Adding USB-C To An IPhone 13 Is Delicate Work

USB-C seeks to rule the roost when it comes to connectors, and even has Big Europe on its side. Apple hasn’t had to abandon Lightning just yet, but [Restore Technique] has put a USB-C port into an iPhone 13 to give us all an idea what it’s going to be like in the brave new future ahead of us.

The idea came about after disassembling the iPhone 13, and the project was locked in after seeing the first iPhone with a USB-C connector sell for $86,001 on eBay. The plan had to support fast charging, cable reversibility, and data transfer, without cutting out any functionality or compromising water resistance.

The concept is simple enough: take the C94 board from a Lightning to USB-C cable, and put it inside the phone along with a USB-C port. Of course, actually achieving that is the real challenge. Techniques from melting apart Lightning connectors to carefully peeling apart 0.5 mm pitch flex cables to fit 0.6 mm pitch pads.

It’s an impressive hack, and explained so well it’s actually tempting to try it at home for the sheer challenge of the thing. If you do pull off a similar hack yourself, drop us a line! Video after the break.

Continue reading “Adding USB-C To An IPhone 13 Is Delicate Work”

Mechanical Keyboards Are Over, This Device Has Won

The desk of any self-respecting technology enthusiast in the 2020s is not complete without a special keyboard of some sort, be it a vintage IBM Model M, an esoteric layout or form factor, or just a standard keyboard made with clacky mechanical switches. But perhaps we’ve found the one esoteric keyboard to rule them all, in the form of [HIGEDARUMA]’s 8-bit keyboard. You can all go home now, the competition has been well and truly won by this input device with the simplest of premises; enter text by setting the ASCII value as binary on a row of toggle switches. No keyboard is more retro than the one you’d find on the earliest microcomputers!

Jokes aside, perhaps this keyboard may be just a little bit esoteric for many readers, but it’s nevertheless a well-executed project. Aside from the row of binary inputs there is a keypress button which sends whatever the value is to the computer, and a stock button that allows for multiple inputs to be stored and sent as one. If you pause for a moment and think how often you use Ctrl-C and Ctrl-V for example, this is an essential function. There’s more information on a Japanese website (Google Translate link), which reveals that under the hood it’s a Bluetooth device running on an ESP32.

We can imagine that with a bit of use it would be possible to memorize ASCII as binary pretty quickly, in fact we wouldn’t be at all surprised to find readers already possessing that skill. But somehow we can’t imagine it ever being a particularly fast text input device. Take a look for yourselves, it’s in the video below the break.

Continue reading “Mechanical Keyboards Are Over, This Device Has Won”

SpinLaunch And The History Of Hurling Stuff Into Space

It’s fair to say that there’s really no phase of spaceflight that could be considered easy. But the case could be made that the most difficult part of a spacecraft’s journey is right at the very beginning, within the first few minutes of flight. At this point the vehicle’s booster rocket will be fighting with all its might against its own immense propellant-laden mass, a battle that it’s been engineered to win by the smallest of margins. Assuming the balance was struck properly and the vehicle makes its way off of the launch pad, it will still need to contend with the thick sea-level atmosphere as it accelerates, a building dynamic pressure that culminates with a point known as “Max q” — the moment where the air density imposes the maximum structural load on the rocket before quickly dropping off as the vehicle continues to ascend and the atmosphere thins.

Air-launched rockets avoid flying through dense sea level air.

While the vast majority of rocket launches have to contend with the realities of flying through the lower atmosphere, there are some exceptions. By launching a rocket from an aircraft, it can avoid having to power itself up from sea level. This allows the rocket to be smaller and lighter, as it doesn’t require as much propellant nor do its engines need to be as powerful.

The downside of this approach however is that even a relatively small rocket needs a very large aircraft to carry it. For example, Virgin Orbit’s LauncherOne rocket must be carried to launch altitude by a Boeing 747-400 airliner in order to place a 500 kg (1,100 lb) payload into orbit.

But what if there was another way? What if you could get all the benefits of starting your rocket from a higher altitude, without the cost and logistical issues involved in carrying it with a massive airplane? It might sound impossible, but the answer is actually quite simple…all you have to do it throw it hard enough.

Continue reading “SpinLaunch And The History Of Hurling Stuff Into Space”

Hackaday Podcast 174: Breaking Into The Nest, The Cheapest 3D Printer, A Spy In Your HDMI, And AI All Over The Place

Fresh from vacation, Editor-in-Chief Elliot Williams makes his triumphant return to the Hackaday Podcast! He’s joined this week by Managing Editor Tom Nardi, who’s just happy he didn’t have to do the whole thing by himself again. In this episode we’ll talk about tackling BGA components in your custom PCBs, a particularly well executed hack against Google’s Nest Hub, and why you probably don’t really want the world’s cheapest 3D printer. We’ll also take a look at an incredible project to turn the Nokia 1680 into a Linux-powered handheld computer, a first of its kind HDMI firewall, and a robot that’s pretty good at making tacos. Listeners who are into artificial intelligence will be in for quite a treat as well, as is anyone who dreams of elevating the lowly automotive alternator to a more prominent position in the hacker world.

By the way, it seems nobody has figured out the hidden message in last week’s podcast yet. What are you waiting for? One of you out there has to be bored enough to give it a shot.

Direct download, and play it offline. You don’t need no stinkin’ cloud.

Check out the links below if you want to follow along, and as always, tell us what you think about this episode in the comments!

Continue reading “Hackaday Podcast 174: Breaking Into The Nest, The Cheapest 3D Printer, A Spy In Your HDMI, And AI All Over The Place”

Active Signal Tracer Probe Has AGC

[Electronics Old and New] has a new version of one of his old projects. The original project was an active probe. He took what he learned building that probe and put it into a new probe design. He also added automatic gain control or AGC. You can see a video explanation of the design below. The probe is essentially a high-impedance input using a JFET that can amplify audio or demodulated RF signals, which is a handy device to have when troubleshooting radios.

The audio amplifier is a simple LM386 circuit. The real work is in the input stage and the new AGC circuit. Honestly, we’ve used the amplifier by itself for a similar function, although the raw input impedance of the chip is only about 50K and is less in many circuits that use a pot on the input. Having a JFET buffer and an RF demodulating diode is certainly handy. You’d think the AGC block would be in the audio stage. However, the design uses it ahead of the detector which is great as long as the amplifier can handle the RF frequency you are interested in. In this case, we think he’s mostly working on old tube AM radios, so the max signal is probably in the neighborhood of 1 MHz.

A similar device was a Radio Shack staple for many years

The module is made to amplify an electret microphone using a MAX9814 which has AGC. The module had a microphone that came off for this project. The datasheet doesn’t mention an upper frequency limit, but a similar Maxim part mentions its gain is greater than 5 at 600 kHz, so for the kind of signals this is probably used for, it should work well. We wondered if you could use the module and dispense with the JFET input. The chip probably has a pretty high input impedance, but the datasheet doesn’t give a great indication.

For years we used a signal tracer from Radio Shack which — if we could still find it — now has an LM386 inside of it after the original electronics failed decades ago. In those days, fixing an AM radio involved either using a device like this to find where you did and didn’t have a signal or injecting signals at different points in the radio. Two sides of the same coin. For example, if you could hear a signal at the volume control — that indicated the RF stages were good and you had a problem on the audio side. Conversely, if you injected a signal at the volume control, not hearing would mean the same thing. Once you knew if the problem was in the RF or AF side, you’d split that part roughly in half and repeat the operation until you were down to one bad stage. Of course, you could use signal generators and scopes, but in those days you weren’t as likely to have those.

Heathkit, of course, had their own version. It even had on of those amazing magic eye tubes.

Continue reading “Active Signal Tracer Probe Has AGC”

This Week In Security: IoT In The Hot Tub, App Double Fail, And FreeBSD BadBeacon

[Eaton Zveare] purchased a Jacuzzi hot tub, and splurged for the SmartTub add-on, which connects the whirlpool to the internet so you can control temperature, lights, etc from afar. He didn’t realize he was about to discover a nightmare of security problems. Because as we all know, in IoT, the S stands for security. In this case, the registration email came from smarttub.io, so it was natural to pull up that URL in a web browser to see what was there. The page presented a login prompt, so [Eaton] punched in the credentials he had just generated. “Unauthorized” Well that’s not surprising, but what was very odd was the flash of a dashboard that appeared just before the authorization complaint. Could that have been real data that was unintentionally sent? A screen recorder answered that question, revealing that there was indeed a table loaded up with valid-looking data.

Digging around in the page’s JavaScript comes up with the login flow. The page uses the Auth0 service to handle logins, and that service sends back an access token. The page sends that access token right back to the Auth0 service to get user privileges. If the logged in user isn’t an admin, the redirect happens. However, we already know that some real data gets loaded. It appears that the limitations to data is all implemented on the client side, and the backend only requires a valid access token for data requests. What would happen if the response from Auth0 were modified? There are a few approaches to accomplish this, but he opted to use Fiddler. Rewrite the response so the front-end believes you’re an admin, and you’re in.

This approach seems to gain admin access to all of the SmartTub admin controls, though [Eaton] didn’t try actually making changes to see if he had write access, too. This was enough to demonstrate the flaw, and making changes would be flirting with that dangerous line that separates research from computer crime. The real problem started when he tried to disclose the vulnerability. SmartTub didn’t have a security contact, but an email to their support email address did elicit a reply asking for details. And after details were supplied, complete radio silence. Exasperated, he finally turned to Auth0, asking them to intervene. Their solution was to pull the plug on one of the two URL endpoints. Finally, after six months of trying to inform Jacuzzi and SmartTub of their severe security issues, both admin portals were secured.

Continue reading “This Week In Security: IoT In The Hot Tub, App Double Fail, And FreeBSD BadBeacon”

What Do You Get When A Raspberry Pi Pico Flashes A Nintendo 64

The joke was when the Nintendo 64 first hit the streets around a quarter century ago, that the 64 in the name referred not to the technology on board, but to the excessive cost of the cartridges. Whatever the truth in that, it’s something now completely laid to rest by [Konrad Beckmann] with his Nintendo 64 flash cart powered by a Raspberry Pi Pico (Nitter Link).

The schematic is surprisingly simple, in that the Pico does everything required to both interface to the N64 and to an SD card to hold the software. The clever work is done by the RP2040 firmware, which can be found along with the hardware details in the “develop” branch of the project’s GitHub repository. And while the earliest version was a Raspberry Pi Pico with a host of jumper wires, the more polished version focuses on a custom PCB and bare RP2040 chip.

Perhaps the N64 hasn’t received the attention it should have over the years, overshadowed as it was by its competitors such as the original PlayStation, but it’s projects like this one which remind us that there’s still life in Nintendo’s ’90s flagship. Speaking of which, if you were on Team Sony back in the day but still want to put your Pi Pico to use, check out this DIY PlayStation Memory Card we covered recently.