[Phil Torrone] interviews [Bunnie Huang] about chumby and more

Over at Make, [Phil Torrone] has done an interview with [Bunnie Huang]. [Bunnie] has been a major contributor to the pages of Hackaday as far back as we can remember. He started in 2002 hacking X-boxes and sharing his findings with the world. It is this sharing that makes [Bunnie] stand out. He has always shared all his findings and pushed for open source wherever it would fit. We recently discussed how Chumby, a project to which [Bunnie] contributed is coming to an end. In this interview, he talks about what the future holds for himself and how he plans to spend his time. Most interestingly, he plans on spending a year just building things he’s wanted to see built. Be sure to check out the interview to see what he’s already accomplished.

[Bunnie] mods Chumby to capture epic time-lapse video

When [Bunny] moved into his apartment in Singapore he was surprised to find that a huge building project was just getting started on the other side of the block. Being the curious sort, he was always interested in what was going on, but just looking in on the project occasionally wasn’t enough. Instead, he set up a camera and made a time-lapse video.

This isn’t hard, you can find a slew of intervalometer projects which we’ve covered over the years. But being that [Bunnie] is one of the designers of the Chumby One, and frequently performs hacks on the hardware, it’s no surprise that he chose to use that hardware for the project.

Luckily, he’s sharing the steps he used to get Chumby capturing images. He mentions the hardest part is finding a compatible USB camera. If you have one that works with a 2008 Linux kernel you should be fine. The rest is done with shell scripts. Mplayer captures the images when the script is called from a cron job. Once all the frames are captured, he used mencoder to stitch the JPEGs into a movie. See the result after the break.

[Read more...]

[Bunnie's] archives: Unlocking protected microcontrollers

A few years back [Bunnie] took a crack at cracking the security fuses on a PIC microcontroller. Like most of the common 8-bit microcontrollers kicking around these days, the 18F1320 that he’s working with has a set of security fuses which prevent read back of the flash memory and EEPROM inside. The only way to reset those security fuses is by erasing the entire chip, which also means the data you sought in the first place would be wiped out. That is, if you were limited to using orthodox methods.

[Bunnie] had a set of the chips professionally uncapped, removing the plastic case without damaging the silicon die inside. He set to work inspecting the goodies inside with an electron microscope and managed to hammer out a rudimentary map of the layout. Turns out that flash memory can be erased with ultraviolet light, just like old EPROM chips. Microchip thought of that and placed some shielding over the security fuses to prevent them being reset in this manner. But [Bunnie] managed to do so anyway, creating an electrical tape mask to protect the rest of the data stored in the chip while bouncing UV light underneath the shielding at an angle.

Want to uncap some chips of your own without enlisting the help of others? Give this method a try.

[via Dangerous Prototypes]

Composite video output from chumby

[bunnie] posted this pretty slick way of getting composite video out of a Chumby. The Chumby is an open source connectivity device that has already seen some decent hacking. This modification, done by [xobs] isn’t too difficult. It only requires patching into some pads on the motherboard and loading a custom kernel to support the external output.

Nokia schematics via Shenzhen

nokia

The silicon hacker behind the Chumby, [bunnie huang], was browsing through the Mobile Phone Megamarket in Shenzhen, China and stumbled upon an unusual repair book. It turns out the book had the schematics to hundreds of Nokia phones. It’s hard to tell if they are legitimate, but the amount of information makes them seem so. [bunnie] claims that the book is a learning experience because it shows how some sub-circuits are implemented. Also, it can be a good reference for sourcing parts. Since Nokia buys millions of each component, the supply of parts they use are stable. There are also editions for other brands, such as Motorola and Samsung.

Intel 4004 internals

silicon

The silicon wizards at Flylogic have certainly posted an interesting chip this time around. The Intel 4004 was the first widely used microprocessor. The logic gates are much larger than you’d find in modern chips. The unique feature is that each gate is designed to make the most efficient use of the silicon instead of the standardized shapes you find now. They’ve uploaded a full image of the chip.

For an introduction to silicon hacking, we reccomend [bunnie]‘s talk from Toorcon and [Karsten]‘s talk from 24C3. You can find many more posts on the topic in our silicon tag.

Nintendo DSi teardown

dsi_teardown

[bunnie] managed to pick up a Nintendo DSi while in Japan. It seems he had the device running less than an hour before he tore it down for an impromptu hotel photoshoot. There’s nothing too surprising and he mentions that the CPU certainly feels more capable than the previous model, which may explain the shorter battery life. The ARM processor sits under an RF shield directly below the WiFi card. The best photo is the top side of the board with every single debug point labeled in plain English on the silkscreen. We’re sure that’ll help with the development of new homebrew hardware.

[bunnie] has posted some interesting teardowns in the past. Have a look at his Sony XEL-1 teardown to see the inner workings of an OLED TV.