Bing Crosby famously sang “Just let a smile be your umbrella.” George Carlin, though, said, “Let a smile be your umbrella, and you’ll end up with a face full of rain.” [BebBrabyn] probably agrees more with the former and used a Raspberry Pi with Open CV to detect a smile, a feature some digital cameras have had for a long time. This project however doesn’t take a snapshot. It launches a marshmallow using a motor-driven catapult. We wondered if he originally tried lemon drops until too many people failed to catch them properly.
This wouldn’t be a bad project for a young person — as seen in the video below — although you might have to work a bit to duplicate it. The catapult was upcycled from a broken kid’s toy. You might have to run to the toy store or rig something up yourself. Perhaps you could 3D print it or replace it with a trebuchet or compressed air.
Continue reading “Reinforce Happy Faces With Marshmallows And Computer Vision” →
If you have even the slightest interest in microwave electronics and radar, you’re in for a treat. The Signal Path is back with another video, and this one covers the internals of a simple 24-GHz radar module along with some experiments that we found fascinating.
The radar module that [Shahriar] works with in the video below is a CDM324 that can be picked up for a couple of bucks from the usual sources. As such it contains a lot of lessons in value engineering and designing to a price point, and the teardown reveals that it contains but a single active device. [Shahriar] walks us through the layout of the circuit, pointing out such fascinating bits as capacitors with no dielectric, butterfly stubs acting as bias tees, and a rat-race coupler that’s used as a mixer. The flip side of the PCB has two arrays of beam-forming patch antennas, one for transmit and one for receive. After a few simple tests to show that the center frequency of the module is highly variable, he does a neat test using gimbals made of servos to sweep the signal across azimuth and elevation while pointing at a receiving horn antenna. This shows the asymmetrical nature of the beam-forming array. He finishes up by measuring the speed of a computer fan using the module, which has some interesting possibilities in data security as well as a few practical applications.
Even though [Shahriar]’s video tend to the longish side, he makes every second count by packing in a lot of material. He also makes complex topics very approachable, like what’s inside a million-dollar oscilloscope or diagnosing a wonky 14-GHz spectrum analyzer.
Continue reading “A Radar Module Teardown And Measuring Fan Speed The Hard Way” →
It’s been at least a month or two since the last vulnerability in Intel CPUs was released, but this time it’s serious. Foreshadow is the latest speculative execution attack that allows balaclava-wearing hackers to steal your sensitive information. You know it’s a real 0-day because it already has a domain, a logo, and this time, there’s a video explaining in simple terms anyone can understand why the sky is falling. The video uses ukuleles in the sound track, meaning it’s very well produced.
The Foreshadow attack relies on Intel’s Software Guard Extension (SGX) instructions that allow user code to allocate private regions of memory. These private regions of memory, or enclaves, were designed for VMs and DRM.
How Foreshadow Works
The Foreshadow attack utilizes speculative execution, a feature of modern CPUs most recently in the news thanks to the Meltdown and Spectre vulnerabilities. The Foreshadow attack reads the contents of memory protected by SGX, allowing an attacker to copy and read back private keys and other personal information. There is a second Foreshadow attack, called Foreshadow-NG, that is capable of reading anything inside a CPU’s L1 cache (effectively anything in memory with a little bit of work), and might also be used to read information stored in other virtual machines running on a third-party cloud. In the worst case scenario, running your own code on an AWS or Azure box could expose data that isn’t yours on the same AWS or Azure box. Additionally, countermeasures to Meltdown and Spectre attacks might be insufficient to protect from Foreshadown-NG
The researchers behind the Foreshadow attacks have talked with Intel, and the manufacturer has confirmed Foreshadow affects all SGX-enabled Skylake and Kaby Lake Core processors. Atom processors with SGX support remain unaffected. For the Foreshadow-NG attack, many more processors are affected, including second through eighth generation Core processors, and most Xeons. This is a significant percentage of all Intel CPUs currently deployed. Intel has released a security advisory detailing all the affected CPUs.
Two or three years back you would see a handful of really interesting unofficial badges at DEF CON. Now, there’s a deluge of clever, beautiful, and well executed badges. Last weekend I tried to see every badge and meet every badge maker. Normally, I would publish one megapost to show off everything I had seen, but this year I’m splitting it into volumes. Join me after the break for the first upload of the incredible badges of DC26!
Continue reading “All The Badges Of DEF CON 26 (vol 1)” →
There are plenty of places outside where you may like to have a project requiring electricity that may not get enough sun for solar power to be viable. Perhaps wind power could be used instead? [Greg] has a project to create a platform for using a small wind turbine to generate the power for your projects.
The wind turbine that [Greg] designing is a Savonius-style wind turbine that would put out between 5 and 12 volts. In a Savonius turbine, blades are mounted on a vertical axis allowing for a smaller, less complicated build than traditional horizontal axis wind turbines. The design is named for its inventor, Finnish engineer Sigurd Johannes Savonius.
After doing some research, the design will have a 2:1 height to blade ratio and use three pairs of overlapping curved blades stacked on top of each other, each pair offset by 120 degrees. This design, [Greg] figures, will come within a few percentage points of the efficiency of more exotic blade shapes while making the windmill easy to design and implement. Being half cylinders, the blades can easily be made from existing objects cut in half – pop cans, for example, but there has been some designing the blades in Fusion 360 for 3D printing. The stator board has been designed and the initial prototypes of it and the rotor have arrived, so the testing can now commence.
Once the design is finalized and the prototype working, it’d be interesting to see some projects start showing up using wind power instead of solar power. Take a look at this design for a vertical wind turbine, and this design for a simple, straightforward turbine.
There is one thing that unites almost every computer and logic circuit commonly used in the hardware hacking and experimentation arena. No matter what its age, speed, or internal configuration, electronics speak to the world through logic level I/O. A single conductor which is switched between voltage levels to denote a logic 1 or logic zero. This is an interface standard that has survived the decades from the earliest integrated circuit logic output of the 1960s to the latest microcontroller GPIO in 2018.
The effect of this tried and true arrangement is that we can take a 7400 series I/O port on an 8-bit microcomputer from the 1970s and know with absolute confidence that it will interface without too much drama to a modern single-board computer GPIO. When you think about it, this is rather amazing.
It’s tempting to think then that all logic level outputs are the same, right? And of course they are from a certain viewpoint. Sure, you may need to account for level shifting between for example 5V and 3.3V families but otherwise just plug, and go, right? Of course, the real answer isn’t quite that simple. There are subtle electrical differences between the properties of I/O lines of different logic and microcontroller families. In most cases these will never be a problem at all, but can rear their heads as edge cases which the would-be experimenter needs to know something about.
Continue reading “Behind The Pin: Logic Level Outputs” →
There is an air of excitement among the hackerspaces of Europe, because this month is hacker camp season. In Denmark they have Bornhack beginning on Thursday, in Italy IHC was held earlier in the month, while here in the UK we are looking forward to Electromagnetic Field. We’re excited be at Eastnor Castle for Electromagnetic Field at the cusp of August and September for several days under canvas surrounded by our community’s best and brightest work. We’ll even have a Hackaday Readers’ Village this year!
If you’ve never been to a hacker camp before, this is one that’s not to be missed. Technically this is camping, but where every structure from the smallest tent upwards has mains power and gigabit Ethernet. It’s the equivalent of a music festival if you replace the music with technology and other cool stuff from our world. There are talks on a huge variety of fascinating subjects, the chance to see up close some of the things you’ll have read about here on Hackaday, and best of all, a significant proportion of Europe’s hackerspace communities all together in one place. They are a uniquely stimulating and exciting environment.
Continue reading “Looking Forward To Electromagnetic Field 2018” →