Pulling Music Out Of The Airwaves

RADIO WONDERLAND is a one-man band with many famous unintentional collaborators. [Joshua Fried]’s shows start off with him walking in carrying a boombox playing FM radio. He plugs it into his sound rig, tunes around a while, and collects some samples. Magic happens, he turns an ancient Buick steering wheel, and music emerges from the resampled radio cacophony.

It’s experimental music, which is secret art-scene-insider code for “you might not like it”, but we love the hacking. In addition to the above-mentioned steering wheel, he also plays a rack of shoes with drumsticks. If we had to guess, we’d say rotary encoders and piezos. All of this is just input for his computer programs which take care of the sampling, chopping, and slicing of live radio into dance music. It’s good enough that he’s opened for [They Might Be Giants].

Check out the videos (embedded below) for a taste of what a live show was like. There are definitely parts where the show is a little slow, but they make it seem cooler when a beat comes together out of found Huey Lewis. We especially like the “re-esser” routine that hones in on the hissier parts of speech to turn them into cymbals. And if you scan the crowd in the beginning, you can find a ten-years-younger [Limor Fried] and [Phil Torrone].

Continue reading “Pulling Music Out Of The Airwaves”

Hackenings: KiCAD, Science, DevOps, And Cyber

This week in [Hackenings], we’ve got a full roster of interesting upcoming events scattered all over the world. Can’t afford airfare to India, but Dublin is in the next county over? We’ve got you covered.

KiCad in Bangalore

IKP EDEN, in Bangalore, is hosting an Introduction to KiCad workshop on Sunday, Nov 13 from 10:00-2:00 pm. If you’re just getting started with PCB layout, or just want a quickstart learning KiCad, Hackaday contributor [Anool Mahidharia] will be there to show you how! Sign up on the link above, and bring your laptop with KiCad already installed.

Science in Dublin

20151115_124704-e1476655395528_thumbnailTOG hackerspace in Dublin is putting on their fifth annual Science Hack Day, a 36-hour hardware and software hackathon on Nov 19 & 20th. Looking through their photos, past creations have included a laser mission-impossible crawl-through maze thing, some kind of freaky turtle, and many objects that move, make noise, or otherwise amuse.

“Each year we bring together, designers, coders, scientists, engineers and makers. Simply to make interesting things. Why? For adventure, for playfulness, for science!”

DevOppery (and Foppery) in Stuttgart

logo_webDo you have what it takes to meet the needs of DevOps, Agile, and Cyber in the Enterprise Environment? Interested in Disruptive Cloud Computing or Mobile First Growth Hacking? Can you rub two buzzwords together and come up with marketing gold? Then you might have a fun time at the shack hackerspace in Stuttgart on Nov. 19th, for the eloop 2016 conference (translated here).

A full day’s talks include topics such as “Enterprise Patterns”, “Good Enough”, and the “Cult of Done Manifesto” as it relates to computer security. “What’s discussed at eloop today moves the digital markets of tomorrow.” YOLO!

Vote for Swindon

If you’re a UK citizen, you can vote to get the Swindon Makerspace some community funding so that they can furnish a new space. Why not?

Game Retro

And if you’re in Huntsville, Alabama, or environs, don’t forget Makers Local 256’s Retro Gaming night tonight (Saturday, 12th).

Hackenings? Hackenings!

[Hackenings] is our weekly Saturday morning (US, Pacific Time) roundup of what’s going to be going on in the hackerspace world in the upcoming week. If you’d like us to cover your event, email us at tips@hackaday.com and put [Hackenings] in the subject so that we don’t miss it. Thanks!

ArduWorm: A Malware For Your Arduino Yun

We’ve been waiting for this one. A worm was written for the Internet-connected Arduino Yun that gets in through a memory corruption exploit in the ATmega32u4 that’s used as the serial bridge. The paper (as PDF) is a bit technical, but if you’re interested, it’s a great read. (Edit: The link went dead. Here is our local copy.)

The crux of the hack is getting the AVR to run out of RAM, which more than a few of us have done accidentally from time to time. Here, the hackers write more and more data into memory until they end up writing into the heap, where data that’s used to control the program lives. Writing a worm for the AVR isn’t as easy as it was in the 1990’s on PCs, because a lot of the code that you’d like to run is in flash, and thus immutable. However, if you know where enough functions are located in flash, you can just use what’s there. These kind of return-oriented programming (ROP) tricks were enough for the researchers to write a worm.

In the end, the worm is persistent, can spread from Yun to Yun, and can do most everything that you’d love/hate a worm to do. In security, we all know that a chain is only as strong as its weakest link, and here the attack isn’t against the OpenWRT Linux system running on the big chip, but rather against the small AVR chip playing a support role. Because the AVR is completely trusted by the Linux system, once you’ve got that, you’ve won.

Will this amount to anything in practice? Probably not. There are tons of systems out there with much more easily accessed vulnerabilities: hard-coded passwords and poor encryption protocols. Attacking all the Yuns in the world wouldn’t be worth one’s time. It’s a very cool proof of concept, and in our opinion, that’s even better.

Thanks [Dave] for the great tip!

My Life In The Connector Zoo

“The great thing about standards is that there are so many to choose from.” Truer words were never spoken, and this goes double for the hobbyist world of hardware hacking. It seems that every module, every company, and every individual hacker has a favorite way of putting the same pins in a row.

We have an entire drawer full of adapters that just go from one pinout to another, or one programmer to many different target boards. We’ll be the first to admit that it’s often our own darn fault — we decided to swap the reset and ground lines because it was convenient for one design, and now we have two adapters. But imagine a world where there was only a handful of distinct pinouts — that drawer would be only half full and many projects would simply snap together. “You may say I’m a dreamer…”

This article is about connectors and standards. We’ll try not to whine and complain, although we will editorialize. We’re going to work through some of the design tradeoffs and requirements, and maybe you’ll even find that there’s already a standard pinout that’s “close enough” for your next project. And if you’ve got a frequently used pinout or use case that we’ve missed, we encourage you to share the connector pinouts in the comments, along with its pros and cons. Let’s see if we can’t make sense of this mess.

Continue reading “My Life In The Connector Zoo”

Anti-Drone Fence: Science Or Snakeoil?

Remember when it was laser pointers? Well, now it’s drones.

[Thinkerer] sent us this link to what’s essentially a press release for a company called Sensofusion that makes a UAV detector and (they claim) smart jammer, and apparently one is being installed at Denver International airport.

We buy that the “Airfence” system will be able to detect known systems by signature, and possibly even take them over. We’ve seen two exploits of quadcopter radio protocols (one a timing attack and the other a controller ID spoof) that would allow them to do just that. But is that the problem? Don’t most of the major manufacturers fence off airports in software these days anyway? And are drones really the droids that you’re looking for?

They also make some claims about being able to detect and stop DIY copters, but we don’t see how. Imagine that your copter ran encrypted on 2.4 GHz. How is this different from any other WiFi signal? Or imagine that it sends and receives infrequent data in the congested pager bands? And short of jamming, we don’t see how they’re going to take down anything that they don’t already understand.

So, commenteers, how would you do it? Detect and even take over an arbitrary drone? Possible or snakeoil?

Helicopter Pendulum Is PID-licious

If you’ve ever tried to tune a PID system, you have probably encountered equal parts overwhelming math and black magic folk wisdom. Or maybe you just let the autotune take over. If you really want to get some good intuition for motion control algorithms, PID included, nothing beats a little hands-on experimentation.

To get you started, [Clovis] wrote in with his budget propeller-based PID demo platform (Portuguese, translated shockingly well here).

The basic setup is a potentiometer glued to a barbecue skewer with a mini-quadcopter motor and rotor on the end of it. A microcontroller reads the voltage and PWMs the propeller through a MOSFET. The goal is to have the pendulum hover stably in midair, controlled by whatever algorithms you can dream up on the controller. [Clovis]’ video demonstrates on-off and PID control of the fan. Adding a few more potentiometers (one for P, I, and D?) would make hands-on tweaking even more interactive.

In all, it’s a system that will only set you back a few bucks, but can teach you more than you’d learn in a month in college. Chances are good that you’re not going to have exactly the same brand of sardine can on hand that he did, but some improvisation is called for here.

If you don’t know why you’d like to master open-loop closed-loop control algorithms, here’s one of the best advertisements that we’ve seen in a long time. But you don’t have to start out with hand-wound hundred-dollar motors, or precisely machined bits. As [Clovis] demonstrates, you can make do with a busted quadcopter and whatever you find in your kitchen.

Continue reading “Helicopter Pendulum Is PID-licious”

NASA Puts Its 3D Models Up On GitHub

NASA has a bunch of its 3D models up on GitHub, and if you didn’t know about it before, you do now. It’s a ridiculously large download, at over one and a half jiggabytes, but it’s full of textures and high-resolution models of spacecraft, landing sites, and other random NASA ephemera.

Continue reading “NASA Puts Its 3D Models Up On GitHub”