Throne Of Dev: An Endgame Office Chair

They say you shouldn’t cheap out on anything that comes between you and the ground. Typically, that list includes shoes, tires, and mattresses. But it’s 2021, and it’s high time to add ‘office chair’ to that list. Take it from someone who bought a handful of hundred-dollar office chairs and finally invested in an Aeron. Your throne makes a difference.

We’re not sure if there is conclusive evidence of this phenomenon, but it seems that for many people, the fastest way to get those creative juices flowing is to lean back and put your feet up. Now it’s one thing to lean back in an office chair and hold yourself there, but it’s quite another to sit in, say, a recliner that keeps the position for you. What if there was an office chair that could switch between the two? [Peter van der Walt] has been working from home for a decade now and will soon be moving to a new base of operations. The new space has a little office next to the main area, so it’s the perfect opportunity to build the dream chair — a day-to-night endgame throne for working, gaming, and everything in between.

[Peter] is working with some cyborg additions to his body and doesn’t care for the standard office chair fare. Currently, he splits his sits between a plastic chair like you’d find outside a coffee house (hey, whatever works best) and a cushy recliner. The idea is to find comfort and focus, and build something comfortable enough to accommodate the occasional afternoon siesta. It will be completely CNC-machineable from 18 mm plywood, and will probably have some upholstery eventually. Your ideas for feature creep are welcome below, or better yet, in the discussion area of the project page.

Some of us like to stand once in a while, but don’t want to go all in on a robotic desk. There are budget-friendly ways around that problem too, of course.

The Trouble With Hubble: Payload Computer Glitch Stops Science At The Space Observatory

The Hubble Space Telescope’s remarkably long service life and its string of astonishing contributions to astronomy belie its troubled history. Long before its launch into low Earth orbit in 1990, Hubble suffered from design conflicts, funding and budgetary pressures, and even the death of seven astronauts. Long delayed, much modified, and mistakenly sent aloft with suboptimal optics, Hubble still managed to deliver results that have literally changed our view of the universe, and is perhaps responsible for more screensaver and desktop pictures than any other single source.

But all of that changed on June 13 of this year, when Hubble suffered a computer glitch that interrupted the flow of science data from the orbiting observatory. It’s not yet clear how the current issue with Hubble is going to pan out, and what it all means for the future of this nearly irreplaceable scientific asset. We all hope for the best, of course, but while we wait to see what happens, it’s worth taking the opportunity to dive inside Hubble for a look at its engineering and what exactly has gone wrong up there.

Continue reading “The Trouble With Hubble: Payload Computer Glitch Stops Science At The Space Observatory”

Hackaday Podcast 125: Linux Users Talking Windows 11, Pop Bottle Filament, Old Phones With Modern Guts, And Eavesdropping In RF

Hackaday editors Mike Szczys and Elliot Williams look through the most interesting hacks of the week. We spent ample time in adulation of the automatons built by François Junod; wizard-level watchmaking wrapped in endless levels of artistic detail. A couple projects stuffed into old cellphones turned Elliot’s head. We got to see what happens if you spin a gear’s teeth on two axes to make a universal spherical gear. And we conclude the episode with a look at how Windows 11 may send a lot of good hardware to recycle center, and at how toothpaste tubes sometimes miss the recycling center completely.

Take a look at the links below if you want to follow along, and as always, tell us what you think about this episode in the comments!

Direct download (55 MB or so.)

Places to follow Hackaday podcasts:

Continue reading “Hackaday Podcast 125: Linux Users Talking Windows 11, Pop Bottle Filament, Old Phones With Modern Guts, And Eavesdropping In RF”

Discarded Plastic Laser-Cut And Reassembled

The longevity of plastic is both a blessing and a curse. On the one hand, it’s extremely durable, inexpensive, and easy to work with, but it also doesn’t biodegrade and lasts indefinitely in the environment when not disposed of properly. While this can mean devastating impacts to various ecosystems, it can also be a benefit if you happen to pick this plastic up and also happen to have a laser cutter around.

After cleaning and sorting plastic that they had found from various places, including scraps from a 3D printing facility, the folks at [dinalab] set about turning waste plastic into something that would be usable once more. After sorting it they shredded it and then melted it into sheets. They found that a sandwich press yielded the best results, as it kept the plastic at a low enough temperature to keep it from burning. Once its off of the press and properly cooled, the flat sheets of plastic can be sent to the laser cutter to be made into whatever useful thing they happen to need.

Not only does this process reuse plastic that would otherwise end up in the landfill (or worse, the ocean), it can also reuse plastic from itself since the scraps can be re-melted back into sheets. Plastic does lose some of its favorable material properties with repeated heat cycles, but we’d have to imagine this is negligible for the types of things that [dinalab] is creating. Of course, you can always skip the heat cycles entirely and turn waste plastic directly into 3D printer filament instead.

Continue reading “Discarded Plastic Laser-Cut And Reassembled”

This Week In Security: Bad Signs From Microsoft, An Epyc VM Escape

Code signing is the silver bullet that will save us from malware, right? Not so much, particularly when vendors can be convinced to sign malicious code. Researchers at G DATA got a hit on a Windows kernel driver, indicating it might be malicious. That seemed strange, since the driver was properly signed by Microsoft. Upon further investigation, it became clear that this really was malware. The file was reported to Microsoft, the signature revoked, and the malware added to the Windows Defender definitions.

The official response from Microsoft is odd. They start off by assuring everyone that their driver signing process wasn’t actually compromised, like you would. The next part is weird. Talking about the people behind the malware: “The actor’s goal is to use the driver to spoof their geo-location to cheat the system and play from anywhere. The malware enables them to gain an advantage in games and possibly exploit other players by compromising their accounts through common tools like keyloggers.” This doesn’t seem to really match the observed behavior of the malware — it seemed to be decoding SSL connections and sending the data to the C&C server. We’ll update you if we hear anything more on this one.
Continue reading “This Week In Security: Bad Signs From Microsoft, An Epyc VM Escape”

A Robot To Top Up Your Tesla

The convenience of just plugging in your car in the evening and not going into a gas station is great as long as you remember to do the plugging. You really don’t want to get caught with an empty battery while you’re in a rush. [Pat Larson]’s Tesla plugging robot might be a handy insurance policy if you count forgetfulness among your weaknesses.

The robot consists of a standard Tesla charging plug attached to a 2-axis robotic arm mounted on [Pat]’s garage wall. Everything is controlled by a Python script running on Raspberry Pi 4. After taking a picture with a camera module, it uses a Tensor Flow Lite machine learning model to determine the position of a reflector on the charging port cover. The platform moves back and forth to align with the charging port, after which it opens the charging port using the Tesla API. It then extends the arm towards the charging port, using ultrasonic proximity sensors for distance control, and again uses the camera module and Tensor Flow to look for the illuminated Tesla logo adjacent to the charging port. The charge plug is flipped out using a large servo, and after some final position adjustment, it takes the plunge. While robot won’t be winning any interior design contests, it does the job well, and adds a bit of convenience and peace of mind.

Other Tesla hacks we’ve seen include building a working Model S for $6500, turning an old Honda into a speed demon using Tesla parts, and a Casio F-91W that can unlock your Tesla.

Dumping 90’s Honda ECU Programming With Arduino

[P1kachu] owns a pair of early 1990’s Honda’s with custom tuning on their stock ECUs, and after having to get the ECU repaired on his ’93 civic, he found himself going down the rabbit hole of Honda ECU EPROM chips.

During the repair process, the tuning shop owner, or [Tuner-san] as [P1ikachu] refers to him, made a backup of the custom tuning to another EPROM chip.  This was done with an old Advantest R4945A EPROM programmer, which [Tuner-san] supposedly also used to clone Famicom cartridges back in the day. After realizing that [Tuner-san] could only clone the contents, but not view or modify it, he started looking at ways to do that.

EPROMS are programmed using higher voltage (12.5 V – 25 V) but to read them 5 V is used. The memory address is selected by setting each of the 15 address pins high or low, and then reading the status of the 8 data pins to extract one byte of data. Rinse and repeat for each of the 256 memory addresses on the Microchip 27C256 EPROM. One of the previous owners of [Pikachu]’s Civic made some unknown tuning changes, so he is in the process of looking at the dumped data to see what was changed. Once he has completed figuring out the programming table of the EPROM, he plans to do some testing with [Tuner-san] to possible smooth out the rev limited.

An interesting aspect of EPROMs is that they are erased using UV light, which sets all the memory bits to 1. During programming, selected bits can be set to 0, but it’s not possible to set them back to 1 without erasing the entire chip again.

Messing around with the computers in cars is not only for tuning, but can also expose some rather serious security flaws, especially in modern vehicles.