Hackaday Links Column Banner

Hackaday Links: March 1, 2020

Talk about buried treasure: archeologists in Germany have – literally – unearthed a pristine Soviet spy radio, buried for decades outside of Cologne. While searching for artifacts from a Roman empire settlement, the archeologists found a pit containing the Soviet R-394KM transceiver, built in 1987 and apparently buried shortly thereafter without ever being used. It was found close to a path in the woods and not far from several sites of interest to Cold War-era spies. Curiously, the controls on the radio are labeled not in Cyrillic characters, but in the Latin alphabet, suggesting the radio was to be used by a native German speaker. The area in which it was found is destined to be an open-cast lignite mine, which makes us think that other Cold War artifacts may have fallen victim to the gore-covered blades of Bagger 288.

Good news for Betelgeuse fans, bad news for aficionados of cataclysmic cosmic explosions: it looks like the red giant in Orion isn’t going to explode anytime soon. Betelgeuse has been dimming steadily and rapidly since October of 2019; as a variable star such behavior is expected, but the magnitude of its decline was seen by some astronomers as a sign that the star was reaching the point in its evolution where it would go supernova. Alas, Betelgeuse started to brighten again right on schedule, suggesting that the star is not quite ready to give up the ghost. We’d have loved to witness a star so bright it rivals the full moon, but given the times we live in, perhaps it’s best not to have such a harbinger of doom appear.

If you plan to be in the Seattle area as the winter turns to spring, you might want to check out the Vintage Computer Fair Pacific Northwest. We visited back during the show’s first year and had a good time, and the Living Computers: Museum + Labs, where the event is held, is not to be missed. The Museum of Flight is supposed to be excellent as well, and not far away.

Mozilla announced this week that Firefox would turn on DNS over HTTPS (DoH) by default in the United States. DoH encrypts the DNS requests that are needed to translate a domain name to an IP address, which normally travel in clear text and are therefore easily observed. Easily readable DNS transactions are also key to content blockers, which has raised the hackles of regulators and legislators over the plan, who are singing the usual “think of the children” song. That DoH would make user data collection and ad-tracking harder probably has nothing to do with their protests.

And finally, sad news from California as daredevil and amateur rocketeer “Mad” Mike Hughes has been killed in a crash of his homemade rocket. The steam-powered rocket was to be a follow-up to an earlier, mostly successful flight to about 1,900 feet (580 m), and supposed to reach about 5,000 feet (1.5 km) at apogee. But in an eerily similar repeat of the mishap that nearly killed Evel Knievel during his Snake River Canyon jump in 1974, Mike’s parachute deployed almost as soon as his rocket left the launch rails. The chute introduced considerable drag before being torn off the rocket by the exhaust plume. The rocket continued in a ballistic arc to a considerable altitude, but without a chute Mike’s fate was sealed. Search for the video at your own peril, as it’s pretty disturbing. We never appreciated Mike’s self-professed Flat Earth views, but we did like his style. We suppose, though, that such an ending was more likely than not.

Single Bolt Transformed Into A Work Of Art

Every once in a while, this job helps you to discover something new and completely fascinating that has little to do with hacking but is worth sharing nonetheless. Turning a single brass bolt into a beautiful Cupid’s bow is certainly one of those times.

Watching [Pablo Cimadevila] work in the video below is a real treat, on par with a Clickspring build for craftsmanship and production values. His goal is to use a largish brass bolt as the sole source of material for a charming little objet d’art, which he achieves mainly with the use of simple hand tools. The stave of the bow is cut from the flattened shank of the bolt with a jeweler’s saw, with the bolt head left as a display stand. The offcuts are melted down and drawn out into wire for both the bowstring and the shaft of the arrow, a process that’s fascinating in its own right. The heart-shaped arrowhead and the faces of the bolt head are bedazzled with rubies; the technique [Pablo] uses to create settings for the stones is worth the price of admission alone. The complete video below is well worth a watch, but if you don’t have the twelve minutes to spare, a condensed GIF is available.

[Pablo]’s artistry reminds us a bit of this not-quite-one-bolt combination lock. We love the constraint of sourcing all a project’s materials from a single object, and we really appreciate the craftsmanship that goes into builds like these.

Continue reading “Single Bolt Transformed Into A Work Of Art”

A Simple Yet Feature-Packed Programmable DC Load

If you’ve got the hankering to own a lab full of high-end gear but your budget is groaning in protest, rolling your own test equipment can be a great option. Not everything the complete shop needs is appropriate for a DIY version, of course, but a programmable DC load like this one is certainly within reach of most hackers.

This build comes to us courtesy of [Scott M. Baker], who does his usual top-notch job of documenting everything. There’s a longish video below that covers everything from design to testing, while the link above is a more succinct version of events. Either way, you’ll get treated to a good description of the design basics, which is essentially an op-amp controlling the gate of a MOSFET in proportion to the voltage across a current sense resistor. The final circuit adds bells and whistles, primarily in the form of triple MOSFETS and a small DAC to control the set-point. The DAC is driven by a Raspberry Pi, which also supports either an LCD or VFD display, an ADC for reading the voltage across the sense resistor, and a web interface for controlling the load remotely. [Scott]’s testing revealed a few problems, like a small discrepancy in the actual amperage reading caused by the offset voltage of the op-amp. The MOSFETs also got a bit toasty under a full load of 100 W; a larger heatsink allows him to push the load to 200 W without releasing the smoke.

We always enjoy [Dr. Baker]’s projects, particularly for the insight they provide on design decisions. Whether you want to upgrade the controller for a 40-year-old game console or giving a voice to an RC2014, you should check out his stuff.

Continue reading “A Simple Yet Feature-Packed Programmable DC Load”

Nixies Adorn A Cold War Relic To Make A Geiger Clock

Say what you will about the centrally planned economies of the Soviet bloc during the Cold War, but their designs had a brutal style all their own. When one comes across an artifact from that time, like a defunct Polish Geiger counter from 1971, one celebrates that style the only way possible: by sticking Nixies tubes on it and making it into a Geiger clock.

Right off the hop, we’ve got to say that we’re in love with the look of [Tom Sparrow]’s build. And we’ll further stipulate that most of the charm comes from the attractive Bakelite case of the original Geiger counter. This looks like the real deal, with the marbleized look presumably caused by different color resins mixing in the mold. [Tom] did an admirable job bringing back the original shine with some polish and elbow grease; no doubt the decades had taken their toll on the original shine. The meter was gutted to make room for the clockworks, which is an off-the-shelf Nixie module. The tubes stick through holes drilled in the top; a pair of LEDs adorn the front panel and an incandescent bulb provides a warm glow behind the original meter. Combined with the original rotary switch and labels, the whole thing has a great look that’s perfect for a desk.

We’ve featured a lot of retro-classic Nixie builds, from digitizing a 1940s radio to a 1970s multimeter turned into a dice-roller. As for Nixie clocks, we’re just glad to take a break from the Nixie steampunk trend for a bit.

[via Dangerous Prototypes]

The Newbie’s Guide To JTAG

Do you even snarf?

If not, it might be because you haven’t mastered the basics of JTAG and learned how to dump, or snarf, the firmware of an embedded device. This JTAG primer will get you up to snuff on snarfing, and help you build your reverse engineering skills.

Whatever your motivation for diving into reverse engineering devices with microcontrollers, JTAG skills are a must, and [Sergio Prado]’s guide will get you going. He starts with a description and brief history of the Joint Test Action Group interface, from its humble beginnings as a PCB testing standard to the de facto standard for testing, debugging, and flashing firmware onto devices. He covers how to locate the JTAG pads – even when they’ve been purposely obfuscated – including the use of brute-force tools like the JTAGulator. Once you’ve got a connection, his tutorial helps you find the firmware in flash memory and snarf it up to a file for inspection, modification, or whatever else you have planned.

We always appreciate guides like these that cover the basics, since not everyone is in the same place in their hardware hacking journey. This puts us in the mood to crack something open and start looking for pins, if for no other reason than to get some practice.

[Thumbnail image source: LufSec]

Bitluni Brings All The ESP-32 Multimedia Hacks To Supercon

Of all the people I was looking forward to meeting at Supercon, aside from my Hackaday colleagues with whom I had worked for five years without ever meeting, was a fellow from Germany named Matthias Balwierz. The name might not ring a bell, but he’ll certainly be familiar to Hackaday readers as Bitluni, the sometimes goofy but always entertaining and enlightening face of “Bitluni’s Lab” on YouTube.

I’d been covering Bitluni’s many ESP32 hacks over the years, and had struck up a correspondence with him, swapping ideas and asking for advice on the many projects I start but somehow never finish. Luckily for us, Bitluni is far better on follow-through than I am, and he brought that breadth and depth of experience to the Design Lab stage for that venue’s last talk of the 2019 Superconference, before the party moved next door for the badge-hacking presentations.

Continue reading “Bitluni Brings All The ESP-32 Multimedia Hacks To Supercon”

Hacking USB Hack Chat

Join us on Wednesday, February 26 at noon Pacific for the Hacking USB Hack Chat with Kate Temkin!

For all its aggravating idiosyncrasies, the Universal Serial Bus has been a game-changer in peripheral connections for nearly a quarter of a century now. What was once simply a means to connect a mouse and a keyboard to a computer has been extended and enhanced into something so much more than its original designers intended. The flexibility that led to these innovative uses for USB also led to its ubiquity, with some form of the connector sprouting from nearly every imaginable device.

Kate Temkin is well-versed in the intricacies of the Universal Serial Bus. As a software lead for Great Scott Gadgets, Kate has developed software and firmware for GSG’s products, like GreatFET and HackRF. Kate also contributes to and maintains a number of open-source projects, including the FaceDancer project. And when she’s not busy with all of this, she can be found sharing her deep knowledge with USB security training courses, where she shows how USB is vulnerable to attack, and what to do to prevent it.

Join us for the Hacking USB Hack Chat this week, where Kate will discuss anything and everything about USB. Come learn about what the future holds for the USB standard, and what you can do to keep your USB project on track.

join-hack-chatOur Hack Chats are live community events in the Hackaday.io Hack Chat group messaging. This week we’ll be sitting down on Wednesday, February 26 at 12:00 PM Pacific time. If time zones have got you down, we have a handy time zone converter.

Click that speech bubble to the right, and you’ll be taken directly to the Hack Chat group on Hackaday.io. You don’t have to wait until Wednesday; join whenever you want and you can see what the community is talking about. Continue reading “Hacking USB Hack Chat”