Hackaday

766 readers
37 users here now

Fresh hacks every day

founded 10 months ago
MODERATORS
51
 
 

We love Arduino here at Hackaday; they’ve probably done more to make embedded programming accessible to more people than anything else in the history of the field. One thing the Arduino ecosystem is rarely praised for is its speed. That’s where [Playduino]  comes in, with his video (embedded below) that promises to make everyone’s favourite microcontroller run 50x faster.

You might be expecting an unstable overclocking setup, with swapped crystals, tweaked voltages and a hefty heat sink, but no! This is stock hardware. The 50x speedup comes from one simple hack: don’t use digitalWrite();

If you aren’t familiar, the digitalWrite() function is one of the key functions Arduino gives you to operate its boards– specify the pin and the value (high or low) to drive it. It’s very easy, but it’s also very slow. [Playduino] takes a moment to show just how much is going on under the hood when you call digitalWrite(), and shows you what you can do instead if you have a need for speed. (Hint: there’s no Arduino-provided code involved; hardware registers and the __asm keyword show up.)

If you learned embedded programming in an earlier era, this will probably seem glaringly obvious. If you, like so many of us, got started inside of the Arduino ecosystem, these closer-to-the-metal programming techniques could prove useful tools in your quiver. Big thanks to [Stephan Walters] for the tip.

Of course if you prefer to speed things up by hardware rather than software, you can overclock an Arduino– with liquid nitrogen, even.


From Blog – Hackaday via this RSS feed

52
 
 

Mainboard with the two 128 kB EPROMs containing the special MacIntosh Plus ROM image. (Credit: Pierre Dandumont)The two 128 kB EPROMs containing the special MacIntosh Plus ROM image. (Credit: Pierre Dandumont)The two 128 kB EPROMs containing the special MacIntosh Plus ROM image. (Credit: Pierre Dandumont)

The Apple MacIntosh Plus was one of the most long-lived Apple computers and saw three revisions of its 128 kB-sized ROMs during its life time, at least officially. There’s a fourth ROM, sized 256 kB, that merges the Western ROMs with Japanese fonts. This would save a user of a Western MacIntosh Plus precious start-up time & RAM when starting software using these fonts. Unfortunately, this mythical ROM existed mostly as a kind of myth, until [Pierre Dandumont] uncovered one (machine-translated, French original).

Since this particular ROM was rumored to exist somewhere in the Japanese market, [Pierre] went hunting for Japanese MacIntosh Plus mainboards, hoping to find a board with this ROM. After finally getting lucky, the next task was to dump the two 128 kB EPROMs. An interesting sidenote here is that the MacIntosh Plus’ two ROM sockets use the typical programming voltage pin (Vpp) as an extra address line, enabling 256 kB of capacity across the two sockets.

This detail probably is why this special ROM wasn’t verified before, as people tried to dump them without using that extra address line, i.e. as a typical 27C512 64 kB EPROM instead of this proprietary pinout, which would have resulted in the same 64 kB dump as from a standard ROM. Thanks to [Doc TB]’s help and his UCA device it was possible to dump the whole image, with the images available for download.

Using this ROM image was the next interesting part, as [Pierre] initially didn’t have a system to test it with, and emulators assume the 128 kB ROM format. Fortunately these are all problems that can be solved, allowing the ROM images to be validated on real hardware as well as a modified MAME build. We were informed by [Pierre] that MAME releases will soon be getting support for this ROM as well.

Top image: Mainboard with the two 128 kB EPROMs containing the special MacIntosh Plus ROM image. (Credit: Pierre Dandumont)


From Blog – Hackaday via this RSS feed

53
 
 

Two rings of magnets are shown encasing a circular channel in a white plastic piece. The channel is filled with liquid metal, and a loop of wire is about to be lowered into the metal.

Almost all satellites have some kind of thrusters aboard, but they tend to use them as little as possible to conserve chemical fuel. Reaction wheels are one way to make orientation adjustments without running the thrusters, and [Zachary Tong]’s liquid metal reaction wheel greatly simplifies the conventional design.

Reaction wheels are basically flywheels. When a spacecraft spins one, conservation of angular momentum means that the wheel applies an equal and opposite torque to the spacecraft, letting the spacecraft orient itself. The liquid-metal reaction wheel uses this same principle, but uses a loop of liquid metal instead of a wheel, and uses a magnetohydrodynamic drive to propel the metal around the loop.

[Zach] built two reaction wheels using Galinstan as their liquid metal, which avoided the toxicity of a more obvious liquid metal. Unfortunately, the oxide skin that Galinstan forms did make it harder to visualize the metal’s motion. He managed to get some good video, but a clearer test was their ability to produce torque. Both iterations produced a noticeable response when hung from a string and activated, and achieved somewhat better results when mounted on a 3D-printed air bearing.

Currently, efficiency is the main limitation of [Zach]’s motors: he estimates that the second model produced 6.2 milli-newton meters of torque, but at the cost of drawing 22 watts. The liquid metal is highly conductive, so the magnetohydrodynamic drive takes high current at low voltage, which is inconvenient for a spacecraft to supply. Nevertheless, considering how hard it is to create reliable, long-lasting reaction wheels the conventional way, the greatly improved resilience of liquid-metal reaction wheels might eventually be worthwhile.

If you’re curious for a deeper look at magnetohydrodynamic drives, we’ve covered them before. We’ve also seen [Zach]’s earlier experiments with Galinstan.


From Blog – Hackaday via this RSS feed

54
 
 

Solder fumes are not nice on the lungs; nor are fumes from superglue, epoxy, or a whole mess of other things we often find ourselves using on the bench. Some people might be able to go the fume hood route to toss that all outside, but for the rest of us, there’s fume extractors. [Raph] has produced an extra-large, carbon-filtering, two-stage fume extractor that by all accounts really sucks — it is effective at hoovering up solder fumes up to 10″ from its inlet.

Photo of fume extractorNote the 18V tool battery in the base. That’ll go for a bit.

Even better, [Raph] built a battery box for an 18 V cordless tool battery, and broke out banana plugs so this doubles as a variable power supply via a cheap LM2596 based DC-DC converter. It also serves as a speed controller for the fans, which makes us wonder if you can adjust the PSU output and the fan speed independently…

Maximum suckage is achieved through careful baffle design. Check out the blog to see the trial-and-error process at work. Of course, having a 200 mm axial fan and 140 mm blower fan front and rear is going to move some air no matter what. Which is required to get air flow through the 38 mm thick activated carbon filter that should scrub all nasties quite nicely. We aren’t filtration experts but we can agree with [Raph]’s estimate that it will last “a while”.

If you want to roll your own, all of the STEP files are on GitHub, and [Raph]’s blog has an excellent step-by-step build guide. We’ve seen other hacks from [Raph] before, from his dovetailed modular breadboard to the machine that shaped his bed and automation for his camper van.


From Blog – Hackaday via this RSS feed

55
 
 

A woman in a ball cap and black tank top holds a black and white image of the Moon printed on black acrylic. It can fold and is mounted on a black plastic mechanism with turning knobs affixed to the ends. There are out-of-focus shelves in the background with various items and books on them.

We love clocks, but we especially love unusual timepieces that aren’t just about showing the hour of the day. [Simone Giertz] built a flip clock moon phase tracker for a friend.

While in Egypt for Cairo Maker Faire, [Giertz] and [dina Amin] found some old flip clocks at a flea market and had to have them. [Amin] mentioned wanting to make a moon phase tracker with one, and [Giertz] decided to try her hand at making her own version. A side quest in more comfortable flying is included with the price of admission, but the real focus is the process of figuring out how to replicate the flip clocks original mechanism in a different size and shape.

[Giertz] cut out 30 semi-circle flaps from polystyrene and then affixed vinyl cut-outs to the flaps. The instructions for the assembly suggest that this might not be the best way to do it, and that printing stickers to affix to the flaps might work better since the cut vinyl turned out pretty fiddly. We really like the part where she built a grid jig to determine the optimal placement of the beams to keep the flaps in the right position after a disheartening amount of difficulties doing it in a more manual way. Her approach of letting it rest for twenty minutes before coming back to it is something you might find helpful in your own projects.

Best of all, if you want to build your own, the files are available for the flip moon station on the Yetch website. You’ll have to come up with your own method to drive it though as that isn’t in the files from what we saw.


From Blog – Hackaday via this RSS feed

56
 
 

An intriguing mouth-played instrument emerged—and won—at the 2023 Guthman Musical Instrument Contest hosted by Georgia Tech. [Keith Baxter] took notice and reproduced the idea for others to explore. The result is the Zen Flute Mouth Theremin, a hybrid of acoustics, electronics, and expressive performance.

At its core lies a forced Helmholtz resonator, a feedback system built with a simple microphone and speaker setup. The resonator itself? The user’s mouth. The resulting pitch, shaped by subtle jaw and tongue movements, is detected and used to drive a MIDI controller feeding an external synthesizer.

Like a trombone or classic electromagnetic theremin, the Zen Flute doesn’t rely on discrete notes. Instead, the pitch is bent manually to the desired frequency. That’s great for expression, but traditional MIDI quantisation can map those “in-between” notes to unexpected semitones. The solution? MIDI Polyphonic Expression (MPE). This newer MIDI extension allows smooth pitch transitions and nuanced control, giving the Zen Flute its expressive character without the hiccups.

Physically, it’s an elegant build. A flat speaker and microphone sit side-by-side at the mouth end, acoustically isolated with a custom silicone insert. This assembly connects to a length of clear PVC pipe, flared slightly to resemble a wind instrument. Inside, a custom PCB (schematic here) hosts a mic preamp, an audio power amp, and a Teensy 4.1. The Teensy handles everything: sampling the mic input, generating a 90-degree phase shift, and feeding it back to the speaker to maintain resonance. It also detects the resonant frequency and translates it to MPE over USB.  A push-button triggers note onset, while a joystick adjusts timbre and selects modes. Different instrument profiles can be pre-programmed and toggled with a joystick click, each mapped to separate MIDI channels.

Mouth-controlled instruments are a fascinating corner of experimental interfaces. They remind us of this Hackaday Prize entry from 2018, this wind-MIDI hybrid controller, and, of course, a classic final project from the Cornell ECE4760 course, a four-voice theremin controlled by IR sensors.


From Blog – Hackaday via this RSS feed

57
 
 

Hackaday Links Column Banner

Saw what you want about the wisdom of keeping a 50-year-old space mission going, but the dozen or so people still tasked with keeping the Voyager mission running are some major studs. That’s our conclusion anyway, after reading about the latest heroics that revived a set of thrusters on Voyager 1 that had been offline for over twenty years. The engineering aspects of this feat are interesting enough, but we’re more interested in the social engineering aspects of this exploit, which The Register goes into a bit. First of all, even though both Voyagers are long past their best-by dates, they are our only interstellar assets, and likely will be for centuries to come, or perhaps forever. Sure, the rigors of space travel and the ravages of time have slowly chipped away at what these machines can so, but while they’re still operating, they’re irreplaceable assets.

That makes the fix to the thruster problem all the more ballsy, since the Voyager team couldn’t be 100% sure about the status of the primary thrusters, which were shut down back in 2004. They thought it might have been that the fuel line heaters were still good, but if they actually had gone bad, trying to switch the primary thrusters back on with frozen fuel lines could have resulted in an explosion when Voyager tried to fire them, likely ending in a loss of the spacecraft. So the decision to try this had to be a difficult one, to say the least. Add in an impending shutdown of the only DSN antenna capable of communicating with the spacecraft and a two-day communications round trip, and the pressure must have been unbearable. But they did it, and Voyager successfully navigated yet another crisis. But what we’re especially excited about is discovering a 2023 documentary about the current Voyager mission team called “It’s Quieter in the Twilight.” We know what we’ll be watching this weekend.

Speaking of space exploration, one thing you don’t want to do is send anything off into space bearing Earth microbes. That would be a Very Bad Thing™, especially for missions designed to look for life anywhere else but here. But, it turns out that just building spacecraft in cleanrooms might not be enough, with the discovery of 26 novel species of bacteria growing in the cleanroom used to assemble a Mars lander. The mission in question was Phoenix, which landed on Mars in 2008 to learn more about the planet’s water. In 2007, while the lander was in the Payload Hazardous Servicing Facility at Kennedy Space Center, biosurveillance teams collected samples from the cleanroom floor. Apparently, it wasn’t very clean, with 215 bacterial strains isolated, 26 of which were novel. What’s more, genomic analysis of the new bugs suggests they have genes that make them especially tough, both in their resistance to decontamination efforts on Earth and in their ability to survive the rigors of life in space. We’re not really sure if these results say more about NASA’s cleanliness than they do about the selective pressure that an extreme environment like a cleanroom exerts on fast-growing organisms like bacteria. Either way, it doesn’t bode well for our planetary protection measures.

Closer to home but more terrifying is video from an earthquake in Myanmar that has to be seen to be believed. And even then, what’s happening in the video is hard to wrap your head around. It’s not your typical stuff-falling-off-the-shelf video; rather, the footage is from an outdoor security camera that shows the ground outside of a gate literally ripping apart during the 7.7 magnitude quake in March. The ground just past the fence settles a bit while moving away from the camera a little, but the real action is the linear motion — easily three meters in about two seconds. The motion leaves the gate and landscaping quivering but largely intact; sadly, the same can’t be said for a power pylon in the distance, which crumples as if it were made from toothpicks.

And finally, “Can it run DOOM?” has become a bit of a meme in our community, a benchmark against which hacking chops can be measured. If it has a microprocessor in it, chances are someone has tried to make it run the classic first-person shooter video game. We’ve covered dozens of these hacks before, everything from a diagnostic ultrasound machine to a custom keyboard keycap, while recent examples tend away from hardware ports to software platforms such as a PDF file, Microsoft Word, and even SQL. Honestly, we’ve lost count of the ways to DOOM, which is where Can It Run Doom? comes in handy. It lists all the unique platforms that hackers have tortured into playing the game, as well as links to source code and any relevant video proof of the exploit. Check it out the next time you get the urge to port DOOM to something cool; you wouldn’t want to go through all the work to find out it’s already been done, would you?


From Blog – Hackaday via this RSS feed

58
 
 

Shade is the mortal enemy of solar panels; even a little shade can cause a disproportionate drop in power output. [Alex Beale] reviewed a “revolutionary” shade-tolerant panel by Renology in a video embedded below. The results are fascinating.

While shading large portions of the panels using cardboard to cut off rows of cells, or columns of cells, the shade tolerant panel does very well compared to the standard panel– but when natural, uneven shading is applied to the panel, very little difference is seen between the standard and active panels in [Alex]’s test.  We suspect there must be some active components to keep power flowing around shaded cells in the Renology panel, allowing it to perform well in the cardboard tests. When the whole panel is partially shaded, there’s no routing around it, and it performs normally.

It’s hard to see a real-world case that would justify the extra cost, since most shading doesn’t come with perfect straight-line cutoffs. Especially considering the added cost for this “shade tolerant” technology (roughly double normal panels).

You might see a better boost by cooling your solar panels. Of course you can’t forget to optimize the output with MPPT. It’s possible that a better MPPT setup might have let the Renology panel shine in this video, but we’re not certain. Whatever panels you’re using, though, don’t forget to keep them clean.


From Blog – Hackaday via this RSS feed

59
 
 

Illustrated Kristina with an IBM Model M keyboard floating between her hands.

The mikecinq, an incredibly slim keyboard.Image by [dynam1keNL] via redditBut sir! I can’t believe I missed [dynam1keNL]’s initial flat offering from about a year ago, the mikefive, which came about when he and some friends ordered switches directly from Kailh and Kailh were like, do you want to try these even lower-profile PG1316 laptop switches? It’s called the mikefive because it’s 5 mm thick.

That’s okay, though, because now you’re caught up and I can talk about his latest keyboard, the mikecinq. The inspiration for this one includes the aesthetics of Le Chiffre and the slimness of Le Oeuf. As you’ll see in the gallery, the top is ever-so-slightly slanted downward from the top.

You can see it really well in the second picture — the top row is flush with the case, and the keys gradually get taller toward the thumb clusters. All [dynam1keNL] really had to do was 3D model the new case and screw in the PCB from his daily driver mikefive.

Image by [dynam1keNL] via reddit[dynam1keNL] ultimately found it nice and comfy, especially for the thumbs, but decided to take it one step further and designed a new switch footprint. Why? The PG1316s are surface-mount with contacts below the switch, so you really need a hotplate or oven to mount them.

So in order to deal with this, he made a dedicated mikecinq PCB with big cutouts with castellated holes beneath each switch. Now, the switch contacts are accessible from underneath and can be soldered with an iron.

You may have noticed that the mikefive production files are not available on GitHub — that’s because it was recently licensed and will be available soon. But if you want production files for the mikecinq, let him know in the comments.

Cyberpunk 2077 Here In 2025

A Cyberpunk 2077-themed split keyboard with a yellow case and Baja Blast RGB and everything.Image by [felipeparaizo] via redditWhile this Cyberpunk 2077 keyboard is certainly nice enough to be a centerfold, [felipeparaizo] has a full write-up on GitHub, so here I go talking about it at length instead!

This here is a Sofle RGB v2.1 that, as we’ve concluded, is heavily inspired by Cyberpunk 2077. The case is 3D-printed and then airbrushed, and then stickered up with custom decals that include references to Arasaka and Samurai. The acrylic base lets even more Baja Blast-colored RGB goodness shine through.

The switches are Akko Crystal Blues, which seem like a great choice, and the caps are two combined sets — one matte and one translucent. This is the second version of the project, and you can see how the first one turned out over on GitHub.

via reddit

The Centerfold: An Avalanche of Color

A colorful Avalanche keyboard in the 60% style.Image by [CaptLynx] via redditSo this right here is an Avalanche keyboard, but at 60%. Go admire the original ones real quick; I’ll wait. They’re just as lovely as this one! I love the jawbreaker-esque layers of the case, and those knobs are exquisite.

Do you rock a sweet set of peripherals on a screamin’ desk pad? Send me a picture along with your handle and all the gory details, and you could be featured here!

Historical Clackers: the Brackelsberg

The Classic Typewriter page calls the Brackelsberg syllabic typewriter “another hallucinogenic creation from the golden age of writing machine design“, and I don’t disagree.

The Brackelsberg, a two-handed type-writing torture device. Image via The Classic Typewriter Page

This 1897 machine had types arranged on several type sectors which swung up and down. Each sector carried about 30 types, which I take to mean characters.

The 132-key board was divided into four sectors, and they could be operated simultaneously — as in, you could type four characters at once, entering entire syllables if you so desired. Thus, it was called a syllabic typewriter.

A hammer struck from the rear, connecting the paper and ribbon with the types. It seems slow and cumbersome, doesn’t it? But Brackelsberg insisted that it was quiet, pointed out that the writing was always visible, and argued that the syllabic gimmick would make it fast and convenient to use.

Although never mass-produced, a working prototype was built and is pictured here in a photograph from Friedrich Muller’s book called Schriebmaschinen und Schriften-Vervielfältigung published in 1900.

Finally, a Keyboard That Looks Like a Typewriter and Might Not Suck

I say this because of the disappointment I suffered buying a similar Bluetooth keyboard for ten bucks from a place where everything typically costs half of that or less.  The thing just stopped working one day not long after the store warranty had expired. You win some, you lose some, I suppose.

The Yunzii QL75 keyboard, which resembles a typewriter that AI created for me once.The Yunzii QL75 typewriter keyboard. Image via Yunzii

Anyway, the Yunzii QL75 ought to fare better given that it’s ten times the cost to pre-order; at least I hope it does. And much like the crappy one I have, it comes in pink.

You can choose either Onyx tactile switches or Cocoa Cream V2 linear switches. But if you don’t like those, the switches are hot-swappable and compatible with 3-pin and 5-pins both.

The keycaps are ABS with a matte chrome electroplated finish and laser-engraved legends. Yes there is RGB, but it doesn’t shine through the keycaps, more like between them, it sounds like.

Thankfully, the QL75 works with QMK and VIA if you want to change things up. This thing has three-way connectivity to the device of your choice, which, if it’s small enough, can sit right above the keyboard where the paper would go.

There’s no telling what the knobs on the sides do, if anything, although there are arrows. On mine, they raise and lower the little kickstands.

Via TweakTown

Got a hot tip that has like, anything to do with keyboards? [Help me out by sending in a link or two](mailto:tips@hackaday.com?Subject=[Keebin' with Kristina]). Don’t want all the Hackaday scribes to see it? Feel free to [email me directly](mailto:kristinapanos@hackaday.com?Subject=[Keebin' Fodder]).


From Blog – Hackaday via this RSS feed

60
 
 

A high level pictorial schematic of the basement monitor.

The hack we have for you today is among our most favorite types of hack: a good, honest, simple, and well documented implementation that meets a real need. Our hacker [Solo Pilot] has sent in a link to their basement monitor.

The documentation is quite good. It’s terse but comprehensive with links to related information. It covers the background, requirements, hardware design, sensors, email and SMS alerts, software details, and even has some credits at the end.

Implementing this project would be a good activity for someone who has already made an LED flash and wants to take their skills to the next level by sourcing and assembling the hardware and then configuring, compiling, deploying, and testing the software for this real-world project.

To make this project work you will need to know your way around the Arduino IDE in order to build the software from the src.zip file included with the documentation (hint: extract the files from src.zip into a directory called AHT20_BMP280 before opening AHT20_BMP280.ino and make sure you add necessary boards and libraries).

One feature of the basement monitor that we would like to see is a periodic “everything’s okay” signal from the device, just so we can confirm that the reason we’re not getting an alarm about flooding in the basement is because there is no flood, and not because the battery ran dead or the WiFi went offline.

If you’ve recently started on your journey into where electronics meets software a project such as this one is a really great place to go next. And of course once you are proficient with the ESP8266 there are a thousand such projects here at Hackaday that you can cut your teeth on. Such as this clock and this fault injection device.


From Blog – Hackaday via this RSS feed

61
 
 

With only two hundred odd days ’til Christmas, you just know we’re already feeling the season’s magic. Well, maybe not, but [Sean Dubois] has decided to give us a head start with this WebRTC demo built into a Santa stuffie.

The details are a little bit sparse (hopefully he finishes the documentation on GitHub by the time this goes out) but the project is really neat. Hardware-wise, it’s an audio-enabled ESP32-S3 dev board living inside Santa, running the OpenAI’s OpenRealtime Embedded SDK (as implemented by ExpressIf), with some customization by [Sean]. Looks like the audio is going through the newest version of LibPeer and the heavy lifting is all happening in the cloud, as you’d expect with this SDK. (A key is required, but hey! It’s all open source; if you have an AI that can do the job locally-hosted, you can probably figure out how to connect to it instead.)

This speech-to-speech AI doesn’t need to emulate Santa Claus, of course; you can prime the AI with any instructions you’d like. If you want to delight children, though, its hard to beat the Jolly Old Elf, and you certainly have time to get it ready for Christmas. Thanks to [Sean] for sending in the tip.

If you like this project but want to avoid paying OpenAI API fees, here’s a speech-to-text model to get you started.We covered this AI speech generator last year to handle the talky bit. If you put them together and make your own Santa Claus (or perhaps something more seasonal to this time of year), don’t forget to drop us a tip!


From Blog – Hackaday via this RSS feed

62
 
 

Want to give an AI the ability to do stuff in Blender? The BlenderMCP addon does exactly that, connecting open-source 3D modeling software Blender to Anthropic’s Claude AI via MCP (Model Context Protocol), which means Claude can directly use Blender and its tools in a meaningful way.

MCP is a framework for allowing AI systems like LLMs (Large Language Models) to exchange information in a way that makes it easier to interface with other systems. We’ve seen LLMs tied experimentally into other software (such as with enabling more natural conversations with NPCs) but without a framework like MCP, such exchanges are bespoke and effectively stateless. MCP becomes very useful for letting LLMs use software tools and perform work that involves an iterative approach, better preserving the history and context of the task at hand.

Unlike the beach scene above which used 3D assets, this scene was created from scratch with the help of a reference image.

Using MCP also provides some standardization, which means that while the BlenderMCP project integrates with Claude (or alternately the Cursor AI editor) it could — with the right configuration — be pointed at a suitable locally-hosted LLM instead. It wouldn’t be as capable as the commercial offerings, but it would be entirely private.

Embedded below are three videos that really show what this tool can do. In the first, watch it create a beach scene using assets from a public 3D asset library. In the second, it creates a scene from scratch using a reference image (a ‘low-poly cabin in the woods’), followed by turning that same scene into a 3D environment on a web page, navigable in any web browser.

Back in 2022 we saw Blender connected to an image generator to texture objects, but this is considerably more capable. It’s a fascinating combination, and if you’re thinking of trying it out just make sure you’re aware it relies on allowing arbitrary Python code to be run in Blender, which is powerful but should be deployed with caution.


From Blog – Hackaday via this RSS feed

63
 
 

On the podcast, [Tom] and I were talking about the continuing saga of the libogc debacle. [Tom] has been interviewing some of the principals involved, so he’s got some first-hand perspective on it all – you should really go read his pieces. But the short version is that an old library that many Nintendo game emulators use appears to have cribbed code from both and open-source real-time operating system called RTEMS, and the Linux kernel itself.

You probably know Linux, but RTEMS is a high-reliability RTOS for aerospace. People in the field tell me that it’s well-known in those circles, but it doesn’t have a high profile in the hacker world. Still, satellites run RTEMS, so it’s probably also a good place to draw inspiration from, or simply use the library as-is. Since it’s BSD-licensed, you can also borrow entire functions wholesale if you attribute them properly.

In the end, an RTOS is an RTOS. It doesn’t matter if it’s developed for blinking LEDs or for guiding ICBMs. This thought got [Tom] and I to thinking about what other high-reliability open-source code is out there, hidden away in obscurity because of the industry that it was developed for. NASA’s core flight system came instantly to mind, but NASA makes much of its code available for you to use if you’re interested. There are surely worse places to draw inspiration!

What other off-the-beaten-path software sources do you know of that might be useful for our crowd?

This article is part of the Hackaday.com newsletter, delivered every seven days for each of the last 200+ weeks. It also includes our favorite articles from the last seven days that you can see on the web version of the newsletter. Want this type of article to hit your inbox every Friday morning? You should sign up!


From Blog – Hackaday via this RSS feed

64
 
 

There’s just some joy in an instant camera. They were never quality cameras, even in the glory days of Polaroid, but somehow the format has survived while the likes of Kodachrome have faded away. [Mellow_Labs] decided he wanted the instacam experience without the Polaroid pricing, so he made his own in the video embedded after the break.

He says “Polaroid’ but we see Game Boy.

At its core, it’s a simple project: an ESP32-CAM for the image (these were never great cameras, remember, so ESP32 is fine– and do you really get to call it an instant camera if you have to wait for a Raspberry Pi to boot up?) and a serial thermal printer for the “instant photo”part. This admittedly limits the project to black and white, and pretty low res, but B/W is artistic and Lo-Fi is hip, so this probably gives the [Mellow Labs] camera street cred with the kids, somehow. Honestly, this reminds us more of the old Gameboy Camera and its printer than anything made by Polaroid, and we are here for it.

The build video goes through the challenges [Mellow Labs] found interfacing the serial printer to the ESP32–which went surprisingly well for what looks like mostly vibe coding, though we’re not sure how much time he spent fixing the vibe code off camera–as well as a the adventure of providing a case that includes the most absurdly beefy battery we’ve ever seen on a camera. Check out the full video below.

Instant cameras are no stranger to Hackaday: this one used e-ink; this one uses film, but is made of gingerbread. In 2022 we wondered if we’d ever shake the Polaroid picture, and the answer appears to be “no” so far.

Thanks to [Mellow] for tooting his own horn by submitting this project to the tip line. We love to see what our readers get up to, so please– toot away!


From Blog – Hackaday via this RSS feed

65
 
 

If you’ve ever looked at widgets on your iPhone, you’ve probably noticed they’re largely static, save for a few first-party apps. By and large, third party developers are not supposed to be able to animate them. However, [Bryce Bostwick] found a workaround.

You might be confused as to the idea of animated widgets, but it’s quite simple. For example, think of a clock app with a widget in which the hands always display the current time, or a calendar app with an icon that shows the current date. Apple’s own apps have long been able to do this, but the functionality has mostly been locked out for third parties.

One way to get around this limitation is by using a timer feature baked into the widget functionality. The timer tool is one of the few ways that third-party apps are allowed to do animation. By running a timer with a custom font, you can display various graphical elements instead of numbers counting down to create a hacky animation that updates every second.

However, there are even more advanced techniques that can get you faster, smoother animations. [Bryce] breaks down the private techniques used to rotate the clock hands on Apple’s own widget, and how to use those tools for your own purposes. It takes some sneaky Xcode tricks and a bit of math to make it fully flexible for doing arbitrary animations, but it works surprisingly well.

Will this backdoor last ? Well, Apple is always updating and changing iOS and its associated software, so don’t expect it to work forever.

Thanks to [gnif] for the tip!


From Blog – Hackaday via this RSS feed

66
 
 

There are (probably) less than two dozen fundemental constants that define the physics of our universe. Determining the value of them might seem like the sort of thing for large, well funded University labs, but many can be determined to reasonable accuracy on the benchtop, as [Marb’s Lab] proves with this experiment to find the value of Planck’s Constant.

[Marv’s Lab] setup is on a nice PCB that uses a rotary switch to select between 5 LEDs of different wavelengths, with banana plugs for the multi-meter so he can perform a linear regression on the relation between energy and frequency to find the constant. He’s also thoughtfully put connectors in place for current measurement, so the volt-current relationship of the LEDs can be characterized in a second experiment. Overall, this is a piece of kit that would not be out of place in any high school or undergraduate physics lab.

To use this to determine Planck’s constant, you need to use Planck’s relation for the energy of a photon:

E = hf

Get some Energies (E), get some energies (f), and bam! You can generate a value for h, Planck’s constant. The energies? Well, that’s a very easy measurement, but it requires some understanding of how LEDs work. [Marb] is simply measuring the voltage needed to just barely light the LED of a given frequency. (For frequency, he’s relying on the LED datasheets.) That translates to the energy of the photon because it corresponds to the energy (in electron volts) required to jump electrons over the bandgap of the semiconductor in the LED– that’s how the light is generated. Those photons will have the energy of the gap, in theory.

In practice, the LEDs do not emit perfectly monochromatic light; there’s a normal distribution centered on the color they’re “supposed” to be, but it is fairly tight. That’s probably why is able to [Marv] get to within 5% of the canonical value, which is better than we’d expect.

This isn’t the first time we’ve determined plank’s constant; it’s quite possible to get to much higher accuracy. The last time we featured this particular technique, the error was 11%.


From Blog – Hackaday via this RSS feed

67
 
 

Recently in material science news from China we hear that [Hailin Peng] and his team at Peking University just made the world’s fastest transistor and it’s not made of silicon. Before we tell you about this transistor made from bismuth here’s a whirlwind tour of the history of the transistor.

The Bipolar Junction Transistor (BJT, such as NPN and PNP) was invented by Bell Labs in 1947. Later came Transistor-Transistor Logic (TTL) made with BJTs. The problem with TTL was too much power consumption.

Enter the energy-efficient Field-Effect Transistor (FET). The FET is better suited to processing information as it is voltage-controlled, unlike the BJT which is current-controlled. Advantages of FETs include high input impedance, low power consumption, fast switching speed, being well suited to Very-Large-Scale Integration (VLSI), etc.

The cornerstone of Complementary Metal-Oxide-Semiconductor (CMOS) technology which came to replace TTL was a type of FET known as the Metal-Oxide-Semiconductor Field-Effect Transistor (MOSFET). The type of MOSFET most commonly used in CMOS integrated circuits is the Enhancement-mode MOSFET which is normally off and needs gate voltage to conduct.

A transistor’s technology generation is given with the “process node”, in nanometers (nm). This used to mean the size of the smallest feature that could be fabricated, but these days it’s just a marketing term (smaller is “better”). Planar CMOS MOSFETs were initially dominant (through ~28nm), then came SOI MOSFETs (28nm to 16nm), then FinFETs (16nm to 5nm), and now finally Gate-All-Around FETs (GAAFETs, 3nm and beyond).

All of that in order to say that this new transistor from [Hailin Peng] and his team is a GAAFET. It’s made from bismuth oxyselenide (Bi₂O₂Se) for the channel, and bismuth selenite oxide (Bi₂SeO₅) as the gate material. See the article for further details.

Keep in mind that at this point in time we only have a prototype from a lab and the gory details about how to mass-produce these things, assuming that’s even possible, haven’t yet been worked out. We have previously discussed the difficulty of manufacturing state-of-the-art transistors. If you’re interested in bismuth be sure to check out how to use bismuth for desoldering.


From Blog – Hackaday via this RSS feed

68
 
 

The Mac mini is the closest to an Apple-based SBC you can get, so it lends itself to unusual portable computers. [Scott Yu-Jan] is back to tackle a portable build using the latest and greatest M4 mini.

[Yu-Jan] walks us through his thought process of how to maximize the portability of the system without all that tedious mucking about with setting up a separate keyboard, monitor, and the mini while on the go. With the more complicated electronics, the monitor risked tipping the keyboard over when attached, particularly since [Yu-Jan] isn’t a fan of batteries for his portables.

By affixing the Mac mini to the side of the keyboard, it makes the whole thing easier to slip into a bag without being overly thick. We get a peek into his iterative process as well when he evaluates the build and decides that the closing of the lid wasn’t what he was hoping for. By adding some TPU rests for the monitor to rest on in the closed position, he says it’s really brought the whole project up a notch. We certainly have had our own projects where one little detail really moves it from sketchy to polished, and we appreciate when makers clue us in on where that happened for them.

You may recognize [Yu-Jan] from our previous coverage of his older portable all-in-one Mac mini and this luggable version where he explains why he doesn’t like laptops. If you like your computers more stationary, how about some G4 iMacs with the newer internals from an M-series mini?


From Blog – Hackaday via this RSS feed

69
 
 

Remember The Clapper? It was a home automation tool (of sorts) that let you turn appliances on and off by clapping. [Kevin O’Connor] has built something rather similar, if more terrifying. It’s called The Screamer.

The build is based around a Sonoff S31 smart switch. [Kevin] selected an off-the-shelf device because he wanted something that was safe to use with mains power out of the box. But specifically, he selected the S31 because it has an ESP8266 inside that’s easy to reprogram with the aid of ESPHome. He ended up hooking up a whole extra ESP32 with an INMP441 microphone over I2S to do the scream detection. This was achieved with a simple algorithm that looked for high amplitude noises with lots of energy in the 1000 – 4000 Hz frequency range. When a scream is detected, it flips a GPIO pin which is detected by the S31, which then toggles the state of the smart switch in turn. Job done.

It’s a simple project that does exactly what it says on the tin. It’s The Screamer! If you’d like to learn more about the original Clapper that inspired this build, we’ve looked at that before, too. Meanwhile, if you’re cooking up your own excuses to scream at the lights and walls in your home, please only notify the tipsline if it has something vaguely to do with electronics or hackery.


From Blog – Hackaday via this RSS feed

70
 
 

For a while now part of my email signature has been a quote from a Hackaday commenter insinuating that an article I wrote was created by a “Dumb AI”. You have my sincerest promise that I am a humble meatbag scribe just like the rest of you, indeed one currently nursing a sore shoulder due to a sporting injury, so I found the comment funny in a way its writer probably didn’t intend. Like many in tech, I maintain a skepticism about the future role of large-language-model generative AI, and have resisted the urge to drink the Kool-Aid you will see liberally flowing at the moment.

Hackaday Is Part Of The Machine

As you’ll no doubt be aware, these large language models work by gathering a vast corpus of text, and doing their computational tricks to generate their output by inferring from that data. They can thus create an artwork in the style of a painter who receives no reward for the image, or a book in the voice of an author who may be struggling to make ends meet. From the viewpoint of content creators and intellectual property owners, it’s theft on a grand scale, and you’ll find plenty of legal battles seeking to establish the boundaries of the field.

Anyway, once an LLM has enough text from a particular source, it can do a pretty good job of writing in that style. ChatGPT for example has doubtless crawled the whole of Hackaday, and since I’ve written thousands of articles in my nearly a decade here, it’s got a significant corpus of my work. Could it write in my style? As it turns out, yes it can, but not exactly. I set out to test its forging skill.

In Which I Meet My Digital Impostor

A couple of weeks ago I covered the news of the impending re-entry of a failed Soviet Venus mission stuck in orbit since 1972. It’s a fascinating story because the craft may survive the experience, and it’s possible that by the time you read this it might have been retrieved. I asked ChatGPT to provide me with a 200 word article on the story “in the voice of the Hackaday writer Jenny List”. Here’s what it came up with:

In the early days of the Space Race, the Soviet Union launched a bold bid to reach Venus: the Venera missions. Among them was Kosmos 482, a 1972 mission that never made it past Earth’s gravity. Now, over five decades later, its descent craft is finally coming home—with a bang.

Kosmos 482 was intended to deliver a lander to Venus, but due to a malfunction in its upper stage, it was stranded in a highly elliptical orbit around Earth. Encased in a semi-spherical titanium shell, the descent craft—designed to survive the brutal atmosphere of Venus—has been orbiting quietly, steadily losing altitude. By early May 2025, that orbit had decayed to a precarious 232 x 136 km, setting the stage for an uncontrolled reentry around May 10th.

Unlike typical space debris, Kosmos 482’s reentry carries a bit more drama. Built to endure Venus’s hellish surface, the lander is expected to survive Earth’s atmospheric plunge mostly intact. Impact predictions estimate it will hit the ground at about 65-70 m/s, roughly the speed of a meteorite, packing the punch of a 500 kg hunk of Soviet engineering.

With an orbital inclination of 51.95 degrees, it could come down anywhere between 52°N and 52°S, adding an element of unpredictability. One thing is certain: after 53 years in limbo, Kosmos 482 is finally coming back to Earth—whether we’re ready or not.

Reading it is a fascinating experience, because superficially it feels like a Hackaday piece. It has my vague style with some phrases such as “packing the punch of a 500 kg hunk of Soviet engineering“. It’s casual in its language, and it’s captured my wordiness; in contrast to the more terse style it does when for example I ask it to do the same thing in the voice of my colleague Al Williams. It fails though in several senses, I feel it doesn’t capture my sentence style and the very British way I use punctuation, it relies on far more figures than I would put in a piece, and perhaps most importantly it has no inference. It relies only on the facts it can find, indeed those figures are a sign of it overusing them, and it doesn’t go further in commenting on any likely outcomes. In my human-written version of the same piece I finished up by speculating on who would own it if retrieved, and anything of that nature is absent in its output.

Don’t Worry, Humans Still Needed

So it’s clear from the above that while it can write something which is superficially coverage of the same story in my voice when writing a Hackaday piece, it still fails at the task in hand. Where we would try to give a little introduction, background and comment to the story, it instead presents only a summary of facts it has found. The fact that it can’t infer beyond the story is reassuring, because it means we meat-based Hackaday scribes still have the edge.  There are many people who will tell you to look for certain words as clues to AI-written text, but the truth is much simpler. Look for the human touch.


From Blog – Hackaday via this RSS feed

71
 
 

Join Hackaday Editors Elliot Williams and Tom Nardi as they take a whirlwind tour of the best and brightest hacks of the last week. This episode starts off with an update about that Soviet Venus lander that’s been buzzing the planet, then moves on to best practices for designing 3D printed parts, giving Chrome OS devices a new lease on life, and a unique display technology that brings a Star Wars prop to life.

You’ll also hear about designing new motherboards for beloved old computers, why you might want to put your calipers on a flatbed scanner, and a NASA science satellite that’s putting in double duty as a wartime reporter. Finally, they’ll cover the interesting physics of meteor burst communications, and the latest developments in the ongoing libogc license kerfuffle.

Check out the links below if you want to follow along, and as always, tell us what you think about this episode in the comments!

Download in DRM-free MP3.

Where to Follow Hackaday Podcast

Places to follow Hackaday podcasts:

iTunesSpotifyStitcherRSSYouTubeCheck out our Libsyn landing page

Episode 321 Show Notes:

News:

Reentry prediction Soviet-era Venera Venus lander – Rocket ScienceTelegram: View @roscosmos_gk

What’s that Sound?

Know that sound? Fill out this form for a chance to win!

Interesting Hacks of the Week:

Best Practices For FDM Printing Learn 15 Print-in-Place Mechanisms In 15 MinutesTurning A Chromebox Into A Proper Power-Efficient PCLet The Wookie Win With This DIY Holochess Table Aska3DA Little Optical Magic Makes This Floating Display PopWhat’s Inside A Neonode Laser Sensor?A Brain Transplant For A Philips Smart LampTearing Down A Forgotten Video Game Pong-Story : PONG in a ChipAnother Old ThinkPad Gets A New Motherboard Replacement Motherboard Brings New Lease Of Life To Classic ThinkpadsRevive A Sony Vaio P-Series With KiCad’s Background Bitmaps

Quick Hacks:

Elliot’s Picks: Move Over, Lithophane: 3D Printed 3D Photos With Gaussian SplatsA Single-Pixel Camera Without Moving Parts Using Compressed SensingScan Your Caliper For Physical Part CopiesTom’s Picks: Studying QR Code DegradationThe World’s Longest Range LED FlashlightOpen Source ELINT Accidentally From NASA

Can’t-Miss Articles:

Radio Apocalypse: Meteor Burst CommunicationsRTEMS Statement Deepens Libogc License Controversy Libogc Allegations Rock Wii Homebrew Community


From Blog – Hackaday via this RSS feed

72
 
 

Series of purple and red mechanisms are stretched from left to right. Almost like arrows pointing right.

Intuitively, you think that everything that you stretch will pull back, but you wouldn’t expect a couple of pieces of plastic to win. Yet, researchers over at [AMOLF] have figured out a way to make a mechanism that will eventually shrink once you pull it enough.

Named “Counter-snapping instabilities”, the mechanism is made out of the main sub-components that act together to stretch a certain amount until a threshold is met. Then the units work together and contract until they’re shorter than their initial length. This is possible by using compliant joints that make up each of the units. We’ve seen a similar concept in robotics.

The picture reads "Excessive vibrations? / It tames them by itself... / ... by switching them off! Bridge undergoing harmonic oscillation about to crumble on the left and mechanisms on the right.

Potentially this may be used as a unidirectional actuator, allowing movement inch by inch. In addition, one application mentioned may be somewhat surprising: damping. If a structure or body is oscillating through a positive feedback loop it may continue till it becomes uncontrollable. If these units are used, after a certain threshold of oscillation the units will lock and retract, therefore stopping further escalation.

Made possible by the wonders of compliant mechanics, these shrinking instabilities show a clever solution to some potential niche applications. If you want to explore the exciting world of compliance further, don’t be scared to check out this easy to print blaster design!

Thanks to [I’m Not Real] for the tip!


From Blog – Hackaday via this RSS feed

73
 
 

Spectre lives. We’ve got two separate pieces of research, each finding new processor primitives that allow Spectre-style memory leaks. Before we dive into the details of the new techniques, let’s quickly remind ourselves what Spectre is. Modern CPUs use a variety of clever tricks to execute code faster, and one of the stumbling blocks is memory latency. When a program reaches a branch in execution, the program will proceed in one of two possible directions, and it’s often a value from memory that determines which branch is taken. Rather than wait for the memory to be fetched, modern CPUs will predict which branch execution will take, and speculatively execute the code down that branch. Once the memory is fetched and the branch is properly evaluated, the speculatively executed code is rewound if the guess was wrong, or made authoritative if the guess was correct. Spectre is the realization that incorrect branch prediction can change the contents of the CPU cache, and those changes can be detected through cache timing measurements. The end result is that arbitrary system memory can be leaked from a low privileged or even sandboxed user process.

In response to Spectre, OS developers and CPU designers have added domain isolation protections, that prevent branch prediction poisoning in an attack process from affecting the branch prediction in the kernel or another process. Training Solo is the clever idea from VUSec that branch prediction poisoning could just be done from within the kernel space, and avoid any domain switching at all. That can be done through cBPF, the classic Berkeley Packet Filter (BPF) kernel VM. By default, all users on a Linux system can run cBPF code, throwing the doors back open for Spectre shenanigans. There’s also an address collision attack where an unrelated branch can be used to train a target branch. Researchers also discovered a pair of CVEs in Intel’s CPUs, where prediction training was broken in specific cases, allowing for a wild 17 kB/sec memory leak.

Also revealed this week is the Branch Privilege Injection research from COMSEC. This is the realization that Intel Branch Prediction happens asynchronously, and in certain cases there is a race condition between the updates to the prediction engine, and the code being predicted. In short, user-mode branch prediction training can be used to poison kernel-mode prediction, due to the race condition.

(Editor’s note: Video seems down for the moment. Hopefully YouTube will get it cleared again soon. Something, something “hackers”.)

Both of these Spectre attacks have been patched by Intel with microcode, and the Linux kernel has integrated patches for the Training Solo issue. Training Solo may also impact some ARM processors, and ARM has issued guidance on the vulnerability. The real downside is that each fix seems to come with yet another performance hit.

Is That Real Cash? And What Does That Even Mean?

Over at the Something From Nothing blog, we have a surprisingly deep topic, in a teardown of banknote validators. For the younger in the audience, there was a time in years gone by where not every vending machine had a credit card reader built-in, and the only option was to carefully straighten a bill and feed it into the bill slot on the machine. Bow how do those machines know it’s really a bill, and not just the right sized piece of paper?

And that’s where this gets interesting. Modern currency has multiple security features in a single bill, like magnetic ink, micro printing, holograms, watermarks, and more. But how does a bill validator check for all those things? Mainly LEDs and photodetectors, it seems. With some machines including hall effect sensors, magnetic tape heads for detecting magnetic ink, and in rare cases a full linear CCD for scanning the bill as it’s inserted. Each of those detectors (except the CCD) produces a simple data stream from each bill that’s checked. Surely it would be easy enough to figure out the fingerprint of a real bill, and produce something that looks just like the real thing — but only to a validator?

In theory, probably, but the combination of sensors presents a real problem. It’s really the same problem with counterfeiting a bill in general: implementing a single security feature is doable, but getting them all right at the same time is nearly impossible. And so with the humble banknote validator.

Don’t Trust That Phone Call

There’s a scam that has risen to popularity with the advent of AI voice impersonation. It usually takes the form of a young person calling a parent or grandparent from jail or a hospital, asking for money to be wired to make it home. It sounds convincing, because it’s an AI deepfake of the target’s loved one. This is no longer just a technique to take advantage of loving grandparents. The FBI has issued a warning about an ongoing campaign using deepfakes of US officials. The aim of this malware campaign seems to be just getting the victim to click on a malicious link. This same technique was used in a LastPass attack last year, and the technique has become so convincing, it’s not likely to go away anytime soon.

AI Searching SharePoint

Microsoft has tried not to be left behind in the current flurry of AI rollouts that every tech company seems to be engaging in. Microsoft’s SharePoint is not immune, and the result is Microsoft Copilot for SharePoint. This gives an AI agent access to a company’s SharePoint knowledge base, allowing users to query it for information. It’s AI as a better search engine. This has some ramifications for security, as SharePoint installs tend to collect sensitive data.

The first ramification is the most straightforward. The AI can be used to search for that sensitive data. But Copilot pulling data from a SharePoint file doesn’t count as a view, making for a very stealthy way to pull data from those sensitive files. Pen Test Partners found something even better on a real assessment. A passwords file hosted on SharePoint was unavailable to view, but in an odd way. This file hadn’t been locked down using SharePoint permissions, but instead the file was restricted from previewing in the browser. This was likely an attempt to keep eyes off the contents of the file. And Copilot was willing to be super helpful, pasting the contents of that file right into a chat window. Whoops.

Fuzzing Apple’s CoreAudio

Googler [Dillon Franke] has the story of finding a type confusion flaw in Apple’s CoreAudio daemon, reachable via Mach Inter-Process Communication (IPC) messages, allowing for potential arbitrary code execution from within a sandboxed process. This is a really interesting fuzzing + reverse engineering journey, and it starts with imagining the attack he wanted to find: Something that could be launched from within a sandboxed browser, take advantage of already available IPC mechanisms, and exploit a complex process with elevated privileges.

Coreaudiod ticks all the boxes, but it’s a closed source daemon. How does one approach this problem? The easy option is to just fuzz over the IPC messages. It would be a perfectly viable strategy, to fuzz CoreAudio via Mach calls. The downside is that the fuzzer would run slower, and have much less visibility into what’s happening in the target process. A much more powerful approach is to build a fuzzing harness that allows hooking directly to the library in question. There is some definite library wizardry at play here, linking into a library function that hasn’t been exported.

The vulnerability that he found was type confusion, where the daemon expected an ioctl object, but could be supplied arbitrary data. As an ioctl object contains a pointer to a vtable, which is essentially a collection of function pointers. It then attempts to call a function from that table. It’s an ideal situation for exploitation. The fix from Apple is an explicit type check on the incoming objects.

Bits and Bytes

Asus publishes the DriverHub tool, a gui-less driver updater. It communicates with driverhub.asus.com using RPC calls. The problem is that it checks for the right web URL using a wildcard, and driverhub.asus.com.mrbruh.com was considered completely valid. Among the functions DriverHub can perform is to install drivers and updates. Chaining a couple of fake updates together results in relatively easy admin code execution on the local machine, with the only prerequisites being the DriverHub software being installed, and clicking a single malicious link. Ouch.

The VirtualBox VGA driver just patched a buffer overflow that could result in VM escape. The vmsvga3dSurfaceMipBufferSize call could be manipulated so no memory is actually allocated, but VirtualBox itself believes a buffer is there and writable. This memory write ability can be leveraged into arbitrary memory read and write capability on the host system.

And finally, what’s old is new again. APT28, a Russian state actor, has been using very old-school Cross Site Scripting (XSS) attacks to gain access to target’s webmail systems. The attack here is JavaScript in an email’s HTML code. That JS then used already known XSS exploits to exfiltrate emails and contacts. The worst part of this campaign is how low-effort it was. These aren’t cutting-edge 0-days. Instead, the target’s email servers just hadn’t been updated. Keep your webmail installs up to date!


From Blog – Hackaday via this RSS feed

74
 
 

There are a number of metal cylinders displayed in a line. Each cylinder has a rectangular brass plate mounted to each end, and these brass plates stand upright, with the metal cylinders held horizontally between them.

If you want to convert heat into electrical power, it’s hard to find a simpler method than a thermoelectric generator. The Seebeck effect means that the junction of two dissimilar conductors will produce a voltage potential when heated, but the same effect also applies to certain alloys, even without a junction. [Simplifier] has been trying to find the best maker-friendly thermoelectric alloys, and recently shared the results of some extensive experimentation.

The experiments investigated a variety of bismuth alloys, and tried to determine the effects of adding lead, antimony, tin, and zinc. [Simplifier] mixed together each alloy in an electric furnace, cast it into a cylindrical mold, machined the resulting rod to a uniform length, and used tin-bismuth solder to connect each end to a brass electrode. To test each composition, one end of the cylinder was cooled with ice while the other was held in boiling water, then resistance was measured under this known temperature gradient. According to the Wiedemann-Franz law, this was enough information to approximate the metal’s thermal conductivity.

Armed with the necessary data, [Simplifier] was able to calculate each alloy’s thermoelectric efficiency coefficient. The results showed some useful information: antimony is a useful additive at about 5% by weight, tin and lead created relatively good thermoelectric materials with opposite polarities, and zinc was useful only to improve the mechanical properties at the expense of efficiency. Even in the best case, the thermoelectric efficiency didn’t exceed 6.9%, which is nonetheless quite respectable for a homemade material.

This project is a great deal more accessible for an amateur than previous thermoelectric material research we’ve covered, and a bit more efficient than another home project we’ve seen. If you just want to get straight to power generation, check out this project.


From Blog – Hackaday via this RSS feed

75
 
 

Internals of ding-dong doorbell.

Today in the it’s-surprising-that-it-works department we have a ding dong doorbell extension from [Ajoy Raman].

What [Ajoy] wanted to do was to extend the range of his existing doorbell so that he could hear it in his workshop. His plan of attack was to buy a new wireless doorbell and then interface its transmitter with his existing doorbell. But his approach is something others might not have considered if they had have been tasked with this job, and it’s surprising to learn that it works!

What he’s done is wrap a new coil around the ding dong doorbell’s solenoid. When the solenoid activates, a small voltage is induced into the coil. This then gets run into the wireless doorbell transmitter power supply (instead of its battery) via a rectifier diode and a filter capacitor. The wireless doorbell transmitter — having also had its push-button shorted out — operates for long enough from this induced electrical pulse to transmit the signal to the receiver. To be clear: the wireless transmitter is fully powered by the pulse from the coil around the solenoid. Brilliant! Nice hack!

We weren’t sure how reliable the transmitter would be when taken out of the lab and installed in the house so we checked in with [Ajoy] to find out. It’s in production now and operating well at a distance of around 50 feet!

Of course we’ve published heaps of doorbell hacks here on Hackaday before, such as this Bluetooth Low Energy (BLE) doorbell and this light-flashing doorbell. Have you hacked your own doorbell? Let us know on the tips line!


From Blog – Hackaday via this RSS feed

view more: ‹ prev next ›