Boiling Acid Used To See Chip Die

When a project starts off by heating acid to its boiling point we say no thanks. But then again we’re more for the projects that use ones and zeros or a hot soldering iron. If you’re comfortable with the chemistry like [Michail] this might be right up your alley. He used boiling acid to expose and photograph the die from several integrated circuits.

The title of our feature is a play on words. In this case, die refers to the silicone on which the IC has been etched. To protect it the hardware manufacturer first attaches the metal pins to the die, then encapsulates it in plastic. [Michail] removes that plastic case by heating sulfuric acid to about 300 degrees Celsius (that’s 572 Fahrenheit) then submerges the chips in the acid inside of a sealed container for about forty minutes. Some of the larger packages require multiple trips through the acid bath. After this he takes detailed pictures of the die and uses post processing to color enhance them.

This isn’t the only way to get to the guts of a chip. We’ve seen nitric acid and even tree sap (in the form of bow rosin) do the trick.

Update On [James’] Bipedal Robot

From the looks of the latest update [James] has made quite a bit of progress on his bipedal robot. He added to the top of the post just a few days ago, but didn’t include the video link which you’ll find embedded after the break. There’s about ten minutes of explanation before he gets down to demonstrating the static and dynamic balance which can be chosen using the buttons on a TV remote.

We looked in on the project about one year ago. The most notable change is the control electronics anchored in the torso of the robot. At first it makes us a bit nervous that he hasn’t built a protective cage around the components. But after seeing the latest stability demonstration we guess it’s because this thing is fantastic at staying upright. The torso is connected at the hips in such a way that no matter where each leg is it will always remain upright. All together the thing stands twenty-six inches tall, but that will grow when he gets around to building a head for it.

Continue reading “Update On [James’] Bipedal Robot”

Giving Siri Control Of Some Smart Bulbs

After getting his hands on the Philips Hue smart lightbulb [Brandon Evans] cracked open some of the hardware to see what is inside. He also spent time working out the software tricks necessary to use Siri to control light bulbs from iOS.

If you haven’t heard of the Hue product before it’s an LED bulb that fits in a standard medium base whose color and intensity can be controlled wirelessly. Included in each unit is Zigbee compatible hardware that lets the bulbs form their own mesh network. [Brandon] didn’t crack open the bulb since these things cost a pretty penny and disassembly requires cutting. But he did point us to this post where [Michael Herf] shows what the bulb’s case is hiding. We do get to see the other piece of the puzzle as [Brandon] exposes the internals on the base unit that bridges the mesh network to your home network via Ethernet. An STM32 chip is responsible for controlling the base unit.

Aside from a look at the guts [Brandon] hacked Siri (Apple’s voice activated virtual assistant) to control the system. You can see a demonstration of that in the clip after the break. The details are found in the second half of his post which is linked at the top. The code is found in his siriproxy-hue repository.

Continue reading “Giving Siri Control Of Some Smart Bulbs”

A Better Way To Hack IClass RFID Readers

iClass is an RFID standard that is aimed at better security through encryption and authentication. While it is more secure than some other RFID implementations, it is still possible to hack the system. But initial iClass exploits were quite invasive. [Brad Antoniewicz] published a post which talks about early attacks on the system, and then demonstrates a better way to exploit iClass readers.

We remember seeing the talk on iClass from 27C3 about a year and a half ago. While the technique was interesting, it was incredibly invasive. An attacker needed multiple iClass readers at his disposal as the method involved overwriting part of the firmware in order to get a partial dump, then patching those image pieces back together. [Brad] makes the point that this is fine with an off-the-shelf system, but high-security installations will be using custom images. This means you would need to get multiple readers off the wall of the building you’re trying to sneak into.

But his method is different. He managed to get a dump of the EEPROM from a reader using an FTDI cable and external power source. If you wan to see how he’s circumventing the PIC read protection you’ll have to dig into the source code linked in his article.

World’s Oldest Functioning Digital Computer Reminds Us Of A Telephone Exchange

This is the WHICH, the Wolverhampton Instrument for Teaching Computing from Harwell. It is the oldest functioning digital computer and thanks to a lengthy restoration process you can go and see it in person at The National Museum of Computing in Milton Keynes (Northwest of London in the UK).

The system was first put into operation in 1951. It’s function is both familiar and foreign. First off, it uses decimal rather than binary for its calculations. And instead of transistors it uses electromechanical switches like are found in older automatic telephone exchanges. This makes for very noisy and slow operation. User input is taken from strips of paper with holes punched in them. As data is accumulated it is shown in the registers using decatrons (which have since become popular in hobby projects). Luckily we can get a look at this in the BBC story about the WITCH.

According to the eLinux page on the device, it was disassembled and put into storage from 1997 until 2009. At that point it was loaned to the museum and has been undergoing cleaning, reassembly, and repair ever since.

[Thanks David]

.NET Micro Framework Used For A Prompt-based Computer

[Tom] is doing a little show and tell with his latest .NET Micro framework based project. He managed to get a prompt-based computer running on a FEZ Cobra board.

A USB keyboard serves as the input device. To give himself a familiar way to navigate and execute programs [Tom] mimicked the functionality of DOS. Above you can see the familiar format of the directory listings as he navigates the data on an SD card. But this goes deeper than changing directories and listing files. He also has access to commands which control peripherals, showing manipulation of the WiFi connection and demonstrating some simple code to show images on the screen. Since the hardware centers around the .NET MF, any compiled binary for that environment can be executed from the prompt as well.

See a complete demonstration of the project embedded after the break.

Continue reading “.NET Micro Framework Used For A Prompt-based Computer”

Dimming The Living Room Lights Using Your TV Remote

As part of a complete home theater setup [Andy] wanted to be able to control the lights from his couch. He started thinking about the best way to do this when he realized that his TV remote has buttons on it which he never uses. Those controls are meant for other components made by the same manufacturer as the TV. Since he doesn’t have that equipment on hand, he built his own IR receiver to switch the lights with those unused buttons.

He monitors and IR receiver using an AVR microcontroller. It is powered from mains via the guts from a wall wart included in the build. Also rolled into the project is a solid state relay capable of switching the mains feed to the light circuit. [Andy] mentions that going with a solid state part mean you don’t get that clicking associated with a mechanical relay. An electrical box extension was used to give him more room for mounting the IR receiver and housing his DIY circuit board.