Hackaday Podcast Episode 306: Bambu Hacks, AI Strikes Back, John Deere Gets Sued, And All About Capacitors

It was Dan and Elliot behind the microphones today for a transatlantic look at the week in hacks. There was a bucket of news about AI, kicked off by Deepseek suddenly coming into the zeitgeist and scaring the pants off investors for… reasons? No matter, we’re more interested in the tech anyway, such as a deep dive into deep space communications from a backyard antenna farm that’s carefully calibrated to give the HOA fits. We got down and dirty with capacitors, twice even, and looked at a clever way to stuff two websites into one QR code. It’s all Taylor, all the time on every channel of the FM band, which we don’t recommend you do (for multiple reasons) but it’s nice to know you can. Plus, great kinetic art project, but that tooling deserves a chef’s kiss. Finally, we wrap up with our Can’t Miss articles where Jenny roots for the right to repair, and Al gives us the finger(1).

Download the zero-calorie MP3.

Continue reading “Hackaday Podcast Episode 306: Bambu Hacks, AI Strikes Back, John Deere Gets Sued, And All About Capacitors”

Supercon 2024: Joshua Wise Hacks The Bambu X1 Carbon

Bambu Labs have been in the news lately. Not because of the machines themselves, but because they are proposing a firmware change that many in our community find restricts their freedom to use their own devices.

What can be done? [Joshua Wise] gave a standout talk on the Design Lab stage at the 2024 Hackaday Superconference where he told the tale of his custom firmware for the Bambu X1 Carbon. He wasn’t alone here; the X1 Plus tale involves a community of hackers working on opening up the printer, but it’s also a tale that hasn’t ended yet. Bambu is striking back. Continue reading “Supercon 2024: Joshua Wise Hacks The Bambu X1 Carbon”

The Badge Hacks Of Supercon

We just got home from Supercon and well, it was super. It was great to see everyone, and meet a whole bunch of new folks to boot! The talks were great, and you can see a good half of them already on the Hackaday YouTube channel, so for that you didn’t even have to be there.

The badge hacks were, as with most years, out of this world. I’ll admit that my cheeks were sore from laughing so much after emceeing it this year, due in no small part to two hilarious AI projects, both of which were also righteous hacks in addition to full-on comedy routines. A group of six programmers got all of their hacks working together, and the I2C-to-MQTT bridge had badges blinking in sync even in the audience. You want blinkies? We had blinkies.

But the hack that warmed everyones’ hearts was “I figured it out” by [Connie]. Before this weekend, she had never coded MicroPython and didn’t know anything about I2C. But yet by Sunday afternoon, she made a sweet spiral animation on the LED wheel, and blinked the RGBs in the touchwheel.

What I love about the Hackaday audience is that, when the chips are down, someone doing something new for the first time is valued as much as some of the more showy work done by more experienced programmers. Hacking is also about learning and pushing out boundaries after all. The shouts for “I figured it out” were louder than any others in the graphics hacks category, it took home a prize, and I was smiling from ear to ear.

Hackaday can learn from this too. [Connie]’s hack definitely shows the need for another badge-hack category, first timers, because we absolutely should recognize first tries. There was also a strong petition / protest from people who had worked new hacks onto previous year’s badges – like [Andy] and [koppanyh]’s addition of bit-banged I2C to the Voja 4 badge from two years ago, and [Instant Arcade]’s Polar Pacman, which he named “Ineligible for this Competition” in protest. Touche.

We’re stoked to learn new things, see new hacks, and basically just catch up with everything folks did over the weekend. We can’t wait to see what you’re up to next year!

Seven New Street Fighter 2 Arcade Rom Hacks

[Sebastian Mihai] is a prolific programmer and hacker with a particular focus on retrocomputing and period games, and this latest hack, adding new gameplay elements to Capcom’s Street Fighter II – Champion Edition, is another great one. [Sebastian] was careful to resist changing the game physics, as that’s part of what makes this game ‘feel’ the way it does, but added some fun extra elements, such as the ability to catch birds, lob barrels at the other player, and dodge fire.

The title screen was updated for each of the different versions, so there is no doubt about which was being played. This work was based on their previous hacks to Knights of the Round. Since both games shared the same Capcom CPS-1 hardware, the existing 68000 toolchain could be reused, reducing the overhead for this new series of hacks. Continue reading “Seven New Street Fighter 2 Arcade Rom Hacks”

Hackaday Podcast Episode 284: Laser Fault Injection, Console Hacks, And Too Much Audio

The summer doldrums are here, but that doesn’t mean that Elliot and Dan couldn’t sift through the week’s hack and find the real gems. It was an audio-rich week, with a nifty microsynth, music bounced off the moon, and everything you always wanted to know about Raspberry Pi audio but were afraid to ask. We looked into the mysteries of waveguides and found a math-free way to understand how they work, and looked at the way Mecanum wheels work in the most soothing way possible. We also each locked in on more classic hacks, Elliot with a look at a buffer overflow in Tony Hawks Pro Skater and Dan with fault injection user a low-(ish) cost laser setup. From Proxxon upgrades to an RC submarine to Arya’s portable router build, we’ve got plenty of material for your late summer listening pleasure.

Worried about attracting the Black Helicopters? Download the DRM-free MP3 and listen offline, just in case.

Continue reading “Hackaday Podcast Episode 284: Laser Fault Injection, Console Hacks, And Too Much Audio”

Vintage Hacks For Dot Matrix Printers In China

In an excerpt from his book The Chinese Computer: A Global History of the Information Age, [Thomas Mullaney] explains how 1980s computer tech — at least the stuff that was developed in the West — was stubbornly rooted in the Latin alphabet. After all, ASCII was king, and with 60,000 symbols, Chinese was decidedly difficult to shoehorn into 8 bits. Unicode was years in the future so, of course, ingenious hackers did what they do best: hack!

The subject of the post is the dot matrix printer. Early printers had nine pins, which was sufficient to make Latin characters in one pass. To print Chinese, each character required at least two passes of the print head. This was slow, of course, but it was also subject to confusing variations due to ink inconsistency and registration problems. It also made the Chinese characters twice as big as English text.

Initial attempts were made to use finer pins to pack twice as many dots in the same space. But this made the pins too thin and subject to bending and breaking. Instead, some engineers would retain the two passes but move the print head just slightly lower so the second pass left dots in the gaps between the first pass dots. Obviously, the first pass would print even-numbered dots (0, 2, 4,…), and the second pass would catch the odd-numbered dots. This wasn’t faster, of course, but it did produce better-looking characters.

While international languages still sometimes pose challenges, we’ve come a long way, as you can tell from this story. Of course, Chinese isn’t the only non-Latin language computers have to worry about.

Old Spotify Car Thing Hacks Gain New Attention

If you haven’t heard by now, Spotify is shutting down support for their “Car Thing” on December 9th of this year. Once that happens the automotive media player will officially be useless, with users being advised to literally throw them in the trash come December 10th. Call it an early Christmas present from your friends at the multi-billion dollar streaming company.

Surely the hardware hacking community can do a bit better than that. As it turns out, there’s actually been a fair amount of hacking and research done on the Car Thing, it’s just that most of it happened a couple years back when the device first hit the market. Things stagnated a bit in the intervening years, but now that the clock is ticking, there’s far more interest in cracking open the gadget and seeing what else we can do with it.

[lmore377]’s Car Thing macropad hack from 2022.
The car-thing-reverse-engineering repository on GitHub has a wealth of hardware and software information, and has been something of a rallying point for others who have been poking around inside the device. Unsurprisingly, the Car Thing runs Linux, and with relatively minor work you can gain U-Boot and UART access. With just 512 MB of RAM and a Amlogic S905D2 chip that’s similar to what powers the Radxa Zero, it’s not exactly a powerhouse. Then again, we’ve seen plenty of awesome projects done with less.

If you’re more into the step-by-step approach, security researcher [Nolen Johnson] did a write-up about getting access to the Car Thing’s internal Linux system back in 2022 that’s certainly worth a look. As you’d imagine, there’s also a few YouTube videos out there that walk the viewer through gaining access to the hardware. This one from [Dinosaur Talks Tech] not only provides a good overview of how to get into the system, but covers flashing modified versions of the stock firmware to unlock various features and tweaking the internal Linux OS.

Interestingly enough, while we’ve seen plenty of homebrew hardware players for Spotify over the years, this is the first time the Car Thing has ever crossed our path. Something tells us though that this isn’t the last time we’ll hear about this forlorn Linux gadget.

Continue reading “Old Spotify Car Thing Hacks Gain New Attention”