Even in the face of an Internet of Things grasping for a useful use case, an Internet-connected clock is actually a great idea. With a cheap WiFi module and a connection to an NTP server, any clock can become an atomic clock. [Jim] decided to experiment with the ESP8266 to turn a cheap analog clock into something that will display network time using a bunch of gears and motors.
The clock [Jim] chose for this build is an extremely cheap clock pulled right from the shelves of WalMart. This clock uses a standard quartz clock mechanism, powered by a single AA cell. The coils in these quartz movements can be easily controlled by pulsing current through them, and with a few a few transistors and diodes set up in an h-bridge, an ESP8266 is quite good at setting the time on this clock.
The software for this clock first connects to the WiFi network, then checks an NTP server for the true time. Once the ESP8266 gets the time, it starts hammering the coil in the clock movement until the hands are where they should be.
[Jim] says the project needs a bit of work – there is no feedback on the clock to determine the position of the hands. Instead, the time is just set assuming the clock hands started off at 12:00. Still, even with that small fault, it’s a great build and a great exploit of what can be done with a cheap quarts clock movement.
If you’d like to go to the opposite extreme of cost and complexity, how about a DIY retro atomic clock? Or if you’re in need of a wakeup, we’ve seen a ton of alarm clock posts in the past few weeks.
A while ago, a few journalists from China visited the Metalab hackerspace in Vienna. They wanted to do a story on ‘fablabs’ and ‘makerspaces’, despite the objections to the residents of the Metalab hackerspace. Apparently, mentioning ‘hacking’ on China Central Television (yes, it’s called CCTV) is a big no-no.
Wanting to send a message to at least a few people in China, the members of the hackerspace had to think laterally. Metalab member [amir] came up with a way to encode data that could be printed on t-shirts. These bright, colorful squares featured in all of the interviews with Metalab members carried messages like, “free tibet!”, “remember tian’anmen 1989” and “question the government. dont trust the propaganda”
All the videos are available in this playlist, and [amir]’s code to generate the colorful rectangles of political activism can be found here.
In a related note, we’d like to say ‘hi’ to our one reader in North Korea. Yes, according to the stats and analytics, we have one reader in North Korea.
Continue reading “Hacking Chinese State Media”
Synesthesia is a mix-up of sensory perception where stimulation of one sense leads to a stimulation of a second sense. This is the condition where Wednesdays can be blue, the best part of your favorite song can be orange, and six can be up and to the right of seventy-three. While you can’t teach yourself synesthesia – it’s something you’re born with – [Zachary] decided to emulate color to smell synesthesia with his most recent electronics project.
For his synesthesia mask, [Zach] is turning varying amounts of red, green, and blue found with a color sensor into scents. He’s doing this with an off-the-shelf color sensor, an Intel Edison, and a few servos and test tubes filled with essential oils. The color sensor is mounted on a ring, allowing [Zach] to pick which colors he wants to smell, and the scent helmet contains a small electronics box fitted with fans to blow the scent into his face.
There’s more than one type of synesthesia, and if you’re looking for something a little more painful, you can make objects feel loud with a tiny webcam that converts pixels into pulses of a small vibration motor.
Continue reading “Smell Colors With A Synesthesia Mask”
There are a surprising number of Raspberry Pis being used in industrial equipment. This means the Arduino is left behind, but no longer. There’s your PLCs that use Arduinos.
A few weeks ago, Google introduced a machine intelligence and computer vision technique that made the world look psychedelic. Now, this library is available. On another note, head mounted displays exist, and a sufficiently creative person could mash these two things together into a very, very cool project.
Welcome to Kickstarter! Kickstarter is an uphill battle. People will doubt you because you don’t have a ‘target audience’ or ‘the rights to this franchise’ or ‘any talent whatsoever’, but that’s what crowdfunding is for!
Several years ago, Apple shipped a few million 17″ iMacs with defective displays. They’re still useful computers, though, especially if you can find a replacement LCD. Apple, in all its wisdom, used a weird connector for this LCD. Here’s the adapter board, and this adapter will allow displays running up to 1920×1200.
[Jan] has earned a reputation of building some very cool synths out of single ARM chips. His previous build was a Drumulator and now he’s shrinkified it. He’s put four drum sounds, pitch CV, and audio out on an 8-pin DIP ARM.
YouTube gives you cadmium! [AvE], recently got 100,000 subscribers on his YouTube channel. Apparently, YouTube sends you a terrible belt buckle when you manage to do that. At least he did it without playing video games and screaming.
Update: We’ve published an in-depth article about The Gaze-Controlled Wheelchair that Won the Hackaday Prize.
Eyedriveomatic are the Grand Prize winners of the 2015 Hackaday Prize. The winners were just announced on stage at the Hackaday Superconference, and awarded by the prize Judges. Eyedriveomatic is a non-invasive method of adding eye-control to powered wheelchairs. Many times these wheelchairs are rented and permanent alterations cannot be made. This inexpensive and easily adaptable hardware has the power to improve life for those who need more options for controlling powered wheelchairs.
We will be publishing more information about this year’s winners in the coming week. The full standings are listed below. Please check out all of the 2015 Hackaday Prize Finalist and the Best Product Finalists.
Continue reading “Eyedrivomatic Wins the 2015 Hackaday Prize”
Ceramic capacitors are small, they don’t leak, they’re convenient, but they are downright strange. Certain types of caps will lose their capacitance depending on the voltage they’re operating at. If you’re using ceramic caps for filters, DC to DC power supplies, bypass caps, or anything where you need an exact capacitance in a circuit, this can be a problem.
[Mathieu] has come up with a tool that’s able to measure the capacitance of a cap over its entire working range. He’s calling it the OpenCVMeter, and although the name might be slightly confusing, the functionality is not. This little box will measure the capacitance of a part over a voltage range from 1.3 to 15.5V.
By attaching the SMD tweezers or test clips to a capacitor, the OpenCVMeter ramps up the voltage and measures the capacitance of the part through the test cycle. This data is then dumped to a Chrome app – a surprisingly popular platform for test equipment apps – and a determination of the cap’s ability will to work in a circuit is displayed on the screen
If you’ve ever tooled around with antique electronic equipment, you’ll know the first thing to go bad in any piece of equipment are caps. Either caps had extremely loose manufacturing tolerances back in the day or the values really were that critical, but a dodgy cap can bring down everything from tube amps to computers. It’s a very neat tool, and something that doesn’t really exist in a single dedicated device.
A few days ago, we saw a project that used a Teensy to build a Universal 2nd Factor (U2F) key. While this project was just an experiment in how to implement U2F on any ‘ol microcontroller, and the creator admitted it wasn’t very secure, the comments for that post said otherwise: “making your own thing is the ONLY way to be secure,” read the comments.
In a stunning turn of events, writing comments on a blog post doesn’t mean you know what you’re talking about. It turns out, to perform a security analysis of a system, you need to look at the code. Shocking, yes, but [makomk] took a good, hard look at the code and found it was horribly broken.
The critical error of the Teensy U2F key crypto is simply how U2F is performed. During authentication, the device sends the U2F key handle to whatever service is trying to authenticating it. Because the key in the Teensy implementation is only ‘encrypted’ with XOR, it only takes 256 signing requests to recover the private key.
The original experimentation with using the Teensy as a U2F key was an educational endeavor, and it was never meant to be used by anyone. The attack on this small lesson in security is interesting, though, and [makomk] wrote a proof of concept that demonstrates his attack. This could be used to perform attacks from a remote server, but hopefully that won’t happen, because the original code should never be used in the wild.