The world around us is a scary place, with a lot of visible and invisible dangers. Some of those invisible dangers are pretty obvious, such as that of an electrical shock from exposed wiring. Some are less obvious, for example the dangers of UV radiation to one’s skin and eyes commonly known, but also heavily underestimated by many until it’s too late. In the US alone, skin cancer ends up affecting about one in every five people.
Perhaps ironically, while the danger from something like UV radiation is often underestimated, other types of electromagnetic radiation are heavily overestimated. All too often, the distinction between what is and isn’t considered to be harmful appears to be made purely on basis of whether it is ‘natural’ radiation or not. The Sun is ‘natural’, ergo UV radiation cannot be harmful, but the EM radiation from a microwave or 5G wireless transceiver is human-made, and therefore harmful. This is, of course, backwards.
Rather than dismissing such irrational fears of radiation, let’s have a look at both the science behind radiation and the way humans classify ‘danger’, such as in the case of 5G cell towers. Continue reading “On 5G And The Fear Of Radiation”
If you’re reading Hackaday, you’ve almost certainly heard of JTAG. There’s an excellent chance you’ve even used it once or twice to reflash an unruly piece of hardware. But how well do you actually know JTAG? More specifically, do you know how useful it can be when reverse engineering hardware?
Whether you’re a JTAG veteran or a novice, this phenomenal guide written by [wrongbaud] is sure to teach you a thing or two. Starting with a low-level explanation of how the interface actually works, the guide takes you though discovering JTAG ports on unknown targets, the current state-of-the-art in open source tools to interact with the device, and finally shows a real-world example of pulling and analyzing a gadget’s firmware.
There’s no way to do his write-up justice with a breakdown or a summary, so we won’t even try. Just get comfortable, maybe grab a drink, and dive in. It’s certainly not a short read, but there isn’t a wasted word on the page. Every piece of the puzzle, from how to figure out an unlabeled pinout to determining the instruction length, is explained in exactly the amount of detail you’re looking for. This is a guide for hackers written by a hacker, and it shows.
It will probably come as no surprise to find this isn’t the first time [wrongbaud] has done a deep dive like this. Over the last few months we’ve been covering his series of practical reverse engineering guides, and each one has been an invaluable resource. Perfect study guides for when a global pandemic has you stuck in the house.
We all think we could use a third arm from time to time, but when we actually play this thought experiment out in our heads we’ll eventually come to the same hurdle [caltadaniel] found, which is a lack of a controller. His third arm isn’t just an idea, though. It’s a Yaskawa industrial robot that he was able to source for pretty cheap, but it was missing a few parts that he’s been slowly replacing.
The robot arm came without a controller or software, but also without any schematics of any kind, so the first step was reverse engineering the wiring diagram to get an idea of what was going on inside the arm. From there some drivers were built for the servos, but the key to all of it is the homemade controller. The inverse kinematics math was done in Python and runs on an industrial PC. Once it was finally all put together [caltadaniel] had a functioning robotic arm for any task he could think of.
Interestingly enough, while he shows the robot brushing his teeth for him, he also set it up to flip the switch of a useless machine that exists only to turn itself off. There’s something surreal about a massive industrial-sized robotic arm being used to turn on a $20 device which will switch itself back off instantly, but the absurdity is worth a watch.
Continue reading “Industrial Robot Given New Life And Controller”