An In-Depth Look At The Haptic Smart Knob

At Hackaday, we love those times when we get a chance to follow up on a project that we’ve already featured. Generally, it’s because the project has advanced in some significant way, which is always great to see. Sometimes, though, new details on the original project are available, and that’s where we find ourselves with [Scott Bez] and his haptic smart knob project.

Alert readers may recall [Scott]’s announcement of this project back in March. It made quite a splash, with favorable comments and a general “Why didn’t I think of that?” vibe. And with good reason; the build quality is excellent, and the idea is simple yet powerful. By attaching a knob to the shaft of a brushless DC motor and mounting a small circular LCD screen in the middle, [Scott] came up with an input device that could be reprogrammed on the fly. The BLDC can provide virtual detents at any interval while generating haptic feedback for button pushes, and the LCD screen can provide user feedback.

But how is such a thing built? That’s the subject of the current video, which has a ton of neat design details and build insights. The big challenge for [Scott] was supporting the LCD screen in the middle of the knob while still allowing the knob — and the motor — to rotate. Part of the solution was, sadly, a hollow-shaft motor that was out of stock soon after he released this project; hopefully a suitable replacement will be available soon. Another neat feature is the way [Scott] built tiny strain gauges into the PCB itself, which pick up the knob presses that act as an input button. We also found the way button press haptics are provided by a quick jerk of the motor shaft very clever.

This is one of those projects that seems like a solution waiting for a problem, and something that you’d build just for the coolness factor. Hats off to [Scott] for following up a sweet build with equally juicy details.

Continue reading “An In-Depth Look At The Haptic Smart Knob”

Adding USB-C To An IPhone 13 Is Delicate Work

USB-C seeks to rule the roost when it comes to connectors, and even has Big Europe on its side. Apple hasn’t had to abandon Lightning just yet, but [Restore Technique] has put a USB-C port into an iPhone 13 to give us all an idea what it’s going to be like in the brave new future ahead of us.

The idea came about after disassembling the iPhone 13, and the project was locked in after seeing the first iPhone with a USB-C connector sell for $86,001 on eBay. The plan had to support fast charging, cable reversibility, and data transfer, without cutting out any functionality or compromising water resistance.

The concept is simple enough: take the C94 board from a Lightning to USB-C cable, and put it inside the phone along with a USB-C port. Of course, actually achieving that is the real challenge. Techniques from melting apart Lightning connectors to carefully peeling apart 0.5 mm pitch flex cables to fit 0.6 mm pitch pads.

It’s an impressive hack, and explained so well it’s actually tempting to try it at home for the sheer challenge of the thing. If you do pull off a similar hack yourself, drop us a line! Video after the break.

Continue reading “Adding USB-C To An IPhone 13 Is Delicate Work”

Mechanical Keyboards Are Over, This Device Has Won

The desk of any self-respecting technology enthusiast in the 2020s is not complete without a special keyboard of some sort, be it a vintage IBM Model M, an esoteric layout or form factor, or just a standard keyboard made with clacky mechanical switches. But perhaps we’ve found the one esoteric keyboard to rule them all, in the form of [HIGEDARUMA]’s 8-bit keyboard. You can all go home now, the competition has been well and truly won by this input device with the simplest of premises; enter text by setting the ASCII value as binary on a row of toggle switches. No keyboard is more retro than the one you’d find on the earliest microcomputers!

Jokes aside, perhaps this keyboard may be just a little bit esoteric for many readers, but it’s nevertheless a well-executed project. Aside from the row of binary inputs there is a keypress button which sends whatever the value is to the computer, and a stock button that allows for multiple inputs to be stored and sent as one. If you pause for a moment and think how often you use Ctrl-C and Ctrl-V for example, this is an essential function. There’s more information on a Japanese website (Google Translate link), which reveals that under the hood it’s a Bluetooth device running on an ESP32.

We can imagine that with a bit of use it would be possible to memorize ASCII as binary pretty quickly, in fact we wouldn’t be at all surprised to find readers already possessing that skill. But somehow we can’t imagine it ever being a particularly fast text input device. Take a look for yourselves, it’s in the video below the break.

Continue reading “Mechanical Keyboards Are Over, This Device Has Won”

SpinLaunch And The History Of Hurling Stuff Into Space

It’s fair to say that there’s really no phase of spaceflight that could be considered easy. But the case could be made that the most difficult part of a spacecraft’s journey is right at the very beginning, within the first few minutes of flight. At this point the vehicle’s booster rocket will be fighting with all its might against its own immense propellant-laden mass, a battle that it’s been engineered to win by the smallest of margins. Assuming the balance was struck properly and the vehicle makes its way off of the launch pad, it will still need to contend with the thick sea-level atmosphere as it accelerates, a building dynamic pressure that culminates with a point known as “Max q” — the moment where the air density imposes the maximum structural load on the rocket before quickly dropping off as the vehicle continues to ascend and the atmosphere thins.

Air-launched rockets avoid flying through dense sea level air.

While the vast majority of rocket launches have to contend with the realities of flying through the lower atmosphere, there are some exceptions. By launching a rocket from an aircraft, it can avoid having to power itself up from sea level. This allows the rocket to be smaller and lighter, as it doesn’t require as much propellant nor do its engines need to be as powerful.

The downside of this approach however is that even a relatively small rocket needs a very large aircraft to carry it. For example, Virgin Orbit’s LauncherOne rocket must be carried to launch altitude by a Boeing 747-400 airliner in order to place a 500 kg (1,100 lb) payload into orbit.

But what if there was another way? What if you could get all the benefits of starting your rocket from a higher altitude, without the cost and logistical issues involved in carrying it with a massive airplane? It might sound impossible, but the answer is actually quite simple…all you have to do it throw it hard enough.

Continue reading “SpinLaunch And The History Of Hurling Stuff Into Space”

Hackaday Podcast 174: Breaking Into The Nest, The Cheapest 3D Printer, A Spy In Your HDMI, And AI All Over The Place

Fresh from vacation, Editor-in-Chief Elliot Williams makes his triumphant return to the Hackaday Podcast! He’s joined this week by Managing Editor Tom Nardi, who’s just happy he didn’t have to do the whole thing by himself again. In this episode we’ll talk about tackling BGA components in your custom PCBs, a particularly well executed hack against Google’s Nest Hub, and why you probably don’t really want the world’s cheapest 3D printer. We’ll also take a look at an incredible project to turn the Nokia 1680 into a Linux-powered handheld computer, a first of its kind HDMI firewall, and a robot that’s pretty good at making tacos. Listeners who are into artificial intelligence will be in for quite a treat as well, as is anyone who dreams of elevating the lowly automotive alternator to a more prominent position in the hacker world.

By the way, it seems nobody has figured out the hidden message in last week’s podcast yet. What are you waiting for? One of you out there has to be bored enough to give it a shot.

Direct download, and play it offline. You don’t need no stinkin’ cloud.

Check out the links below if you want to follow along, and as always, tell us what you think about this episode in the comments!

Continue reading “Hackaday Podcast 174: Breaking Into The Nest, The Cheapest 3D Printer, A Spy In Your HDMI, And AI All Over The Place”

Active Signal Tracer Probe Has AGC

[Electronics Old and New] has a new version of one of his old projects. The original project was an active probe. He took what he learned building that probe and put it into a new probe design. He also added automatic gain control or AGC. You can see a video explanation of the design below. The probe is essentially a high-impedance input using a JFET that can amplify audio or demodulated RF signals, which is a handy device to have when troubleshooting radios.

The audio amplifier is a simple LM386 circuit. The real work is in the input stage and the new AGC circuit. Honestly, we’ve used the amplifier by itself for a similar function, although the raw input impedance of the chip is only about 50K and is less in many circuits that use a pot on the input. Having a JFET buffer and an RF demodulating diode is certainly handy. You’d think the AGC block would be in the audio stage. However, the design uses it ahead of the detector which is great as long as the amplifier can handle the RF frequency you are interested in. In this case, we think he’s mostly working on old tube AM radios, so the max signal is probably in the neighborhood of 1 MHz.

A similar device was a Radio Shack staple for many years

The module is made to amplify an electret microphone using a MAX9814 which has AGC. The module had a microphone that came off for this project. The datasheet doesn’t mention an upper frequency limit, but a similar Maxim part mentions its gain is greater than 5 at 600 kHz, so for the kind of signals this is probably used for, it should work well. We wondered if you could use the module and dispense with the JFET input. The chip probably has a pretty high input impedance, but the datasheet doesn’t give a great indication.

For years we used a signal tracer from Radio Shack which — if we could still find it — now has an LM386 inside of it after the original electronics failed decades ago. In those days, fixing an AM radio involved either using a device like this to find where you did and didn’t have a signal or injecting signals at different points in the radio. Two sides of the same coin. For example, if you could hear a signal at the volume control — that indicated the RF stages were good and you had a problem on the audio side. Conversely, if you injected a signal at the volume control, not hearing would mean the same thing. Once you knew if the problem was in the RF or AF side, you’d split that part roughly in half and repeat the operation until you were down to one bad stage. Of course, you could use signal generators and scopes, but in those days you weren’t as likely to have those.

Heathkit, of course, had their own version. It even had on of those amazing magic eye tubes.

Continue reading “Active Signal Tracer Probe Has AGC”

This Week In Security: IoT In The Hot Tub, App Double Fail, And FreeBSD BadBeacon

[Eaton Zveare] purchased a Jacuzzi hot tub, and splurged for the SmartTub add-on, which connects the whirlpool to the internet so you can control temperature, lights, etc from afar. He didn’t realize he was about to discover a nightmare of security problems. Because as we all know, in IoT, the S stands for security. In this case, the registration email came from smarttub.io, so it was natural to pull up that URL in a web browser to see what was there. The page presented a login prompt, so [Eaton] punched in the credentials he had just generated. “Unauthorized” Well that’s not surprising, but what was very odd was the flash of a dashboard that appeared just before the authorization complaint. Could that have been real data that was unintentionally sent? A screen recorder answered that question, revealing that there was indeed a table loaded up with valid-looking data.

Digging around in the page’s JavaScript comes up with the login flow. The page uses the Auth0 service to handle logins, and that service sends back an access token. The page sends that access token right back to the Auth0 service to get user privileges. If the logged in user isn’t an admin, the redirect happens. However, we already know that some real data gets loaded. It appears that the limitations to data is all implemented on the client side, and the backend only requires a valid access token for data requests. What would happen if the response from Auth0 were modified? There are a few approaches to accomplish this, but he opted to use Fiddler. Rewrite the response so the front-end believes you’re an admin, and you’re in.

This approach seems to gain admin access to all of the SmartTub admin controls, though [Eaton] didn’t try actually making changes to see if he had write access, too. This was enough to demonstrate the flaw, and making changes would be flirting with that dangerous line that separates research from computer crime. The real problem started when he tried to disclose the vulnerability. SmartTub didn’t have a security contact, but an email to their support email address did elicit a reply asking for details. And after details were supplied, complete radio silence. Exasperated, he finally turned to Auth0, asking them to intervene. Their solution was to pull the plug on one of the two URL endpoints. Finally, after six months of trying to inform Jacuzzi and SmartTub of their severe security issues, both admin portals were secured.

Continue reading “This Week In Security: IoT In The Hot Tub, App Double Fail, And FreeBSD BadBeacon”