Sputtering Daguerreotypes, Batman!

The Daguerreotype was among the earliest photographic processes, long before glass plates or film, that relied on sensitizing a thin layer of silver on top of a copper plate. The earliest Daguerreotype plates were made physically, by rolling a copper-silver plate thinner and thinner until the silver layer was just right. Good luck finding a source of Daguerreotype plates made this way in 2022. (There are electroplating methods, but they all end up with chemically contaminated silver.)

On the other hand, magnetron sputtering is a process of depositing pure metal in thin layers using plasma, high voltages, and serious magnets, and [Koji Tokura] is making his own sputtered Daguerreotype plates this way, giving him the best of both worlds: the surreal almost-holographic quality of the Daguerreotype with the most difficult film preparation procedure imaginable.

The star of the show is [Koji]’s sputtering rig, which consists of a Tupperware glass sandwich box as a vacuum chamber and a microwave oven transformer as the high voltage source. In use, he pumps the chamber down, introduces a small amount of argon, and then lights up the plasma. The high voltage accelerates the plasma ions into a sheet of silver, and the silver particles that get knocked free coat the copper plate. A strong magnet creates a local plasma, which accelerates the coating procedure, but since [Koji] only had a relatively small magnet, he scans the plate with the magnet, using a scavenged 2D pen plotter mechanism.

Check out his video on the Hackaday.io page, and his Daguerreotype gallery as well. (We don’t think that they were all made with this procedure.)

The result is a chemically pure Daguerreotype plate produced in a seriously modern way, and we’d love to see the images in person. In these days of disposable images made by the AIs in your cell phone, it’s nice to see some people taking photography in strange directions. For instance, maybe you’d like to make your own ultra-large collodion plates. Or something else? If you do, show us!

DIY LED Bulb Lacks Correct Lugs, So M3 Bolts To The Rescue

[Damo] has an interesting LED bulb project with a neat twist: he converted some outdoor lighting to 12 V LED lighting with some self-designed bulb replacements and decided to reuse the existing GU10 sockets and wiring. That meant putting GU10 lugs onto his custom PCBs, but he ran into a snag.

These GU10 bulb lugs are tough to buy in small quantities. Luckily, M3 socket head bolts are a near-perfect match.

Those distinctive lugs that twist into GU10 sockets? [Damo] simply couldn’t find anywhere offering to sell them in small quantities. So he did what any enterprising hacker would do and found a substitute that was both accessible and economical: M3 bolts. Apparently, socket-headed M3 bolts are pretty much identical in size to GU10 lugs. Who’d have thought?

[Damo]’s retrofit worked great, and thanks to M3 bolts he was able to re-use the existing weatherproof wiring and sockets in his yard. His design files are here on GitHub.

We do love using things for other than their intended purpose, but as [Damo] points out, GU10 sockets are normally connected to mains power. So if you decide to use his design (or use GU10 sockets for your own purposes), be aware that you’ll have hardware that looks interchangeable with other (mains-connected) sockets, but isn’t. Be mindful of that, and take appropriate precautions. Avoiding electrical oopsies is always worth putting effort into, after all.

Mac Mini Mini

The Mac Mini has been roughly the same size and shape for 12 years, as the current design was released in June 2010. However, despite being the same general form factor, the internals has shrunk over the years. [Snazzy Labs] took advantage of this to make a miniaturized Mac Mini.

With a donor Mac in hand, they cracked it open and found an oversized power supply, a diminutive logic board, and a good bit of space. Unfortunately, the logic board attaches to a wide IO shield. He removed that, and the fan attached to the heatsink (checking to ensure it still booted). Relocating the WiFi antennas was the trickiest part of the whole build. Given that he wanted to shrink the power supply and the Mac Mini accepts just 12 volts, he devised a clever solution to use MagSafe as a connector. However, Magsafe negotiates over a complex protocol when attached. So, rather than smarten his port up, he dumbed the charger down by replacing it with a Microsoft Surface power supply spliced into the MagSafe connector.

With his mini Mac Mini board ready to go, he began designing a case to fit what was now a single-board computer. A fan of the channel offered a design reminiscent of the 2019 Mac Pro. Unfortunately, FDM printing struggled with the cheese-grater pattern, so [Snazzy Labs] printed it in resin with some mica powder. As a result, the mini mini looks fantastic while taking up just 28% of the volume of the original.

They’ve posted the STL files online with detailed instructions and a parts list if you want to recreate it at home. Perhaps with the smaller motherboard, it might be worth revisiting the Mac Mini inside a PowerBook hack from a few years ago. Video after the break.
Continue reading “Mac Mini Mini”

A Simple Streaming Radio Receiver

For those interested in a career in broadcast radio there aren’t many routes into the business. Student radio, pirate radio, and hospital radio usually feature somewhere near the start of any DJ’s resumé. Hospital radio stations often don’t have a transmission license and have historically relied on wired systems, but since those can’t reach everywhere they are now more likely to look to the Internet. [AllanGallop] has created the Mini Web Radio for the hospital station in the British city of Milton Keynes, a compact battery-powered single station streaming radio receiver that can pick up those tunes anywhere with a wireless network connection.

Inside the neatly designed 3D printed box the hardware is quite straightforward, a WeMos ESP32 board and a MAX98357A I2S digital amplifier module all powered by an 18650 cell. There’s a volume control and headphone socket, which is all that’s needed for the user interface. The software has code for both Arduino and Platform.io and is configured as you might expect through a web interface. Everything can be found in a handy GitHub repository should you wish to build one yourself. Meanwhile, it’s particularly pleasing as a Hackaday scribe to feature a project with roots in one’s own hackerspace, in this case, Milton Keynes Makerspace.

Thanks [Cid] for the tip!

What’s That Scope Trace Saying? UPD And Wireshark

[Matt Keeter], like many of us, has a lot of network-connected devices and an oscilloscope. He decided he wanted to look into what was on the network. While most of us might reach for Wireshark, he started at the PCB level. In particular, he had — or, rather, had someone — solder an active differential probe soldered into an Ethernet switch. The scope attached is a Textronix, but it didn’t have the analyzer to read network data. However, he was able to capture 190+ MB of data and wrote a simple parser to analyze the network data pulled from the switch.

The point of probing is between a network switch and the PHY that expands one encoded channel into four physical connections using QSGMII (quad serial gigabit media-independent interface). As the name implies, this jams four SGMII channels onto one pair.

As is common in networking schemes, the 8-bit byte is encoded into a 10-bit code group to ensure enough bit transitions to recover the synchronous clock. The decoding software has to examine the stream to find framing characters and then synchronize to the transmitted clock.

What follows is a nice tour of the protocol and the Python code to decode it. It seems complex, but the code is fairly short and also executes quickly. The output? Pcap files that you can process with Wireshark. Overall, a great piece of analysis. He also points out there are other tools already available to do this kind of decoding, but what fun is that?

Wireshark can do a lot of different kinds of analysis, even if you aren’t usually capturing from a scope. You can even decrypt SSL if you know the right keys.

Hackaday Links Column Banner

Hackaday Links: August 14, 2022

What’s this? News about robot dogs comes out, and there’s no video of the bots busting a move on the dance floor? Nope — it looks like quadruped robots are finally going to work for real as “ground drones” are being deployed to patrol Cape Canaveral. Rather than the familiar and friendly Boston Dynamics “Big Dog” robot, the US Space Force went with Ghost Robotics Vision 60 Q-UGVs, or “quadruped unmanned ground vehicles.” The bots share the same basic layout as Big Dog but have a decidedly more robust appearance, and are somehow more sinister. The dogs are IP67-rated for all-weather use, and will be deployed for “damage assessments and patrols,” whatever that means. Although since this is the same dog that has had a gun mounted to it, we’d be careful not to stray too far from the tours at Kennedy Space Center.

Continue reading “Hackaday Links: August 14, 2022”

Starlink Ground Stations Successfully Hacked

Belgian security researcher [Lennert Wouters] has gotten his own code running on the Starlink “Dishy McFlatface” satellite terminals, and you can too! The hack in question is a “modchip” with an RP2040 and a MOSFET that crowbars the power rails, browning out the main CPU exactly when it’s verifying the firmware’s validity and bypassing that protection entirely. [Lennert] had previously figured out how to dump the Starlink firmware straight from the eMMC, and with the ability to upload it back, the circle of pwnership is closed. This was a talk at DEFCON, and you can check out the slides here. (PDF)

The mod chip itself was a sweet piece of work, being tailored to fit into the Starlink’s motherboard just so, and taking good advantage of the RP2040’s PIOs, which are probably the microcontroller’s superpower.

[Lennert] says he submitted his glitch attack to Starlink and they took some precautions to make the glitching harder. In particular, [Lennert] was triggering his timing off of the USART port coming up on the Starlink unit, so Starlink just shut that down. But it’s not like he couldn’t trigger on some other timing-relevant digital signal, so he chose the eMMC’s D0 data line: they’re not going to be able to boot up without it, so this hack is probably final. No shade against Starlink here. It’s almost impossible to shield a device against an attacker who has it on their bench, and [Lennert] concludes that he found no low-hanging fruit and was impressed that he had to work so hard to get root.

What can you do with this? Not much, yet. But in principle, it could be used to explore the security of the rest of the Starlink network. As reported in Wired, Starlink says that they’ve got a defence-in-depth system and that just getting into the network doesn’t really get you very far. We’ll see!

Thanks [jef] for the tip!