Norway Leads The Charge To Phase Out Internal Combustion; China And The UK To Follow

Climate change promises to cause untold damage across the world if greenhouse gas emissions continue at current levels for much longer. Despite the wealth of evidence indicating impending doom, governments have done what humans do best, and procrastinated on solving the issue.

However, legislatures around the world are beginning to snap into action. With transportation being a major contributor to greenhouse gas emissions — 16% of the global total in 2016 — measures are being taken to reduce this figure. With electric cars now a viable reality, many governments are planning to ban the sale of internal combustion vehicles in the coming decades.

Continue reading “Norway Leads The Charge To Phase Out Internal Combustion; China And The UK To Follow”

Slim RGB Matrix Puts LEDs Inside The PCB

Sometimes all that’s required to build something interesting is to put the same old pieces together differently. [Sayantan Pal] did this for the humble RGB LED matrix, creating an extra-thin version by recessing WS2812b NeoPixel LEDs inside a PCB.

The popular WS2812B is 1.6 mm in height, which happens to be the most commonly used PCB thickness. Using EasyEDA, [Sayantan] designed a 8×8 matrix with modified WS2812B footprints. A slightly undersized cutout was added to create a friction-fit for the LEDs, and the pads were moved to the back side of the panel just outside the cutout, and their assignment were flipped. The PCB is assembled face down, and all the pads are soldered by hand. Unfortunately this creates rather large solder bridges which slightly increases the overall thickness of the panel, and is probably also unsuitable for production with conventional pick-and-place assembly.

We’ve seen some similar methods with PCB assemblies that use layered PCBs. Manufacturers are starting to even embed components inside multilayer PCBs.

A Brain Transplant For An Uncommon Smart Bulb

By now it’s a hardware hack that’s become common enough to be unremarkable, taking a smart light bulb or other mains switchable appliance and replacing its firmware with an open-source equivalent such as Tasmota. But what can be done when a new device is found to have a microcontroller unsupported by any open-source equivalents? If you are [Luca Dentella], you don’t throw in the towel and buy another one with a known processor, instead you reverse engineer it enough to give it a brain transplant of an ESP8266 module.

The Fcmila branded smart bulb in question was found to have a relatively unknown Chinese SoC, the Opulinks OPL1000. Since this couldn’t even raise a serial port it was more trouble than it was worth to write software for it, so instead he spent a while reverse engineering its schematic and electrical protocols, before grafting in a Wemos D1 ESP8266 board. He’s made a video about the project which you can see below the break.

Thankfully the majority of smart bulbs on the market seem to use more familiar hardware that can be flashed with relative ease.

Continue reading “A Brain Transplant For An Uncommon Smart Bulb”

These Micro Mice Have Macro Control

Few things fascinate a simple Hackaday writer as much as a tiny robot. We’ve been watching [Keri]’s utterly beguiling micromouse builds for a while now, but the fifth version of the KERISE series (machine translation) of ‘bots takes the design to new heights.

A family of mice v1 (largest) to v5 (smallest)

For context, micromouse is a competition where robots complete to solve mazes of varying pattern but standardized size by driving through them with no guidance or compute offboard of the robot itself. Historically the mazes were 3 meter squares composed of a 16 x 16 grid of cells, each 180mm on a side and 50mm tall, which puts bounds on the size of the robots involved.

What are the hallmarks of a [Keri] micromouse design? Well this is micromouse, so everything is pretty small. But [Keri]’s attention to detail in forming miniaturized mechanisms and 3D structures out of PCBs really stands out. They’ve been building micromouse robots since 2016, testing new design features with each iteration. Versions three and four had a wild suction fan to improve traction for faster maneuvering, but the KERISE v5 removes this to emphasize light weight and small size. The resulting vehicle is a shocking 30mm x 32mm! We’re following along through a translation to English, but we gather that [Keri] feels that there is still plenty of space on the main PCBA now that the fan is gone.

The KERISE v5 front end

The processor is a now familiar ESP32-PICO-D4, though the wireless radios are unused so far. As far as environmental sensing is concerned the v5 has an impressive compliment given its micro size. For position sensing there are custom magnetic encoders and a 3 DOF IMU. And for sensing the maze there are four side-looking IR emitter/receiver pairs and one forward-looking VL6180X laser rangefinder for measurements out to 100 or 150mm. Most of these sensors are mounted on little PCB ‘blades’ which are double sided (check out how the PCB shields the IR emitter from it’s receiver!) and soldered into slots perpendicular to the PCBA that makes up the main chassis. It goes without saying that the rest of the frame is built up of custom 3D printed parts and gearboxes.

If you’d like to build a KERISE yourself, [Keri] has what looks to be complete mechanical, electrical, and firmware sources for v1, v2, and v3 on their Github. To see the KERISE v5 dance on a spinning sheet of paper, check out the video after the break. You don’t want to miss it!

Continue reading “These Micro Mice Have Macro Control”

A UV Curing Wand For Everyone

The average person’s experience with an ultraviolet (UV) wand is getting a cavity at the dentist. However, anyone with a resin-based 3d printer knows how important a UV curing system is. Often times some spots on a print need a little bit of extra UV to firm up. [Mile] has set out to create an open-source UV curing wand named Photon that is cost-effective and easy to build.

What’s interesting here is that there are dozens if not hundreds of UV curing systems ranging from $5 LED flashlights to larger industrial flood systems. [Mile] dives right in and shows the trade-offs that those cheaper modules are making as well as what the commercial systems are doing that he isn’t. [Mile’s] Photon wand tries to be energy efficient with more irradiated power while staying at a lower cost. This is done by carefully selecting the CSP LEDs instead of traditional wire-bonded and making sure the light source is properly focused and cooled. From the clean PCB and slick case, it is quite clear that [Mile] has gone the extra step to make this production-friendly. Since there are two industry-standard wavelengths that resins cure at (364nm and 405nm), the LED modules in Photon are user-replaceable.

What we love about this project is looking past what is readily available and diving deep. First understanding the drawbacks and limitations of what is there, then setting a goal and pushing through to something different. This isn’t the first UV curing tool we’ve seen recently, so it seems there is a clear need for something better that’s what is out there today.

Continue reading “A UV Curing Wand For Everyone”

Hackaday Links Column Banner

Hackaday Links: December 6, 2020

By now you’ve no doubt heard of the sudden but not unexpected demise of the iconic Arecibo radio telescope in Puerto Rico. We have been covering the agonizing end of Arecibo from almost the moment the first cable broke in August to a eulogy, and most recently its final catastrophic collapse this week. That last article contained amazing video of the final collapse, including up-close and personal drone shots of the cable breaking. For a more in-depth analysis of the collapse, it’s hard to beat Scott Manley’s frame-by-frame analysis, which really goes into detail about what happened. Seeing the paint spalling off the cables as they stretch and distort under loads far greater than they were designed for is both terrifying and fascinating.

Exciting news from Australia as the sample return capsule from JAXA’s Hayabusa2 asteroid explorer returned safely to Earth Saturday. We covered Hayabusa2 in our roundup of extraterrestrial excavations a while back, describing how it used both a tantalum bullet and a shaped-charge penetrator to blast regolith from the surface of asteroid 162173 Ryugu. Samples of the debris were hoovered up and hermetically sealed for the long ride back to Earth, which culminated in the fiery re-entry and safe landing in the midst of the Australian outback. Planetary scientists are no doubt eager to get a look inside the capsule and analyze the precious milligrams of space dust. In the meantime, Hayabusa2, with 66 kilograms of propellant remaining, is off on an extended mission to visit more asteroids for the next eleven years or so.

The 2020 Remoticon has been wrapped up for most of a month now, but one thing we noticed was how much everyone seemed to like the Friday evening Bring-a-Hack event that was hosted on Remo. To kind of keep that meetup momentum going and to help everyone slide into the holiday season with a little more cheer, we’re putting together a “Holiday with Hackaday & Tindie” meetup on Tuesday, December 15 at noon Pacific time. The details haven’t been shared yet, but our guess is that this will certainly be a “bring-a-hack friendly” event. We’ll share more details when we get them this week, but for now, hop over to the Remo event page and reserve your spot.

On the Buzzword Bingo scorecard, “Artificial Intelligence” is a square that can almost be checked off by default these days, as companies rush to stretch the definition of the term to fit almost every product in the neverending search for market share. But even those products that actually have machine learning built into them are only as good as the data sets used to train them. That can be a problem for voice-recognition systems; while there are massive databases of utterances in just about every language, the likes of Amazon and Google aren’t too willing to share what they’ve leveraged from their smart speaker using customer base. What’s the little person to do? Perhaps the People’s Speech database will help. Part of the MLCommons project, it has 86,000 hours of speech data, mostly derived from audiobooks, a clever source indeed since the speech and the text can be easily aligned. The database also pulls audio and the corresponding text from Wikipedia and other random sources around the web. It’s a small dataset, to be sure, but it’s a start.

And finally, divers in the Baltic Sea have dredged up a bit of treasure: a Nazi Enigma machine. Divers in Gelting Bay near the border of Germany and Denmark found what appeared to be an old typewriter caught in one of the abandoned fishing nets they were searching for. When they realized what it was — even crusted in 80-years-worth of corrosion and muck some keys still look like they’re brand new — they called in archaeologists to take over recovery. Gelting Bay was the scene of a mass scuttling of U-boats in the final days of World War II, so this Engima may have been pitched overboard before by a Nazi commander before pulling the plug on his boat. It’ll take years to restore, but it’ll be quite a museum piece when it’s done.

Leaking Data By Ultrasound

Human ears are capable of perceiving frequencies from roughly 20 Hz up to 20 kHz, at least when new. Correspondingly, our audio hardware is designed more or less to target these frequencies. However, there’s often a little extra capability at the upper edges, which [Jacek] shows can be exploited to exfiltrate data.

The hack takes advantage of the fact that most computers can run their soundcards at a sample rate of up to 48 kHz, which thanks to the Nyquist theorem means they can output frequencies up to around 24 kHz — still outside the range of human hearing. Computers and laptops often use small speaker drivers too, which are able to readily generate sound at this frequency. Through the use of a simple Linux shell script, [Jacek] is able to have a laptop output Morse code over ultrasound, and pick it up with nothing more than a laptop’s internal microphone at up to 20 meters away.

[Jacek] enjoys exploring alternative data exfiltration methods; he’s previously experimented with Ethernet leaks on the Raspberry Pi. Of course, with any airgap attack, the real challenge is often getting the remote machine to run the exfiltration script when there’s no existing remote admin access to be had. Video after the break.

Continue reading “Leaking Data By Ultrasound”