32-Bit Processing For The Vectrex Arcade System

Alongside the Commodores, Ataris, Nintendos, and all the other game systems of the 80s, there was a single unique video game system that stood out from the pack. This was the Vectrex, a console with a built-in CRT meant to display vector graphics and only vector graphics. The video game crash of 1983 wasn’t kind to the Vectrex, but it still lives on with a reasonably popular homebrew scene. Still, these homebrew games are limited by the hardware itself. After thirty years, the Vectrex has an upgrade. The Vectrex32 is a coprocessor, designed for the Vectrex cartridge slot, that gives this ancient console better graphics and 32-bit capabilities.

There’s a whole site dedicated to this Vectrex add-on, and the hardware is pretty much what you would expect. There’s a fast PIC32 microcontroller on this cartridge, a USB port, and a dual-port memory chip that’s connected to the Vectrix’s native processor.

Since this add-on cartridge is effectively a computer itself,  the Vectrex32 can operate as a BASIC interpreter for the Vectrex. That’s something the original hardware couldn’t have done, and makes homebrew development much easier.

You can check out a few videos describing the functionality of the Vectrex32 below, along with a few gameplay videos of new homebrew games written specifically for the Vectrex.

Continue reading “32-Bit Processing For The Vectrex Arcade System”

Ask Hackaday: How Does This Air Particle Sensor Work?

The hardware coming out of [Dr. Peter Jansen]’s lab is the craziest stuff you can imagine. He’s built a CT scanner out of plywood, and an MRI machine out of many, many turns of enamel wire. Perhaps his best-known build is his Tricorder – a real, all-sensing device with permission from the estate of [Gene Roddenberry] to use the name. [Peter]’s tricorder was one of the finalists for the first Hackaday Prize, but that doesn’t mean he’s stopped working on it. Sensors are always getting better, and by sometime in the 23rd century, he’ll be able to fit a neutrino detector inside a tiny hand-held device.

One of the new sensors [Peter] is working with is the MAX30105 air particle sensor. The marketing materials for this chip say it’s designed for smoke detectors and fire alarms, but this is really one of the smallest dust and particle sensors on the market. If you want a handheld device that detects dust, this should be the chip you’re looking at.

Unfortunately, Maxim is being very, very tight-lipped about how this particle sensor works. There is a way to get access to raw particle counts and the underlying algorithms, and Maxim is more than willing to sell those algorithms through a third-party distributor. That’s simply not how we do things around here, so [Peter] is looking for someone with a fancy particle sensor to collect a few hours of data so he can build a driver for this chip.

Here’s what we know about the MAX30105 air particle sensor. There are three LEDs inside this chip (red, IR, and green), and an optical sensor underneath a piece of glass. The chip drives the LEDs, light reflects off smoke particles, and enters the optical sensor. From there, magic algorithms turn this into a number corresponding to a particle count. [Peter]’s hackaday.io log for this project has tons of data, math, and statistics on the data that comes out of this sensor. He’s also built a test rig to compare this sensor with other particle sensors (the DSM501A and Sharp sensors). The data from the Maxim sensor looks good, but it’s not good enough for a Tricorder. This is where you, o reader of Hackaday, come in.

[Peter] is looking for someone with access to a fancy particle sensor to collect a few hours worth of data with this Maxim sensor in a test rig. Once that’s done, a few statistical tests should be enough to verify the work done so far and build a driver for this sensor. Then, [Peter] will be able to play around with this sensor and hopefully make a very cheap but very accurate air particle sensor that should be hanging on the wall of your shop.

Trademarking Makerspace (Again)

A British company has filed a trademark application for the word ‘MakerSpace’. While we’ve seen companies attempt to latch on to popular Maker phrases before, Gratnells Limited, the company in question, is a manufacturer of plastic containers, carts, and other various storage solutions. These products apparently provide a space to store all the stuff you make. Something along those lines.

This isn’t the first time we’ve seen someone try to glom onto the immense amount of marketing Make: has put into the term ‘makerspace’. In 2015, UnternehmerTUM MakerSpaceGmbH, an obviously German tech accelerator based in Munich, filed an application to trademark the word ‘Makerspace’. A few days later, we got word this makerspace wasn’t trying to enforce anything, they were just trying to keep the rug from being pulled out from under them. It was a defensive trademark, if something like that could ever exist (and it can’t under US trademark law). Swift and efficient German bureaucracy prevailed, and the trademark was rejected.

The trademark in question here covers goods including, ‘metal hardware and building materials’, ‘trolleys, trolleys with trays’, ‘guide rails of non-metallic materials’, and ‘lids for containers’, among other storage-related items. While this is far outside the usual meaning for a ‘makerspace’ – a building or club with a whole bunch of tools – if this trademark is approved, there is always the possibility of overzealous solicitors.

Fortunately, Gratnells released a statement today saying they would not defend or continue this trademark. This is in light of the recent, limited reaction to the trademark application. The word Makerspace is safe again another day.

Thanks [Tom] for the tip.

A Tiny Bench Power Supply

One of the more popular projects for beginners in electronics is a power supply. Yes, you can always go to Amazon and buy a nice power supply, but unfortunately, we haven’t set up our Amazon affiliate links yet. Instead, we’ll have to go with the next best thing and check out [Tron900]’s mini bench power supply build. It’s extremely capable and cute as a button.

The design goals for this project were to build a small and compact unit using mostly salvaged and recycled components, with all through-hole circuitry. The best guide you’ll ever find for a DIY power supply is one of [Dave Jones]’ earlier video series going over the construction of an adjustable power supply based on an LT3080. [Tron] didn’t have this regulator on hand and wanted to base his design around an op-amp instead. After rummaging through his parts, he found what he was looking for: a TIP3055 power transistor, a neat enclosure that could double as a heatsink and an AD680 voltage reference.

The design of this power supply was simulated in SIMETRIX, and after a few revisions [Tron] had a circuit that worked reasonably well. The circuit was populated on a piece of perfboard, a fantastic front panel was constructed, and one of those ubiquitous volt/ammeter panels added.

This is just a one-off project, but the results are fantastic. This is a very small, very capable power supply that does everything [Tron] needs. It’s accurate enough, at least when measured with a fancy benchtop HP meter, and looks adorable. What more could you want in a benchtop power supply?

Hackaday Links: April 9, 2017

[Federico Musto], one of the Arduinos in the Arduino vs. Arduino saga (which finally came to an end last September) may have fabricated his academic record. This news comes from Wired, providing documents from the registrars at MIT and NYU stating [Musto] never attended these institutions. Since this story came out, [Musto] has edited his LinkedIn, listing his only academic credential as a kindergarten in Torino, Italy.

[shininglaser] built a tinnitus machine. What’s a tinnitus machine? It’s a device that, when activated, produces this sound: eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee. [shininglaser] built this tinnitus machine out of a pair of speakers, a cardboard box, a few batteries, and some sort of board with an epoxy-coated blob. We have no idea what the circuit looks like, but you could do this with any normal signal pulsing at around 15-18kHz (address pins on a CPU for bonus nerd cred) or a simple 555 timer.

This is a hackers bar. This bar in Roppongi, Tokyo is, “a place where you can enjoy live programming and business making…. The term ‘hacker’ is applied to someone who possesses top skills and knowledge to provide innovative and quick solutions even to the most difficult tasks.” It appears they have daily events/talks for JavaScript, Python, R, and Swift.

Captain Crunch needs our help. He’s facing some serious surgery, and even if it’s successful, there’s going to be a lot of stuff insurance doesn’t cover.

We can use Libreboot again. A few months ago, the Libreboot project left the GNU project after an issue with an employee at the Free Software Foundation. Hackaday chose not to report on this only because the accusations levied against the FSF were hearsay. I should emphasize this: the only reason we chose not to report on this is because the accusations were hearsay. Now the Libreboot project is under more democratic management and they’re working on the Thinkpad X220, the greatest Thinkpad of all time. Neat.

Here’s a quick and easy tip to get metal fume fever. Build a foundry out of a galvanized trash can! No, don’t worry about that galvanized coating, it’ll burn off. Oh, he’s doing this indoors. What’s carbon monoxide? Why am I sleepy?

The Cubic Cyphercon Badge

Last week in Milwaukee was Cyphercon, Wisconsin’s premier hacker conference. You can’t do a hacker con without either an electronic conference badge or a 45 hanging off a lanyard, and the Cyphercon 2017 badge doesn’t disappoint. It’s an electronic cube, lovingly designed by the folks at tymkrs. It’s also a puzzle box with security holes and wireless communications. It’s a mesh network of badges, and one of the best conference badges we’ve ever seen.

The most obvious feature of the Cyphercon 2.0 badge is the extra dimension. From the outset, the design of this badge was a 3-dimensional cube, constructed out of beautifully crafted PCBs and soldered together at the edges. The techniques to bring PCBs into the third dimension are really nothing new — we’ve seen 3D PCBs before — but never at this kind of volume. There were over four hundred badges constructed for Cyphercon, and every single joint was hand-soldered. This is something your assembly house just won’t do, and I would hate to think about the poor solder monkeys that would be forced to assemble 3D badges for a larger con.

3D isn’t the only trick up the Cyphercon badge. There are cutouts in each side of the cube exposing LEDs, microprocessors, busses, and a single USB port. This USB port allows the wearer to recharge the battery, yes, but if you install a terminal emulator on your laptop and plug in the badge, you’re dropped into a world of mystery, intrigue, and suffocation. This badge is a text adventure game, with the goal of a game to reassemble a relay-based computer from parts scrounged from around a missile silo. Once the relay computer is complete, the badge turns into an emulator for a vintage time-sharing operating system. In this OS, you’re able to write code and deploy it to other badges. This is seriously impressive stuff.

Between the cubic Cyphercon badge, the Hunter S. Rodriguez badge heading to Vegas this summer, and badges that are Nintendo emulators, this is looking like a great year for electronic conference badges. The artistry and skill here is amazing, and we can’t wait to see what else the community will come up with.

Below, you can check out a few videos on the Cypbercon badge. [Wire]’s explanation of how the badge was created over the last nine months is in there, as is the Cyphercon badge panel talk.

Continue reading “The Cubic Cyphercon Badge”

How To Hack Your Own Password

[Haseeb] failed the marshmallow test as a kid. He has no self-control. He wastes a lot of time on reddit. There is a solution to this problem — simply lock yourself out of your account. The process is simple, and all you need to do is change your password to something random, change the recovery email address, and click submit. In the blink of an eye, all your imaginary Internet points vanish.

That’s the one guaranteed way to quit reddit. However, [Haseeb] wanted to hold onto those magic Internet points in the event they become worth something. This led to a far more baroque solution. He found a service that would email him at a later date, send an email to himself containing a random password, and quit reddit temporarily. Until that email was delivered, he was officially off reddit. When that email was received, productivity would stop.

A few years pass, and [Haseeb] had some time to kill at his new job. He decided to scrounge up his old password, only to discover he locked himself out of his Reddit account until 2018. What followed is a security exploit of an ’email me in the future’ service, and a great example of how much effort one person will commit to a lifetime of instant gratification.

The email service in question is LetterMeLater, a site that will send an email at some arbitrary point in the future. You can hide the body of the email from yourself, making this a fairly good solution for what [Haseeb] is doing. He was still locked out of his email, though, and emailing the people running LetterMeLater seemed absurd. Dopamine is fun, though, and [Haseeb] eventually found a workaround. This site indexes the body of an email for search. This is great, because the body of the email this site would send [Haseeb] in 2018 contained his reddit password and only his reddit password. With a little bit of code, he can perform substring queries on an email he can’t read. Now, extracting the password is simply a first year CS homework problem.

At this point, the only thing [Haseeb] knows about his password is that it’s a long string of random characters that probably doesn’t include upper-case characters. That’s 26 possible characters, 10 possible numbers, and a character bank that can be determined by searching his email one character at a time. [Haseeb] is essentially playing Hangman against his former self here.

After figuring out an API for LetterMeLater, [Haseeb] whipped up a quick bit of code that finds the password by searching substrings. It’s beautiful and recursive, although he did break it down into finding a suffix of the password then determining the remainder of the password. It took 443 iterations of the code to find the password, and when that was complete he logged into reddit. Math works, although [Haseeb] will have to figure out a way to wean himself off the opiate of the millennials again.