Most hardware hackers have a clock project or two under their belt. A pretty common modification to a generic clock is to add lights to it, and if the clock has an alarm feature, it’s not too big of a stretch to try to get those lights to simulate a sunrise for a natural, peaceful morning alarm. The problem that a lot of us run across, though, is wiring up enough LEDs with enough diffusion to make the effect work properly and actually get us out of bed without an annoying buzzer.
Luckily for all of us, [jarek319] came up with an elegant and simple solution that should revolutionize all future sunrise alarm clock builds. He found a cheap OLED display and drove it with an LM317 voltage regulator. By driving the ADJ pin on the regulator, he was able to effectively drive the OLED with a makeshift PWM signal. This allows the OLED’s brightness to be controlled. [jarek319] threw some NTP code up on an ESP12E and did a little bit of programming for the alarm, and the problem is solved.
While an OLED is pretty much the perfect solution for a sunrise alarm clock, if you have a problem sourcing one or are just looking for an excuse to use up a strip of addressable LEDs, you can build a sunrise alarm clock out of almost any other light source.
Who among you has difficulty rising in the mornings? Sunrise clocks that simulate a — well, sunrise, are a gentle means of returning to the waking world. [FlorianH], grappling with this very issue, has built his own impressive sunrise clock he has named Circadia. Some sunrise clocks mate an LED with a dev board and call it a day. This work of hardware art will never be confused for something rudimentary.
Standing at 187cm tall, the 8mm thick PCB frame contains three main sections that plug into each other “like Lego”: the top houses a cleverly designed (and virtually silent) propeller clock and a speaker with a 3D-printed, omni-directional reflector. The midsection is reinforced with an MDF column, around which is wrapped 16 strips of 18 RGB LEDs with a heat-molded sheet of acrylic to diffuse the light, while the bottom section has the mid-woofer, the Raspberry Pi 2 brain, most of the electronics, and three switched power supplies.
Built over two years, the primary feature is a variety of themes — with more being added all the time — ranging from rain forest, to arctic, to the warp core of a starship that will rouse you over the course of a half hour. Circadia can also function as a visualizer during a party, or even a Tetris display (a theme that was designed and tested in an afternoon!). Seeing it in action is a treat:
Continue reading “Want To Wake Up In A Ship’s Warp Core? Circadia Sunrise Clock Makes it So”
If you could spend a couple of bucks on a simple project that might prevent a $2000 repair bill on your vehicle, you’d probably build it, right? That’s the idea behind this simple low-pressure alarm for a diesel fuel system, and it’s so simple it makes you wonder why the OEM didn’t do it.
We normally see [Bob Johnson] coming up with nifty projects (like this claw or this camera slider) that more often than not combine woodworking and electronics. But no tree carcasses were harmed in the making of this project. [Bob]’s goal is just to sound a warning and flash a light if the output of a pressure switch goes to ground. That indicates the lift pump in his Dodge Ram’s fuel tank has failed, which could lead to the sudden failure of the downstream injector pump for lack of lubrication by the fuel itself. His simple ATtiny85 circuit lives on a small perfboard in a 3D printed case and taps into a $30 fuel pressure switch. The microcontroller code enables a short delay to prevent nuisance alarms, and if the pressure drops below 5 PSI, [Bob] gets a chance to shut down the engine and disappoint his mechanic to the tune of $2000.
Maybe it’s planned obsolescence on the OEM’s part, or maybe it’s not. But kudos to [Bob] for a simple hack that averts a potentially expensive problem.
Continue reading “Simple Fuel Pressure Alarm Averts Diesel Disaster”
[TVMiller] has a bone to pick with you if you let your car idle while you chat or text on your phone. He doesn’t like it, and he wants to break you of this wasteful habit – thus the idle-deterrence system he built that he seems to want on every car dashboard.
In the video below, the target of his efforts is clear – those who start the car then spend time updating Twitter or Instagram. His alarm is just an Arduino Nano that starts a timer when the car is started. Color-coded LEDs mark the time, and when the light goes red, an annoying beep starts to remind you to get on with the business of driving. The device also includes an accelerometer that resets the timer when the vehicle is in motion; the two-minute timeout should keep even the longest stop light from triggering the alarm.
[TVMiller] plans an amped-up version of the device built around an MKR1000 that will dump idle to moving ratios and other stats to the cloud. That’s a little too Big Brother for our tastes, but we can see his point about how wasteful just a few minutes of idling can be when spread over a huge population of vehicles. This hack might make a nice personal reminder to correct wasteful behavior. It could even be rolled into something that reads the acceleration and throttle position directly from the OBD port, like this Internet of Cars hack we featured a while back.
Continue reading “Car Idle Alarm Helps You Stop Wasting Gas While Tweeting”
The SimpliSafe home security system is two basic components, a keyboard and a base station. Sensors such as smoke detectors, switches, and motion sensors can be added to this system, all without a wired installation. Yes, this security system is completely wireless. Yes, you can still buy a software defined radio for ten dollars. Yes, the device has both “simple” and “safe” in its name. We all know where this is going, right?
Last week, [Andrew Zonenberg] at IOActive published a security vulnerability for the SimpliSafe wireless home security system. As you would expect from an off-the-shelf, wireless, DIY security system, the keypad and base station use standard 433 MHz and 315 MHz ISM band transmitters and receivers. [Dr. Zonenberg]’s attack on the system didn’t use SDR; instead, test points on the transmitters were tapped and messages between the keypad and base station were received in cleartext. When the correct PIN is entered in the keypad, the base station replies with a ‘PIN entered’ packet. Replaying this packet with a 433 MHz transmitter will disable the security system.
[Michael Ossmann] took this one step further with a software defined radio. [Ossmann] used a HackRF One to monitor the transmissions from the keypad and turned to a cheap USB SDR dongle to capture packets. Replaying keypad transmissions were easy, but with a little bit more work new attacks can be found. The system can be commanded to enter test mode even when the system is armed bypassing notifications to the owner.
It’s a hilarious failure of wireless security, especially given the fact that this exploit can be performed by anyone with $100 in equipment. With a little more effort, an attacker can execute a PIN replay from a mile away. Sadly, failures of security of this magnitude are becoming increasingly common. There will assuredly be more attacks of this kind in the future, at least until hardware manufacturers start taking the security (of their security products) seriously.
[BrittLiv] and her boyfriend got in one too many fights about who set the alarm. It’s the only argument they seem to repeat. So, true to her nature as an engineer, she over-engineered. The result was this great puzzle alarm clock.
The time displayed on the front is not the current time. Since the argument was about alarm times in the first place, [BrittLiv] decided the most prominent number should be the next alarm. To hear the time a button (one of the dots in the colon) must be pressed on the front of the clock. To set the alarm, however, one must manually move the magnetized segments to the time you’d like to get up. Processing wise, for a clock, it’s carrying some heat. It runs on an Intel Edison, which it uses to synthesize a voice for the time, news, weather, and, presumably, tweets. It sounds great, check it out after the break.
All in all the clock looks great, and works well too. We hope it brought peace to [BrittLiv]’s household.
Continue reading “Puzzle Alarm Clock Gets Couple Up In The Morning”
CSL Dualcom, a popular maker of security systems in England, is disputing claims from [Cybergibbons] that their CS2300-R model is riddled with holes. The particular device in question is a communications link that sits in between an alarm system and their monitoring facility. Its job is to allow the two systems to talk to each other via internet, POT lines or cell towers. Needless to say, it has some heavy security features built in to prevent tampering. It appears, however, that the security is not very secure. [Cybergibbons] methodically poked and prodded the bits and bytes of the CS2300-R until it gave up its secrets. It turns out that the encryption it uses is just a few baby steps beyond a basic Caesar Cipher.
A Caesar Cipher just shifts data by a numeric value. The value is the cipher key. For example, the code IBDLBEBZ is encrypted with a Caesar Cipher. It doesn’t take very much to see that a shift of “1” would reveal HACKADAY. This…is not security, and is equivalent to a TSA lock, if that. The CS2300-R takes the Caesar Cipher and modifies it so that the cipher key changes as you move down the data string. [Cybergibbons] was able to figure out how the key changed, which revealed, as he put it – ‘the keys to the kingdom’.
There’s a lot more to the story. Be sure to read his detailed report (pdf) and let us know what you think in the comments below.
We mentioned that CSL Dualcom is disputing the findings. Their response can be read here.