Gecho Pocket Synth Looper

[Mario] wrote us with his synthesizer project that’s currently up on Kickstarter. It looks like a good amount of fun to play with, as you can see in the video on the Kickstarter page. But it’s also built to be easily hackable.

On the hardware front, it’s a tiny four-layer board that’s crammed with parts. At the core is an STM32F4 microcontroller and a DAC. Indeed, the build was inspired by other folks’ work on the STM32F4 Discovery dev kit that has been used to make some pretty interesting synthesizer devices. [Mario]’s version adds two stereo headphone outputs, two microphone inputs, two IR reflective distance sensors used as control inputs, some buttons, and a ton of LEDs. And then it makes good use of all of them.

The firmware isn’t open source yet (poke! poke!) but it looks like it’s going to be. On his blog, [Mario] works through an example of adding a drum machine into the existing firmware, so it looks like it’ll be hackable.

Squeezing a lot of DSP functionality out of a single microcontroller is a feat. On a similar chip from a different manufacturer, [Paul Stoffregen]’s Teensy Audio Library could also be made to do a lot of the same things. But the real beauty of the Gecho project is that it has some interesting hardware features already built in and ready to go. It wouldn’t be a bad launching pad for your own musical or audio explorations.

PURE Modules Aim To Make Prototyping Easier

[Sashi]’s PURE modules system wants your next wireless microcontroller and sensor module project to be put together using card-edge connectors. But it’s a lot deeper than that — PURE is an entire wireless gadget development ecosystem. Striking a balance between completeness and modularity is very difficult; a wire can carry any imaginable electronic signal, but just handing someone a pile of wires presents them a steep learning curve. PURE is at the other end of the spectrum: everything is specified.

So far, two microcontroller options are available in the system, the nRF52 series and TI’s CC2650. Both of these run the Contiki OS, so it doesn’t matter which of these you choose. Wired data is all transmitted over I2C and connects up via the previously-mentioned card-edge connectors. On the wireless side, data transport is handled through an MQTT broker, using the MQTT-sn variant which is better suited to small radio devices. At the protocol layer everything uses Protocol Buffers, Google’s newest idea for adding some structure to the data.

Continue reading “PURE Modules Aim To Make Prototyping Easier”

3D Printing With Yarn And Silicone

This one is apparently a few years old, but the idea looks so good that we’re left wondering whatever happened to it.

[Seyi Sosanya] made what amounts to a 3D printer, but one that prints in a unique way: wrapping yarn around pillars and then post-dipping them in a silicone glue. The result is a tough, flexible 3D mesh that’s lightweight and looks fairly resilient. We’re not at all sure what it’s good for, but watching the video about the project (embedded below) makes us want to try our hand at this sort of thing.

So what happened? Where did this project go? Is anyone else working on a glue-plus-fabric style printer? Is anyone doing this with carbon fiber and epoxy? We can also imagine that with the right adhesive this could be used less like a loom and more like a traditional FDM machine, although weaving the layers together may provide additional strength in what would be the Z direction, and for that you’d need the supports.

Continue reading “3D Printing With Yarn And Silicone”

Simon Says Smile, Human!

The bad news is that when our robot overlords come to oppress us, they’ll be able to tell how well they’re doing just by reading our facial expressions. The good news? Silly computer-vision-enhanced party games!

[Ricardo] wrote up a quickie demonstration, mostly powered by OpenCV and Microsoft’s Emotion API, that scores your ability to mimic emoticon faces. So when you get shown a devil-with-devilish-grin image, you’re supposed to make the same face convincingly enough to fool a neural network classifier. And hilarity ensues!

Continue reading “Simon Says Smile, Human!”

Halogen Lamp Abused For Desoldering

[Moony] thought that it was unconscionable that IR soldering stations sell for a few hundred Euros. After all, they’re nothing more than a glorified halogen lightbulb with a fancy IR-pass filter on them. Professional versions use 100 W 12 V DC bulbs, though, and that’s a lot of current. [Moony] tried with a plain-old 100 W halogen lightbulb. Perhaps unsurprisingly, it worked just fine. Holding the reflector-backed halogen spotlight bulb close to circuit boards allows one to pull BGAs and other ornery chips off after a few minutes. Voila.

[Moony] reasons that the IR filter is a waste anyway, since the luminous efficiency of halogen lights is so low: around 3.5%. And that means 96.5% heat! But there’s still a lot of light streaming out into a very small area, so if you’re going to look at the board as you de-solder, you’re really going to need a pair of welding goggles. Without, you’ll have a very hard time seeing your work at best, and might actually do long-term damage to your retinas.

So the next time you’re feeling jealous of those rework factory workers with their fancy IR soldering stations, head on down to the hardware store, pick up a gooseneck lamp, a 100 W halogen spotlight, and some welding goggles. And maybe a fire brick. You really don’t want your desk going up in flames.

We love make-do hacks, but we love doing it right, too. Just watch [Bil Herd] extol the virtues of a real IR desoldering station. And then giggle as you do the same thing with a few-dollar halogen bulb.

Continue reading “Halogen Lamp Abused For Desoldering”

FANCY BEAR Targets Ukrainian Howitzers

Just in case you’re one of the people out there who still doesn’t believe in “the cyber” — it appears that the Russian military served malicious cell-phone apps to the Ukrainian army that allowed them to track a particular artillery cannon.

The legitimate version of the Android app helped its operator use the 1960’s-era former Soviet howitzer. The trojanized version of this application did just the same, except it also phoned home to Russian military intelligence with its location. In addition to giving the Russian army valuable information about troop movements in general, it also led to the destruction of 80% of the cannons in question over two years.

The cited article goes into depth about how certain it is that a hacking group, referred to as FANCY BEAR, are nearly certainly responsible for the attack. The exploit has fingerprints that are not widely known outside of the security research community, and the use of the exploit against the Ukrainian army pretty much ties FANCY BEAR to the Russian military.

This is also the same exploit that was used against the Democratic National Committee in the United States. Attribution is one of the hardest parts of white-hat hacking — attackers don’t want to be found and will leave misleading clues when they can — but the use of the same proprietary malware in these two attacks is pretty convincing evidence that Russian military intelligence has also hacked into US political parties and NGOs.

(Banner image by Vitaly Kuzmin, CC-BY-SA 3.0.)

Alan Yates: Why Valve’s Lighthouse Can’t Work

[Alan Yates] is a hacker’s engineer. His job at Valve has been to help them figure out the hardware that makes virtual reality (VR) a real reality. And he invented a device that’s clever enough that it really should work, but difficult enough that it wasn’t straightforward how to make it work.

In his presentation at the Hackaday Supercon 2016, he walked us through all of the design and engineering challenges that were eventually conquered in getting the Lighthouse to market. We’re still a bit overwhelmed by the conceptual elegance of the device, so it’s nice to have the behind-the-scenes details as well.

Continue reading “Alan Yates: Why Valve’s Lighthouse Can’t Work”