What Is The Tianwen-1 Probe Saying?

A few days ago, the Chinese National Space Administration launched their Tianwen-1 mission to Mars from their launch site in the province of Hainan. It should arrive at the Red Planet in April 2021, when it will face the daunting task of launching a surface probe from its orbiting component, which will release a rover once it has reached the surface. Like all such missions it’s in constant contact with its controllers on the ground, and as with any radio transmissions floating through the aether its telemetry has been received by the radio hacker community and analaysed by [r00t].

Straight away there’s something interesting in the modulation scheme, instead of a carrier with modulation applied to it there is a main unmodulated centre carrier, and the data appears instead on a series of subcarriers. Is this a feature of its being a space probe, the unmodulated carrier making it easier to find and track in deep space?

They quickly find the telemetry carrier, and decode its frames. It carries a series of data sets, including positional and instrumentation data. From the positional data they can tell when the craft has made any course changes, and from the sensor data such as the solar sensor its movement can be deduced and graphed. It makes for a fascinating insight into the mission, and we’re grateful for the analysis.

Mars is a notoriously difficult target for space probes, somewhere that multiple missions have for various reasons failed to reach. We hope the Tianwen-1 mission is ultimately successful and that in time the Chinese space people will in due course be showing us some of the fruits of their labours. They’re not alone in launching this month, so we’ve got a plethora of Mars-related stories to look forward to next year.

Header image: Tianwen-1 rover mockup. Pablo de León‎ / CC BY-SA 3.0

Busting GPS Exercise Data Out Of Its Garmin-controlled IoT Prison

If you take to the outdoors for your exercise, rather than walking the Sisyphusian stair machine, it’s nice to grab some GPS-packed electronics to quantify your workout. [Bunnie Huang] enjoys paddling the outrigger canoe through the Singapore Strait and recently figured out how to unpack and visualize GPS data from his own Garmin watch.

By now you’ve likely heard that Garmin’s systems were down due to a ransomware attack last Thursday, July 23rd. On the one hand, it’s a minor inconvenience to not be able to see your workout visualized because of the system outage. On the other hand, the services have a lot of your personal data: dates, locations, and biometrics like heart rate. [Bunnie] looked around to see if he could unpack the data stored on his Garmin watch without pledging his privacy to computers in the sky.

Obviously this isn’t [Bunnie’s] first rodeo, but in the end you don’t need to be a 1337 haxor to pull this one off. An Open Source program called GPSBabel lets you convert proprietary data formats from a hundred or so different GPS receivers into .GPX files that are then easy to work with. From there he whipped up less than 200 lines of Python to plot the GPS data on a map and display it as a webpage. The key libraries at work here are Folium which provides the pretty browsable map data, and Matplotlib to plot the data.

These IoT devices are by all accounts amazing, listening for satellite pings to show us how far and how fast we’ve gone on web-based interfaces that are sharable, searchable, and any number of other good things ending in “able”. But the flip side is that you may not be the only person seeing the data. Two years ago Strava exposed military locations because of an opt-out policy for public data sharing of exercise trackers. Now Garmin says they don’t have any indications that data was stolen in the ransomware attack, but it’s not a stretch to think there was a potential there for such a data breach. It’s nice to see there are Open Source options for those who want access to exercise analytics and visualizations without being required to first hand over the data.

RadioGlobe Takes The World Of Internet Radio For A Spin

There’s no denying that the reach and variety of internet radio is super cool. The problem is that none of the available interfaces really give the enormity of the thing the justice it deserves. We long for a more physical and satisfying interface for tuning in stations from around the globe, and [Jude] has made just the thing.

RadioGlobe lets the user tune in over 2000 stations from around the world by spinning a real globe. It works by using two absolute rotary encoders that each have a whopping 1024 positions available. One encoder is stuck into the South Pole, and it reads the lines of longitude as the user spins the globe.

The other encoder is on the left side of the globe, and reads whatever latitude is focused in the reticle. Both encoder are connected to a Raspberry Pi 4, though if you want to replicate this open-source project using the incredibly detailed instructions, he says a Raspberry Pi 3 B+ will work, too.

In the base there’s an LCD that shows the coordinates, the city, and the station ID. Other stations in the area are tune-able with the jog wheel on the base. There’s also an RGB LED that blinks red while the station is being tuned in, and turns green when it’s done. We totally dig the clean and minimalist look of this build — especially the surprise transparent bottom panel that lets you see all the guts.

There are three videos after the  break – a short demo that gives you the gist of how it works, a longer demonstration, and a nice explanation of absolute rotary encoders. Those are just the tip of the iceberg, because [Jude] kept a daily vlog of the build.

Maybe you just long for a web radio that dials in vintage appeal. This antique internet radio has a lot of features, but you wouldn’t know it from the outside.

Continue reading “RadioGlobe Takes The World Of Internet Radio For A Spin”

Polymorphic String Encryption Gives Code Hackers Bad Conniptions

When it comes to cyber security, there’s nothing worse than storing important secret data in plaintext. With even the greenest malicious actors more than capable of loading up a hex editor or decompiler, code can quickly be compromised when proper precautions aren’t taken in the earliest stages of development. To help avoid this, encryption can be used to hide sensitive data from prying eyes. While a simple xor used to be a quick and dirty way to do this, for something really sophisticated, polymorphic encryption is a much better way to go.

A helpful tool to achieve this is StringEncrypt by [PELock]. An extension for Visual Studio Code, it’s capable of encrypting strings and data files in over 10 languages. Using polymorphic encryption techniques, the algorithm used is unique every time, along with the encryption keys themselves. This makes it far more difficult for those reverse engineering a program to decrypt important strings or data.

While the free demo is limited in scope, the price for the full version is quite reasonable, and we expect many out there could find it a useful addition to their development toolkit. We’ve discussed similar techniques before, often used to make harder-to-detect malware.

[Thanks to Dawid for the tip!]

3D Printing Latex Is Now Possible

For those getting started with 3D printers, thermoplastics such as ABS and PLA are the norm. For those looking to produce parts with some give, materials like Ninjaflex are most commonly chosen, using thermoplastic polyeurethane. Until recently, it hasn’t been possible to 3D print latex rubber. However, a team at Virginia Tech have managed the feat through the combination of advanced printer hardware and some serious chemistry.

Sample cubes printed with the new process. Note the clarity of the sample at the top right.

The work was primarily a collaboration between [Phil Scott] and [Viswanath Meenakshisundaram]. After initial experiments to formulate a custom liquid latex failed, [Scott] looked to modify a commercially available product to suit the project. Liquid latexes are difficult to work with, with even slight alterations to the formula leading the solution to become unstable. Through the use of a molecular scaffold, it became possible to modify the liquid latex to become photocurable, and thus 3D printable using UV exposure techniques.

The printer side of things took plenty of work, too. After creating a high-resolution UV printer, [Meenakshisundaram] had to contend with the liquid latex resin scattering light, causing parts to be misshapen. To solve this, a camera was added to the system, which visualises the exposure process and self-corrects the exposure patterns to account for the scattering.

It’s an incredibly advanced project that has produced latex rubber parts with advanced geometries and impressive mechanical properties. We suspect this technology could be developed quickly in the coming years to produce custom rubber parts with significant strength. In the meantime, replicating flexible parts is still possible with available filaments on the market.

[via phys.org]

Smoking Meat With A Commodore 64

When [Deadline] couldn’t find a replacement control module for his Masterbuilt electric smoker, he could have just tossed the thing in the trash. Instead, he decided to come up with his own system to take over for the smoker’s original brain. Basing it around the nearly 40 year old Commodore 64 probably wouldn’t have been our first choice, but it’s hard to argue with the end result.

Connectors to control the smoker’s hardware.

At the most basic level, controlling an electric smoker like this only requires a temperature sensor, a relay to control the heating element, and something to get those two devices talking to each other. But for the best results you’ll also want some kind of a timer, and an easy way to change the target temperature on the fly. Connecting the relay and temperature sensor up to the back of the C64 was easy enough, all he had to do was write the BASIC code to glue it all together.

This hack was made considerably easier thanks to the fact that the Masterbuilt’s original controller interfaced with the smoker by way of a couple relatively well documented connectors. So instead of having to mess with any of the mains voltage electronics, he simply had to bring a wire in the connector high to fire up the smoker’s heating element. This bodes well for anyone looking to replace the controller in a similar smoker, with a C64 or otherwise.

In the past we’ve seen some very impressive custom smoker controllers that look as though they could easily be adapted for use with these commercial units. Though the true smoke aficionados might prefer building the entire thing to their exacting specifications.

Continue reading “Smoking Meat With A Commodore 64”

A Low-Cost Current Probe For IoT Applications

When it comes to the Internet of Things, many devices run off batteries, solar power, or other limited sources of electricity. This means that low power consumption is key to success. However, often these circuits draw relatively small currents that are difficult to measure, with plenty of transient current draw from their RF circuits. To effectively measure these low current draws, [Refik Hadzialic] built a cheap but accurate current probe.

The probe consists of a low value resistor of just 0.1 Ω, acting as a current shunt in series with the desired load. By measuring the voltage drop across this known resistor, it’s possible to calculate the current draw of the circuit.

However, the voltage drop is incredibly small for low current draws, so some amplification is needed. [Refik] does a great job of explaining his selection process, going deep into the maths involved to get the gain and part choice just right. The INA128P instrumentation amplifier from Texas Instruments was chosen, thanks to its good Common Mode Rejection Ratio (CMRR) and gain bandwidth.

The final circuit performs well, competing admirably with the popular uCurrent Gold measurement tool. While less feature-packed, [Refik]’s circuit appears to perform better in the noise stakes, likely due to the great CMRR rating of the TI part. It’s a great example of how the DIY approach can net solid results over and above simply buying something off the shelf.

Current sensing is a key skill to have in your toolbox, and can even help solve laundry disputes. Video after the break.

Continue reading “A Low-Cost Current Probe For IoT Applications”