Google Home Scripting

It is always controversial to have home assistants like the ones from Google or Amazon. There are privacy concerns, of course. Plus they maddeningly don’t always do what you intend for them to do. However, if you do have one, you’ve probably thought about something you wanted to do that would require programming. Sure, you can usually do a simple list, but really writing code wasn’t on the menu. But now, Google Home will allow you to write code. Well, at least script using a YAML file.

The script language is available in the web app and if you opt in on the mobile app as well. There’s a variety of ways you can trigger scripts and many examples you can start with.

Continue reading “Google Home Scripting”

It’s Never Too Late To Upgrade Your ZX81 Keyboard

Sir Clive Sinclair’s ZX81 was a phenomenal sales success as one of the cheapest machines available in the early 1980s, but even its most fervent admirers will admit that it suffered heavily from the Sinclair economy drive. In particular that membrane keyboard was notorious for its lack of feedback, and a popular upgrade back in the day was a replacement keyboard. Now we can bring you what might be the ultimate in ZX replacement keyboards, in the form of [Brian Swetland]’s mechanical ZX81 keyboard.

The familiar 40-key layout is all there, using Cherry MX key switches and a beautiful set of custom-printed keycaps. There’s little more to a ZX keyboard than the matrix wiring, and in this case it’s all incorporated on a PCB. None of these techniques were readily available to individuals back in the ’80s, so a large piece of perfboard, key switches from an old terminal keyboard, and Letraset would have had to suffice.

We have to admit liking this project a lot, in fact we’re even tempted by a set of these keycaps for a regular keyboard just for old time’s sake. If you’re interested in the ZX81 then take a look at how we used one to help us through the pandemic.

Updated OSHW Flash Drive Keeps Data Safe, Fingers Dry

For almost a year now, we’ve been following the progress [Walker] has been making with Ovrdrive — a completely open source USB flash drive that features the ability to destroy itself should it fall into the wrong hands. It’s an interesting enough project on those merits alone, but what really made this idea stand out was that the user was expected to lick their fingers before handling the drive as a form of covert authentication.

Well, we’ve got some good news and some bad news. The good news is that [Walker] is just about ready to release the Ovrdrive officially on Crowd Supply. But it’s with a heavy heart that we must report that the device’s cutting edge spit-detection capabilities have been removed. Now if you want to preserve the drive’s files, you need to rapidly insert and remove the drive several times rather than just plugging it in.

In all seriousness, this new approach makes a lot more sense. As entertaining as it might have been, the whole idea of a device that could detect moisture on the user’s fingers was fraught with problems. It was a bit more of a meme than a real solution, and if we’re being honest, kind of disgusting. This new approach sounds far more reliable, especially when combined with the new “Lite” self-destruct mode.

While the original capability of literally frying the flash chip by way of several capacitors and a voltage doubler is still here, there’s also a non-destructive approach that’s enabled by default. Unless you open up the drive and desolder the jumper pad on the PCB, the onboard ATtiny24A will simply use the enable pin on the flash chip to make it appear empty. This means that you’ve got to really want to cook your flash chip on the first hint of funny business.

Ultimately, whether it’s self-destructing or not, we just really like the idea of a hacker-developed open source hardware USB flash drive. Admittedly it would be a lot cheaper and more practical to just buy one like a normal person, but we strongly believe that if there’s a way for the community to build a OSHW version of something, they should at least give it a shot.

Continue reading “Updated OSHW Flash Drive Keeps Data Safe, Fingers Dry”

A black work mat holds a circular badge with 64 addressable LEDs in a spiraling shape akin to the center of a sunflower. The LEDs have a rotating rainbow spiraling around the circle with red touching violet on one end. The colors extend in bands from the center to the rim of the circle.

Math You Can Wear: Fibonacci Spiral LED Badge

Fibonacci numbers are seen in the natural structures of various plants, such as the florets in sunflower heads, areoles on cacti stems, and scales in pine cones. [HackerBox] has developed a Fibonacci Spiral LED Badge to bring this natural phenomenon to your electronics.

To position each of the 64 addressable LEDs within the PCB layout, [HackerBox] computed the polar (r,θ) coordinates in a spreadsheet according to the Vogel model and then converted them to rectangular (x,y) coordinates. A little more math translates the points “off origin” into the center of the PCB space and scale them out to keep the first two 5 mm LEDs from overlapping. Finally, the LED coordinates were pasted into the KiCad PCB design file.

An RP2040 microcontroller controls the show, and a switch on the badge selects power between USB and three AA batteries and a DC/DC boost converter. The PCB also features two capacitive touch pads. [HackerBox] has published the KiCad files for the badge, and the CircuitPython firmware is shared with the project. If C/C++ is more your preference, the RP2040 MCU can also be programmed using the Arduino IDE.

For more details on beautiful RGB lights, we’ve previously presented Everything You Might Have Missed About Addressable LEDs, and for more details on why they can be so fun to wear, check out our Hackaday Badgelife Documentary.

(Editor’s note: HackerBox makes and sells kits, is run by Hackaday Contributor [Joseph Long] IRL.)

Continue reading “Math You Can Wear: Fibonacci Spiral LED Badge”

Linux Fu: Easy And Easier Virtual Networking

One of the best things about Linux is that there are always multiple ways to do anything you want to do. However, some ways are easier than others. Take, for example, virtual networking. There are plenty of ways to make a bunch of Internet-connected computers appear to be on a single private network. That’s nothing new, of course. Linux and Unix have robust networking stacks. Since 2018, though, Wireguard has been the go-to solution; it has a modern architecture, secure cryptography, and good performance.

There’s only one problem: it is relatively difficult to set up. Not impossible, of course. But it is a bit difficult, depending on what you want to accomplish.

How Difficult?

You must set up a wireguard server and one or more clients. You’ll need to pick a range of IP addresses. You might need to turn on routing. You have to generate keys. You might need to configure DNS and other routing options. You’ll certainly need to modify firewall rules. You’ll also need to distribute keys.

None of these steps are terribly difficult, but it is a lot to keep straight. The wg program and wg-quick script do most of the work, but you have a lot of decisions and configuration management to keep straight.

Browse the official “quick start,” and you’ll see that it isn’t all that quick. The wg-quick script is better but only handles some use cases. If you want really limited use cases, there are third-party tools to do a lot of the rote work, but if you need to change anything, you’ll still need to figure it all out.

That being said, once you have it set up, it pretty much works without issue and works well. But that initial setup can be very frustrating. Continue reading “Linux Fu: Easy And Easier Virtual Networking”

Flipper Zero “Smoking” A Smart Meter Is A Bad Look For Hardware Hackers

Alright, we’re calling it — we need a pejorative equivalent to “script kiddie” to describe someone using a Flipper Zero for annoyingly malign purposes. If you need an example, check out the apparent smart meter snuff video below.

The video was posted by [Peter Fairlie], who we assume is the operator of the Flipper Zero pictured. The hapless target smart meter is repeatedly switched on and off with the Flipper — some smart meters have contactors built in so that service can be disconnected remotely for non-payment or in emergencies — which rapidly starts and stops a nearby AC compressor. Eventually, the meter releases a puff of Magic Smoke, filling its transparent enclosure and obscuring the display. The Flipper’s operator mutters a few expletives at the results, but continues turning the meter on and off even more rapidly before eventually running away from the scene of the crime.

We qualify this as “apparent” because the minute we saw this over on RTL-SDR.com, we reached out to reverse engineer par excellence and smart meter aficionado [Hash] for an opinion. Spoiler alert: [Hash] thinks it’s an elaborate hoax; the debunking starts at the 4:32 mark in the second video below. The most damning evidence is that the model of smart meter shown in the video doesn’t even have a disconnect, so whatever [Peter] is controlling with the Flipper, it ain’t the meter. Also, [Hash] figured out where [Peter] lives — he doxxed himself in a previous video — and not only does the meter shown in the video not belong to the Canadian power company serving the house, StreetView shows that there’s a second meter, suggesting that this meter may have been set up specifically for the lulz.

It should go without saying that Hackaday is about as supportive of hardware experimentation as an organization can be. But there have to be some boundaries, and even if this particular video turns out to be a hoax, it clearly steps over the line. Stuff like this paints a poor picture of what hardware hacking is all about, and leads to unintended consequences that make it harder for all of us to get the tools we need.

Continue reading “Flipper Zero “Smoking” A Smart Meter Is A Bad Look For Hardware Hackers”

This Rohde & Schwarz Computer Is A Commodore PET

The IEE-488 or GPIB bus for controlling instruments by computer has existed now for many decades. It’s often implemented over USB or Ethernet here in 2023, but the familiar connector can still be found on the backs of pricey instruments. In the earlier days of GPIB when a powerhouse Linux laptop was decades away, what computer did the would-be GPIB user reach for? If they were a Rohde and Schwarz customer in the late 1970s the chances are it would have been the R&S PUC process controller, an 8-bit microcomputer that under its smart exterior turns out to be an enhanced Commodore PET. [NatureAndTech] has one for teardown, and you can see it in the video below the break.

Readers with long memories will remember that the PET had an IE-488 bus on a card edge connector, and it’s possible that’s why R&S took it as the basis for their machine. But this isn’t merely a PET in a fancy box, instead it’s a fully new PET-compatible computer, and it has some interesting features. There’s more memory than the original, a set of disk drives, and an expansion bus complete with a high-res graphics card allowing pixel graphics rather than text. Surprisingly though it has a BASIC interpreter it’s a hardware clone of the PET only, the ROM is unique to Rohde & Schwarz.

We think this machine is probably rare enough that we’re unlikely to see one in the flesh, but it’s been a fascinating thing to examine. You can join in with the video below the break, or you can look at the PET’s impact on a more recent scene.

Continue reading “This Rohde & Schwarz Computer Is A Commodore PET”