Regular Hackaday readers will have noted a succession of stories following the reports of drones in the air over British airports and in proximity to aircraft. We’ve consistently asked for a better quality of investigation and reporting into these cases, because so far the absence of reported tangible evidence of a drone being present casts doubt on the validity of the official reaction. For too long the official records of air proximity incidents have relied upon a shockingly low standard of proof when apportioning blame to drone operators, and this situation has contributed to something of a panic over the issue.
It seems that some members of the British drone flying community are on the case though. Airprox Reality Check are a group analysing air proximity reports and linking them to contemporary ADS-B and weather records to identify possible explanations. They have devised a rating system based upon a number of different metrics in an attempt to quantify the reliability of a particular report, and they are tabulating their analysis of air proximity reports on a month by month basis. This includes among many analyses such gems as Airprox Report #2019046, in which an Embraer 170 flying at 9000 feet and 20 km offshore reported a drone in close proximity. The Airprox Reality Check analysis points out that no known drone could manage that feat, and refers to a passing Boeing 737 revealed through ADS-B data as a more likely culprit.
Their latest news is that they have made a Freedom of Information request to the Air Proximity Board, asking for what evidence the Board has of a drone having been involved in any of the over 350 incidents in UK airspace having been reported as involving drones. The official response contains the following quote:
in all cases UKAB has no confirmation that a drone has flown close to an aircraft other than the report made by the pilot(s). Similarly, other than from the report of the pilot(s), UKAB has no confirmation that a drone was involved.
This confirms the view of the multirotor and drone community that has been reported by Hackaday in the past, that the whole British drone panic has been based upon unreliable and uncorroborated reports from eyewitnesses with little direct experience of multirotors. If any irresponsible drone operator is flying into close proximity with aircraft or otherwise into protected airspace then it goes without saying that they should be prosecuted, yet it seems that the community is being punished as though this had happened when the reality is that no such acts are proven to have occurred.
After the immense failure of the 2013-era Apple Pro trash can Mac, Apple has been hard at work at the next generation of workstation desktops. This week, the new Mac Pro has been announced, and the specs are amazing: We finally can buy a professional, desktop Mac with half the storage of an iPhone. The big story isn’t the next generation of cheese-grater Macs, though: the new display, the Pro Display XDR, has killed the venerable VESA mount and we couldn’t be happier.
The VESA mount, or more correctly, the VESA Mounting Interface Standard, was created in 1997 as a mounting standard for flat panel monitors and televisions. Look on the back of your monitor, and you’ll probably find a pattern of M4 threaded inserts laid out on a 75mm or 100mm square. Larger sizes, with respectively larger thread sizes, are used for gigantic wall-mounted televisions. For the last two decades, this has been the standard for mounting monitors to stands. Now this standard faces a challenger thanks to the brave designers at Apple. Continue reading “Apple Just Killed The VESA Mount And We Couldn’t Be Happier”
In the RF world, attenuators are a useful test and measurement tool. Variable units that can apply different levels of attenuation in discrete steps are even better. [DuWayne] made a 63 dB step attenuator by putting two smaller units in series, with an Arduino Nano in control of them. With a 3D printed enclosure and OLED for feedback, the device is easily adjusted with a single rotary encoder. There was even room to add a micro USB plug for recharging the power supply.
The two smaller digital attenuators [DuWayne] used are essentially breakout boards for the PE4302 digital RF attenuator, and cheaply available from the usual overseas sources. They are capable of up to 31.5 dB of attenuation in 0.5 dB steps, and by using two in series (and controlling them in parallel) [DuWayne] gets a range of up to 63 dB. The design files can be downloaded from a Dropbox share for the project, should you wish to try any of it for yourself.
Are you interested in RF and maybe software defined radio (SDR)? We’ve covered all the stuff you’ll need to get started with an inexpensive RTL-SDR, and sooner or later you may find yourself in need of [Dan Maloney]’s info on cheap and effective dummy loads.
Have you ever found yourself in a crowded restaurant on a Saturday night, holding onto one of those little gadgets that blinks and vibrates when it’s your turn to be seated? Next time, bust out the HackRF and follow along with [Tony Tiger] as he shows how it can be used to easily fire them off. Of course, there won’t actually be a table ready when you triumphantly show your blinking pager to the staff; but there’s only so much an SDR can do.
Even if you aren’t looking to jump the line at your favorite dining establishment, the video that [Tony] has put together serves as an excellent practical example of using software defined radio (SDR) to examine and ultimately replicate a wireless communications protocol. The same techniques demonstrated here could be applied to any number of devices out in the wild with little to no modification. Granted these “restaurant pagers” aren’t exactly high security devices to begin with, but you’d be
horrified surprised how many other devices out there take a similarly cavalier attitude towards security.
[Tony] starts by using inspectrum to examine the Frequency-shift keying (FSK) modulation used by the 467.750 Mhz devices, and from there, uses Universal Radio Hacker to capture the actual binary data being sent over the air. Between studying the transmissions and the information he found online, he was eventually able to piece together the packet structure used by the restaurant’s base station.
Finally, he wrote a Python script which generates packets based on which pager he wants to set off. If he’s feeling particularly mischievous, he can even set them all off at once. The script outputs a binary file which is then loaded into GNU Radio for transmission via the HackRF. [Tony] says he’s not quite ready to release his script yet, but he gives enough information in the video that the intrepid hacker could probably get their own version up and running by the time he gets it posted up to GitHub anyway.
We saw some very similar techniques demonstrated at the recent WOPR Summit security conference, so once you’re done hacking the local restaurants, you can take these same lessons and apply them to the rest of the Internet of Things. If you’re wondering, it’s even easier to eavesdrop on the non-restaurant pagers.
Continue reading “Your Table Is Ready, Courtesy Of HackRF”
The infrared remote control might not hold the seat of honor in the average home theater setup that it once enjoyed, but it’s not quite out to pasture yet. After all, what are you going to use to stop Netflix once the Chromecast invariably disconnects from your phone? As long as there are devices out there that will respond to commands blasted their way via an IR LED, hackers will be looking to get in on the action.
In an effort to make IR remote hacking just a bit easier, [sjm4306] has submitted his Remoteduino for the 2019 Hackaday Prize. With this handy tool in your arsenal, you can focus on developing the software side of your next IR remote project without worry about the hardware. Just upload your code, and get clicking.
As you might imagine, the design is rather simple. On the front edge of the PCB you’ve got the prerequisite IR LED, and a healthy supply of tactile buttons that your code can use as input. The remote features a fairly standard layout on the top half, complete with silkscreened labels for the common functions, but below that [sjm4306] has packed in six general purpose buttons that can be used for whatever you like.
The Remoteduino is powered by an ATmega328P, and the whole thing runs on a CR2032 cell mounted on the backside. [sjm4306] mentions in his write-up on Hackaday.io that battery life was always a consideration during development of the Remoteduino, so he’s made a few energy-saving considerations. Using the internal 8 MHz oscillator instead of an external crystal shaved a bit off the top, and the aggressive sleep routines got him the rest of the way. In testing, he estimates the battery should last a few years even with daily use.
Continue reading “Simple Arduino Universal Remote Control”
Blade Runner showed us a dystopian megatropolis vision of Los Angeles in the far-off future. What was a distant dream for the 1982 theater-goes (2019) is now our everyday. We know Los Angeles is not perpetually overcast, flying cars are not cruising those skies, and replicants are not hiding among the population. Or… are they?
The LayerOne conference takes place in greater Los Angeles and this year it adopted a Blade Runner theme in honor of that landmark film. My favorite part of the theme was the conference badge modeled after a Voight-Kampff machine. These were used in the film to distinguish replicants from humans, and that’s exactly what this badge does too. In the movies, replicants are tested by asking questions and monitoring their eyes for a reaction — this badge has an optional eye-recognition camera to deliver this effect. Let’s take a look!
Continue reading “Hunting Replicants With The 2019 LayerOne Badge”
Many of us have had the experience of viewing an artwork in a gallery, in which the eyes appear to follow one around the room. In our high-technology work, this no longer need be achieved with artistic skill. You can just build something that actually moves instead.
Chartreuse is the creation of [alynton], and has a personality all its own. A face was created out of laser cut wood, and assembled layer by layer. It was then given glowing LED eyes, and mounted on a rotating plate. Combined with an Arduino and an ultrasonic sensor, it’s capable of tracking targets moving within its field of view, and rotating to follow them. Chartreuse’s expression changes as well, with from happy to forlorn, depending on the situation.
It’s a great example of the artistic results that can be achieved by layering lasercut materials, as well as how art can be brought to life with simple maker staples like servos and microcontrollers. Motion tracking has plenty of useful applications, too – like aiming heat directly at cold humans. Video after the break.
Continue reading “Motion Tracking Face Really Does Follow You Around The Room”