Field Testing A Home Made WiFi Antenna

Most readers will be aware that a good way to extend WiFi range is to use a better antenna for those 2.4 GHz signals, but at the same time such high frequency hijinks have something of a reputation of being not for the faint-hearted. [Dereksgc] puts that reputation to the test by building a helical WiFi antenna — and if that weren’t enough — he also subjects it to a field test. In a real field, is there any other way?

We’ve put both videos below the break, and you can find his helical antenna calculator on his website and the parametric CAD file for the scaffold in his GitHub repository. He first delivers a crash course in the fundamentals of helical antennas before diving into the construction, and even soldering on an impedance matching strip. The field testing involves setting up a base station with an FTP server on a phone, and connecting to it with a variety of antennas over increasing distance across farmland. We’ve characterised antennas in this way before, and it really does give an immediate view of their performance.

In this case the helix comfortably outperforms a commercial patch antenna and a laptop’s internal antenna, making such an antenna a very worthwhile piece of work whether you’re making a fixed link or indulging in a bit of casual wardriving.

The tools mentioned here will make helical antennas a snap, but this isn’t the first time we’ve touched on the subject.

Continue reading “Field Testing A Home Made WiFi Antenna”

Earth’s Final Frontier: Exploring The Alien Depths Of The Earth’s Oceans

Despite how hostile to life some parts of the Earth’s continents are, humanity has enthusiastically endeavored over the course of millennia to establish at least a toehold on each of them. Yet humanity has barely ventured beyond the surface of the oceans which cover around three-quarters of the planet, with human activity in these bodies of water dropping off quickly along with the fading of light from the surface.

Effectively, this means for all intents and purposes we have to this day not explored the vast majority of the Earth’s surface, due to over 70% of it being covered by water. As an ocean planet, much of Earth’s surface is covered by watery depths of multiple kilometers, with each 10 meters of water increasing the pressure by one atmosphere (1.013 bar), so that at a depth of one kilometer we’re talking about an intense 101 atmospheres.

Over the past decades, the 1985 discovery of Titanic’s wreck approximately 3.8 kilometer below the surface of the Atlantic, the two year long search for AF447’s black boxes, and the fruitless search for the wreckage of MH370 despite washed-up remnants have served as stark reminders of just how alien and how hostile the depths of the Earth’s oceans are. Yet with both tourism and mining efforts booming, will we one day conquer the full surface of Earth?

Continue reading “Earth’s Final Frontier: Exploring The Alien Depths Of The Earth’s Oceans”

Custom Keyboard Built For Diablo 3 Action

Custom mechanical keyboards are a great way to show off your passion and skill for electronics and design. They’re also perfect when you need to optimize your setup for a certain game or piece of software. [Pakequis] did just that with his Bad Thing of the Edge mechanical keyboard build.

[Pakequis] occasionally plays Diablo 3 on a tiny 7-inch laptop, which as you might expect, doesn’t have a keyboard conducive to gaming. Thus, he designed a mechanical keyboard with a series of important actions mapped to keys for the left hand. Naturally, that was an opportunity to have fun with the keycaps, which all feature graphics for their relevant in-game functions. The prototype was built with surplus keys from an old PTZ camera controller, but the final version runs Cherry MX switches. There are also a set of RGB LEDs with a variety of fun effects. The whole thing is run by a Raspberry Pi Pico, which is perfectly suited for building custom USB HID devices.

Hackers build custom keyboards for all kinds of reasons, like ergonomics, style, or just sheer absurdist fun.

Continue reading “Custom Keyboard Built For Diablo 3 Action”

An ESP In Your Mini TV

When miniature LCD TVs arrived on the market they were an object of desire, far from the reach of tech-obsessed youngsters. Now in the age of smartphones they’re a historical curiosity, but with the onward march of technology you can have one for not a lot. [Taylor Galbraith] shows us how, with an ESP32 and an LCD we rather like because of its CRT-like rounded corners.

What he’s created is essentially a small media player, but perhaps what makes it of further interest is its migration from a mess of wires on a breadboard to a rather nice PCB. He’s not released the board files at the time of writing, but since the software can all be found in the GitHub repository linked above, we live in hope. On it are not only the ESP and the screen, but also a battery management board, an audio amplifier, and a small speaker. For now it’s a bare board, but we hope he’ll complete it with a neatly designed case for either a pocket player or a retro-styled mini TV. Until then you can see his progress in the videos below the break.

If you’re after more ESP32 media player inspiration, this isn’t the first retro-themed media player we’ve brought you.

Continue reading “An ESP In Your Mini TV”

Build A Tesla Coil With Just Three Components

Tesla coils are beautiful examples of high voltage hardware, throwing sparks and teaching us about all kinds of fancy phenomena. They can also be quite intimidating to build. [William Fraser], however, has come up with a design using just three components.

It’s a simplified version of the “Slayer Exciter” design, which nominally features a transistor, resistor and LED, along with a coil, and runs on batteries. [William] learned that adding a capacitor in parallel with the batteries greatly improved performance, and allowed the removal of the LED without detriment. [William] also learned that the resistor was not necessary either, beyond starting the coil oscillating.

The actual 3-component build uses a 10 farad supercapacitor as a power source, hooked up to a 2N3904 NPN transistor and an 85-turn coil. It won’t start oscillating on its own, but when triggered by a pulse of energy from a piezo igniter, it jerks into life. The optimized design actually uses the shape of the assembled component leads to act as the primary coil. The tiny Tesla coil isn’t big and bold enough to throw big sparks, but it will light a fluorescent tube at close proximity.

If you like your Tesla coils musical, we have those too.

Continue reading “Build A Tesla Coil With Just Three Components”

Bluetooth Battery Monitors That Also Monitor Your Position, Without Asking

These days Bluetooth-based gadgets are everywhere, including for car and solar batteries. After connecting them up to the battery, you download the accompanying app on your smartphone, open it up and like magic you can keep tabs on your precious pile of chemistry that keeps things ticking along. Yet as [haxrob] discovered during an analysis, many of these devices will happily pass your location and other information along to remote servers.

The device in question is a Bluetooth 4.0 Battery Monitor that is resold under many brands, and which by itself would seem to do just what it is said to do, from monitoring a battery to running crank tests. Where things get unpleasant is with the Battery Monitor 2 (BM2) mobile app that accompanies the device. It integrates a library called AMap which is “a leading provider of digital map in China” and part of Alibaba. Although the app’s information page claims that no personal information is collected, the data intercepted with Wireshark would beg to differ.

In part 2 of this series, the BM2 app is reverse-engineered, decompiling the Java code. The personal information includes the latitude and longitude, as well as GPS, cell phone tower cell IDs and WiFi beacon data, which understandably has people rather upset. In addition to leaking your personal info, the BM2 app seems to be also good at running constantly in the background, which ironically drains your phone’s battery at an alarming rate.

Cases like these should be both a warning to not just install any app on your smartphone, as well as a wake-up call to Google and others to prevent such blatant privacy violations.

(Thanks to [Drew] for the tip)

Honda Headunit Reverse Engineering, And The Dismal State Of Infotainment Systems

These days the dozen or so ECUs in an average car are joined by an infotainment system of some type, which are typically a large touch screen on the dashboard (the headunit) and possibly a couple of auxiliary units for the rear seats. These infotainment systems run anything from QNX to (Yocto) Linux or more commonly these days some version of Android. AsĀ [Eric McDonald] discovered with his 2021 Honda Civic, its headunit runs an archaic Android dating back to roughly 2012.

While this offers intriguing options with gaining root access via decade-old exploits that the car manufacturer never fixed, as [Eric] notes, this is an advantage that anyone who can gain access to the car’s CAN buses via e.g. the headlights, a wireless access point, or even inject an exploit via ADB radio can use to their advantage. Essentially, these infotainment systems are massive attack surfaces with all of their wired and wireless interfaces, combined with outdated software that you as the vehicle owner are forbidden to meddle with by the manufacturer.

Naturally taking this ‘no’ as a challenge as any civilized citizen would, [Eric] set out to not only root the glorified Android tablet that Honda seeks to pass off as a ‘modern infotainment system’, but also reverse-engineer the system as far as possible and documenting the findings on GitHub. As [Eric] also explains in a Hacker News discussion, his dream is to not only have documentation available for infotainment systems in general as a community effort, but also provide open source alternatives that can be inspected by security researchers rather than being expected to lean on the ‘trust me bro’ security practices of the average car manufacturer.

Although a big ask considering how secretive car manufacturers are, this would seem to be an issue that we should tackle sooner rather than later, as more and more older cars turn into driving security exploits just waiting to happen.