East Coast RepRap Festival Returns This Weekend

After laying low during the height of the pandemic, the East Coast RepRap Festival (ERRF) is just days away from making its triumphant return to Bel Air, Maryland. This two-day celebration of all things extruded is packed with talks, exhibits, and demonstrations that you won’t want to miss if you’ve got even a passing interest in 3D printing. You can purchase advance tickets now — adult admission for both days (Oct 8 & 9) will set you back just $10 USD, while anyone under 17 gets in for free.

ERRF 22 will honor Sanjay Mortimer with a bust printed by the community.

When we visited in 2019, ERRF was only in its second year, but it was already obvious that it was becoming a major event in the 3D printing world. The schedule included talks from 3D printing luminaries such as Adrian Bowyer, Josef Průša was on hand to personally unveil the Prusa Mini, and it seemed everyone who ever squirted out a bit of hot plastic on YouTube was there to stream live from the show floor. But then COVID-19 came around and jammed the extruder, as it were.

We’re glad to see that an event as young as ERRF managed to weather the pandemic and return to an in-person show. There was naturally a risk of loosing momentum, especially as the organizers opted not to go the virtual route these last two years — but with palpable online buzz about the event and a stacked lineup of speakers, vendors, and exhibitors, it seems like even a global pandemic couldn’t hold these hackers and makers down for long.

If you make the trip to Maryland this weekend and happen to run into a roving Hackaday writer, there just might be some special edition swag in it for you. But for those who can’t make it to ERRF in person, don’t worry. As always, we’ll make sure to bring you plenty of pictures and details from the show.

Matthew [wrongbaud] Alt Is Fighting The Good Fight

In a perfect world, all of our electronic devices would come with complete documentation, and there’d be open source libraries available for interfacing them with whatever we wanted. There’d never be arbitrary lockouts preventing us from using a piece of hardware in a way the manufacturer didn’t approve of, and the “cloud” wouldn’t be a black-box server in some data center on the other side of the planet, but a transparent and flexible infrastructure for securely storing and sharing information.

Unfortunately, that’s not the world we live in. What’s worse, rather than moving towards that electronic utopia, the industry appears to be heading in the opposite direction. It seems like every month we hear about another service shutting down and leaving viable hardware to twist in the wind. Just yesterday Google announced they’d be retiring their Stadia game streaming service early next year — leaving users with unique Internet-connected controllers that will no longer have a back-end to communicate with.

Matthew Alt

Luckily for us, there’s folks like Matthew [wrongbaud] Alt out there. This prolific hacker specializes in reverse engineering, and has a knack not just for figuring out how things work, but in communicating those findings with others. His conquests have graced these pages many times, and we were fortunate enough to have him helm the Introduction to Reverse Engineering with Ghidra class for HackadayU back in 2020. This week, he stopped by the Hack Chat to talk about the past, present, and future of reverse engineering.

Matthew got his start in reverse engineering during college, when he was working in a shop that specialized in tuning engine control units (ECUs). He was responsible for figuring out how the ECUs functioned, which ultimately would allow them to be modified to improve engine performance beyond the vehicle’s stock configuration. Sometimes that involved uploading modified calibration data, or disabling functions that were detrimental to engine performance. These software changes could potentially increase engine output by as much as 50 HP, though he says that sometimes the goal was to simply increase throttle response so the vehicle would feel more aggressive on the road.

Moving on to the tools of the trade, Matthew explained why he prefers using Ghidra for embedded targets over classic reverse engineering tools like IDA Pro. As an example he points to a recent project where he used Ghidra’s API and intermediary language PCode to crack passwords in Game Boy Advance games. Though he does mention that IDA still has its place if you’re looking to peek into some Windows C++ software.

Matthew also pointed to new techniques and tools for working with fault injection which have opened up a lot of exciting possibilities over the last few years. In fact, he says tools like ChipWhisperer will become invaluable as newer devices adopt advanced security features. When gadgets are using secure boot and encrypted firmware, gaining access is going to take a bit more than just finding an unleaded serial port on the board. Glitching attacks will become more commonplace, so you might as well get up to speed now.

Colin O’Flynn’s ChipWhisperer makes side-channel power analysis and glitching attacks far more accessible.

To that end, Matthew pointed out a number of instructional courses that he and other hardware hackers such as Joe Grand have put together for those who want to get started with practical reverse engineering and have some disposable income. For those who’d rather work though it on their own, he dropped links to several Capture-the-Flag (CTF) events and wargames you can use to hone your skills.

We’d like to thank Matthew Alt for not just stopping by the Hack Chat, but for being such a good friend to the Hackaday community. His work has been inspirational for all of us here, and it’s always exciting when he’s penned a new blog post detailing another challenge bested. The next time your favorite MegaCorp releases some anti-consumer gadget, you can take some comfort in knowing he’s still out there bending hardware to his will.


The Hack Chat is a weekly online chat session hosted by leading experts from all corners of the hardware hacking universe. It’s a great way for hackers connect in a fun and informal way, but if you can’t make it live, these overview posts as well as the transcripts posted to Hackaday.io make sure you don’t miss out.

Infinite Axis Printing On The Ender 3

It’s taken years to perfect them, but desktop 3D printers that uses a conveyor belt instead of a traditional build plate to provide a theoretically infinite build volume are now finally on the market. Unfortunately, they command a considerable premium. Even the offering from Creality, a company known best for their budget printers, costs $1,000 USD.

But if you’re willing to put in the effort, [Adam Fasnacht] thinks he might have the solution. His open source modification for the Ender 3 Pro turns the affordable printer into a angular workhorse. We wouldn’t necessarily call it cheap; in addition to the printer’s base price of $240 you’ll need to source $200 to $300 of components, plus the cost of the plastic to print out the 24 components necessary to complete the conversion. But it’s still pretty competitive with what’s on the market. Continue reading “Infinite Axis Printing On The Ender 3”

Watch NASA Crash A Probe Into An Asteroid Tonight

Got any plans for tonight? No? Well then you’re in luck, because NASA is just a few hours from intentionally smashing a probe into the minor planet Dimorphos as part of Double Asteroid Redirection Test (DART) — marking the first time humanity has ever intentionally tried to knock a space rock off-course. If it works, we’re one step closer to having a viable planetary defense system in case we ever detect an asteroid on a collision course with Earth. If it doesn’t work. . . well, we’ve still got time to come up with another plan.

To be clear, the 170 meter (560 feet) wide Dimorphos DOES NOT pose any threat to us, nor will it after NASA smacks it around with an ion-propelled spacecraft. This is simply a test to see if a small spacecraft impacting an asteroid head-on can slow it down enough to appreciably change its orbital trajectory. We won’t know for a week or so if the impact did the trick, but it should still be fascinating to watch the crash happen live.

We’ve embedded the two NASA streams below. The first one will start about a half an hour before impact and is going to show live navigational images of Dimorphos as the DART spacecraft zeros in on its target, and the second stream will cover the main event. Keep in mind this isn’t a Hollywood film we’re talking about — don’t expect any dramatic explosions when the clock hits zero. When the telemetry stops coming back, that means it was a bullseye.

Continue reading “Watch NASA Crash A Probe Into An Asteroid Tonight”

So How Do You Make A Self-Destructing Flash Drive?

A self-destructing storage device that vaporizes its contents at the first sign of trouble would be an invaluable tool for many people, but good luck getting your hands on such a thing if you don’t work for a three-letter agency. Or at least, that’s what we would have said before [Walker] got on the case. He’s working on an open source self-destructing USB flash drive for journalists, security researchers, whistleblowers, or anyone else who really values their privacy.

When we previously covered this project in July, [Walker] had only planned to make the flash drive hide its contents unless you knew to wet your fingers before plugging it in. We admit it sounds a little weird, but as far as clandestine methods of activating something goes, it’s pretty clever. But based on the feedback he received, he decided to go all-in and make the USB drive literally trash itself should it be accessed by somebody who doesn’t know the secret.

An elegant weapon for a more civilized age.

But how exactly do you pull that off? Sure we’d love to see a small thermite charge or vial of acid packed in there, but obviously that’s not very practical. It needs to be safe to carry around, and just as importantly, unlikely to get you into even more trouble with whoever is searching through your belongings. To that end, [Walker] thinks he’s come up with an elegant solution.

The datasheet for his flash memory chip says the maximum voltage it can handle before releasing the Magic Smoke is a meager 4.6 V. So he figures running a voltage doubler on the nominal 5 V coming from a USB port should disable the chip nicely with a minimum of external drama. Will it be enough to prevent the data from being recovered forensically? We don’t know, but we’re eager to find out.

In the write-up, [Walker] takes readers through the circuit designs he’s come up so far, and shows off the source code that will run on the ATtiny25 to determine when it’s time to toast the flash. He says by the next post he should have the entire flash drive built and documented, so stay tuned.

CAPSTONE: The Story So Far

After decades of delays and false starts, NASA is finally returning to the Moon. The world is eagerly awaiting the launch of Artemis I, the first demonstration flight of both the Space Launch System and Orion Multi-Purpose Crew Vehicle, which combined will send humans out of low Earth orbit for the first time since 1972. But it’s delayed.

While the first official Artemis mission is naturally getting all the attention, the space agency plans to do more than put a new set of boots on the surface — their long-term goals include the “Lunar Gateway” space station that will be the rallying point for the sustained exploration of our nearest celestial neighbor.

But before launching humanity’s first deep-space station, NASA wants to make sure that the unique near-rectilinear halo orbit (NRHO) it will operate in is as stable as computer modeling has predicted. Enter the Cislunar Autonomous Positioning System Technology Operations and Navigation Experiment, or CAPSTONE.

CAPSTONE in the clean room prior to launch.

Launched aboard an Electron rocket in June, the large CubeSat will hopefully become the first spacecraft to ever enter into a NRHO. By positioning itself in such a way that the gravity from Earth and the Moon influence it equally, maintaining its orbit should require only periodic position corrections. This would not only lower the maintenance burden of adjusting the Lunar Gateway’s orbit, but reduce the station’s propellant requirement.

CAPSTONE is also set to test out an experimental navigation system that uses the Lunar Reconnaissance Orbiter (LRO) as a reference point instead of ground-based stations. In a future where spacecraft are regularly buzzing around the Moon, it will be important to establish a navigation system that doesn’t rely on Earthly input to operate.

So despite costing a relatively meager $30 million and only being about as large as a microwave oven, CAPSTONE is a very important mission for NASA’s grand lunar aspirations. Unfortunately, things haven’t gone quite to plan so far. Trouble started just days after liftoff, and as of this writing, the outcome of the mission is still very much in jeopardy.

Continue reading “CAPSTONE: The Story So Far”

Finding Digital Solace In An Old Nokia Phone

We don’t have to tell you that the current mobile phone market is a bit bleak for folks who value things like privacy, security, and open source. While there have been a few notable attempts to change things up, from phone-optimized versions of popular Linux distributions to the promise of modular handsets — we still find ourselves left with largely identical slabs released by a handful of companies which often seem to treat the customer as a product.

Instead of waiting for technological relief that may never come, [vrhelmutt] has decided to take matters into their own hands by looking to the past. Specifically, by embracing the relatively uncommon Nokia Asha 210. Released in 2013, this so-called “feature phone” offers a full QWERTY keyboard, Nokia’s Series 40 operating system, WiFi, Bluetooth, and a removable BL-4U battery. Unfortunately, with 2G cellular networks quickly being shut down, it’s not likely to get a signal for much longer (if at all, depending on where you live).

So why would you want to use some weird old Nokia phone in 2022? [vrhelmutt] argues that there’s a whole world of S40 software out there that can still be put to use, ranging from games to SSH clients. It’s also relatively easy to develop your own S40 applications in Java, with the original software development kit still freely available online. Combined with the solid (if considerably dated) hardware, this makes the Nokia Asha 210 a surprisingly compelling choice for a pocket hacking platform.

Whether you’re looking for a cheap device that will let you chat on IRC from your couch, or want to write your own custom software for controlling your home automation or robotics projects, you might want to check the second-hand market for a Nokia Asha 210. Or if you’re eager to get experimenting immediately, [vrhelmutt] is actually selling these phones pre-loaded with a wide array of games and programs. Don’t consider this to be an official endorsement; frankly we’re not feeling too confident about the legality of redistributing all this software, but at least it’s an option for those looking to get off the modern smartphone thrill-ride.

If you’re looking for something even farther removed from today’s mobile supercomputers, perhaps we could interest you in the Rotary Un-Smartphone.

Continue reading “Finding Digital Solace In An Old Nokia Phone”