Hackaday Podcast 228: Bats, Eggs, Lasers, Duck Tape, And Assembly Language

Summer’s in full swing, and this week both Elliot and Dan had to sweat things out to get the podcast recorded. But the hacks were cool — see what I did there? — and provided much-needed relief. Join us as we listen in on the world of bats, look at a laser fit for a hackerspace, and learn how to make an array of magnets greater than — or less than — the sum of its parts. There’ll be flying eggs, keyboards connected to cell phones, and everything good about 80s and 90s cable TV, as well as some of the bad stuff. And you won’t want to miss Elliot putting Dan to shame with the super-size Quick Hacks, either, nor should you skip the Can’t Miss sweep with a pair of great articles by Al Williams.

Check out the links below if you want to follow along, and as always, tell us what you think about this episode in the comments!

Download a long series of ones and zeroes that, when appropriately interpreted, sound like two people talking about nerdy stuff!

Continue reading “Hackaday Podcast 228: Bats, Eggs, Lasers, Duck Tape, And Assembly Language”

Lighting Up With Chemistry, 1823-Style

With our mass-produced butane lighters and matches made in the billions, fire is never more than a flick of the finger away these days. But starting a fire 200 years ago? That’s a different story.

One method we’d never heard of was Döbereiner’s lamp, an 1823 invention by German chemist Johann Wolfgang Döbereiner. At first glance, the device seems a little sketchy, what with a tank of sulfuric acid and a piece of zinc to create a stream of hydrogen gas ignited by a platinum catalyst. But as [Marb’s Lab] shows with the recreation in the video below, while it’s not exactly as pocket-friendly as a Zippo, the device actually has some inherent safety features.

[Marb]’s version is built mainly from laboratory glassware, with a beaker of dilute sulfuric acid — “Add acid to water, like you ought-er!” — bathing a chunk of zinc on a fixed support. An inverted glass funnel acts as a gas collector, which feeds the hydrogen gas to a nozzle through a pinch valve. The hydrogen gas never mixes with oxygen — that would be bad — and the production of gas stops once the gas displaces the sulfuric acid below the level of the zinc pellet. It’s a clever self-limiting feature that probably contributed to the commercial success of the invention back in the day.

To produce a flame, Döbereiner originally used a platinum sponge, which catalyzed the reaction between hydrogen and oxygen in the air; the heat produced by the reaction was enough to ignite the mixture and produce an open flame. [Marb] couldn’t come up with enough of the precious metal, so instead harvested the catalyst from a lighter fluid-fueled hand warmer. The catalyst wasn’t quite enough to generate an open flame, but it glowed pretty brightly, and would be more than enough to start a fire.

Hats off to [Marb] for the great lesson is chemical ingenuity and history. We’ve seen similar old-school catalytic lighters before, too.

Continue reading “Lighting Up With Chemistry, 1823-Style”

Reverse Engineering Reveals Hidden API In Abandonware Trail Camera

It sometimes seems like there are two kinds of cheap hardware devices: those dependent on proprietary software that is no longer available and those that are equally dependent but haven’t been abandoned just quite yet. But rest assured, abandonment is always on the table, and until then, you get to deal with poorly written apps that often suffer from a crippling lack of essential functionality.

Such was the case for the wireless game camera that [Chris Jones] scored on the cheap, but rather than suffering with the original software, he decided to reverse engineer the camera and turn it into something more useful. The eBay description was promising — Bluetooth LE! WiFi! — but the reality proved less so. To save the batteries, WiFi is off by default and can only be turned on by connecting to the camera via BLE using a janky and crash-prone Android app.

[Chris]’ first step in reverse engineering the camera was to snoop into the BLE by capturing the Bluetooth packets to a file and running them through Wireshark. This revealed a write command with the text “BT_KEY_ON” — very promising. After verifying that this command turned on the camera’s access point, [Chris] got to work capturing WiFi packets using PCAPDroid and analyzing the results, again with Wireshark. Using every function available in the OEM app eventually revealed the full API on the camera, which gives file system control, access to individual images, and even putting the camera into live video mode.

Continue reading “Reverse Engineering Reveals Hidden API In Abandonware Trail Camera”

PCMCIA Flash Card Gives Up Its Secrets Thanks To Retro Gear

There are two ways to recover data from an obsolete storage medium. One way is to pull out all the tools in the hacker’s kit — with logic analyzers, oscilloscopes, and bit-banged software in a desperate attempt to reverse engineer the original protocol. The other way is to have a really, really deep junk bin that just happens to contain exactly the right pieces that would have been used decades ago.

For recovering data from a 25-year-old PCMCIA memory card, [Dave] from Vintage Apparatus chose the latter method. But to be fair, characterizing the stash of gear he had to select from as a “junk bin” is pretty insulting. It’s more like a museum of retro technology, which just so happened to hold  Toshiba Libretto, a subnotebook computer hailing from the late 1990s. The machine sports a pair of PCMCIA slots and was just the thing to read the data from the old 32 MB SanDisk flash card, which once lived in a backpack-mounted GPS system for surveyors.

If this hack sounds as easy as plugging things into an old computer, you’d be right — if you just happen to have a stack of floppies containing the Windows 98 drivers for said things. So [Dave]’s task became a game of finding the right combination of cards that already had the drivers installed and would provide the connectivity needed to get the data off the flash card. Between a suspiciously crunchy-sounding floppy drive and an Ethernet card dongle badly in need of some contact cleaner, cobbling together the right hardware was a bit of a chore. After that, a lot of the hack was [Dave] just remembering how we used to do things back in the day, with the eventual solution being transferring over the files to an FTP server on a Raspberry Pi.

The video below tells the whole saga, but the real treat might just be the Vintage Apparatus collection of gear. Incidentally, we really like [Dave]’s idea for storing associated bits and bobs.

Continue reading “PCMCIA Flash Card Gives Up Its Secrets Thanks To Retro Gear”

Hackaday Links Column Banner

Hackaday Links: July 16, 2023

Last week, we noted an attempt to fix a hardware problem with software, which backfired pretty dramatically for Ford when they tried to counter the tendency for driveshafts to fall out of certain of their cars by automatically applying the electric parking brake.

This week, the story is a little different, but still illustrates how software and hardware can interact unpredictably, especially in the automotive space. The story centers on a 2015 Optima recall for a software update for the knock sensor detection system. We can’t find the specifics, but if this recall on a similar Kia model in the same model year range and a class-action lawsuit are any indication, the update looks like it would have made the KSDS more sensitive to worn connecting rod damage, and forced the car into “limp home mode” to limit damage to the engine if knocking is detected.

A clever solution to a mechanical problem? Perhaps, but because the Kia owner in the story claims not to have received the snail-mail recall notice, she got no warning when her bearings started wearing out. Result: a $6,000 bill for a new engine, which she was forced to cover out of pocket. Granted, this software fix isn’t quite as egregious as Ford’s workaround for weak driveshaft mounting bolts, and there may very well have been a lack of maintenance by the car’s owner. But if you’re a Kia mechanical engineer, wouldn’t your first instinct have been to fix the problem causing the rod bearings to wear out, rather than papering over the problem with software?

Continue reading “Hackaday Links: July 16, 2023”

Bringing A Baofeng Into The Cyberpunk 2077 Universe

You’ve got to love the aesthetics of dystopian cyberpunk video games, where all the technology looks like it’s cobbled together from cast-off bits of the old world’s remains. Kudos go to those who attempt to recreate these virtual props and bring them into the real world, but our highest praise goes to those who not only make a game-realistic version of a prop, but make it actually work.

Take the Nokota Manufacturing radio from Cyberpunk 2077, for instance. [Taylor] took one look at that and knew it would be the perfect vessel for a Baofeng UV-5R, the dual-band transceiver that amateur radio operators love to hate. The idea is to strip the PCB out of a Baofeng — no worries, the things cost like $25 — and install it in a game-accurate 3D printed case. But this is far from just a case mod, since [Taylor]’s goal is to replace the radio’s original controls with something closer to what’s in the game.

To that end, [Taylor] is spinning up an interface to the stock radio’s keypad using some 7400-series bilateral analog switches. Hooked to the keypad contacts and controlled by a Mini MEGA 2560 microcontroller, the interface is able to send macros that imitate the keypresses necessary to change frequencies and control the radio’s settings, plus display the results on the yellow OLED screen that seems a dead-ringer for the in-game display. The video below shows some early testing of the interface.

While very much still a work in progress, we’ve been following [Taylor]’s project for a week or so and he’s really gaining some ground. We’ve encouraged him to enter this one in the Cyberdeck Challenge we’ve got going on now; it might not have much “deck” going for it, but it sure does have a lot of “cyber.”

Continue reading “Bringing A Baofeng Into The Cyberpunk 2077 Universe”

Open-Source LAMP Instrument Aimed At Clinicians And Biohackers Alike

Over the last few years, we’ve all been given a valuable lesson in both the promise and limitations of advanced molecular biology methods for clinical diagnostics. Polymerase chain reaction (PCR) was held up as the “gold standard” of COVID-19 testing, but the cost, complexity, and need for advanced instrumentation and operators with specialized training made PCR difficult to scale to the levels demanded by a pandemic.

There are other diagnostic methods, of course, some of which don’t have all the baggage of PCR. RT-LAMP, or reverse transcriptase loop-mediated amplification, is one method with a lot of promise, especially when it can be done on a cheap open-source instrument like qLAMP. For about 50€, qLAMP makes amplification and detection of nucleic acids, like the RNA genome of the SARS-CoV-2 virus, a benchtop operation that can be performed by anyone. LAMP is an isothermal process; it can be done at one single temperature, meaning that no bulky thermal cycler is required. Detection is via the fluorescent dye SYTO 9, which layers into the base pairs inside the amplified DNA strands, using a 470-nm LED for excitation and a photodiode with a filter to detect the emission. Heating is provided by a PCB heater and a 3D-printed aluminum block that holds tubes for eight separate reactions. Everything lives in a 3D-printed case, including the ESP32 which takes care of all the housekeeping and data analysis duties.

With the proper test kits, which cost just a couple of bucks each, qLAMP would be useful for diagnosing a wide range of diseases, and under less-than-ideal conditions. It could also be a boon to biohackers, who could use it for their own citizen science efforts. We saw a LAMP setup at the height of the pandemic that used the Mark 1 eyeball as a detector; this one is far more quantitative.