Amateur Builds Super Deep Super Cheap Ocean Vehicle

During the summers [Doug] has been building a 75 foot sailing junk to be launched from America’s most inland port. When Oklahoma’s winter hits he heads indoors to work on an ROV that will prowl 3,000 feet below the surface. Originally building a piloted submarine, he grew bored and decided to use the sailboat as a carrier for his fleet of remote submersibles instead.

A consummate amateur, [Doug] is the first to admit how little he knows about anything and how much he enjoys the open source spirit: collaboration, cooperation and learning from others. Determination and hard work fills in everything in between.

Hackaday covered the beginnings of his ROV last winter. In the year since it has progressed from some sketches and a 10″ steel pipe turned into a pressure testing rig to a nearly-complete, 10 foot long,  custom-lathed 4″ aluminum torpedo laying on his shop table. In a bow-to-stern walk-through [Doug] shows how he is building science equipment for less than a penny on the dollar by using largely off-the-shelf imaginatively-repurposed parts or things he could fabricate himself with only a lathe and a 3d printer.

Continue after the break for a breakdown of the tech used.

Continue reading “Amateur Builds Super Deep Super Cheap Ocean Vehicle”

Yule-Inspired Tool Time With [Becky Stern]

And now for something completely different: [Becky Stern]’s musical tour of her favorite tools around the Adafruit factory is the best holiday tune we’ve heard since The Waitresses’ “Christmas Wrapping”. Of course, good tools are near and dear to us as well, and we found ourselves nodding frequently in agreement and smiling as broadly as [Billie, Ruby, and Gus], the anthropomorphic LED backup singers.

In other Adafruity news, it looks like their new Samsung SM482 pick and place machine was given the gift of eyes as big as pizza pies. What tools would you like to see under the tree, leaning against the Festivus pole, or all wrapped up a safe distance from the menorah this year? Do tell.

Continue reading “Yule-Inspired Tool Time With [Becky Stern]”

‘Gibson Girl’ emergency beacon built from a Wind-Up Flashlight

Batteries flat and no cellphone coverage and you need to communicate hundreds of miles?  No problem. [Peter Parker VK3YE] has created a wind-up ham radio transmitter built into a discount store crank-handle flashlight (or torch). No batteries – all power comes from you turning the hand crank. This design was inspired by the ‘Gibson Girl’ emergency beacon transmitter used during Second World War. But what used to be an very large, full body cranking box is now tiny and simple to crank. Let’s take a look at he video and the build details after the break.

Continue reading “‘Gibson Girl’ emergency beacon built from a Wind-Up Flashlight”

Hobbit Sword Glows Blue, Vanquishes Unprotected Wifi

Whilst the original Sting glowed blue as a defensive alert, Spark’s “WarSting” is all about aggression. The project hacks a toy Hobbit sword and teaches it to glow blue when vulnerable WiFi is detected. Once alerted, combat ensues. If its bearer slashes, the sword will battle the helpless network, swinging and clanging until it acquires an IP from the defeated DHCP server. Once conquered, the sword publishes a “Vanquished” message to Spark’s cloud, teaching the sword to ignore it from thenceforth.

While “wardriving” has not really been a thing since the first Lord of the Rings movie came out, the last time we saw someone do something similar the hardware was limited to detecting WiFi, not connecting.

Spark CEO [Zach] chose the particular sword because it could be disassembled without being cut apart and already came equipped with easily-hackable LEDs, motion control, and sound effects. Naturally he added one of his own products – the Spark Core – to the hilt to graft WiFi features onto the weapon (a cheaper alternative would be an MCU of your choice and the new ESP8266). The project then hijacks the LED lighting, sound, and hit detection sensor. Our readers can probably come up with some more imaginative actions to take once connected, though the project’s existing code for the Core is published on Github. As-is, in many jurisdictions even merely connecting to an unsecured WiFi these days is unlawful so beware your local restrictions.

Lots of companies could simply advertise the easy way and while obviously an ad, the WarSting is still a creative and fun hack.

See the video below for the sword in action and a Spark’s lore regarding the hack. Thanks [Chris] for the tip.

Continue reading “Hobbit Sword Glows Blue, Vanquishes Unprotected Wifi”

Touching Light with Haptic Feedback

Many of us have gone on a stationary romp through some virtual or augmented scape with one of the few headsets out in the wild today. While the experience of viewing a convincing figment of reality is an exciting sensation in itself, [Mark Lee] and [Kevin Wang] are figuring out how to tie other senses into the mix.

The duo from Cornell University have built a mechanical exoskeleton that responds to light with haptic feedback. This means the wearer can touch the sphere of light around a source as if it were a solid object. Photo resistors are mounted like antenna to the tip of each finger, which they filed down around the edges to receive a more  diffused amount of light. When the wearer of the apparatus moves their hand towards a light source, the sensors trigger servo motors mounted on the back of the hand to actuate and retract a series of 3D printed tendons which arch upward and connect to the individual fingers of the wearer. This way as the resistors receive varying amounts of light, they can react independently to simulate physical contours.

One of the goals of the project was to produce a working proof of concept with no more than 100 dollars worth of materials, which [Mark] and [Kevin] achieve with some cash to spare. Their list of parts can be found on their blog along with some more details on the project.

Continue reading “Touching Light with Haptic Feedback”

Crypto Photography and Custom Firmware

Imagine a camera that took encrypted pictures. If your camera is stolen, the only thing on the memory card would be random data that can only be unlocked with a key. If you hire a photographer, those images cannot be copied without the key. At the very least, it’s an interesting idea made impressive because this actually exists.

[Doug] recently got his hands on a Samsung NX300, a nice camera for the price that conveniently runs Linux and is kinda open-sourced by Samsung. With special firmware, [Doug] created public/private key encryption for this camera, giving only the person with the private key the ability to unlock the pictures taken with this camera.

[Doug] started his build by looking at the firmware for this camera, figuring out how to take everything apart and put it back together. With a few modifications that included encryption for all images taken with this camera, [Doug] repackaged the firmware and upgraded the camera.

The encryption firmware is available on the site, but considering how easily [Doug] was able to make this hack happen, and a great walkthrough of how to actually do it raises some interesting possibilities. The NX300 is a pretty nice camera that’s a little bit above the Canon PowerShot cameras supported by CHDK. It also runs Linux, so if you’re looking for something cool to do with a nice camera, [Doug] has a very good resource.

Counting Transistors In The Playstation

Over in Russia there are a few people doing extremely in-depth technical teardowns, and the latest is one of the most ambitious ever seen. The PSXDEV team is tearing into the heart of the original PlayStation (Google translatrix), looking at 300,000 transistors, and re-implementing the entire console in a logic level simulator.

While the CPU in the PSX is unique to that specific piece of hardware, a lot of this custom silicon can be found in other places. The core – a RISC LSI LR33300 – is documented in a few rare tomes that are somehow available for free on the Internet. Other parts of this chip are a little stranger. There is a bizarre register that isn’t documented anywhere, a Bus Unit that handles the access between various devices and peripherals, and a motion picture decompressor.

The reverse engineering process begins by de-encapsulating the CPU, GPU, sound processing unit, and CD-ROM controller, taking very high magnification photos of the dies, and slowly mapping out the semiconductors and metals to figure out what cells do what function, how they’re connected, and what the big picture is. It’s a painstaking process that requires combing through gigabytes of die shots and apparently highlight gates, wires, and busses with MS Paint.

The end result of all this squinting at a monitor is turning tracings of chips into logic elements with Logisim. From there, the function of the CPU can be understood, studied, and yes, eventually emulated down to the gate level. It’s an astonishing undertaking, really.

If this sort of thing sounds familiar, you’re right: the same team behind PSXDEV is also responsible for a similar effort focused on the Nintendo Entertainment System. There, the CPU inside the NES – the Ricoh 2A03 – was torn down, revealing the 6502 core, APU, DMA, and all the extra bits that made this a custom chip.

Thanks [Rasz] for the tip.