Additive + Subtractive = One Powerful Machine

It says it right on the title of the video below: it was bound to happen eventually. It’s only natural that somebody would stick a 3D printer extruder on the business end of a CNC machine. The long-awaited convergence of additive and subtractive manufacturing is here.

OK, that may be overstating things a bit, but we think [Chris DePrisco] is on to something here. Given the considerable investment he’s made in his DIY CNC machine, an enormous vertical machining center that looks a little like a homebrew Bridgeport, it was a no-brainer to take advantage of the huge XYZ stage. Mounting the Titan Aero extruder to the quill required some custom parts; fair warning that the video below is heavy on machining, but it’s not the seven hours of video he streamed when he milled the heated aluminum bed. Skip ahead to about the six-minute mark if you want to see the first prints and how he optimized the setup.

As we watched [Chris]’ video, we were struck by the potential for adding 3D printing to CNC milling machines. What we’d like to see is a setup where the spindle and the extruder work together to build more complex parts. Or maybe a tool-changing CNC that can pick up a spindle, an extruder, and maybe even a laser or plasma cutter head. Now that would be a powerful machine!

Continue reading “Additive + Subtractive = One Powerful Machine”

Malduino Elite – First Impressions

A while back, I wrote an article about Malduino, an Arduino-based, open-source BadUSB device. I found the project interesting so I signed up for an Elite version and sure enough, the friendly postman dropped it off in my mail box last Friday, which means I got to play around with it over the weekend. For those who missed the article, Malduino is USB device which is able to emulate a keyboard and inject keystrokes, among other things. When in a proper casing, it will just look like a USB flash drive. It’s like those things you see in the movies where a guy plugs in a device and it auto hacks the computer. It ships in two versions, Lite and Elite, both based on the ATmega32U4.

The Lite version is really small, besides the USB connector it only contains a switch, which allows the user to choose between running and programming mode, and a LED, which indicates when the script has finished running.

Original Malduino Elite sketch and Lite prototype

The Elite version is bigger, comes with a Micro-SD card reader and four DIP switches, which allow the user to choose which script to run from the card. It also has the LED, which indicates when a script has finished to run. This allows the user to burn the firmware only once and then program the keystroke injection scripts that stored in the Micro-SD card, in contrast to the Lite version which needs to be flashed each time a user wants to run a different script.

These are the two Malduinos and because they are programmed straight from the Arduino IDE, every feature I just mentioned can be re-programmed, re-purposed or dropped all together. You can buy one and just choose to use it like a ‘normal’ Arduino, although there are not a lot of pins to play around with. This freedom was one the first things I liked about it and actually drove me to participate in the crowd-funding campaign. Read on for the full review.
Continue reading “Malduino Elite – First Impressions”

Hacking An External Mic Port Onto A Camera

A sub-$100 camera competing in the 4K market, the Akaso EK7000 has a few features typical for the range: wifi, 12MP photos at 30 frames per second, and the like. [Foxx D’Gamma] wanted to add an external mic jack to his camera, replacing the internal mic, which featured poor sound pickup due to being buried in the heart of the camera. [Foxx] spent a considerable amount of effort getting the enclosure apart, working gingerly to avoid damaging the display’s ribbon cable, which can’t be disconnected. He also had to deal with the button covers falling out when the case was opened.

[Foxx] desoldered the button mic and added the jack’s wires, and the next challenge presented itself: getting it back together again with the mic port looking good. He had to make sure the jack projected just the right amount from the housing, to ensure the external mic could plug in. Check out both videos below the break.

We’ve featured several cheap camera hacks recently on Hackaday: the ruggedized cheap camera, the cheap 360 degree camera, and the full-spectrum camera all come to mind. It’s a fertile field for not a lot of money!

Continue reading “Hacking An External Mic Port Onto A Camera”

Counterfeit Hardware May Lead To Malware And Failure

Counterfeit parts are becoming increasingly hard to tell the difference from the real deal, the technology used by the counterfeiters has come on leaps and bounds, so even the experts struggle to tell the real product from a good fake. Mere fake branding isn’t the biggest problem with a counterfeit though, as ieee.com reports, counterfeit parts could contain malware or be downright dangerous.

Way back in 2014 the FBI charged [Marc Heera] with selling clones of the Hondata S300, a plugin engine module for Honda cars that reads sensors, and depending on their values can change idle speed, air-fuel mixture and a plethora of other car/engine related settings. What, might you ask, is the problem, except they are obviously not genuine parts? According to Honda they had a number of issues such as random limits on engine rpm and occasionally failure to start. While the fake Hondata S300 parts where just poor clones that looked the part, anything connected to an engine control unit brings up huge safety concerns and researchers have shown that through ECU access, they could hijack a car’s steering and brakes.

It’s not just car parts being cloned, remember the fake USB-to-serial chips of FTDI-Gate? Entire routers are also being cloned, which doesn’t sound too bad until you realise that the cloners could configure your internet traffic to be redirected through their network for snooping. In 2010 Saudi citizen [Ehab Ashoor] was convicted of buying cloned Cisco Systems gigabit interface converters with the intention of selling them to the U.S Dept of Defense. While nothing sinister was afoot in [Ashoor]’s case other than greed, these routers were to be deployed in Iraq for use by the Marine Corps networks. They were then to be used for security, transmitting troop movements and relaying intelligence from field operations back to HQ.

So who are the cloners and why are they doing it? It is speculated that some of them may be state funded, as there are a lot of countries who do not trust American silicon. Circuits are reverse engineered and find their way to the international market. Then just like the FTDI-Gate case, cloners want to make profits from others intellectual property. This also brings up another question, if there is a mistrust of American silicon, nearly everything is made in China these days so why should we trust anything from there? Even analog circuits can be made to spy on you, as you can see from the piece we recently featured on compromising a processor using an analog charge pump. If you want to defend yourself from such attacks, perhaps look at previous Hackaday Prize finalist, ChipWhisperer.