We know that LED video cubes are so last year, but that doesn’t mean we don’t still love to see them. Any project that incorporates over 24,000 LEDs is bound to be impressive, after all. But the more interesting bit about [Mike Cann]’s self-contained LED cube has more to do with the process he chose to get to the finished product.
There are two ways to approach a new project, especially when you’re new to hardware hacking like [Mike] is. One is to jump in with both feet and just see what happens, for good or for ill. The other is is to ease into it with a starter project, to find out where your limitations lay and work around them gradually. [Mike Cann] wisely chose the latter approach with his LED cube project, starting with an LED sand toy. The single 64 x 64 LED panel was a bit easier to work with, and got him up to speed on the care and feeding of such hardware, as well as the code needed to drive it. The video below tells the tale of scaling that project up by a factor of six to make the cube, a process that had its share of speedbumps. Everything ended up fitting together great, though, letting [Mike] get on to the software side. That’s where this project really shines — the smartphone app running the cube is really slick, and the animations are great.
There’s clearly room for new features on [Mike]’s cube, so here’s hoping he can carve out some time to make a great build even better. For inspiration he might want to check out this side-scrolling Castlevania cube, or perhaps read up on the finer points of OpenGL for LED cubes.
Continue reading “From Zero To LED Cube In Less Than Seven Months”
Another DDOS amplification technique has just recently been disclosed, NXNSAttack (technical paper here) that could be used against DNS servers.
We’ve covered amplification attacks before. The short explanation is that some UDP services, like DNS, can be abused to get more mileage out of a DDoS attack. The attacking machined send messages like this: “Hello Google DNS, This is the Hackaday server. Can you send me a really big DNS response packet?” If the DNS response is bigger than the request, then the overall attack is bigger as a result. The measure of effectiveness is the amplification factor. For every byte of DDoS sent by attacking machines, how much many bytes are actually sent to the victim machine? Mirai, for example, had an amplification factor of something around 2.6.
NXNSAttack has a theoretical per-byte amplification factor of 163. That’s not a missed decimal point, this has the potential to be quite the nasty problem. Continue reading “This Week In Security: DNS DDOS, Revenge Of The 15 Year Old Bug, And More”
While Valve’s Steam Controller ultimately ended up being a commercial flop, most users agreed its use of touch-sensitive pads in place of traditional analog joysticks or digital directional buttons was at least a concept worth exploring. Those same touchpad aficionados will likely be very interested in this modification by [Matteo Pisani], which replaces the analog joystick on a Nintendo Switch Joy-Con with a capacitive touch sensor.
As [Matteo] explains in his detailed write-up, the initial inspiration for this project was to create a permanent solution to joystick fatigue and drifting issues. He reasoned that if he removed the physical joystick completely, there would be no way for it to fail in the future. We’re not sure how many people would have taken the concept this far, but you can’t argue with the logic.
The original joystick is a fairly straightforward device, comprised of two analog potentiometers and a digital button. It’s connected to the Joy-Con’s main PCB with a 0.5 mm pitch flexible cable, so the first step for [Matteo] was to spin up a breakout for the cable in KiCad to make the development process a bit easier.
The board design eventually evolved to hold an Arduino Pro Mini, a digital potentiometer, and a connector for the circular touchpad. The Arduino communicates with both devices over I2C, and translates the high resolution digital output of the touch controller into an analog signal within the expected ranges of the original joystick. [Matteo] says he still has to implement the stick’s digital push button, but thanks to an impressive 63 levels of pressure sensitivity on the pad, that shouldn’t be a problem.
Now that he knows the concept works, the next step for [Matteo] is to clean it up a bit. He’s already working on a much smaller PCB that should be able to fit inside the Joy-Con, and we’re very interested in seeing the final product.
We’ve seen several interesting Joy-Con hacks since the Switch hit the market, including a somewhat less intense joystick swap. Between the Joy-Con and the legendary Wii Remote, Nintendo certainly seems to have a knack for creating input devices that catch the imagination of gamers and tinkerers alike.
Continue reading “Joy-Con Mod Gives Nintendo Switch Touchpad Control”
What could you do with a dual-core 240 MHz ESP32 that supports Arduino-style programming, with 16 MB of flash, 8 MB of PSRAM, and 520 k of RAM? Oh, let’s throw in a touchscreen, an accelerometer, Wifi, and Bluetooth. Besides that, it fits on your wrist and can show the time? That’s the proposition behind Lilygo T Watch 2020. If it sounds like a smartwatch, it is. At around $25 –and you can snag the hardware from a few different places — it is not only cheaper than the latest flagship smartwatch, but it is also infinitely more hackable.
OK, so the screen is only 1.54″, but then again, it is a watch. If Arduino isn’t your thing, you can use anything else that supports the ESP32 like Micropython or even Scratch. There are variants that have LoRA and GPS, at slightly higher prices. You can also find ones with heart rate monitors and other features.
Continue reading “Is That An ESP32 On Your Wrist?”