Introducing The First Cisco Certified Mixologist

You’d be hard pressed to find an IT back office that doesn’t have a few Cisco routers or switches laying around and collecting dust. We’d even bet there are a decent number of people reading this post right now that have a stack of them within arm’s reach. They’re the kind of thing most of us have no practical application for, but we still can’t bear to throw away. But it looks like [Sven Tantau] has found an ideal middle ground: rather than junk his Cisco Catalyst switches, he turned them into automatic bartenders.

Inspired by all those perfect little square openings on the front, [Sven] loaded each switch with a whopping 24 peristaltic pumps, one for each Ethernet port. To fit all his plumbing inside, the switches were naturally gutted to the point of being hollow shells of their former selves, although he does mention that their original power supplies proved useful for keeping two dozen power-hungry motors well fed.

The motors are connected to banks of relays, which in turn are thrown by an ESP32 and an Arduino Nano. [Sven] explains that he wasn’t sure if the ESP32 could fire off the relays with its 3 V output, so he decided to just use an Arduino which he already knew could handle the task. The two microcontrollers work in conjunction, with a web interface on the ESP32 ultimately sending I2C commands to the Arduino when it’s time to get the pumps spinning.

[Sven] mentions his robotic bartenders were a hit at the 2019 Chaos Communication Camp, where we know for a fact the computer-controlled alcohol was flowing freely. Of course, if you don’t intend on carrying your barbot around to hacker camps, you can afford to make it look a bit swankier.

Continue reading “Introducing The First Cisco Certified Mixologist”

Modular Camera Remote Is Highly Capable

Many cameras these days have optional remotes that allow the shutter release to be triggered wirelessly. Despite this, [Foaly] desired more range, and more options for dealing with several cameras at once. As you’d expect, hacking ensued.

[Foaly] uses Silver modules to photograph rocket launches safely.
The system goes by the name of Silver, and is modular in nature. Each Silver module packs a transmitter and receiver, and can send and receive trigger orders to any other module in range. This allows a module to be used to trigger a camera, or be used as a remote to control other modules. There’s even a PC interface program that controls modules over USB.

Modules are also capable of sharing configuration changes with other modules in the field, making it easy to control a large battery of cameras without having to manually run around changing settings on each one. Oh, and it can run as a basic intervalometer too.

LoRa is used for wireless communications between modules, giving them excellent range. [Foaly] successfully used the remotes at ranges over 500 meters without any dropouts, capturing some great model rocket takeoffs in the process.

Silver is a highly robust project that should do everything the average photographer could ever possibly need, and probably a good deal more. Firmware and board files are available for those eager to make their own.

We’ve seen several very impressive camera augmentations entered into the 2019 Hackaday Prize, from ultra high-speed LED flash modules to highly flexible automatic trigger systems.

More Supercon Talks Taking The Hardware World By Storm

You’re going to love the talks at the Hackaday Superconference this November. The ultimate hardware conference is all about hardware creation. The ten speakers below join the talks we announced last week and that’s still not even half of what you’ll see on the stages of Supercon. Add to that the superb workshops we announced early this week and you begin to ask yourself just how much awesome can really fit into a single weekend. Well, it’s three full days and we’d recommend arriving the day before for the unofficial festivities too!

Of course, you’ll need a ticket to ride. At the time of writing there were some available (we’ve left the teens and are headed for single digits), but no guarantee there will be any left when this article is published. We’ll be maintaining a waiting list though, so if you’re sitting on a ticket you just can’t use, please return it so someone else can take your spot.

Enough delay, let’s see what talks await us at 2019 Supercon!

The Talks (Part Two of Many)


  • Shelley Green

    Pressure connections: crimping isn’t as simple as you thought.

    Crimping is generally defined as the joining of two conductors by mechanical forces. At first, the process appears to be rather simple. However, deeper investigations reveal complex dynamics that operate at macroscopic, microscopic, and nanoscales. I will cover the basic theory for pressure connections, examine the role of mechanical properties for both conductivity and tensile strength, look at oxides and surface films, and consider the design challenges for tooling, testing, and validation of crimp quality.


  • Mike Harrison

    Everything I’ve Learnt About LEDs.

    LEDs are not all created alike. I will cover a wide range of practical techniques involved in using LEDs, in particular in the context of large-scale installations, hower much of it will be equally applicable to smaller projects. Topics include suitable LED types, drive circuitry, dimming techniques, gamma correction. There will be live demonstrations illustrating many of the areas covered.


  • Kerry Scharfglass

    Basic Device Security for Basic Needs

    It feels like every day we hear about an unbelievable new security vulnerability that allows an attacker to spy on your dog through a connected light bulb or program your toaster oven remotely. Some of these are quite elaborate, requiring researchers years to track down. But others are total no-brainers; “why didn’t the manufacturer just do X!”. In our IoT-ified world device security is more important than ever, but not every hardware product needs to be secured like an ATM inside a missile. I will discuss basic design practices and implementation tricks which are easy to incorporate into your product and provide a solid baseline of security against casual adversaries.


  • Sophy Wong

    Made With Machines: 3D Printing & Laser Cutting for Wearable Electronics

    Building tech for the human body is tricky! Whether it’s a fitness tracker or a costume, making hardware comfortable and durable enough to wear is a fascinating design challenge. I like to tackle this challenge with the help of machines! In this talk, I’ll share my recent projects that use 3D printing and laser cutting to create wearable tech with precision and high impact. I’ll talk about the design process and build techniques for using 3D printing and laser cutting to create custom parts that are comfortable and perfect for wearables.


  • Jen Costillo

    The Future is Us: Why the Open Source And Hobbyist Community Will Drive Hi-Tech Consumer Products

    Where did we the OSHW and hobbyist community come from and what have we accomplished? The truth is we are driving modern consumer electronics industry. From prototyping, to tools to media and training, we have changed it all. I’ll talk about the reasons why, our impact and our future, as well as how to avoid becoming what the older industry is: obsolete.


  • Timothy Ansell

    Xilinx Series 7 FPGAs Now Have a Fully Open Source Toolchain!

    You should be super excited about FPGAs and how they allow open source projects to do hardware development. In this talk I will cover a basic introduction into what an FPGA is and can do, what an FPGA toolchain is, and how much things sucked when the only option was to use proprietary toolchains. The SymbiFlow project changed this and I’ll discuss what is currently supported including a demo of Linux on a RISC-V core with a cheap Xilinx FPGA development board.


  • Chris Gammell

    Gaining RF Knowledge: An Analog Engineer Dives into RF Circuits

    Starting my engineering career working on low level analog measurement, anything above 1kHz kind of felt like “high frequency”. This is very obviously not the case. I’ll go over the journey of discovering and rediscovering higher frequency techniques and squaring them with the low level measurement basics that I learned at the beginning my career. This will include a discussion of Maxwell’s equations and some of the assumptions that we make when we’re working on different types of circuits. You will find this information useful in the context of RF calculations around cellular, WiFi, Bluetooth and other commonly available communication methods.


  • Shanni Prutchi and Jeff Wood

    Adventures in Building Secure Networks from Blockchain Transactions

    In our talk, we will show how we designed and built a message authentication system operating on ADANA (Automated Detection of Anomalous Network Activity) and Hyperledger (a “smart contract” form of Blockchain) all hosted on just two servers that were no longer being used by Rowan College at Burlington County. The system was built using Docker, syslog-ng, Hyperledger Fabric and Composer, and a beta version of Splunk. This system is accessible by nodes wired into the network which interact with the hyperledger through a web browser. We’ll present the infrastructure of the network, details of the hyperledger, an explanation of all the tools used by the system, a walkthrough of how the system works, reflections on the particular challenges of this project, and what we see in the future of this technology.


  • John McMaster

    Replicating a Secure Telephone Key

    The STU-III secure telephone was originally developed by the NSA for defense use in the 1980’s but also saw use in unclassified commercial products like the Motorola Sectel 9600\. However, they require difficult to find electromechanical keys. I will describe the process of creating a compatible key for the Sectel 9600 by reverse engineering the mechanical and electrical design and subsequently fabricating it. Along the way I’ll discuss low volume manufacturing issues and strategies to overcome.

 

We Want You!

Don’t miss out. One weekend as one of so many amazing people will inspire you and recharge your creative batteries for the coming year of hardware hacking. See you at Supercon!

Hackaday Podcast 038: Cyberdecks Taking Over, Resin 3D-Printing Vs FDM, Silicone Injection Molding, And The Pickle Fork Fiasco

Hackaday Editors Tom Nardi and Mike Szczys comb through their favorite hacks from the past week. We loved Donald Papp’s article on considerations before making the leap from FDM 3D Printers to a resin-based process, and we solidify our thoughts on curing cement in low-gravity. Tom’s working on a Cyberdeck build, and he also found an ancient episode of an earlier and much different version of the Hackaday podcast. We’re impressed with a mostly 3D-printed useless machine, a thermal-insert press that’s also 3D-printed, and the Raspberry-Pi based Sidekick clone that popped up this week. A DIY wire-bending robot is an incredible build, as is the gorgeous wire-routing in a mechanical keyboard, and the filigree work on this playing card press. Plus you need to spend some time getting lost in this one hydrogen-line telescope project.

Take a look at the links below if you want to follow along, and as always tell us what you think about this episode in the comments!

Take a look at the links below if you want to follow along, and as always, tell us what you think about this episode in the comments!

Direct download (60 MB or so.)

Continue reading “Hackaday Podcast 038: Cyberdecks Taking Over, Resin 3D-Printing Vs FDM, Silicone Injection Molding, And The Pickle Fork Fiasco”

This Biofuel Cell Harvests Energy From Your Sweat

Researchers from l’Université Grenoble Alpes and the University of San Diego recently developed and patented a flexible device that’s able to produce electrical energy from human sweat. The lactate/O2 biofuel cell has been demonstrated to light an LED, leading to further development in the area of harvesting energy through wearables.

[via Advanced Functional Materials]
The research was published in Advanced Functional Materials on September 25, 2019. The potential use cases for this type of biofuel cell within the wearables space include medical and athletic monitoring. By using biofuels present in human fluids, the devices can rely on an efficient energy source that easily integrated with the human body.

Scientists have developed a flexible conductive material made up of carbon nanotubes, cross-linked polymers, and enzymes connected to each and printed through screen-printing. This type of composite is known as a buckypaper, and uses the carbon nanotubes as the electrode material.

The lactate oxidase works as the anode and the bilirubin oxidase (from the yellowish compound found in blood) as the cathode. Given the theoretical high power density of lactate, this technology has the potential to produce even more power than its current power generation of 450 µW.

[via Advanced Functional Materials]
The cell follows deformations in the skin and produces electrical energy through oxygen reduction and oxidation of the lactate in perspiration. A boost converter is used to increase the voltage to continuously power an LED. The biofuel cells currently delivered 0.74V of open circuit voltage. As measurements for power generation had to be taken with the biofuel cell against human skin, the device has shown to be productive even when stretched and compressed.

At the moment, the biggest cost for production is the price of the enzymes that transform the compounds in sweat. Beyond cost considerations, the researchers also need to look at ways to increase the voltage in order to power larger portable devices.

With all the exciting research surrounding wearable technology right now, hopefully we’ll be hearing about further developments and applications from this research group soon!

[Thanks to Qes for the tip!]

This Week In Security: Is RSA Finally Broken? The Push For Cloud Accounts, Encrypted DNS, And More Mobile Mayhem

Ever wondered what “cyberwar” looks like? Apparently it’s a lot of guessing security questions and changing passwords. It’s an interesting read on its own, but there are some interesting clues if you read between the lines. A General in the know mentioned that Isis:

clicked on something or they did something that then allowed us to gain control and then start to move.

This sounds very similar to stories we’ve covered in the past, where 0-days are used to compromise groups or individuals. Perhaps the NSA supplied such an exploit, and it was sent in a phishing attack. Through various means, the U.S. team quietly compromised systems and collected credentials.

The article mentions something else interesting. Apparently the targets of this digital sting had also been compromising machines around the world, and using those machines to manage their efforts. The decision was made by the U.S. team to also compromise those machines, in order to lock out the Isis team. This might be the most controversial element of the story. Security researchers have wanted permission to do this for years. How should the third parties view these incursions?

The third element that I found particularly interesting was the phase 2 attack. Rather than outright delete, ban, and break Isis devices and accounts, the U.S. team installed persistent malware that emulated innocuous glitches. The internet connection is extremely laggy on certain days, certain websites simply don’t connect, and other problems. These are the sort of gremlins that networking pros spend all day trying to troubleshoot. The idea that it’s intentional gives me one more thing to worry about. Continue reading “This Week In Security: Is RSA Finally Broken? The Push For Cloud Accounts, Encrypted DNS, And More Mobile Mayhem”

Navigate Around Garmin’s Custom Map Limits

If your only experience with Garmins is from that one rental car a few years back, it may surprise you that some of them, mostly the handheld outdoor units, allow custom maps. This sounds cool until you find out the limitations. Unless you upgrade to premium, it doesn’t allow map files larger than 3MB. What’s worse, it will choke the resolution of maps larger than one megapixel. Well, bust out your virtual hiking boots, because [facklere]’s gonna take you down the trail of DIY digital cartography.

You can use any map you want as long as its not completely fictional (although wandering the maps of middle-earth would be a fun hack on top of this one). Your map can be paper, PDF, or parchment; it just has to be converted to JPEG. The map [facklere] wanted to use was a huge PDF, so as a bonus, he shows how to get from PDF to JPEG in GIMP. Then comes the fiddly part — rooting the map in reality by overlaying it on real roads using Google Earth.

You’ve still got a huge map. Now what? The secret sauce is tiling. [facklere] used KMZfactory, a free map editor for Garmin maps that goes the extra mile to split the tiles for you, keeping them under the 1MP limit. Once that’s done, just upload it to your unit and hit the road.

Got an old Garmin that won’t do custom maps? See if you can get DOOM up and running on it.