain of the robot, and the brawn. The brain refers to the microchip, and the brawn refers to the “legs,” or actuating limbs of the robot. Between these two, the brain – believe it or not – is the easy part. As Cohen explains, “fifty years of Moore’s Law has solved this problem.” (In 1965, Gordon Moore theorized that roughly every two years, the number of transistors able to fit on microchips will double, suggesting that computational progress will become exponentially more efficient over time.) We now possess the ability to create ridiculously small microcircuits that fit on the footprint of a few micrometers. The brawn, on the other hand, is a major challenge. 

This is where Cohen and his lab come in. Their idea was to use standard fabrication tools used by the semiconductor industry to build the chips, and then build the robot around the chip by folding the robot into the 3D shape they desired. Think origami, but at the microscopic scale. 

Like any good origami artist, the researchers at the Cohen lab recognized that it all starts with the paper. Using the unique tools at the Cornell Nanoscale Facility, the Cohen team created the world’s thinnest paper, including one made out of a single sheet of graphene. To clarify, that’s a single atom thickness.

Next, it came to the folding.  As Cohen describes, there’s really two main options. The first is to shrink down the origami artist to the microscopic level. He concedes that science doesn’t know how to do that quite yet. Alas, the second strategy is to have the paper fold itself. (I will admit that as an uneducated listener, option number two sounds about as absurd as the first one.) Regardless, this turns out to be the more reasonable option.

Countless different iterations of microrobots can be fabricated using the origami folding technique.

The basic process works like this: a seven nanometer thick platinum layer is coated on one side with an inert material. When put in a solution and voltage applied, ions that are dissociated in the solvent will absorb onto the platinum surface. When this happens, a stress is created that bends the device. Reversing the voltage drives away the ions and unbends the device. Applying stiff elements to certain regions restricts the bending to occur only in desired locations. Devices about the thickness of a hair diameter can be created (folded and unfolded) using this method. 

This microscopic origami duck developed by the Cohen Lab graced the covered of Science Robotics in March 2021.

As incredible as this is, there is still one defect: it requires a wire to an external power source that attaches onto the device. To solve this problem, the Cohen lab uses photovoltaics (mini solar panels) that attach directly onto the device itself. When light is shined on the photovoltaic (via sunlight or lasers), it moves the limb. With this advance and some continuous tweaking, the Cohen lab was able to develop the world’s smallest walking robot. 

At just 40 microns by 70 microns by 2 microns thick, the smallest walking microrobot in the world is able to fold itself up and walk off the page.

The Cohen Lab also achieved “BroBot” – a microrobot that “flexes his muscles” when light is shined on the front photovoltaics and truly “looks like he belongs on a beach somewhere.”

The “BroBot,” complete with “chest hair,” was one of the earlier versions of the robot that eventually was refined into the world record-winning microrobot.

The Cohen Lab successfully eliminated the need for any external wire, but there was still more left to be desired. These robots, including “BroBot” and the Guinness World Record-winning microrobot, still required lasers to activate the limbs. In this sense, as Cohen explains, the robots were “still just marionettes” being controlled by “strings” in the form of laser pulses.

To go beyond this, the Cohen Lab began working with a commercial foundry, X-Fab, to create microchips that would act as a brain that could coordinate the limb movements. In this way, the robots would be able to move on their own, without using lasers pointed at specific photovoltaics. Cohen describes this moment as “cutting the strings on the marionette, and bringing Pinocchio to life.”

This is the final key step in the development of Ant Bot: a microrobot that moves all on its own. It uses a hexapod gate, meaning a tripod on each side. All that has to be done is placing the robot in sunlight, and the brain does the rest of the coordination.

“Ant Bot,” one of the most advanced of all microrobots to come out of the Cohen Lab, is able to move autonomously, without the aid of lasers.

The potential for these kinds of microrobots is nearly limitless. As Cohen emphasizes, the application for robots at the microscale is “basically anything you can imagine doing at the macroscale.” Cleaning surfaces, transporting cargo, building components. Perhaps conducting microsurgeries, or exploring new worlds that appear inaccessible. One particularly promising application is a robot that mimics that movement of cilia – the microscopic cellular hair responsible for countless locomotion and sensory functions in the body. A cilia-covered chip could become the basis of new portable diagnostic devices, enabling field testing that would be much easier, cheaper, and more efficient.

The researchers at the Cohen Lab envision a possible future where microscopic robots are used in swarms to restructure blood vessels, or probe large swathes of the human brain in a new form of healthcare based on quantum materials. 

Until now, few would have imagined that the ancient art of origami would predict and enable technology that could transform the future of medicine and accelerate the exploration of the universe.

Post by Kyla Hunter, Class of ’23

How Concerned Should You Be About AirTags?

Photograph of an AirTag from Wikimedia Commons. Image licensed under Creative Commons Attribution-Share Alike 4.0 International. Creator: KKPCW.

I didn’t even know what an AirTag was until I attended a cybersecurity talk by Nick Tripp, senior manager of Duke’s IT Security Office, but according to Tripp, AirTag technology is “something that the entire Duke community probably needs to be aware of.”

An AirTag is a small tracking device that can connect to any nearby Apple device using Bluetooth. AirTags were released by Apple in April 2021 and are designed to help users keep track of items like keys and luggage. Tripp himself has one attached to his keys. If he loses them, he can open the “Find My” app on his phone (installed by default on Apple devices), and if anyone else with an Apple device has been near his keys since he lost them, the Bluetooth technology will let him see where his keys were when the Apple device user passed them—or took them.

According to Tripp, AirTags have two distinct advantages over earlier tracking devices. First, they use technology that lets the “Find My” app provide “precise location tracking”—within an inch of the AirTag’s location. Second, because AirTags use the existing Apple network, “every iPhone and iPad in the world becomes a listening device.”

You can probably guess where this is going. Unfortunately, the very features that make AirTags so useful for finding lost or stolen items also make them susceptible to abuse. There are numerous reports of AirTags being used to stalk people. Tripp has seen that problem on Duke’s campus, too. He gives the example of someone going to a bar and later finding an AirTag in their bag or jacket without knowing who put it there. The IT Security Office at Duke sees about 2-3 suspected cyberstalking incidents per month, with 1-2 confirmed each year. Cyberstalking, Tripp emphasizes, isn’t confined to the internet. It “straddles the internet and the real world.” Not all of the cyberstalking reports Duke deals with involve tracking devices, but “the availability of low-cost tracking technology” is a concern. In the wrong hands, AirTags can enable dangerous stalking behavior.

As part of his IT security work, and with his wife’s permission, Tripp dropped an AirTag into his wife’s bag to better understand the potential for nefarious use of AirTags by attackers. Concerningly, he found that he was able to track her movement using the app on his phone—not constantly, but about every five minutes, and if a criminal is trying to stalk someone, knowing their location every five minutes is more than enough.

Fortunately, Apple has created certain safety features to help prevent the malicious use of AirTags. For instance, if someone has been near the same AirTag for several hours (such as Tripp’s wife while there was an AirTag in her bag), they’ll get a pop-up notification on their phone after a random period of time between eight and twenty-four hours warning them that “Your current location can be seen by the owner of this AirTag.” Also, an AirTag will start making a particular sound if it has been away from its owner for eight to twenty-four hours. (It will emit a different sound if the owner of the AirTag is nearby and actively trying to find their lost item using their app.) Finally, each AirTag broadcasts a certain Bluetooth signal, a “public key,” associated with the AirTag’s “private key.” To help thwart potential hackers, that public key changes every eight to twenty-four hours. (Are you wondering yet what’s special about the eight-to-twenty-four hour time period? Tripp says it’s meant to be “frequently enough that Apple can give some privacy to the owner of that AirTag” but “infrequently enough that they can establish a pattern of malicious activity.”)

But despite these safety features, a highly motivated criminal could get around them. Tripp and his team built a “DIY Stealth AirTag” in an attempt to anticipate what measures criminals might take to deactivate or counteract Apple’s built-in security features. (Except when he’s presenting to other IT professionals, Tripp makes a point of not revealing the exact process his team used to make their Stealth AirTag. He wants to inform the public about the potential dangers of tracking technology while avoiding giving would-be criminals any ideas.) Tripp’s wife again volunteered to be tracked, this time with a DIY Stealth AirTag that Tripp placed in her car. He found that the modified AirTag effectively and silently tracked his wife’s car. Unlike the original AirTag, their stealthy version could create a map of everywhere his wife had driven, complete with red markers showing the date, time, and coordinates of each location. An AirTag that has been modified by a skilled hacker could let attackers see “not just where a potential victim is going but when they go there and how often.”

“The AirTag cat is out of the bag, so to speak,” Tripp says. He believes Apple should update their AirTag design to make the safety features harder to circumvent. Nonetheless, “it is far more likely that someone will experience abuse of a retail AirTag” than one modified by a hacker to be stealthier. So how can you protect yourself? Tripp has several suggestions.

  1. Know the AirTag beep indicating that an AirTag without its owner is nearby, potentially in your belongings.
  2. If you have an iPhone, watch for AirTag alerts. If you receive a notification warning you about a nearby AirTag, don’t ignore it.
  3. If you have an Android, Tripp recommends installing the “Tracker Detect” app from Apple because unlike iPhone users, Android users don’t get automatic pop-up notifications if an AirTag has been near them for several hours. The “Tracker Detect” Android app isn’t a perfect solution—you still won’t get automatic notifications; you’ll have to manually open the app to check for nearby trackers. But Tripp still considers it worthwhile.
  4. For iPhone users, make sure you have tracking notifications configured in the “Find My” app. You can go into the app and click “Me,” then “Customize Tracking Notifications.” Make sure the app has permission to send you notifications.
  5. Know how to identify an AirTag if you find one. If you find an AirTag that isn’t yours, and you have an iPhone, go into the “Find My” app, click “Items,” and then swipe up until you see the “Identify Found Item” option. That tool lets you scan the AirTag by holding it near your phone. It will then show the AirTag’s serial number and the last four digits of the owner’s phone number, which can be useful for the police. “If I found one,” Tripp says, “I think it’s worth making a police report.”

It’s worth noting that owning an AirTag does not put you at higher risk of stalking or other malicious behavior. The concern, whether or not you personally use AirTags, is that attackers can buy AirTags themselves and use them maliciously. Choosing to use AirTags to keep track of important items, meanwhile, won’t hurt you and may be worth considering, especially if you travel often or are prone to misplacing things. Not all news about AirTags is bad. They’ve helped people recover lost items, from luggage and wallets to photography gear and an electric scooter.

“I actually think this technology is extremely useful,” Tripp says. It’s the potential for abuse by attackers that’s the problem.

Post by Sophie Cox, Class of 2025

“Of Sound Mind”: a Discussion of the Hearing Brain

“To me [this image] captures the wonder, the awe, the beauty of sound and the brain that tries to make sense of it,” said professor Nina Kraus, Northwestern University researcher and author of “Of Sound Mind: How Our Brain Constructs a Meaningful Sonic World.”

Stop. What do you hear?

We might not always think about the sounds around us, but our brains are always listening, said Northwestern University professor Nina Kraus.

Kraus, auditory researcher and author of “Of Sound Mind: How Our Brain Constructs a Meaningful Sonic World,” spoke via Zoom to a Duke audience in October. She has published more than four hundred papers on the auditory system in humans and other animals and how it’s affected by conditions like autism, aging, and concussion. She discussed some of her findings and how “the sound mind” affects us in our day-to-day lives.

One of the slides from Kraus’s presentation. We can think of sound as having many “ingredients.”

“I think of the sound mind as encompassing how we think, how we move, how we sense, and how we feel,” Kraus said. We live in a “visually dominated world,” but for hearing people, sound plays an important role in language, music, rhythm, and how we perceive the world.

One of the slides from Kraus’s presentation. The human auditory system involves not just the ears but also several regions of the brain. The “hearing brain” engages movement, cognition, and emotions along with interpreting direct sensory input from all senses.

Kraus discussed the auditory system and how much of what we think of as hearing takes place in the brain. We can think of sound as signals outside the head and electricity as signals inside the head (neural processing). When those two merge, learning occurs, and we can make sound-to-meaning connections.

Another slide from Kraus’s presentation. In an experiment, teaching rabbits to associate a sound with meaning (in this case, more carrots) changed patterns of neuron firing in the auditory cortex, even in individual neurons. “Same sound, same neuron, and yet the neuron responded differently… because now there’s a sound-to-meaning connection,” Kraus said.

Despite how sensitive our neurons and brains are to sound, things can get lost in translation. Kraus studies how conditions like concussions and hearing loss can adversely affect auditory processing. Even among healthy brains, we all hear and interpret sounds differently. People have unique “sonic fingerprints” that are relatively stable over time within an individual brain but differ between people. These patterns of sound recognition are apparent when scientists record brain responses to music or other sounds.

“One of the biological measures that we have been using in human and in animal models,” Kraus said, is FFR (frequency following response) to speech. FFR-to-speech can be used to analyze an individual’s auditory processing system. It also allows scientists to convert brain responses back into sound waves. “The sound wave and the brainwave resemble each other, which is just remarkable.”

One of Kraus’s slides. Technology called frequency following response (FFR) can be used to convert brain waves back into original sound (like a song).

This technology helps reveal just how attuned our brains are to sound. When we hear a song, our brain waves respond to everything from the beat to the melody. Those brain waves are so specific to that particular song or sound that when scientists convert the brain waves back into sound, the resulting music is still recognizable.

When scientists try this on people who have experienced a concussion, for instance, the recreated music can sound different or garbled. Experiments that compare healthy and unhealthy brains can help reveal what concussions do to the brain and our ability to interpret sound. But not everything that affects auditory processing is bad.

Musical training is famously good for the brain, and experiments done by Kraus and other scientists support that conclusion. “The musician signature—something that develops over time—” has specific patterns, and it can enhance certain components of auditory processing over time. Making music might also improve language skills. “The music and language signatures really overlap,” Kraus said, “which is why making music is so good for strengthening our sound mind.” Kids who can synchronize to a beat, for example, tend to have better language skills according to some of the experiments Kraus has been involved with.

Musicians are also, on average, better at processing sound in noisy environments. Musicians respond well in quiet and noisy environments. Non-musicians, on the other hand, respond well in quiet environments, but that response “really breaks down” in noisy ones.

Interestingly, “Making music has a lifelong impact. Making music in early life can strengthen the sound mind when one is seventy or eighty years old.”

A slide from Kraus’s presentation. Musicians tend to be better at processing sounds in noisy environments.

Exercise, too, can improve auditory processing. “Elite division 1 athletes have especially quiet brains” with less neural noise. That’s a good thing; it lets incoming information “stand out more.”

In experiments, healthy athletes also have a more consistent response over time across multiple trials, especially women.

These benefits aren’t limited to elite athletes, though. According to Kraus, “Being fit and flexible is one of the best things you can do for your brain,” Kraus said.

Kraus and her team have a regularly updated website about their work. For those who want to learn more about their research, they have a short video about their research approach and an online lecture Kraus gave with the Kennedy Center.

Nina Kraus with a piano. “Science is a deeply human endeavor,” she said, “and I think we often forget that. It’s made by people.”
Photo courtesy of Kraus and colleague Jenna Cunningham, Ph.D.
Post by Sophie Cox, Class of 2025

“Brains are Weird… and the World is Difficult”

Institute for Consumer Money Management, and Duke University’s Center for Advanced Hindsight.

Intending to do the right thing doesn’t always lead to actually doing it, a tendency formally known as the “intention-behavior gap.” We can intend to go to bed early and still go to bed late. We can want to exercise and still choose not to. We can recognize the importance of saving extra money and still choose to spend it instead. So why is it so hard to change our behavior? Because, says Jonathan Corbin, Ph.D., “brains are weird” and “the world is difficult.”

Corbin is a senior behavioral researcher at the Center for Advanced Hindsight at Duke University. The Center for Advanced Hindsight recently partnered with NOVA Labs, Thought Cafè, and the Institute for Consumer Money Management to create the NOVA Financial Lab, a group of financial literacy games targeted at adolescents and emerging adults. In each game, players practice managing money while taking care of a pet. You may never have to sneak a cat into a concert or prepare a retirement plan for a dog in real life, but you will need to understand concepts like budgeting, interest, and debt. “What we hope people start to do,” Corbin says, “is really think about, ‘What decisions should I make now to make better decisions later?’”

Essentially, “Money spent now is money that can’t be spent later.” As intuitive as that might seem, “The way we think about money is relative, and it’s not linear.” When you’re already spending thousands of dollars on a car, for instance, an extra five hundred dollars for a feature you may or may not need “feels like a very small amount of money,” but in a different situation, its value can seem higher. How many times, Corbin points out, could you go out to eat with five hundred dollars?

The three games combine financial literacy with behavioral science to explore why people make the decisions they do and how they can start to make better ones.
Source: https://advanced-hindsight.com/wp-content/uploads/2022/03/CAH-NOVA.pdf

There are three games: Shopportunity Cost, Budget Busters, and Exponential Potential. (“One of the people from PBS helped us come up with these cute names,” Corbin says.) They each involve different skills, but they all focus on “financial literacy from a behavioral science perspective.” Players have to contend with both external obstacles and common behavioral biases to make financial decisions for a pet. “I always choose the dog,” Corbin adds, “but I understand other people might choose the cat.” (I chose the cat.)

The first game, Shopportunity Cost, focuses on short-term financial planning. It involves dressing a pet up like a person in order to sneak them into a concert for the night. “You have to make decisions that optimize the pet’s happiness while also being able to make it to the concert and back home,” but you have a limited amount of money to spend. If you spend too much money too soon, you’ll run out, but if you’re too frugal, your pet won’t enjoy the evening. As goofy as the concert scenario is, it introduces players to an important concept known as opportunity cost, which refers to the potential benefits we miss out on when we choose one alternative over another. Say you’re debating between a $50 outfit and a $30 one. The opportunity cost of choosing the more expensive outfit is $20, but shoppers don’t always consider that. “Opportunity cost neglect is the simple idea that when we’re faced with financial decisions, we tend not to consider alternative uses for that money.” Reframing the $30 outfit as “a $30 dress that I’m okay with plus 20 extra dollars” that could be spent elsewhere might lead you to choose the cheaper outfit. Or it might not. “Sometimes you want the $50 outfit, and that’s perfectly fine… but a lot of the time that might not be the right decision.” Like many things, taking opportunity cost into account is a balancing act. “We shouldn’t obsess over every possible opportunity that there is,” Corbin cautions, but “consider[ing] opportunity costs can lead to better financial decisions.”

Budget Busters, meanwhile, involves medium-term planning. Players have to manage checking, credit, and savings accounts while caring for their pet over a six-month period. Along with purchasing essential and non-essential items to attend to their pet’s basic needs and happiness, players have to contend with unforeseen circumstances like medical emergencies. The game introduces people to the 50-30-20 rule, a budgeting concept that involves devoting 50% of income to essentials, 30% to non-essentials, and 20% to savings. Budget Busters also explores the principle of mental accounting, the idea that aside from formal budgets, we have “categories in our head” that change our perception of money. “Let’s say you get birthday money from your relative. That money tends to be a different kind of spending money to you than money you get from your paycheck,” Corbin explains, because “money feels different in different contexts.” 

There are parallels in Budget Busters. Sometimes players receive unexpected windfalls like gifts or prizes. (My cat won $40 for being “Best in Show” at the local pet pageant.) Players get to decide whether to use the extra money on a “fun” item for their pet or put it into savings. Corbin says “gift money” is a classic example of a misleading mental account. “We tend to overspend… because it feels like it’s not even our money in a way.” In reality, though, money has “fungibility,” meaning it’s “exchangeable… across any account.” In other words, “money is money,” regardless of where it comes from.  A $10 bill, for instance, can be exchanged for two fives without changing its value. (Non-fungible tokens, or NFTs, lack this property. “You can’t exchange the picture of a cat you bought from the internet for Chipotle.”) Like Shopportunity Cost, Budget Busters focuses on both traditional financial concepts and common behavioral tendencies that affect decision-making. “None of these things are necessarily bad,” Corbin emphasizes, “but they’re things that one should be aware of… when that natural proclivity may be swaying them in the wrong way.”

Budget Busters, which focuses on monthly budgeting, also encourages players to look closely at discounts when shopping. “Sometimes the discount that looks really good from a  percentage-off perspective isn’t actually the better discount” in terms of overall budgeting and total amount of money saved, Corbin warns.

The last game, Exponential Potential, explores concepts like compound interest, debt, and investment. The premise of the game involves traveling back in time to balance debts and investments. The goal is to make your pet a millionaire. By showing players how investment decisions can affect future net worth, the game seeks to increase understanding of processes involving exponential growth. Exponential Potential introduces the concept of exponential growth bias. According to Corbin,  “We tend to underestimate things that grow exponentially.” He cites the coronavirus pandemic as an example: “Even the people who were making the graphs of Covid’s growth… it’s really hard for them to figure out how to show that to people.” Log-transformed graphs are one option, but they can be deceptive by making the slope look flatter. Similarly, when dealing with exponential growth in the financial world, “People are going to underestimate how badly they’re going to get burned” by debt, but they may also underestimate how much they’ll benefit by saving for retirement.

With compound interest, for instance, “The interest gets applied both to principle and to interest from the last time, and that’s where exponential growth happens.” In the game, players have the opportunity to adjust how much money to put toward paying off debts, investing, and saving for retirement each month. Then they travel decades into the future to see how their decisions have affected their pet’s net worth.  “We’re hoping that that kind of feedback allows you to think through… what you might have done wrong and try to correct,” Corbin says. Once again, though, raw numbers aren’t the only factor at play. “We just want people to understand what the optimal way to do this is, and if there’s a better way for them to do that psychologically, that’s fine.” Debt account aversion, for example, refers to the fact that people want to have fewer debt accounts, meaning they are often eager to pay off accounts in full when they can. Some financial advisers suggest that “because they think it’ll get the ball rolling and you’ll be more likely to pay off the next one.” According to Corbin, there isn’t a lot of evidence for that, and sometimes paying everything off at the outset isn’t ideal. For instance, “It is optimal to start thinking about retirement as soon as you can… but if you’re delaying putting money into retirement because you’re so concerned with your student loan debt,” that can be problematic. Still, Corbin understands the appeal of closing debt accounts. “I am risk-averse, which means if I have a debt I’m probably going to put more money toward that debt that I necessarily should given what the interest rates are and what I could potentially make by investing that money instead.” Financially speaking, “There’s a decent likelihood that I should just pay the minimum on my mortgage… [but] I’ve decided I’m willing to trade off those future gains for the peace of mind that if something goes wrong… I’ll be ahead on my mortgage payment.” Even in Exponential Potential, the right choices aren’t always clear-cut. Corbin describes it as a “sandbox approach” where players are given more opportunity to play around. “This is the trickiest game because there’s no perfect answer for anything,” he says. “Everything has risk.”

Another bias that can affect our financial decisions is known as present bias, the tendency to discount the future in favor of the present. Corbin offers the everyday example of staying up too late. “Nighttime Me wants to stay up and read…. Morning Me is going to be really ticked off at Nighttime Me when they’re exhausted and don’t want to get up.” Research suggests that people can have a harder time identifying with their future selves. That can easily affect our financial decisions, too. “I’m going to let future me worry about that. That guy. Whoever that is.” However, “If you can get people to identify more with that person,” they can sometimes make better decisions. Ultimately, “The game isn’t trying to force people to become investment robots.” We are biased for the present because we live in it, and that’s normal. The purpose of the game is simply “to nudge people… to worry just a little more about the future.”

“Money is basically for safety, security, and happiness,” Corbin says. The ultimate objective is to balance needs, wants, and savings to achieve those three goals both in the present and the future.

By Sophie Cox
By Sophie Cox

Duke First-Year Founds Cryptocurrency Security Startup, Harpie

“Crypto is scaling so quickly but security systems are still the same as they were in 2013.” Those are the words of Daniel Chong, a recent Duke student whose new startup aims to change that.

One of the largest challenges within cryptocurrency is security. The most impactful application of cryptocurrency thus far is decentralized finance (DeFi). DeFi eliminates intermediaries by allowing people and businesses to conduct financial transactions through blockchain technology as opposed to working through banks or other corporations. However, as a result, people are personally responsible for securing their assets. 

Graphic from the Harpie.io Website

When engaging with cryptocurrency people generally use a trading platform and a wallet. Cryptocurrency trading platforms like Coinbase, Binance, and Crypto.com allow people to buy and sell cryptocurrencies using USD or other cryptocurrencies. However, in order to use crypto, one must transfer some of it into a wallet.

As with conventional currency, crypto wallets are not required in order to use cryptocurrency but they allow individuals to store their tokens in one place, easily retrieve them and send it to other individuals or organizations (i.e. buying non-fungible tokens).  Some of the most popular wallets include Coinbase wallet, Metamask, and Electrum. 

Screenshot of a Metamask Wallet

These wallets are not only password-protected but provide each user with a seed phrase or a series of words generated by one’s cryptocurrency wallet. This phrase, like a password, provides access to the crypto associated with that wallet.

An example seed phrase

The catch is, if an individual gets locked out of their wallet and cannot remember or does not have access to their seed phrase, all of their money will be lost. This is a major problem in the space and people have lost millions of dollars to lost seed phrases and inaccessible wallets. In fact, 20% of all existing Bitcoin tokens have been misplaced. 

Furthermore, in the past, it was already hard enough to secure one’s crypto wallets but now people have several wallets, each with their own unique seed phrase and passcodes making it all the more difficult. In the Fall of 2020, Daniel Chong, a Duke first-year at the time, identified this wallet security problem. 

“Crypto is scaling so quickly but security systems are still the same as they were in 2013.”

Daniel Chong

Having grown up in Las Vegas, Chong was used to fast-paced environments and unique challenges. During high school, Chong started coding as a hobby. 

“I just wanted to build something,” he explained

The first project he built was a website for a research paper he had in his high school psychology class. In 2018 Chong was introduced to solidity, a programming language that’s main purpose is to develop smart contracts for the Ethereum blockchain. If you are unfamiliar with blockchain, please refer to my previous article here

Chong matriculated to Duke during a period of transition, the Fall of 2020. As a result of being sent home due to COVID-19 in the Spring and having to shift to online meetings, many on-campus clubs were struggling. Early on Chong met Manmit Singh, a Junior at the time and the President of the Duke Blockchain Lab.

Even though Chong was only a first-year, he had experience coding in solidity and ended up aiding Singh in revamping Duke Blockchain Lab so students could continue engaging with and learning about blockchain despite the pandemic. Additionally, he ran a virtual course on web3 and solidity development for other club members. 

Despite the fact that Chong was attending classes, involved in clubs, and working part-time, he began talking to his brother Noah who was a senior at Georgia Tech about once again, building something. 

After working on building a security solution for crypto wallets for about a year, Chong and his brother received venture capital funding for their startup Harpie: a simple crypto protection plan that scales with you. 

Chong explained that venture capitalists are very excited about crypto right now, especially back in November of 2021 when crypto was in a bull market and bitcoin was at a market high of 60,000. 

Harpie is a web app that allows users to connect all of their wallets to individualized protection plans. This means that if you have a Harpie protection plan and someone hacks your wallet or you get locked out, you can go to the Harpie web app and transfer your funds from the unusable wallet to a new one.

Additionally, users are able to choose the degree of security their Harpie account has. Users can regain access to their fund via email, phone, or (personal recommendation) 2-factor authentication. Ultimately, for $8.99/month you can protect as many wallets, with any sum of funds, as you want.

Why Harpie is a better backup Solution

After working for just over a year, Harpie launched on February 14th, 2022. The next weekend Chong and his brother headed to ETHDenver, the largest Ethereum conference, to promote Harpie and compete in the Hackathon. For those who are unfamiliar, hackathons are competitive, sprint-like events where computer programmers and others are involved in software development work to build something over a condensed period of time. 

Over 10,000 people participated in the ETHDenver hackathon in person and over 30,000 participated virtually for over $1 million in bounties and prizes, as well as up to $2 million in investment capital.

While the teams had 36 hours to build a project, Chong and his brother managed to build there’s in 4-5 hours. They did this by quickly creating a front-runner bot/flash bot to help people avoid getting hacked by detecting and halting transactions to unauthorized addresses.

The brothers not only successfully built the bot but also placed top 10 in the overall hackathon and had the opportunity to present their project.

While presenting, Chong also received questions from Vitalik Buterin, the founder of Ethereum. He explained this as a very “nerve-wracking experience” and added that Buterin asked very technical questions such as what the miners’ extractable value would be.

Chong and his brother (left) onstage with Vitalik Buterin (right) presenting at ETHDenver

In the future, Chong would be open to entering more hackathons but right now is more interested in growing his startup. Currently, Chong is taking time off from school to focus on Harpie and to, ultimately, revolutionize security systems as they relate to online assets.

“Rest easy knowing your crypto is safe.”

Daniel Chong

What’s Up In Space? 3 Experts Weigh In

On Friday, February 25th, 2022 the brand-new Duke Space Diplomacy Lab (SDL) had an exciting launch with its first panel event: hosting journalists Ramin Skibba, Loren Grush, and Jeff Foust for a conversation on challenges in space within the next year. Moderated by Benjamin L. Schmitt of Harvard University, the conversation was in line with the SDL’s goals to convene a multidisciplinary group of individuals for the development of research, policy proposals, and solutions to mitigate risks in space.

In conversation, three key themes arose:

  1. U.S Russia Relations

With the current Russian invasion in Ukraine and the subsequent strain on U.S-Russia relations, the geopolitics of space has been in the limelight. Control of outer space has been a contentious issue for the two countries since the Cold War, out of which an uneasy yet necessary alliance was forged. Faust remarked that he doesn’t see U.S-Russia space relations lasting beyond the end of the International Space Station (ISS) in 2030. Grush added that before then, it will be interesting to see whether U.S-Russia relations will sour in the realm of space, simply because it’s questionable whether the ISS could continue without Russian support. However, Russia and NASA have historically acted symbiotically when it comes to space, and it’s unlikely that either party can afford to break ties.

2. Space debris

Major global players, from the U.S to China to India to Russia, are all guilty of generating space debris. Tons of dead satellites and bits of spacecraft equipment litter the areas around Earth – including an estimated 34,000 pieces of space junk bigger than 10 centimeters – and if this debris hit something, it could be disastrous. Grush paints the picture well by comparing spacecrafts to a car on a road – except we just trust that the satellite will maneuver out of the way in the event of a collision, autonomously, and there are absolutely no rules of the road to regulate movement for any other vehicles.

A computer-generated graphic from NASA showing objects in Earth orbit that are currently being tracked. 95% of the objects in this illustration are orbital debris, i.e., not functional satellites.

Skibba suggests that the best thing to do might be to make sure that more stuff doesn’t enter space, since the invention of technologies to clean up existing space debris will take a while. He also points to efforts to program new spacecrafts with graveyard orbit and deorbit capabilities as a necessary step.

3. Who is in charge of space?

Faust explained that commercial space exploration is moving incredibly fast, and legal regulations are struggling to keep up. Tons of companies are planning to launch mega-constellations in the next few years, for reasons that include things like providing higher-speed Internet access – something that we can all benefit from. Yet with new players in space comes the question of: who is in charge of space? The Artemis Accords are the existing rules that govern space at an international level, but they function as an agreement, not law, and with more players in space comes a need for legally binding terms of conduct. But as Grush puts it, “there’s a tension between the nimble, rapid commercial environment and a regulatory environment that wasn’t quite prepared to respond.”

The eight signees of the Artemis Accords

Beyond who rules over space, there’s also the question of decolonizing space. Skibba brings up that amidst a growing number of mega-constellations of satellites being launched, there are key questions being asked about who has access to space, and how we can level the playing field for more countries and companies to enter space exploration.

Space is uncharted territory, and to understand it is no small feat. While science has come incredibly far in terms of technological capabilities in space, it’s clear that we don’t know what we don’t know. But with a more multilateral, global approach to exploring space, we may just be able to go even farther.

Post by Meghna Datta, Class of 2023

What is The Duke Summer Experiences Database?

Graphics courtesy of Catherine Angst, Director of Communications in the Division of Experiential Education at Duke University.

Pre-pandemic, Duke undergraduates looking for a good summer experience might have seen something good at an in-person fair or maybe heard about an opportunity from a favorite professor. But there was a lot of luck involved.

Now, thanks to the Duke Summer Experiences database, which launched in late January, undergrads can view a variety of summer opportunities in one centralized place. They can search by area of interest, type of program, program cost, year in school, and several other filters.

“Duke Summer Experiences is a resource for all of Duke,” says Catherine Angst, Director of Communications in the Division of Experiential Education, “because it’s an easily searchable, permanent database that allows people to select the features of an opportunity that are important to them.”

Angst explains that the new database is “an evolution of the Duke summer opportunities fair and the ‘Keep Exploring’ project.”

In previous years, Duke organized an in-person fair with representatives from various summer programs. During the pandemic, the “Keep Exploring” project was created to “[provide] students with summer opportunities and mentorship during a time when not a lot of traditional opportunities were operating because of COVID.” The two programs joined forces, she said, and ultimately expanded into the Duke Summer Experiences website.

By aggregating opportunities into one place, the database should increase awareness and access for summer programs.

Dean Sarah Russell, Director of the Undergraduate Research Support Office, thinks this might be especially valuable for research opportunities, which she says tend to be less publicized. “Previously,” she says, “students might know about DukeEngage, GEO, or summer courses, but would have to rely on word of mouth or, if they were lucky, a tip from faculty or advisors to find out about smaller, lesser-known programs.”

Ms. Leigh Ann Muth-Waring, Assistant Director in Employer Relations at the Career Center, sees similar benefits to the new database: “Prior to the website’s creation, students had to actively search for information about summer programs by contacting individual departments on campus,” sometimes causing students to miss deadlines. The Duke Summer Experiences website, on the other hand, provides easy-to-navigate and up-to-date information.

Another goal of the Duke Summer Experiences database, Ms. Angst says, is to “build a community of practice where administrators can share best practices, resources, and lessons learned.”

Dr. Karen Weber, Executive Director of the Office of University Scholars and Fellows, hopes this will “enable administrators across campus to collaborate more effectively together and improve programmatic outcomes.” For instance, “They can communicate on shared initiatives, such as developing successful recruitment and marketing strategies, creating student applications, editing participation agreements, addressing student and administrative issues, engaging with faculty, and assessing programs.”

Along with making summer opportunities easier to find and encouraging administrative collaboration, Duke Summer Experiences is also beta-testing a new application process that would allow students to use one application to apply for multiple opportunities at once. Muth-Waring said the Duke Experiences Application “allows the student to complete one questionnaire with general information (name, major, etc.) which then can be used to apply to multiple Duke-sponsored summer programs.” It also provides links to other programs students might be interested in.

Ms. Angst also sees the new application system as a valuable tool. She hopes that it will reduce “application fatigue” among students looking for summer opportunities.

The Career Center is already using the new application platform for their summer Internship Funding Program, which encourages participation in unpaid or low-paying summer internships by providing financial support to students. According to Ms. Muth-Waring, the new application system “has helped us streamline our program’s application process so that it is easier and less burdensome for students.” Streamlining the process of finding summer opportunities is a major goal of the Summer Experiences website as well. Ultimately, Ms. Muth-Waring says, “both the Duke Summer Experiences Database and the Duke Experiences Application are creating an easier way for students to learn about and apply to university-sponsored summer programs, research opportunities, internships, and funding sources.” For students seeking summer opportunities through Duke, the Summer Experiences website can make the process easier.

Post by Sophie Cox, Class of 2025

2019 Duke Grad Founds Cryptocurrency Startup Fei Protocol

As cryptocurrency gains popularity, people continue to question “How and where can these tokens be used?” A November 2021 study by Pew Research reported that 86% of Americans claimed to have heard about cryptocurrency and 16% say they personally have invested in, traded, or otherwise used it

Despite this, there are still very few places where one can make purchases directly using crypto. This means that in order to use cryptocurrency, people must first convert it back to US dollars, which can cost a lot due to transaction fees. Additionally, the exchange rate between any given crypto token and USD changes by the second, resulting in a lack of price stability.

(If you are unfamiliar with cryptocurrency or transaction (gas) fees please refer to my prior article here.)

Duke Alum, Joey Santoro, sensed this gap and saw an opportunity. Santoro graduated from Duke in 2019 with a major in Computer Science. There needed to be a volatility-free token with a stable valuation (i.e. matching the USD), to move between the worlds of crypto and fiat currency. This is also known as a stablecoin. While several were already in existence, Santoro wanted to create a more scalable and decentralized one.

Thus, in December of 2020, Joey founded the Fei Protocol. Fei is a stablecoin in Ethereum native decentralized finance (DeFi). Stablecoins are a type of token that aids in maintaining a liquid market by pegging the token’s value to the USD.  Fei is able to achieve this through various stability mechanisms. Stablecoins can be used for real-life transactions while still benefiting from instant processing and the security of cryptocurrency payments.

When asked why he chose to work in crypto as opposed to Machine Learning (ML) or Artificial Intelligence (AI) Joey explained that it came down to how much impact he could have.

“The barrier for making an avenue of innovation in crypto is so much lower than something like a machine learning. Higher risk, higher reward.”

joey santoro

Santoro did not come to Duke with the plan of founding a web3 DeFi protocol. In fact, when he matriculated he was actually pre-med and originally only took CS 101 because it was a pre-requisite for the Neuroscience major.

However, it did not take long for Joey to realize he wanted to work in the crypto space. In his second semester, he joined the Duke Blockchain Lab and ended up teaching a blockchain course in his junior and senior years.

Because decentralized finance is still so new, no one completely knows what they are doing, which creates considerable opportunities for innovation. Additionally, because the crypto space is decentralized, it is inherently collaborative and community-driven. 

“Being able to write code that’s immediately interoperable with dozens of financial protocols is the coolest thing ever,” Santoro said

Joey argues anyone can become an expert in a particular area in crypto in a couple of months. He said economists and mechanism designers are increasingly moving into the crypto space. 

When the Fei Protocol launched in 2020 it was the height of a bull market for crypto and there was heavy demand for a decentralized stablecoin. While there were several other stablecoins in existence, USDC and tether were the most popular and they were both centralized, meaning they were owned by companies. 

“What so important to me and why I do this is because I want people to be able to do whatever they want with their money.”

JOey santoro

The demand for a decentralized stablecoin created excitement around Feio but also a highly compressed timescale. The Fei Protocol ended up having the largest token launch for an Ethereum DeFi protocol in history, raising $1.25B. However, when it launched,  the peg broke due to issues with the incentive mechanism and bugs in the code.

Santoro recalled the surreal and challenging experience of watching the protocol he spent countless weeks working on fall apart before his eyes. However, his team and investors decided to stick it through and try to salvage what they had built. It took over a month just to fix everything that had gone wrong. In the meantime, people were threatening Santoro and his team. 

While the Fei protocol faced challenges while launching,  Joey and his team were able to adapt, learn from their mistakes, and come back stronger. They recently conducted a multi-billion-dollar merge with Rari Capital and launched Fei version2 (V2).

Additionally, this is the first multi-billion dollar merger in DeFi meaning that the decision to merge was voted on by members of the respective Decentralized Autonomous Organizations (DAOs). This is a huge milestone in the world of DeFi and sets a precedent for the potential of decentralized business operations. 

Joey Santoro Presenting at the ETHDenver Convention

Moving forward Joey explained, “I’m obsessed with simplicity now; I still move fast but more carefully.”

Post by Anna Gotskind, Class of 2022

The Mind Behind Muser

Biology professor Sheila Patek remembers when she was an undergraduate, petrified as she waded through the world of academia in search of a research position. Knocking on door after door, Patek promised herself that if she was able to enter that world of research, she was going to change it; she was going to help students find opportunities and shift the rigid, exclusionary culture of academia.

Years later, Professor Patek was able to keep her promise. She created Muser, a website to connect students to research opportunities in an effort “to achieve accessible, transparent, equitable, and multidisciplinary research experiences for students and mentors.”

Patek first began this effort as a faculty member at the University of Massachusetts, where she found few efficient pathways for undergraduates to find research opportunities. Patek had grown accustomed to being at UC Berkeley, where they utilized a fully integrated system known as the Undergraduate Research Apprentice Program. The University of Massachusetts was more reminiscent of Patek’s own undergrad experience, and it was there that she and her colleagues began working on the first version of Muser’s software. This is the version that she brought with her when she came to Duke.

Here, we’re lucky to have a slew of resources — DukeList, the Undergraduate Research Support Office, Bass Connections — that are intended to help students pursue research. However, Patek says that Muser distinguishes itself by being specifically designed to address the many barriers that still prevent students from pursuing research — from a lack of support and resources to racial and gender biases. 

Team Muser: (from left) Sheila Patek, Founder; Sonali Sanjay, Co-Student Leader; Katherine Wang, Co-Student Leader; Theo Cai, Duke Undergrad Muser Director and Nowicki Fellow (Credit: Ben Schelling)

One way Muser does this is by making all initial applications anonymous. Patek mentions studies that have found that things like the race and gender connotation of names have significant influence on who gets a position; for example, when given CVs that are identical except for the gender of the names, faculty are more likely to rate the male CVs higher. From the mentor side of Muser, research leads see students’ personal statements first, then must formally review the applications if they wish to view all the information the student has provided — including their names. Patek notes that it has surprised and perhaps frustrated many mentors, but it’s a feature for the benefit of students; it allows them to first be heard without the preconceptions attached to something like their name.

On the flip side, Muser tries to keep things as transparent as possible for students (although anonymous mentors are in the works). There are set timelines — called “rounds” — in which mentors post positions and students apply then hear back. With most other forums for research like DukeList, students are expected to check in and apply constantly — not even knowing if they will get a response. Muser solves this through these rounds, as well as a unique “star” system: mentors that actually review every application get a gold star, visible to students applying. 

So far, over three thousand (3000) undergraduates have used the software, and Patek estimates that in 2021, 20% of Duke undergraduates had, at some point, held a research position thanks to Muser. She also boasts the diversity of research leads that have become involved with Muser; it features professors, graduate students, and lab managers alike as mentors, who represent a better gender and diversity balance than academia as a whole. But as much progress has been made, Patek’s ultimate dream would be for every project in every department to be posted on Muser, available for undergraduates who don’t have to worry about being denied because of bigotry or ignored altogether. 

“The culture of academia is fundamentally opaque to everyone not in it,” Patek notes, but she and the Muser team are doing everything they can to change that. The newest version of Muser’s software open source on GitHub and available for free — has recently been adopted by Harvey Mudd College and the University of Massachusetts, and Patek expresses her hope for the idea to spread nationwide. 

Universities that have adopted Muser

The website used to be called MUSER — an acronym meaning Matching Undergraduates to Science and Engineering Research — but nowadays, it’s known simply as “Muser.” I’ve been told that the rebranding is a play on words, referencing the Muses of Greek and Roman mythology who oversaw the full range of arts and sciences, to represent all thinkers. 

The next round of Muser for Summer 2022 research positions opens on February 19. Mentors can post opportunities NOW, until February 18. For more information, visit the website and check out this fantastic article introducing Muser.

Hidden in Plain Sight: The Growing Role of Computation in Science

One of downtown Durham’s most memorable landmarks, the Chesterfield building looks like it was aesthetically designed to maintain the country’s morale during World War II. On the former cigarette factory’s roof rests a brilliant red sign that’s visible from miles away:

But don’t mistake the building’s quaint exterior for antiquity: the Chesterfield Building is home to one of the nation’s most powerful quantum computers. Managed by the Duke Quantum Center, the computer is part of Duke’s effort to bolster the Scalable Quantum Computing Laboratory (SQLab).

On February 2nd, the lab’s director – Christopher Monroe – joined engineering professor Michael Reiter and English professor Charlotte Sussman in a Research Week panel to discuss the growing presence of computation at Duke and in research institutions across the country. (View the panel.)

Chris Monroe

Monroe opened by detailing the significance of quantum computing in the modern world. He explained that quantum mechanics are governed by two golden rules: first, that quantum objects are waves and can be in superposition, and second, that the first rule only applies when said objects are not being measured.

The direct impact of quantum mechanics is that electrons can be in two orbits at the same time, which revolutionizes computing. Quantum computers factor numbers exponentially faster than classical computers, converge to more desirable solutions in optimization problems and have been shown to bolster research in fields like biomolecular modeling.

Still, Monroe insists that the future reach of quantum computing is beyond anyone’s current understanding. Says Monroe, “quantum computing is an entirely new way of dealing with information, so we don’t know all the application areas it will touch.” What we do know, he says, is that quantum computers are poised to take over where conventional computers and Moore’s Law leave off.

While Monroe discussed computing innovations, Michael Reiter – James B. Duke Professor of Computer Science and Electrical and Computer Engineering – demonstrated the importance of keeping computing systems safe. By pointing to the 2010 Stuxnet virus, a series of cyberattacks against Iranian nuclear centrifuges, and the 2017 Equifax Data Breach, which stole the records of 148 million people, Dr. Reiter provided evidence to show that modern data systems are vulnerable and attractive targets for cyber warfare.

Michael Reiter

To show the interdisciplinary responsibilities associated with the nation’s cybersecurity needs, Reiter posed two questions to the audience. First, what market interventions are appropriate to achieve more accountability for negligence in cybersecurity defenses? Second, what are the rules of war as it relates to cyber warfare and terrorism?

After Reiter’s presentation, Charlotte Sussman transitioned the conversation from the digital world to the maritime world. A professor of English at Duke, Sussman has always been interested in ways to both memorialize and understand the middle passage, the route slave trading ships took across the Atlantic from Africa to the Americas. Through the University’s Bass Connections and Data+ research programs, she and a group of students were able to approach this problem through the unlikely lens of data science.

Sussman explained that her Data+ team used large databases to find which areas of the Atlantic Ocean had the highest mortality rates during the slave trade, while the Bass Connections team looked at a single journey to understand one young migrant’s path to the bottom of the sea.

Professor Sussman (second from right), and the Bass Connections/Data+ Team.

Monroe, Reiter, and Sussman all showed that the applications of computing are growing without bound. Both the responsibility to improve computing infrastructures and the ability to leverage computing resources are rapidly expanding to new fields, from medicine and optimization to cybersecurity and history.

With so many exciting paths for growth, one point is clear about the future of computing: it will outperform anyone’s wildest expectations. Be prepared to find computing in academia, business, government, and other settings that require advanced information.

Many of these areas, like the Chesterfield Building, will probably see the impact of computing before you know it.

Post by Shariar Vaez-Ghaemi, Class of 2025

Page 1 of 18

Powered by WordPress & Theme by Anders Norén