We all know that speakers are microphones and microphones are speakers, right? If not, take a moment to plug your headphones into a microphone jack and yell into them. It’s not exactly hi-fi, but it works.
So it’s not a huge surprise that three security researchers in Israel have managed to turn the combination headphone and microphone input jacks that are present on most laptops into an eavesdropping device. (Paper here as PDF, with an obligatory demo video on YouTube, embedded below.) Speake(a)r is a neat proof-of-concept and a horrid pun. Continue reading “Eavesdropping Via Headphones”→
If you need to test rockets, missiles, or ejection-seat systems, your first instinct would be to shoot them up in the air and see what happens. But if you want data, film footage, or the ability to simply walk away from a test, you might consider running your experiment on a rocket sled.
The Holloman High Speed Test Track is a 15 km long stretch of meticulously straight railroad track located in the middle of the New Mexico desert, and bristling with measurement equipment. Today’s Retrotechtacular video (embedded below) gives you the guided tour. And by the way, the elderly colonel who narrates? He doesn’t just run the joint — he was one of the human test subjects put on a rocket sled to test the effects of high acceleration on humans. You can see him survive a run around 1:00 in. Continue reading “Retrotechtacular: Rocket Sleds”→
Every once in a while, we stumble on an amazing resource that’s not exactly new, but it’s new to us. This is the case, in spades, with The Engines of Our Ingenuity, a radio show that’s been running since 1988!
Each episode covers an invention or engineering marvel, and tells the story of how it came to be, and puts each device into its historical and cultural context. Want to get the lowdown on how we safely bring fire into the kitchen? Or the largest land transport vehicle, NASA’s crawler? And what’s up with lobsters anyway?
Sometimes Hackaday runs in closed-loop mode: one hacker makes something, we post it, another hacker sees it and makes something else, and we post it, spiraling upward to cooler and cooler hacks. This is one of those times.
One of our favorite junk-sound-artists and musical magicians, [Gijs Gieskes], made this magnetic-levitation, rubber-band, percussive zither thing after seeing our coverage of another magnetic levitation trick. Both of them simply have a Hall sensor controlling a coil, which suspends a magnet in mid-air. It’s a dead-simple circuit that we’ll probably try out as soon as we stop typing.
But [Gijs] took the idea and ran with it. What looks like a paperclip dangles off the magnets, and flails wildly around with its tiny steel arms. These hit a zither made of rubber bands with a bamboo skewer as a bridge, pressing down on a piezo. The rest is cardboard, copper-clad, and some ingenuity. Watch it work in the video embedded below.
[Huan Truong] was given a WiFi router and thought he’d improve it by installing a free firmware on it. Unfortunately, the router in question is a bit old, and wasn’t ever popular to begin with, which meant that it was unsupported by the usual open firmware suspects. The problem was that it only had a 4 MB flash to boot off of, but [Huan] was determined to make it work. (Spoiler: he did it, and documented it fully.)
The flash workaround consisted basically of repartitioning the space, and then telling u-boot where to find everything. On a router like the WNR2000 that [Huan] had, the flash is memory-mapped, which meant adding an offset to the flash start (0xbf000000 instead of 0x00000000) and remembering to do this consistently so that he doesn’t overwrite things like the MAC address.
[Huan] went for the LEDE fork of OpenWRT, and rebuilt it from source because he needed a small version to fit inside his limited flash. With this task completed, it worked. All done? Nope, [Huan] then submitted a pull request to LEDE, and now you can enjoy the fruits of his labor without replicating it. But if you’ve got another low-flash, obscure router, you’ve got a head start in getting LEDE up and running on it.
Routers are perhaps the most-hacked device that we see here, and they can be made pretty darn useful with the right firmware. Sometimes getting a custom firmware running is relatively easy, as it was here, and sometimes it requires some deep reverse engineering. But it’s good to keep up your router-hacking chops, because they may not always be as open as they are now.
Wouldn’t it be great if there were just one standard for attaching to, programming, and debugging hardware? If you could just plug in and everything would just work? Dream on, dreamer! But of course we hobbyists aren’t the only people to suffer from multiple standards. Industry has the same problems, writ large. In response to the proliferation of smart devices — microcontrollers, sensors, and their friends — on any given PCB makes it difficult to test them all, much less their function as a system.
The Joint Test Action Group (JTAG) got together in the mid-80s to make automated testing of circuit boards a standardized process. A JTAG port can be found on almost any piece of consumer electronics with enough brains to warrant it, and it’s also a tremendously useful entry point for debugging your own work and hacking into other’s. You’re going to need to use JTAG someday.
Implemented right, it’s a very cool system that lets you test any compliant IC on the board all from a single connector. It’s mostly used by hackers for its ability to run and halt individual processors, and put them in debugging modes, inspecting their memory states, etc. Essentially every microcontroller responds to JTAG commands, and it’s an incredibly widespread and powerful standard. A victory for rationality and standardization!
The connector pinout was, of course, left up to the manufacturer. The horror!
Five Signals
In principle, JTAG uses five signal lines. They form a chain starting at the debugger, where one device’s output is the next device’s input, until the result is returned back to the debugger.
We’re not specialists, but the Maillardet Automaton is one of the more amazing mechanical machines that we’ve seen in a while, and [Fran Blanche] got to spend some time with it in an attempt to figure out how it’s mysterious missing pen apparatus would have worked. The resulting video, embedded below, is partially her narrative about the experiment she’s running, and part straight-up mechanical marvel.
If you need a refresher course on Maillardet’s Automaton, we’ll send you first to Wikipedia, and then off to watch this other video , which has a few great close-ups of the cams that drive everything.