A black work mat holds a circular badge with 64 addressable LEDs in a spiraling shape akin to the center of a sunflower. The LEDs have a rotating rainbow spiraling around the circle with red touching violet on one end. The colors extend in bands from the center to the rim of the circle.

Math You Can Wear: Fibonacci Spiral LED Badge

Fibonacci numbers are seen in the natural structures of various plants, such as the florets in sunflower heads, areoles on cacti stems, and scales in pine cones. [HackerBox] has developed a Fibonacci Spiral LED Badge to bring this natural phenomenon to your electronics.

To position each of the 64 addressable LEDs within the PCB layout, [HackerBox] computed the polar (r,θ) coordinates in a spreadsheet according to the Vogel model and then converted them to rectangular (x,y) coordinates. A little more math translates the points “off origin” into the center of the PCB space and scale them out to keep the first two 5 mm LEDs from overlapping. Finally, the LED coordinates were pasted into the KiCad PCB design file.

An RP2040 microcontroller controls the show, and a switch on the badge selects power between USB and three AA batteries and a DC/DC boost converter. The PCB also features two capacitive touch pads. [HackerBox] has published the KiCad files for the badge, and the CircuitPython firmware is shared with the project. If C/C++ is more your preference, the RP2040 MCU can also be programmed using the Arduino IDE.

For more details on beautiful RGB lights, we’ve previously presented Everything You Might Have Missed About Addressable LEDs, and for more details on why they can be so fun to wear, check out our Hackaday Badgelife Documentary.

(Editor’s note: HackerBox makes and sells kits, is run by Hackaday Contributor [Joseph Long] IRL.)

Continue reading “Math You Can Wear: Fibonacci Spiral LED Badge”

Linux Fu: Easy And Easier Virtual Networking

One of the best things about Linux is that there are always multiple ways to do anything you want to do. However, some ways are easier than others. Take, for example, virtual networking. There are plenty of ways to make a bunch of Internet-connected computers appear to be on a single private network. That’s nothing new, of course. Linux and Unix have robust networking stacks. Since 2018, though, Wireguard has been the go-to solution; it has a modern architecture, secure cryptography, and good performance.

There’s only one problem: it is relatively difficult to set up. Not impossible, of course. But it is a bit difficult, depending on what you want to accomplish.

How Difficult?

You must set up a wireguard server and one or more clients. You’ll need to pick a range of IP addresses. You might need to turn on routing. You have to generate keys. You might need to configure DNS and other routing options. You’ll certainly need to modify firewall rules. You’ll also need to distribute keys.

None of these steps are terribly difficult, but it is a lot to keep straight. The wg program and wg-quick script do most of the work, but you have a lot of decisions and configuration management to keep straight.

Browse the official “quick start,” and you’ll see that it isn’t all that quick. The wg-quick script is better but only handles some use cases. If you want really limited use cases, there are third-party tools to do a lot of the rote work, but if you need to change anything, you’ll still need to figure it all out.

That being said, once you have it set up, it pretty much works without issue and works well. But that initial setup can be very frustrating. Continue reading “Linux Fu: Easy And Easier Virtual Networking”

Flipper Zero “Smoking” A Smart Meter Is A Bad Look For Hardware Hackers

Alright, we’re calling it — we need a pejorative equivalent to “script kiddie” to describe someone using a Flipper Zero for annoyingly malign purposes. If you need an example, check out the apparent smart meter snuff video below.

The video was posted by [Peter Fairlie], who we assume is the operator of the Flipper Zero pictured. The hapless target smart meter is repeatedly switched on and off with the Flipper — some smart meters have contactors built in so that service can be disconnected remotely for non-payment or in emergencies — which rapidly starts and stops a nearby AC compressor. Eventually, the meter releases a puff of Magic Smoke, filling its transparent enclosure and obscuring the display. The Flipper’s operator mutters a few expletives at the results, but continues turning the meter on and off even more rapidly before eventually running away from the scene of the crime.

We qualify this as “apparent” because the minute we saw this over on RTL-SDR.com, we reached out to reverse engineer par excellence and smart meter aficionado [Hash] for an opinion. Spoiler alert: [Hash] thinks it’s an elaborate hoax; the debunking starts at the 4:32 mark in the second video below. The most damning evidence is that the model of smart meter shown in the video doesn’t even have a disconnect, so whatever [Peter] is controlling with the Flipper, it ain’t the meter. Also, [Hash] figured out where [Peter] lives — he doxxed himself in a previous video — and not only does the meter shown in the video not belong to the Canadian power company serving the house, StreetView shows that there’s a second meter, suggesting that this meter may have been set up specifically for the lulz.

It should go without saying that Hackaday is about as supportive of hardware experimentation as an organization can be. But there have to be some boundaries, and even if this particular video turns out to be a hoax, it clearly steps over the line. Stuff like this paints a poor picture of what hardware hacking is all about, and leads to unintended consequences that make it harder for all of us to get the tools we need.

Continue reading “Flipper Zero “Smoking” A Smart Meter Is A Bad Look For Hardware Hackers”

This Rohde & Schwarz Computer Is A Commodore PET

The IEE-488 or GPIB bus for controlling instruments by computer has existed now for many decades. It’s often implemented over USB or Ethernet here in 2023, but the familiar connector can still be found on the backs of pricey instruments. In the earlier days of GPIB when a powerhouse Linux laptop was decades away, what computer did the would-be GPIB user reach for? If they were a Rohde and Schwarz customer in the late 1970s the chances are it would have been the R&S PUC process controller, an 8-bit microcomputer that under its smart exterior turns out to be an enhanced Commodore PET. [NatureAndTech] has one for teardown, and you can see it in the video below the break.

Readers with long memories will remember that the PET had an IE-488 bus on a card edge connector, and it’s possible that’s why R&S took it as the basis for their machine. But this isn’t merely a PET in a fancy box, instead it’s a fully new PET-compatible computer, and it has some interesting features. There’s more memory than the original, a set of disk drives, and an expansion bus complete with a high-res graphics card allowing pixel graphics rather than text. Surprisingly though it has a BASIC interpreter it’s a hardware clone of the PET only, the ROM is unique to Rohde & Schwarz.

We think this machine is probably rare enough that we’re unlikely to see one in the flesh, but it’s been a fascinating thing to examine. You can join in with the video below the break, or you can look at the PET’s impact on a more recent scene.

Continue reading “This Rohde & Schwarz Computer Is A Commodore PET”

BIOS POST Card Built Using Raspberry Pi Pico

A computer’s BIOS includes basic diagnostic tools for troubleshooting issues. Often, we rely on the familiar beeps from the POST system for this reason. However, error codes are also available via hardware “POST Cards” that were particularly popular in the 1990s. [Mr. Green] has now built a POST card using readily-available modern hardware.

[Mr. Green] built the device to help troubleshoot an x86 based firewall appliance that was having trouble. Like many x86 systems, it featured a Low Pin Count (LPC) bus which can be used to capture POST troubleshooting codes. By hooking up a Raspberry Pi Pico to the LPC bus on the firewall’s motherboard, it was possible to get it to display the POST error codes on some LEDs. This is of great use in the absence of a conventional PC speaker to sound the error out with beeps.

The build can be used for POST-based troubleshooting on any x86 system with an LPC bus. Files are on Github for those eager to replicate the build. We’ve seen similar work before, too. Video after the break.

Continue reading “BIOS POST Card Built Using Raspberry Pi Pico”

Take A Ride In The Bathysphere

[Tom Scott] has traveled the world to see interesting things.  So when he’s impressed by a DIY project, we sit up and listen. In this case, he’s visiting the Bathysphere, a project created by a couple of passionate hobbyists in Italy. The project is housed at Explorandia, which based on google translate, sounds like a pretty epic hackerspace.

The Bathysphere project itself is a simulation of a submarine. Sounds simple, but this project is anything but.  There are no VR goggles involved.  Budding captains who are up for the challenge find themselves inside the cockpit of a mini-submarine. The sub itself is on a DIY motion platform. Strong electric motors move the system causing riders to feel like they are truly underwater. Inside the cockpit, the detail is amazing. All sorts of switches, lights, and greebles make for a realistic experience.  An electronic voice provides the ship status, and let’s the crew know of any emergencies. (Spoiler alert — there will be emergencies!)

The real gem is how this simulation operates. A Logitec webcam is mounted on an XY gantry. This camera then is dipped underwater in a small pond. Video from the camera is sent to a large monitor which serves as the sub’s window. It’s all very 1960’s simulator tech, but the effect works. The subtle movements of the simulator platform really make the users feel like they are 20,000 leagues under the sea.

Check out the video after the break for more info!

Continue reading “Take A Ride In The Bathysphere”

Arduino-Powered Missile System Uses Ultrasound To Aim

In the real world, missile systems use advanced radars, infrared sensors, and other hardware to track and prosecute their targets. [Raspduino Uno] on YouTube has instead used ultrasound for targeting for an altogether simpler desktop fire control solution.

This fun build uses a common off-the-shelf USB “missile launcher” that fires foam darts. To supply targeting data for the launcher, an Arduino Uno uses an ultrasonic sensor pair mounted atop a servo. As the servo rotates, the returns from the ultrasonic sensor are plotted on a screen run by a Raspberry Pi. If an object is detected in the 180-degree field of view of the sweeping sensor, a missile is fired using the dart launcher.

It’s a relatively simple build, but nonetheless would serve as a useful classroom demonstration of radar-like targeting techniques to a young audience. Real military hardware remains altogether more sophisticated. Video after the break.

Continue reading “Arduino-Powered Missile System Uses Ultrasound To Aim”