Most of us have Ethernet in our homes today. The real backbones of the Internet though, use no wires at all. Optical fibers carry pulses of light across the land, under the sea, and if you’re lucky, right to your door. [Sven Brauch] decided to create an optical link. He didn’t have any fiber handy, but air will carry laser pulses over short distances quite nicely. The idea of this project is to directly convert ethernet signals to light pulses. For simplicity’s sake, [Sven] limited the bandwidth to one channel, full-duplex, at 10 Megabits per second (Mbps).
The transmit side of the circuit is rather simple. An op-amp circuit acts as a constant current source, biasing the laser diode. The transmit signal from an Ethernet cable is then added in as modulation. This ensures the laser glows brightly for a 1 bit but never shuts completely off for a 0 bit.
The receive side of the circuit starts with a photodiode. The diode is biased up around 35 V, and a transimpedance amplifier (a current to voltage converter) is used to determine if the diode is seeing a 1 or a 0 from the laser. A bit more signal conditioning ensures the output will be a proper differential Ethernet signal.
[Sven] built two identical boards – each with a transmitter and receiver. He tested the circuit by pointing it at a mirror. His Linux box immediately established a link and was reported that there was a duplicate IP address on the network. This was exactly what [Sven] expected. The computer was confused by its own reflection – but the laser and photodiode circuits were working.
Finally, [Sven] connected his PC and a Raspberry Pi to the two circuits. After carefully aligning the lasers on a wooden board, the two machines established a link. Success! (But be aware that a longer distances, more sophisticated alignment mechanisms may be in order.)
The ESP32 is Espressif’s follow-up to their extraordinarily popular ESP8266 WiFi chip. It has a dual-core, 32-bit processor, WiFi, Bluetooth, ADCs, DACs, CAN, a Hall effect sensor, an Ethernet MAC, and a whole bunch of other goodies that make this chip the brains for the Internet of Everything. Everyone has been able to simply buy an ESP32 for a few months now, but the Hackaday tip line isn’t exactly overflowing with projects and products built around this wonderchip. Perhaps we need an ESP32 dev board or something.
The Hornbill is the latest crowdfunding campaign from CrowdSupply. It’s an ESP32 dev board, packed with the latest goodies, a single cell LiPo charger, and a USB to serial chip that will probably work with most operating systems. The Hornbill comes in two varieties, a breadboardable module, with a breakout board that includes an SD card slot, sensors, an RGB LED, and a bunch of prototyping space. The second version is something like an Adafruit Flora with big pads for alligator clips.
While this isn’t the first ESP32 breakout we’ve seen — Adafruit, Sparkfun, and a hundred factories in China are pumping boards with this chip out — it is a very easy and inexpensive way to get into the ESP32 ecosystem.
If you’ve ever experimented with a robot gripper, you’ll know that while it is easy to make an analogue of the human ability to grip between thumb and forefinger, it is extremely difficult to capture the nuances of grip with the benefit of touch feedback to supply only just enough of the force required to grip and hold an object. You as a human can pick up a delicate eggshell without breaking it using the same hand you might use to pick up a baseball or a cricket ball, but making your robot do the same thing is something of an engineering challenge.
The robot gripper is something that has exercised the minds of the folks at Festo, and the solution they have arrived at is as beautiful as it is novel. They have produced a gripper based upon the action of an octopus tentacle, though unlike the muscle of the real thing they’ve created a silicone tube which bends inwards when inflated. Its inner surface is covered with octopus-like suckers, some of which can be activated by a vacuum. The result is a very capable and versatile gripper which due to its soft construction is ideal for use in environments in which robots and humans interact.
They’ve put up a slick video showing the device in action, which we’ve put below the break. Tasks such as gripping a rolled-up magazine or a plastic bottle that would tax more conventional grippers are performed faultlessly.
Well, think again. At least if you are using Chrome or Firefox. Don’t believe us? Well, check out Apple new website then, at https://www.apple.com . Notice anything? If you are not using an affected browser you are just seeing a strange URL after opening the webpage, otherwise it’s pretty legit. This is a page to demonstrate a type of Unicode vulnerability in how the browser interprets and show the URL to the user. Notice the valid HTTPS. Of course the domain is not from Apple, it is actually the domain: “https://www.xn--80ak6aa92e.com/“. If you open the page, you can see the actual URL by right-clicking and select view-source.
So what’s going on? This type of phishing attack, known as IDN homograph attacks, relies on the fact that the browser, in this case Chrome or Firefox, interprets the “xn--” prefix in a URL as an ASCII compatible encoding prefix. It is called Punycode and it’s a way to represent Unicode using only the ASCII characters used in Internet host names. Imagine a sort of Base64 for domains. This allows for domains with international characters to be registered, for example, the domain “xn--s7y.co” is equivalent to “短.co”, as [Xudong Zheng] explains in his blog.
Different alphabets have different glyphs that work in this kinds of attacks. Take the Cyrillic alphabet, it contains 11 lowercase glyphs that are identical or nearly identical to Latin counterparts. These class of attacks, where an attacker replaces one letter for its counterpart is widely known and are usually mitigated by the browser:
The cube sat in question is UPSat, a 2U cubesat that is completely Open Source. Everything from the chassis to the firmware is completely Open, with all the source files hosted on GitHub.
UPSat is currently on its way to the International Space Station stowed in an Orbital ATK Cygnus cargo spacecraft. From here, the UPSat will be unloaded by members of the current ISS expedition and deployed with help from NanoRacks. Basically, the first Open Source satellite will be tossed overboard from the International Space Station. If you want to listen in on the data UPSat is beaming down, build a SatNOGS ground station and tune into 435.765 MHz. With a good antenna, you should be able to hear it when the ISS is in the sky, or a few times a week.
You can check out the launch of the Cygnus the UPSat is flying on in the video below. NASA also recorded a 360° video from the launch pad that unfortunately cuts out in the first few seconds after launch.
Oh, for cryin’ out loud. That’s the last straw. We’ve seen one dangerous YouTube video too many. Are we honestly cursed with a false feedback system that unequitably rewards dangerous behavior in online videos? Obviously the answer is ‘yes’. Now the real question becomes, can we do anything about it?
Professional Driver on a Closed Course
Marketing is all about putting something in front of a consumer and getting their brain to go “awesome!”. The fast, loud, shiny, burny, and sharp things are all on the table for that task. It’s the primal part of your brain that gives you jolt, as if your amygdala forgot how to run from sabertooths (saberteeth?) and learned how to like and subscribe.
Back in the day, people were hurt and even killed when replicating stunts they saw done on television. To protect from litigation, companies started adding disclaimers — Don’t Try this at Home or my favorite: Professional Driver on a Closed Course.
But the thing is, commercials are big business. If someone gets hurt, there’s money to be had by assigning blame in a court of law. When the ability to produce and distribute video content was democratized by the coming of the Internet we lost those warnings and the common sense that went with them.
Going way back to this remote-control-a-real-car hack in 2009 I haven’t been able to shake the lack of consideration for danger in a project like this. I included it in the title, which ends with “(dangerously)”. While I wasn’t taken to task in the comments for that title, I have been chided for advocating for things as controversial as helmets when strapping your body to a moving object. Do a Ctrl-F on “helmet” in this article to see what I mean.
The people pulling off these hacks were doing it because it felt awesome and they wanted to document how that felt. They weren’t stars, they were hackers and the world mostly ignored them except in places like Hackaday. We might debate the lack of safety measures but most assumed anyone with skills to do this would take a beat to consider the risks. This was probably a false assumption.
It’s All About the Subs
Things have gotten worse since then. I can’t blame all of this on YouTube, but I’m going to try. One day, YouTube changed everything. They put together a perfect mix of easy uploading, great discoverability, and (most importantly) advertising revenue sharing. For some people, this became a business and not just a way to connect with the rest of the hacker community.
This is the rise of the subscriber base. It’s a vicious cycle — you need more people to like and subscribe so that their influence will push your channel to more people to like and subscribe. The problem is, the fastest way to this is that tricky amygdala again. For some, this is being funny, but for others this is speed, fireballs, and loud bangs, with no regard for life, limb, or eyeball.
But even the more mainstream content appears to be getting more and more dangerous. Our beloved [Colin Furze] is guilty of dangerous behavior. Not only did he burn himself testing a jet engine out without any safety gear, but turned the aftermath into another ad-supported video.
Which brings me to the straw that broke the camel’s back. Here’s a hack that’s based on the idea of hurting people. It’s what is (luckily) a crappy robot designed to recognize faces and shine lasers into any eyes it detects. Literally it’s conceived to shoot your eyes out. It’s using a red laser that likely won’t cause eye damage unless you intentionally stare into it without blinking, but that’s not discussed in the video, and someone who doesn’t know better replicating this with a different laser could easily cause irreparable damage to their sight.
Rocket Scientists Use Common Sense and So Should You
I was going to use the heading “This Isn’t Rocket Science”, but you don’t see rocket scientists testing new engine designs by lighting a fuse as they run away giggling in short sleeves and flip-flops. Those brilliantly intelligent people are tucked safely in a bunker at a safe distance with their hands hovering over the emergency kill switch as fire fighting equipment hangs out at arms reach. Rocket scientists know a lot about safety and so should you.
This is simple. We don’t have to invent anything to add safety to our hacks. Use common sense. Dress appropriately for your demo — as the situation dictates use reasonable fire-resistant clothing, helmet, etc. Wear protective glasses, laser spec’d goggles, and ear plugs; each whenever called for. Take fumes and particulates seriously and wear respiratory gear. Keep a fire extinguisher around. And if you’re making a video or posting images about it — which you should definitely do — snap a picture or give us a quick video cut to the safety precautions you’ve chosen.
I still want to see awesome projects on YouTube. But I also want to see the trend towards danger for clicks stopped. Let’s do dangerous stuff safely. And let’s be conspicuous about those safety measures. That combination is truly awesome.
Now get off my lawn, and wear your seat belt while doing so.
Every week Hackaday.io features an AMA of sorts. This is the Hack Chat, a chatroom where we sit down with the best in the business to talk about manufacturing techniques, engineering, and how to build the best hardware around. Over the last few months, we’ve hosted a few hardware celebrities, from [Sprite_TM] talking about the ESP32, [Lady Ada] and MicroPython, [Roger Thornton] of Raspberry Pi discussing how to build everyone’s favorite Linux computer, [Samy Kamkar] talking about reverse engineering, and heard [bunnie’s] take on making and breaking hardware.
Now we’re looking for new co-hosts to lead a discussion and be the expert in the room. If you have the skills, we want to hear from you.
We’re looking for experts to lead a discussion on what they’re doing. If you have a new hardware product and want to share the story of taking it to production while getting some feedback from the Hackaday community, this is the place to do it. We’re looking for a wide range of people who will allow us to pick their brains. If you’ve ever designed a 16-layer PCB, we want to know how (and why) you did it. If you’re into building robotics, we want to hear from you. If you’re an embedded systems wizard, this is your time to shine.
If you want to get in on this, send us an email. We’re doing one Hack Chat a week, every Friday, sometime around noon, Pacific time. This is a great opportunity for you to share what you know with one of the best hardware communities on the Internet. It’s also great practice if you’re thinking about presenting at the Hackaday SuperConference in November.
This Week: How do Magnets Work Anyway?
Do you know how magnets work? Of course you don’t, nobody does. But one of the people with the deepest knowledge on the topic is Jeremy Chan who is a Prototype Engineer at Nano Magnetics Ltd. This Friday at noon PST Jeremy leads a Hack Chat on magnetism.
What is there to talk about? Jeremy will cover how magnets are manufactured and magnetized. He’ll cover the different grades of magnets, and the different magnetic sensing mechanisms. He’ll also go into some of the most interesting magnetic phenomenon. How often do you get to hang out with a magnet expert? See you this Friday!
By using our website and services, you expressly agree to the placement of our performance, functionality and advertising cookies. Learn more