33C3 Starts Tomorrow: We Won’t Be Sleeping For Four Days

Possibly the greatest hacker show on Earth, the 33rd annual Chaos Communication Congress (33C3) begins Tuesday morning in Hamburg, Germany. And Hackaday will be there! Contributing Editor [Elliot Williams] is taking the night train up and will be trying to take it all in for you. The schedule looks tremendous.

If you can’t make it, don’t fret. There will be live streaming, and the talks are usually available in preliminary edit for viewing or download just a few minutes after they finish. It’s even cooler to watch the talks with friends, though. Every hackerspace with a video projector could be playing along, live or after the fact. Pick some cool talks and have a “movie night”.

elliot_williams_head_2_square_fuzzIf you’re going to be in Hamburg, and you want to show us something cool, tell us that something is NOTAHACK!1!! in person, or even just say “Hi”, we’ll be wandering around from talk to talk and session to session just like you, only with a backpack full of Hackaday stickers.

If there’s anything you think we should see, post up in the comments. If there’s enough call for it, we’ll have a Hackaday meetup once we can figure out a good time and location. Bring us a cool hack, and we’ll document it on the spot! Our DECT phone number is 2475.

Gecho Pocket Synth Looper

[Mario] wrote us with his synthesizer project that’s currently up on Kickstarter. It looks like a good amount of fun to play with, as you can see in the video on the Kickstarter page. But it’s also built to be easily hackable.

On the hardware front, it’s a tiny four-layer board that’s crammed with parts. At the core is an STM32F4 microcontroller and a DAC. Indeed, the build was inspired by other folks’ work on the STM32F4 Discovery dev kit that has been used to make some pretty interesting synthesizer devices. [Mario]’s version adds two stereo headphone outputs, two microphone inputs, two IR reflective distance sensors used as control inputs, some buttons, and a ton of LEDs. And then it makes good use of all of them.

The firmware isn’t open source yet (poke! poke!) but it looks like it’s going to be. On his blog, [Mario] works through an example of adding a drum machine into the existing firmware, so it looks like it’ll be hackable.

Squeezing a lot of DSP functionality out of a single microcontroller is a feat. On a similar chip from a different manufacturer, [Paul Stoffregen]’s Teensy Audio Library could also be made to do a lot of the same things. But the real beauty of the Gecho project is that it has some interesting hardware features already built in and ready to go. It wouldn’t be a bad launching pad for your own musical or audio explorations.

PURE Modules Aim To Make Prototyping Easier

[Sashi]’s PURE modules system wants your next wireless microcontroller and sensor module project to be put together using card-edge connectors. But it’s a lot deeper than that — PURE is an entire wireless gadget development ecosystem. Striking a balance between completeness and modularity is very difficult; a wire can carry any imaginable electronic signal, but just handing someone a pile of wires presents them a steep learning curve. PURE is at the other end of the spectrum: everything is specified.

So far, two microcontroller options are available in the system, the nRF52 series and TI’s CC2650. Both of these run the Contiki OS, so it doesn’t matter which of these you choose. Wired data is all transmitted over I2C and connects up via the previously-mentioned card-edge connectors. On the wireless side, data transport is handled through an MQTT broker, using the MQTT-sn variant which is better suited to small radio devices. At the protocol layer everything uses Protocol Buffers, Google’s newest idea for adding some structure to the data.

Continue reading “PURE Modules Aim To Make Prototyping Easier”

3D Printing With Yarn And Silicone

This one is apparently a few years old, but the idea looks so good that we’re left wondering whatever happened to it.

[Seyi Sosanya] made what amounts to a 3D printer, but one that prints in a unique way: wrapping yarn around pillars and then post-dipping them in a silicone glue. The result is a tough, flexible 3D mesh that’s lightweight and looks fairly resilient. We’re not at all sure what it’s good for, but watching the video about the project (embedded below) makes us want to try our hand at this sort of thing.

So what happened? Where did this project go? Is anyone else working on a glue-plus-fabric style printer? Is anyone doing this with carbon fiber and epoxy? We can also imagine that with the right adhesive this could be used less like a loom and more like a traditional FDM machine, although weaving the layers together may provide additional strength in what would be the Z direction, and for that you’d need the supports.

Continue reading “3D Printing With Yarn And Silicone”

Simon Says Smile, Human!

The bad news is that when our robot overlords come to oppress us, they’ll be able to tell how well they’re doing just by reading our facial expressions. The good news? Silly computer-vision-enhanced party games!

[Ricardo] wrote up a quickie demonstration, mostly powered by OpenCV and Microsoft’s Emotion API, that scores your ability to mimic emoticon faces. So when you get shown a devil-with-devilish-grin image, you’re supposed to make the same face convincingly enough to fool a neural network classifier. And hilarity ensues!

Continue reading “Simon Says Smile, Human!”

Halogen Lamp Abused For Desoldering

[Moony] thought that it was unconscionable that IR soldering stations sell for a few hundred Euros. After all, they’re nothing more than a glorified halogen lightbulb with a fancy IR-pass filter on them. Professional versions use 100 W 12 V DC bulbs, though, and that’s a lot of current. [Moony] tried with a plain-old 100 W halogen lightbulb. Perhaps unsurprisingly, it worked just fine. Holding the reflector-backed halogen spotlight bulb close to circuit boards allows one to pull BGAs and other ornery chips off after a few minutes. Voila.

[Moony] reasons that the IR filter is a waste anyway, since the luminous efficiency of halogen lights is so low: around 3.5%. And that means 96.5% heat! But there’s still a lot of light streaming out into a very small area, so if you’re going to look at the board as you de-solder, you’re really going to need a pair of welding goggles. Without, you’ll have a very hard time seeing your work at best, and might actually do long-term damage to your retinas.

So the next time you’re feeling jealous of those rework factory workers with their fancy IR soldering stations, head on down to the hardware store, pick up a gooseneck lamp, a 100 W halogen spotlight, and some welding goggles. And maybe a fire brick. You really don’t want your desk going up in flames.

We love make-do hacks, but we love doing it right, too. Just watch [Bil Herd] extol the virtues of a real IR desoldering station. And then giggle as you do the same thing with a few-dollar halogen bulb.

Continue reading “Halogen Lamp Abused For Desoldering”

FANCY BEAR Targets Ukrainian Howitzers

Just in case you’re one of the people out there who still doesn’t believe in “the cyber” — it appears that the Russian military served malicious cell-phone apps to the Ukrainian army that allowed them to track a particular artillery cannon.

The legitimate version of the Android app helped its operator use the 1960’s-era former Soviet howitzer. The trojanized version of this application did just the same, except it also phoned home to Russian military intelligence with its location. In addition to giving the Russian army valuable information about troop movements in general, it also led to the destruction of 80% of the cannons in question over two years.

The cited article goes into depth about how certain it is that a hacking group, referred to as FANCY BEAR, are nearly certainly responsible for the attack. The exploit has fingerprints that are not widely known outside of the security research community, and the use of the exploit against the Ukrainian army pretty much ties FANCY BEAR to the Russian military.

This is also the same exploit that was used against the Democratic National Committee in the United States. Attribution is one of the hardest parts of white-hat hacking — attackers don’t want to be found and will leave misleading clues when they can — but the use of the same proprietary malware in these two attacks is pretty convincing evidence that Russian military intelligence has also hacked into US political parties and NGOs.

(Banner image by Vitaly Kuzmin, CC-BY-SA 3.0.)