Exploring An Aftermarket LED Headlight Retrofit Kit

There’s plenty of debate about drop-in LED headlight bulbs, especially when they’re used with older reflector housings that were designed for halogen bulbs. Whether or not you personally feel the ultra-bright lights are a nuisance, or even dangerous, one thing we can all agree on is that they’re clearly the result of some impressive engineering.

Which is why we were fascinated to see the teardown [TechChick] did on a “Ultra 2 LED” retrofit from GTR Lighting. Apparently one of the diodes was failing, and as part of the warranty replacement process, she was informed she had to make it completely inoperable. Sounds like a teardown dream come true. If a manufacturer ever told us we needed to take something apart with extreme prejudice and provide photographic evidence that the deed was done, we’d be all too happy to oblige.

The driver itself ended up being completely filled with potting compound, so she doesn’t spend much time there. Some will no doubt be annoyed that [TechChick] didn’t break out the small pointy implements and dig all that compound out, but we all pretty much know what to expect when it comes to driving LEDs. The real interesting bit is the bulb itself.

As is common with these high-output automotive LEDs, the Ultra 2 is actively cooled with a small fan that’s actually enclosed within the heatsink. With the fan and the two-piece heatsink removed, she’s able to access the LED module itself. Here, two PCBs are sandwiched back to back with a hollow copper chamber that leads out of the rear of the module. When [TechChick] cut into the copper she said she heard a hiss, and assumed it was some kind of liquid cooling device. Specifically we think it’s a vapor chamber that’s being used to pull heat away from the diodes and into the heatsink at the rear of the module, which speaks to the advanced technology that makes these bulbs possible.

While laser headlights are arguably the future of automotive lighting, it’s going to be quite some time before they trickle down to those of us that don’t own supercars. Until then, when used responsibly, these LED retrofits can inject a bit of cutting-edge tech into your old beater without breaking the bank.

Continue reading “Exploring An Aftermarket LED Headlight Retrofit Kit”

Rescuing A Wacom Digitizer From A Broken Lenovo Yoga Book

The Lenovo Yoga Book is a interesting thing, featuring a touch-surface keyboard that also doubles as a Wacom tablet. [TinLethax] sadly broke the glass of this keyboard when trying to replace a battery in their Yoga Book, but realised the Wacom digitizer was still intact. Thus began a project to salvage this part and repurpose it for the future.

The first step was to reverse engineer the hardware; as it turns out, the digitizer pad connects to a special Wacom W9013 chip which holds the company’s secret sauce (secret smoke?). As the GitHub page for [TinLethax]’s WacomRipoff driver explains, however, the chip communicates over I2C. Thus, it was a simple enough job to hook up a microcontroller, in this case an STM32 part, and then spit out USB HID data to a host.

It hasn’t all been smooth sailing, and it’s not 100% feature complete, but [TinLethax] was able to get the digitizer working as a USB HID input device. It appears the buttons and pressure sensitivity are functional, too.

If you’ve got a disused or defunct Yoga Book lying around, you might just consider the same mods yourself. We’ve seen some other great hacks in this space, too. Video after the break.

Continue reading “Rescuing A Wacom Digitizer From A Broken Lenovo Yoga Book”

The Astronomical Promises Of The Fisher Space Pen

We’ve all heard of the Fisher Space Pen. Heck, there’s even an episode of Seinfeld that focuses on this fountain of ink, which is supposed to be ready for action no matter what you throw at it. The legend of the Fisher Space Pen says that it can and will write from any angle, in extreme temperatures, underwater, and most importantly, in zero gravity. While this technology is a definite prerequisite for astronauts in space, it has a long list of practical Earthbound applications as well (though it would be nice if it also wrote on any substrate).

You’ve probably heard the main myth of the Fisher Space Pen, which is that NASA spent millions to develop it, followed quickly by the accompanying joke that the Russian cosmonauts simply used pencils. The truth is, NASA had already tried pencils and decided that graphite particles were too much of an issue because they would potentially clog the instruments, like bags of ruffled potato chips and unsecured ant farms.

A Space-Worthy Instrument Indeed

Usually, it’s government agencies that advance technology, and then it trickles down to the consumer market at some point. But NASA didn’t develop the Space Pen. No government agency did. Paul Fisher of the Fisher Pen Company privately spent most of the 1960s working on a pressurized pen that didn’t require gravity in the hopes of getting NASA’s attention and business. It worked, and NASA motivated him to keep going until he was successful.

An original Fisher Space Pen AG-7 atop the Apollo 11 flight plan.
The pen that went to the moon. Image via Sebastien Billard

Then they tested the hell out of it in all possible positions, exposed it to extreme temperatures between -50 °F and 400 °F (-45 °C to 204 °C), and wrote legible laundry lists in atmospheres ranging from pure oxygen to a total vacuum. So, how does this marvel of engineering work?

The Fisher Space Pen’s ink cartridge is pressurized to 45 PSI with nitrogen, which keeps oxygen out in the same manner as potato chip bags. Inside is a particularly viscous, gel-like ink that turns to liquid when it meets up with friction from the precision-fit tungsten carbide ballpoint.

Between the viscosity and the precision fit of the ballpoint, the pen shouldn’t ever leak, but as you’ll see in the video below, (spoiler alert!) snapping an original Space Pen cartridge results in a quick flood of thick ooze as the ink is forced out by the nitrogen.

Continue reading “The Astronomical Promises Of The Fisher Space Pen”

A macro keypad making music.

Meet The Marvelous Macro Music Maker

Do you kind of want a macropad, but aren’t sure that you would use it? Hackaday alum [Jeremy Cook] is now making and selling the JC Pro Macro on Tindie, which is exactly what it sounds like — a Pro Micro-based macro keypad with an OLED screen and a rotary encoder. In the video below, [Jeremy] shows how he made it into a music maker by adding a speaker and a small solenoid that does percussion, all while retaining the original macro pad functionality.

[Jeremy]’s original idea for a drum was to have a servo seesawing a chopstick back and forth on the table as one might nervously twiddle a pencil. That didn’t work out so well, so he switched to the solenoid and printed a thing to hold it upright, and we absolutely love it. The drum is controlled with the rotary encoder: push to turn the beat on or off and crank it to change the BPM.

To make it easier to connect up the solenoid and speaker, [Jeremy] had a little I²C helper board fabricated. There’s one SVG connection and another with power and ground swapped in the event it is needed. If you’re interested in the JC Pro Macro, you can pick it up in various forms over on Tindie. Of course, you might want to wait for version 2, which is coming to Kickstarter in October.

There are many ways to make a macro keyboard. Here’s one that also takes gesture input.

Continue reading “Meet The Marvelous Macro Music Maker”

Roll-on/roll-off vessel docking

RORO Vessels: Driving Cars Across The Ocean

YouTube does a pretty good job of making itself a target for criticism, but one thing you can say about their algorithms: when they work, they really work. Case in point, the other day I found a suggestion in my feed for a very recent video about salvaging a shipwreck. I can’t begin to guess what combination of view history and metadata Google mined to come to the conclusion that I’d be interested in this video, but they hit the nail on the head.

But more importantly, their algorithmic assessment of my interests must have been a goldmine to them — or it could have been if I didn’t have a minefield of ad blockers protecting me — because I fell down a rabbit hole that led me to a bunch of interesting videos. As it turns out, the shipwreck in that first video was of a cargo ship that was carrying thousands of brand-new automobiles, which were all destroyed in the fire and subsequent capsizing of a “roll-on/roll-off” (RORO) vessel off the coast of Georgia (the state, not the country) in 2019.

Thus began my journey into RORO vessels, on which automobiles and other bulky cargo are transported around the world. And while my personal assessment of the interests of Hackaday readers probably is not as finely tuned as Google’s algos, I figured there’s a better than decent chance that people might enjoy tagging along too.

Continue reading “RORO Vessels: Driving Cars Across The Ocean”

Bluetooth Vulnerability: Arbitrary Code Execution On The ESP32, Among Others

Bluetooth has become widely popular since its introduction in 1999. However, it’s also had its fair share of security problems over the years. Just recently, a research group from the Singapore University of Technology and Design found a serious vulnerability in a large variety of Bluetooth devices. Having now been disclosed, it is known as the BrakTooth vulnerability.

Full details are not yet available; the research team is waiting until October to publicly release proof-of-concept code in order to give time for companies to patch their devices. The basic idea however, is in the name. “Brak” is the Norweigan word for “crash,” with “tooth” referring to Bluetooth itself. The attack involves repeatedly attempting to crash devices to force them into undesired operation.

The Espressif ESP32 is perhaps one of the worst affected. Found in all manner of IoT devices, the ESP32 can be fooled into executing arbitrary code via this vulnerability, which can do everything from clearing the devices RAM to flipping GPIO pins. In smart home applications or other security-critical situations, this could have dire consequences.

Other chipsets are affected to varying degrees, including parts from manufacturers like Texas Instruments and Cypress Semiconductor. Some parts are vulnerable to denial of service, while audio devices may be frozen up or shut down by the attack. The group claims over 1400 products could be affected by the bug.

Firmware patches are being rolled out, and researcher [Matheus E. Garbelini] has released code to build a sniffer device for the vulnerability on GitHub. If you’re involved with the design or manufacture of Bluetooth hardware, it might pay to start doing some homework on this one! Concerned vendors can apply for proof-of-concept test code here.

Download From NFC Datalogger, No App Required

The plethora of wireless technologies has made internet-connected devices the norm, but it’s not always necessary if you don’t need real-time updates. Whether it’s due to battery life, or location and range constraints, downloading data directly from the device whenever possible might be a viable solution. [Malcolm Mackay] demonstrates an elegant solution on the open source cuplTag temperature/humidity logger, using any NFC-enabled smartphone, without requiring a custom app.

The cuplTag utilizes the feature on NFC-enabled smartphones to automatically open a URL provided by the cuplTag. It encodes the sensor data from the sensor unit as a circular buffer in a ~1 kB URL, which automatically uploads to a web frontend that plots the data. (You can use their server or run your own.)

This means that data can be collected by anyone with the appropriate phone with zero setup. The data is displayed on the web app and can be downloaded as a CSV. To deter spoofing, each tag ships with a secret key which is used to generate a unique HMAC every time the circular buffer changes.

Battery life is a priority on the cuplTag, and it’s theoretically capable of running seven years on a single CR1220 coin cell using the current-sipping Texas Instruments MSP430 microcontroller. The hardware, firmware, and server-side frontend and backend code are all open source and available on GitHub.

Earlier this year, we held a data logging contest, and featured submissions that monitored everything from your garden’s moisture levels to your caffeine intake.