MRRF: ARM-Based CNC Controllers

 

8-bit microcontrollers are the standard for RepRap electronics, but eventually something better must come along. There has been a great deal of progress with ARM-based solutions, and of course a few of these made a showing at the Midwest RepRap Festival.

First up is [Mark Cooper], creator of Smoothieboard, the ultimate RepRap and CNC controller. It’s an ARM Cortex-M3 microcontroller with Ethernet, SD card, and up to five stepper drivers. It had a Kickstarter late last year and has just finished shipping all the rewards to the backers. In our video interview, [Mark] goes over the functions of Smoothieboard and tells us about some upcoming projects: the upcoming Smoothiepanel will feature a graphic LCD, SD card, rotary encoder and buttons, all controlled over USB by the Smoothieboard.

Next up is [Charles] with a whole bunch of CNC capes for the Beaglebone. By far the most impressive board was a huge I/O expander, motor driver, and everything controller for a Beaglebone featuring – get this – three parallel port interfaces. This was a one-off board costing thousands of dollars, but [Charles] did show off a few smaller and more practical boards for Beaglebone CNC control. Here’s a link to [Charles]’ capes.

Videos below.

Continue reading “MRRF: ARM-Based CNC Controllers”

Hacking Rolling Code Keyfobs

Most keyfobs out there that open cars, garage doors, and gates use a rolling code for security. This works by transmitting a different key every time you press the button. If the keys line up, the signal is considered legitimate and the door opens.

[Spencer] took a look into hacking rolling code keyfobs using low cost software-defined radio equipment. There’s two pars of this attack. The first involves jamming the frequency the keyfob transmits on while recording using a RTL-SDR dongle. The jamming signal prevents the receiver from acknowledging the request, but it can be filtered out using GNU Radio to recover the key.

Since the receiver hasn’t seen this key yet, it will still be valid. By replaying the key, the receiver can be tricked. To pull off the replay, GNU Radio was used to demodulate the amplitude shift keying (ASK) signal used by the transmitter. This was played out of a computer sound card into a ASK transmitter module, which sent out a valid key.