For a workshop at the ECAL University of Art and Design in Switzerland, students were asked to come up with new unorthodox ways to capture video using a GoPro camera. The results are pretty awesome.
Lead by the Dutch designer [Roel Wouters], students in the Media & Interaction Design program worked together with Industrial Design students to create these fascinating camera rigs. From “the eye”, a water based stabilizing ball, to a silly bobble hat can be spun around the user, the results are super fun and unique to watch. The workshop was one week long and produced five different camera rigs as featured in the following video.
Continue reading “Unorthodox GoPro Camera Rigs Produce Unreal Videos”
[Luke Wren] just wrote in to tell us about his new science blog called Wren’s Tech — it’s only a few days old, but he’s already got some pretty cool science experiments written up! Like how to estimate the muzzle velocity of a BB gun using just a voice recorder, and a curtain!
There are many different ways you could do this. One of the easiest is using a high-speed camera with a known grid or pattern as the background — like how Mythbusters does it. Unfortunately, high-speed cameras are usually out of reach for most hobbyists. [Luke] explains a rather cool system you can build with some electronics, whereby you have two thin wires a known distance apart — run current through both and use a circuit that can detect the interrupt as your projectile breaks the wires — or, you can use a voice recorder. Continue reading “Estimating BB Gun Muzzle Velocity With A Voice Recorder And A Curtain”
Remember the Sega Saturn? You know, that short-lived game system of the mid 90’s. Well, [c_mon] is still a fan and decided to make a portable version with a built in screen.
As you can see from the photos, the main case is made from wood, plywood to be exact. Several pieces of the plywood were cut out using a CNC Router and laminated together to achieve the full height needed to enclose the internal electronics. The finished case takes up a little less real estate than the original, however it is slightly taller.
You may recognize the screen as an old PSOne unit. The screen was taken part and housed in it’s own wooden enclosure which is hinged to the main case. The video is supplied to the screen by a composite output from the Saturn. There is no unique CD lid either, the screen functions as one when it is folded down. For sound there are a couple built in powered speakers that tap into the stock audio output.
To ad a little pizzazz, [c_mon] routed in a groove in the top to accept some EL wire. There are also some cool engravings in the wooden case, including the Saturn Automobile Manufacturer logo on the top of the screen lid…. whoops!
I got a great seat on the main floor for the first big DEFCON 22 talk which is a welcome to the con and discussion of the badge hardware. [LosT], the creator of this year’s badge, started the discussion with a teaser about the badge… there’s a phone number hidden as part of the challenge. [LosT] took a call from someone chasing the puzzles. The guy was in the audience which was pretty fun.
The process of building a puzzle that can be solved at DEFCON is really tough. How do you make it just hard enough that it won’t get pwned right away but easy enough that a large number of attendees will be able to figure it out during the weekend? The answer is to build a secure system and introduce strategic flaws which will be the attack vectors for the attendees solving the badge challenge.
Of course the badge can be used as a development platform. The populated electronics on the board all have these nice little footprints which can be cut to disconnect them from the chip. The breakout headers on either side of the board allow you to connect headers for your own uses. Great idea!
The back of the lanyards have special characters on them too. This encourages community at the conference. To solve the puzzle you need to find others with different lanyards. Compare the glyphs and crack the code (so far I have no clue!!).
Know what I’m doing wrong? Have suggestions on where to go from here? I’ll be checking the comments!
In honor of DEFCON, this week we’re looking at some cryptography and reverse engineering projects over at Hackaday.io Every hacker loves a hardware puzzle, and [Tom] has created a tool to make those puzzles. His Hardware Reverse Engineering Learning Platform consists of a shield with two ATmega328 chips and an I2C EEPROM. The two Atmel chips share a data bus and I2C lines. Right in the middle of all this is an ST Morpho connector, which allows an ST Nucleo board to act as a sniffer. The platform allows anyone to create a reverse engineering challenge! To successfully reverse engineer a board, it sure helps to have good tools. [coflynn] is giving that to us in spaces with The ChipWhisperer. ChipWhisperer is an open source security research platform. The heart of the system is a Xilinx Spartan 6 FPGA. The FPGA allows very high speed operations for things like VCC and clock glitching. ChipWhisperer is an entire ecosystem of boards – from LNA blocks to field probes. The entire system is controlled from an easy to use GUI. The end result is a powerful tool for hardware attacks. On the Encryption side of the house, we start by keeping the Feds at bay. The [Sector67] hackerspace has collectively created NSA AWAY. NSA AWAY is a simple method of sending secure messages over an insecure medium – such as email. A one-time use pad is stored on two SD cards, which are used by two Android devices. The message sender uses an Android device to encrypt the message. On the receive side, the message can be decoded simply by pointing an android device’s camera at the encrypted data. So easy, even a grandparent could do it! Next up is [Josh’s] Bury it under the noise floor. “Bury it” is an education for cryptography in general, and steganographic software in particular. [Josh] explains how to use AES-256 encryption, password hashing, and other common techniques. He then introduces steganography by showing how to hide an encrypted message inside an image. Anyone who participated in Hackaday’s ARG build up to The Hackaday Prize will recognize this technique. [yago] gives us encrypted voice communications with his ZRTP Hardphone. The hardphone implements the ZRTP, a protocol for encrypted voice over IP communications. The protocol is implemented by a Raspberry Pi using a couple of USB sound cards. User interface is a 16×2 Line character LCD, a membrane keypad, and of course a phone handset. Don’t forget that you need to build two units,or whoever you’re trying to call will be rather confused!
Finally we have the Mooltipass. Developed right here on Hackaday by [Mathieu Stephan] and the community at large, Mooltipass is a secure password storage system. All your passwords can be stored fully AES-256 encrypted, with a Smart Card key. Under the hood, Mooltipass uses an Arduino compatible ATmega32U4 microcontroller. UI is through a OLED screen and touch controls. That’s it for this week! Be sure to check out next week’s Hacklet, when we bring you more of the best from Hackaday.io!
It’s Friday morning and time for another round of Astronaut Or Astronot, the little lottery thing where we’re giving away lots of dev boards, programmers, and an awesome meter to someone on hackaday.io if they have voted in the latest round of voting.
There’s no video this week because, you know, DEFCON, but the person randomly chosen did not vote. Too bad.
This means the voting will continue next week, same time. If you want a chance to get your grubby mitts on a bunch of awesome gear, vote. Do it now.
Who of us out there don’t have a spare iPad and Mac Classic kicking around? If you are one of those lucky folks then this project is for you. [site hirac] has made a pretty neat stand for an iPad made out of a Mac Classic case (translated). It just happens that the screens of the Mac Classic and iPad are pretty darn close in size. Although the screen size is similar, the resolution is not. The original Macintosh Classic had a black and white screen with a resolution of 512 × 342 pixels. The iPad’s resolution of 1024 x 768 pixels has 450% more pixels than the original Mac.
To get the iPad to fit correctly, the case had to be significantly modified. First, all of the internals of the Mac were removed, leaving just an empty case. The front panel of the case was removed and a slot on the left side is made. This slot helps to allow the iPad to slide into the Mac. On the inside of the front panel quite a few of injection molded supports were trimmed away for clearance. A slot was also cut in the left side of the rear case half. When the case is re-assembled, the slots in the front and rear halves provide a large enough hole for the iPad to fit through. Oddly, there are some plastic features on the front panel that are at just the right height to hold the iPad in the ideal location to line up with the screen cutout in the case.
Continue reading “IPad Finds New Home In Mac Classic”