Hackaday Prize Entry: A Six Axis Robotic Arm With Fingertip Control

If you were a child of the 1980s whose fascination extended to the contents of your local Radio Shack store, you may remember the Armatron robot arm as a particular object of desire. It was a table top robot arm operated not by motors or a microcontroller, but by a clever set of gears directed manually from a pair of joysticks. If you took a look at it with an eye to control from your 8-bit home computer you were likely to be disappointed, but nevertheless it was an excellent toy.

The Armatron may be long gone, but if you hanker for a similar device you should take a look at [3D Meister]’s finger controlled six axis arm. This is an arm similar to the Armatron in size, but with far more capabilities. Control is via cable loops to sliders at the arm’s base, and in addition to the usual arm movements there is an extra loop which can be used to operate any of a selection of tools including a gripper, a magnet, and a clipper. The video below the break shows the arm in action, and for the faint-hearted it should be noted that it contains the gratuitous death of some innocent plants.

Continue reading “Hackaday Prize Entry: A Six Axis Robotic Arm With Fingertip Control”

The Amazon Echo As A Listening Device

It is an inevitability that following swiftly on the heels of the release of a new device there will be an announcement of its rooting, reverse engineering, or other revealing of its hackability. Now the device in question is the Amazon Echo, as MWR Labs announce their work in persuading an Echo to yield the live audio from the microphone and turn the voice assistant device into a covert listening device.

The work hinges on a previous discovery and reverse engineering (PDF) of Amazon’s debug connector on the base of the Echo, which exposes both an SD card interface and a serial terminal. Following that work, they were able to gain root access to the device, analyze the structure of the audio buffers and how the different Echo processes use them, and run Amazon’s own “shmbuf_tool” application to pipe raw audio data to a network stream. Astoundingly this could be done without compromising the normal operation of the device.

It should be stressed, that this is an exploit that requires physical access to the device and a bit of knowledge to perform. But it’s not inconceivable that it could be made into a near-automated process requiring only a device with a set of pogo pins to be mated with an Echo that has had its cover quickly removed.

That said, inevitably there will be enough unused Echos floating around before too long that their rootability will make them useful to people in our community. We look forward to what interesting projects people come up with using rooted Echos.

This isn’t the first time we’ve covered the use of an Echo as a listening device.

Via Hacker News.

Amazon Echo image: FASTILY [CC BY-SA 4.0].

Avoiding The Engineer-Saviour Trap

The random seaside holidays of Hackaday staffers rarely sow the seeds of our articles, but my most recent trip had something slightly unusual about it. I was spending a couple of days in a resort town on the Isle of Wight, just off the coast of Southern England, and my hotel was the local outpost of a huge chain that provides anonymous rooms for travelling salesmen and the like. I could probably find an identical place to lay my head anywhere in the world from Anchorage to Hobart and everywhere in between.

My room though was slightly different to the norm. By chance rather than necessity I’d been assigned one of the hotel’s accessible rooms, designed with people with disabilities in mind. And once I’d reached the limit of the free amusement that the digital TV channels of Southern England could provide, my attention turned to the room itself, eyeing up its slightly unfamiliar design features as an engineer.

Continue reading “Avoiding The Engineer-Saviour Trap”

Getting Data Out Of Air-Gapped Networks Through The Power Cable

If you are an organisation that is custodian of sensitive information or infrastructure, it would be foolhardy of you to place it directly on the public Internet. No matter how good your security might be, there is always the risk that a miscreant could circumvent it, and perform all sorts of mischief. The solution employed therefore is to physically isolate such sensitive equipment from the rest of the world, creating an air gap. Nothing can come in and nothing can go out, or so goes the theory.

Well, that’s the theory, anyway. [Davidl] sends us some work that punches a hole in some air-gapped networks, allowing low-speed data to escape the air gap even if it doesn’t allow the reverse.

So how is this seemingly impossible task performed? The answer comes through the mains electrical infrastructure, if the air gap is bridged by a mains cable then the load on that mains cable can be modulated by altering the work undertaken by a computer connected to it. This modulation can then be detected with a current transformer, or even by compromising a UPS or electricity meter outside the air gap.

Of course, the Hackaday readership are all upstanding and law-abiding citizens of good standing, to whom such matters are of purely academic interest. Notwithstanding that, the article goes into the subject in great detail, and makes for a fascinating read.

We’ve touched on this subject before with such various techniques as broadcast radio interference and the noise from a fan,  as well as with an in-depth feature.

Amateur Radio Just Isn’t Exciting

As ARRL president, [Rick Roderick, K5UR] spends a significant amount of time proselytising the hobby. He has a standard talk about amateur radio that involves tales gleaned from his many decades as a licence holder, and features QSL cards from rare DX contacts to show how radio amateurs talk all over the world.

He’s delivered this talk countless times, and is used to a good reception from audiences impressed with what can be done with radio. But when he delivered it to a group of young people, as Southgate ARC reports, he was surprised to see a lack of interest from his audience, to whom DX or contesting just don’t cut it when they have grown up with the pervasive Internet. Writing in the 2016 ARRL Annual Report, he said:

“Change generally doesn’t come easy to us. But when I looked out at that group of young faces and saw their disinterest in traditional ham pursuits, I realized that I had to change. We have to change. It won’t come easy, but it’s essential that we get to work on it now.”

If you were to profile a typical group of radio amateurs, it would not be difficult to see why [K5UR] found himself in this position. It might be an unflattering portrait for some amateurs, but it’s fair to say that amateur radio is a hobby pursued predominantly by older more well-off men with the means to spend thousands of dollars on commercial radios. It is also fair to say that this is hardly a prospect that would energize all but the most dedicated of youthful radio enthusiasts. This is not a new phenomenon, where this is being written it was definitely the case back in the days when they were issuing G7 callsigns, for instance.

Were Hackaday to find ourselves in the position of advising the ARRL on such matters, we’d probably suggest a return to the roots of amateur radio, a time in the early 20th century when it was the technology that mattered rather than the collecting of DXCC entities or grid squares, and an amateur had first to build their own equipment rather than simply order a shiny radio before they could make a contact. Give a room full of kids a kit-building session, have them make a little radio. And lobby for construction to be an integral part of the licensing process, it is very sad indeed that where this is being written at least, the lowest tier of amateur radio licence precludes home-made radio equipment. Given all that, why should it be a surprise that for kids, amateur radio just isn’t exciting?

We’ve shown you some fantastic amateur radio builds over the years. If you have a youngster with an interest in radio, show them a BitX transceiver, or the world of QRP.

Header image: enixii. [CC BY 2.0]. We hope these snoozing kids aren’t in the middle of a lecture on amateur radio.

Beautiful Rocketeer Jetpack Replica Boasts Impressive Metalwork

Fans of the Rocketeer comic book and movie franchise will be familiar with its hero’s 1930s-styled rocket backpack.  It’s an intricate construction of complex streamlined curves, that has inspired many recreations over the years.

Most Rocketeer jetpacks are made from plastic, foam, and other lightweight materials that will be familiar to cosplayers and costumers. But [David Guyton]’s one is different, he’s made it from sheet steel.

The attraction in his video is not so much the finished pack, though that is an impressive build. Instead it’s the workmanship, nay, the craftsmanship, as he documents every stage of the metalwork involved. The panel beating tools of a sheet metalworker’s trade are surprisingly simple, and it’s tempting to think as you watch: “I could do that!”. But behind the short video clips and apparent speed of the build lies many hours of painstaking work and a huge amount of skill. Some of us will have tried this kind of sheet work, few of us will have taken it to this level.

The video is below the break, it takes us through the constituent parts of the build, including at the end some of the engine details which are cast in resin. Watch it with a sense of awe!

Continue reading “Beautiful Rocketeer Jetpack Replica Boasts Impressive Metalwork”

Listen To Your Fermentation To Monitor Its Progress

If you are a wine, beer, or cider maker, you’ll know the ritual of checking for fermentation. As the yeast does its work of turning sugar into alcohol, carbon dioxide bubbles froth on the surface of your developing brew, and if your fermentation container has an airlock, large bubbles pass through the water within it on a regular basis. Your ears become attuned to the regular “Plop… plop… plop” sound they make, and from their interval you can tell what stage you have reached.

[Chris] automated this listening for fermentation bubbles, placing a microphone next to his airlock and detecting amplitude spikes through two techniques: one using an FFT algorithm and the other a bandpass filter. Both techniques yielded similar graphs for fermentation activity over time.

He has a few ideas for improvement, but notes that his system is vulnerable to external noises. There is also an admission that using light to detect bubbles might be a more practical solution as we have shown you more than once with other projects, but as with so many projects on these pages, it is the joy of the tech as much as the practicality that matters.