How The Hero Droid BB-8 Rolls

By now we’ve come to expect a bountiful harvest of licensed merchandise to follow every Star Wars film. This year’s crop included many flavors of BB-8 so every fan can find something to suit their taste. At the top of this food chain is a mobile interactive “Hero Droid BB-8”. For those who want to see how it works, [TheMikeSenna] cracked open his unit to feed our curiosity.

Also called “Spin Master BB-8” for the manufacturer, this toy is impressively sophisticated for its price point. The video surveyed the mechanical components inside the ball. Showing how the droid travels, and how the head articulates.

Continue reading “How The Hero Droid BB-8 Rolls”

Dig Into The Apple Device Design Guide

Millions of people worldwide have just added new Apple gadgets to their lives thanks to the annual end of December consumerism event. Those who are also Hackaday readers are likely devising cool projects incorporating their new toys. This is a good time to remind everybody that Apple publishes information useful for such endeavors: the Accessory Design Guidelines for Apple Devices (PDF).

This comes to our attention because [Pablo] referenced it to modify an air vent magnet mount. The metal parts of a magnetic mount interferes with wireless charging. [Pablo] looked in Apple’s design guide and found exactly where he needed to cut the metal plate in order to avoid blocking the wireless charging coil of his iPhone 8 Plus. What could have been a tedious reverse-engineering project was greatly simplified by Reading The… Fine… Manual.

Apple has earned its reputation for hacker unfriendliness with nonstandard fasteners and liberal use of glue. And that’s even before we start talking about their digital barriers. But if your project doesn’t involve voiding the warranty, their design guide eliminates tedious dimension measuring so you can focus on the fun parts.

Dimensioned drawing of Apple iPad Pro

This guide is packed full of dimensioned drawings. A cursory review shows that they look pretty good and aren’t terrible at all. Button, connector, camera, and other external locations make this an indispensable tool for anyone planning to mill or print an interface for any of Apple’s hardware.

So let’s see those projects! Maybe a better M&M sorter. Perhaps a time-lapse machine. Or cure your car’s Tesla envy and put a well-integrated iPad into the dashboard.

JST Is Not A Connector

When reading about cool projects and products, it’s common to see wiring plugs labelled “JST connector.” This looks fine until we start getting hands-on and begin hacking things together. Inevitably we find the JST connector from one part fails to fit in the JST connector of another. This is the moment we learn “JST” is not a connector specification. It is short for Japan Solderless Terminals Manufacturing Company, Ltd. A company whose history goes back to 1957 and their website (styled in 1999) lists hundreds of different types.

We can simplify to “JST connector” when chit-chatting about projects. But when it comes to actual hardware specification, that’s not good enough. Which JST connector?

Continue reading “JST Is Not A Connector”

Aireon Hitchhikes On Iridium To Track Airplanes

SpaceX just concluded 2017 by launching 10 Iridium NEXT satellites. A footnote on the launch was the “hosted payload” on board each of the satellites: a small box of equipment from Aireon. They will track every aircraft around the world in real-time, something that has been technically possible but nobody claimed they could do it economically until now.

Challenge one: avoid adding cost to aircraft. Instead of using expensive satcom or adding dedicated gear, Aireon listen to ADS-B equipment already installed as part of international air traffic control modernization. But since ADS-B was designed for aircraft-to-aircraft and aircraft-to-ground, Aireon had some challenges to overcome. Like the fact ADS-B antenna is commonly mounted on the belly of an aircraft blocking direct path to satellite.

Challenge two: hear ADS-B everywhere and do it for less. Today we can track aircraft when they are flying over land, but out in the middle of the ocean, there are no receivers in range except possibly other aircraft. Aireon needed a lot of low-orbit satellites to ensure you are in range no matter where you are. Piggybacking on Iridium gives them coverage at a fraction of the cost of building their own satellites.

Continue reading “Aireon Hitchhikes On Iridium To Track Airplanes”

Military Surplus Repurposed For High Energy Physics

Performing high-energy physics experiments can get very expensive, a fact that attracts debate on public funding for scientific research. But the reality is that scientists often work very hard to stretch their funding as far as they can. This is why we need informative and entertaining stories like Gizmodo’s How Physicists Recycled WWII Ships and Artillery to Unlock the Mysteries of the Universe.

The military have specific demands on components for their equipment. Hackers are well aware MIL-SPEC parts typically command higher prices. That quality is useful beyond their military service, which lead to how CERN obtained large quantities of a specific type of brass from obsolete Russian naval ordnance.

The remainder of the article shared many anecdotes around Fermilab’s use of armor plate from decommissioned US Navy warships. They obtained a mind-boggling amount – thousands of tons – just for the cost of transport. Dropping the cost of high quality steel to “only” $53 per ton (1975 dollars, ~$250 today) and far more economical than buying new. Not all of the steel acquired by Fermilab went to science experiments, though. They also put a little bit towards sculptures on the Fermilab campus. (One of the few contexts where 21 tons of steel can be considered “a little bit”.)

Continue reading “Military Surplus Repurposed For High Energy Physics”

Small Jet Engine Model From Students Who Think Big

We love to highlight great engineering student projects at Hackaday. We also love environment-sensing microcontrollers, 3D printing, and jet engines. The X-Plorer 1 by JetX Engineering checks all the boxes.

This engineering student exercise took its members through the development process of a jet engine. Starting from a set of requirements to meet, they designed their engine and analyzed it in software before embarking on physical model assembly. An engine monitoring system was developed in parallel and integrated into the model. These embedded sensors gave performance feedback, and armed with data the team iterated though ideas to improve their design. It’s a shame the X-Plorer 1 model had to stop short of actual combustion. The realities of 3D printed plastic meant airflow for the model came from external compressed air and not from burning fuel.

Also worth noting are the people behind this project. JetX Engineering describe themselves as an University of Glasgow student club for jet engine enthusiasts, but they act less like a casual gathering of friends and more like an aerospace engineering firm. The ability of this group to organize and execute on this project, including finding sponsors to fund it, are skills difficult to teach in a classroom and even more difficult to test with an exam.

After X-Plorer 1, the group has launched two new project teams X-Plorer 2 and Kronos. They are also working to expand to other universities with the ambition of launching competitions between student teams. That would be exciting and we wish them success.

Continue reading “Small Jet Engine Model From Students Who Think Big”

Mount Sopris

Design A Microcontroller With Security In Mind

There are many parts to building a secure networked device, and the entire industry is still learning how to do it right. Resources are especially constrained for low-cost microcontroller devices. Would it be easier to build more secure devices if microcontrollers had security hardware built-in? That is the investigation of Project Sopris by Microsoft Research.

The researchers customized the MediaTek MT7687, a chip roughly comparable to the hacker darling ESP32. The most significant addition was a security subsystem. It performs tasks notoriously difficult to do correctly in software, such as random number generation and security key storage. It forms the core of what they called the “hardware-based secure root of trust.”

Doing these tasks in a security-specific module solves many problems. If a key is not stored in memory, a memory dump can’t compromise what isn’t there. Performing encryption/decryption in task-specific hardware makes it more difficult to execute successful side-channel attacks against them. Keeping things small keeps the cost down and also eases verifying correctness of the code.

But the security module can also be viewed from a less-favorable perspective. Its description resembles a scaled-down version of the Trusted Platform Module. As a self-contained module running its own code, it resembles the Intel Management Engine, which is currently under close scrutiny.

Will we welcome Project Sopris as a time-saving toolkit for building secure networked devices? Or will we become suspicious of hidden vulnerabilities? The researchers could open-source their work to ease these concerns, but value of their work will ultimately depend on the fast-moving field of networked device security.

Do you know of other efforts to add hardware-assisted security to microcontrollers? Comment below or let us know via the tip line!

[via Wired]

Image of Mount Sopris, namesake of the project, by [Hogs555] (CC-BY 4.0)