[Bunnie] mods Chumby to capture epic time-lapse video

When [Bunny] moved into his apartment in Singapore he was surprised to find that a huge building project was just getting started on the other side of the block. Being the curious sort, he was always interested in what was going on, but just looking in on the project occasionally wasn’t enough. Instead, he set up a camera and made a time-lapse video.

This isn’t hard, you can find a slew of intervalometer projects which we’ve covered over the years. But being that [Bunnie] is one of the designers of the Chumby One, and frequently performs hacks on the hardware, it’s no surprise that he chose to use that hardware for the project.

Luckily, he’s sharing the steps he used to get Chumby capturing images. He mentions the hardest part is finding a compatible USB camera. If you have one that works with a 2008 Linux kernel you should be fine. The rest is done with shell scripts. Mplayer captures the images when the script is called from a cron job. Once all the frames are captured, he used mencoder to stitch the JPEGs into a movie. See the result after the break.

Continue reading “[Bunnie] mods Chumby to capture epic time-lapse video”

[Bunnie’s] archives: Unlocking protected microcontrollers

A few years back [Bunnie] took a crack at cracking the security fuses on a PIC microcontroller. Like most of the common 8-bit microcontrollers kicking around these days, the 18F1320 that he’s working with has a set of security fuses which prevent read back of the flash memory and EEPROM inside. The only way to reset those security fuses is by erasing the entire chip, which also means the data you sought in the first place would be wiped out. That is, if you were limited to using orthodox methods.

[Bunnie] had a set of the chips professionally uncapped, removing the plastic case without damaging the silicon die inside. He set to work inspecting the goodies inside with an electron microscope and managed to hammer out a rudimentary map of the layout. Turns out that flash memory can be erased with ultraviolet light, just like old EPROM chips. Microchip thought of that and placed some shielding over the security fuses to prevent them being reset in this manner. But [Bunnie] managed to do so anyway, creating an electrical tape mask to protect the rest of the data stored in the chip while bouncing UV light underneath the shielding at an angle.

Want to uncap some chips of your own without enlisting the help of others? Give this method a try.

[via Dangerous Prototypes]

Chumby hacking by Bunnie

[bunnie] is one of the main people behind the Chumby, and even he can’t resist modding the things. He decided to outfit one with a larger LCD – using a stereo microscope to do the really fine pitch work – and a laser cutter to create a custom bezel for the finished piece. The new LCD is still a touchscreen and allows the Chumby to display 640×480 resolution over the stock 320×240. The mod requires a few parts, but the ultimate difficulty is caused by the surface mount connectors. If you’d rather have some software fun, you might want to check out [bunnie]’s Chumby wifi sniffer.

Tearing Down the Boss Phone

Poke around enough on AliExpress, Alibaba, and especially Taobao—the Chinese facing site that’s increasingly being used by Westerners to find hard to source parts—and you’ll come across some interesting things. The Long-CZ J8 is one of those, it’s 2.67 inch long and weighs just 0.63 ounces, and it’s built in the form factor of a Bluetooth headset.

A couple of months ago Cory Doctorow highlighted this tiny phone, he’d picked up on it because of the marketing. The lozenge-shaped phone was being explicitly marketed that it could “beat the boss”. The boss in question here being the B.O.S.S chair—a scanning technology that has been widely deployed across prisons in the U.K. in an attempt to put a halt to smuggling of mobile phones to inmates.

The Long-CZ J8 is just 2.67 inch (6.8cm) long.

I wasn’t particularly interested in whether it could make it through a body scanner, or the built-in voice changer which was another clue as to the target market for the phone. However just the size of the thing was intriguing enough that I thought I’d pick one up and take a look inside. So I ordered one from Amazon.

Continue reading “Tearing Down the Boss Phone”

Call for Hack Chat Hosts

Every week Hackaday.io features an AMA of sorts. This is the Hack Chat, a chatroom where we sit down with the best in the business to talk about manufacturing techniques, engineering, and how to build the best hardware around. Over the last few months, we’ve hosted a few hardware celebrities, from [Sprite_TM] talking about the ESP32, [Lady Ada] and MicroPython, [Roger Thornton] of Raspberry Pi discussing how to build everyone’s favorite Linux computer, [Samy Kamkar] talking about reverse engineering, and heard [bunnie’s] take on making and breaking hardware.

Now we’re looking for new co-hosts to lead a discussion and be the expert in the room. If you have the skills, we want to hear from you.

We’re looking for experts to lead a discussion on what they’re doing. If you have a new hardware product and want to share the story of taking it to production while getting some feedback from the Hackaday community, this is the place to do it. We’re looking for a wide range of people who will allow us to pick their brains. If you’ve ever designed a 16-layer PCB, we want to know how (and why) you did it. If you’re into building robotics, we want to hear from you. If you’re an embedded systems wizard, this is your time to shine.

If you want to get in on this, send us an email. We’re doing one Hack Chat a week, every Friday, sometime around noon, Pacific time. This is a great opportunity for you to share what you know with one of the best hardware communities on the Internet. It’s also great practice if you’re thinking about presenting at the Hackaday SuperConference in November.

This Week: How do Magnets Work Anyway?

Do you know how magnets work? Of course you don’t, nobody does. But one of the people with the deepest knowledge on the topic is Jeremy Chan who is a Prototype Engineer at Nano Magnetics Ltd. This Friday at noon PST Jeremy leads a Hack Chat on magnetism.

What is there to talk about? Jeremy will cover how magnets are manufactured and magnetized. He’ll cover the different grades of magnets, and the different magnetic sensing mechanisms. He’ll also go into some of the most interesting magnetic phenomenon. How often do you get to hang out with a magnet expert? See you this Friday!

Source Parts on TaoBao: An Insider’s Guide

For hardware aficionados and Makers, trips to Shenzhen’s Huaqiangbei have become something of a pilgrimage. While Huaqiangbei is a tremendous and still active resource, increasingly both Chinese and foreign hardware developers do their sourcing for components on TaoBao. The selection is vastly greater and with delivery times rarely over 48 hours and frequently under 24 hours for local purchases it fits in nicely with the high-speed pace of Shenzhen’s hardware ecosystem.

For overseas buyers, while the cost of Taobao is comparable to, or slightly less than AliExpress and Chinese online stores, the selection is again, many, many times the size. Learning how to effectively source parts from Taobao will be both entertaining and empowering.

Continue reading “Source Parts on TaoBao: An Insider’s Guide”

Shut the Backdoor! More IoT Cybersecurity Problems

We all know that what we mean by hacker around here and what the world at large thinks of as a hacker are often two different things. But as our systems get more and more connected to each other and the public Internet, you can’t afford to ignore the other hackers — the black-hats and the criminals. Even if you think your data isn’t valuable, sometimes your computing resources are, as evidenced by the recent attack launched from unprotected cameras connected to the Internet.

As [Elliot Williams] reported earlier, Trustwave (a cybersecurity company) recently announced they had found a backdoor in some Chinese voice over IP gateways. Apparently, they left themselves an undocumented root password on the device and — to make things worse — they use a proprietary challenge/response system for passwords that is insufficiently secure. Our point isn’t really about this particular device, but if you are interested in the details of the algorithm, there is a tool on GitHub, created by [JacobMisirian] using the Trustwave data. Our interest is in the practice of leaving intentional backdoors in products. A backdoor like this — once discovered — could be used by anyone else, not just the company that put it there.

Continue reading “Shut the Backdoor! More IoT Cybersecurity Problems”