What’s tiny and on track to be worth $22 billion dollars by 2018? MEMS (Micro Electrical Mechanical Systems). That’s a catch-all phrase for microscopic devices that have moving parts. Usually, the component sizes range from 0.1 mm to 0.001 mm, which is tiny, indeed. There are some researchers working with even smaller components, sometimes referenced as NEMS (Nano Electrical Mechanical Systems).
MEMS have a wide range of applications including ink jet printers, accelerometers, gyroscopes, microphones, pressure sensors, displays, and more. Many of the sensors in a typical cell phone would not be possible without MEMS. There are many ways that MEMS devices are built, but just to get a flavor, consider the cantilever (see right), one of the most common MEMS constructions.
After Nintendo’s wild success with the Wii U, Nintendo released it’s Nintendo Switch. The switch functions primarily as a home console, stagnantly connected to a display. However, Nintendo switched things up a bit: the Switch can be removed from its dock for standalone tablet-like use. But there’s a slight problem: when the Switch is in portable mode, it leaves behind a bleak and black box. What’s one to do? Worry not: [Alexander Blake] is here to save the day with a Game Boy Advance SP and an X-Acto knife.
After casually noting that the main control board of the Switch was roughly Game Boy Advance SP sized, [Alexander Blake], aka [cptnalex], knew it was meant to be. After retrieving his broken Game Boy Advance SP from his closet, [cptnalex] set to work turning his Game Boy into a Nintendo Switch dock. When he was done, the results were stunning, especially considering the fact that this is his first console mod. Moreover, the very fact that he did it all with an X-Acto knife rather than a Dremel is astounding.
With the screen providing support to the Switch, [cptnalex’s] design leaves some to be desired for long term use. But we know for sure that [cptnalex’s] design does, in fact, work. Due to naysayers of the internetTM, [cptnalex] filmed a video of his dock in uses (embedded after the break). But, what the design lacks in structural stability, it more than makes up for in aesthetics. On the device itself, [cptnalex’s] history with controller painting shines through.
If you want to see more of [cptnalex’s] work, you can follow him on Instagram. For more console mods that will take your breath away, look no farther than [Bungle’s] vacuum formed portable N64.
Sometimes I need to be able to take photographs of very small things, and the so-called macro mode on my point-and-shoot camera just won’t cut it. And it never hurts to have an inspection scope on hand for tiny soldering jobs, either, though I prefer a simple jeweler’s loupe in one eye for most tasks. So I sent just over $40 off to my close friend Alibaba, and a few weeks later was the proud owner of a halfway usable inspection scope that records stills or video to an SD card.
Unfortunately, it’s only halfway useable because of chintzy interface design and a wobbly mount. So I spent an afternoon, took the microscope apart, and got it under microcontroller control, complete with WiFi and a scripting language. Much better! Now I can make microscope time-lapses, but much more importantly I can take blur-free photos without touching the wiggly rig. It was a fun hack, so I thought I’d share. Read on!
When the [Director of Legal Evil] at Louisville’s LVL1 Hackerspace decided to demonstrate the uselessness of a 3D printer by printing a fidget spinner, another member at the space’s Tuesday meeting rose to the challenge and built a machine that whose sole purpose is to spin fidget spinners.
[Gary Flispart] used an Arduino clone and what appears to be a motor driver in conjunction with a stepper motor. The motor moves a belt that turns a series of metal scraps serving as a four-bar linkage. The linkage moves the dowel that turns the spinner and then gets out of the way so it doesn’t inhibit the toy’s rotation. The Digital Fidget Digit, as [Gary] calls it, looks like it was built out of scrap metal and random pieces of wood in the glorious tradition of hackerspace projects.
Poplar and pine wood make up the framing, and red oak — stained and engraved — make for a chic exterior. Programmed with Arduino and run on a Teensy 3.1, the tabletop has 960 LEDs in forty sections. There are, four USB ports hidden behind sliding panels, as well as a two-port AC outlet and an inductive charging pad and circuit. A hidden Adafruit TFT touchscreen display allows the user to control the table’s functions. Control is limited to changing lighting functions, but Pac-Man, Snake, and text features are still to come!
Weighing in at $850, it’s not a cheap build, but it looks amazing.
In 1985, [Wim van Eck] published several technical reports on obtaining information the electromagnetic emissions of computer systems. In one analysis, [van Eck] reliably obtained data from a computer system over hundreds of meters using just a handful of components and a TV set. There were obvious security implications, and now computer systems handling highly classified data are TEMPEST shielded – an NSA specification for protection from this van Eck phreaking.
Methods of van Eck phreaking are as numerous as they are awesome. [Craig Ramsay] at Fox It has demonstrated a new method of this interesting side-channel analysis using readily available hardware (PDF warning) that includes the ubiquitous RTL-SDR USB dongle.
The experimental setup for this research involved implementing AES encryption on two FPGA boards, a SmartFusion 2 SOC and a Xilinx Pynq board. After signaling the board to run its encryption routine, analog measurement was performed on various SDRs, recorded, processed, and each byte of the key recovered.
The results from different tests show the AES key can be extracted reliably in any environment, provided the antenna is in direct contact with the device under test. Using an improvised Faraday cage constructed out of mylar space blankets, the key can be reliably extracted at a distance of 30 centimeters. In an anechoic chamber, the key can be extracted over a distance of one meter. While this is a proof of concept, if this attack requires direct, physical access to the device, the attacker is an idiot for using this method; physical access is root access.
However, this is a novel use of software defined radio. As far as the experiment itself is concerned, the same result could be obtained much more quickly with a more relevant side-channel analysis device. The ChipWhisperer, for example, can extract AES keys using power signal analysis. The ChipWhisperer does require a direct, physical access to a device, but if the alternative doesn’t work beyond one meter that shouldn’t be a problem.
How many geeks does it take to flash a lightbulb? Judging from the list of entries in the 2017 Flashing Light Prize, so far only seven. But we suspect Hackaday readers can add to that total.
The goal is almost as simple as possible: build something that can flash an incandescent light bulb for at least five minutes. The system actually has to power the bulb’s filament, so no mechanical shutters are allowed. Other than that, the sky is the limit — any voltage, any wattage, any frequency and duty cycle, and any circuit. Some of the obvious circuits, like an RC network on a relay, have been tried. But we assume there will be points for style, in which case this sculptural cascading relay flasher might have a chance. Rube Goldberg mechanical approaches are encouraged, as in this motor, thread, stick and switch contraption. But our fave thus far is the 1000-watt bulb with solar cell feedback by Hackaday regular [mikeselectricstuff].
Get your entry in before August 1st and you’ll be on your way to glory and riches — if your definition of rich is the £200 prize. What the heck, your chances are great right now, and it’s enough for a few pints with your mates. Just don’t let it distract you from working on your 2017 Hackaday Prize entry — we’re currently in the “Wheels, Wings, and Walkers” phase, so maybe there’ll be a little crossover that you can leverage for your flasher.