An Earthquake Display To Keep You Abreast Of Rumblings Worldwide

The Internet has brought us the ability to share data all over the globe, and nearly instantaneously at that. It’s revolutionized the sharing of science across the world, and taking advantage of this global data network is this earthquake display from [AndyGadget].

The build relies on an ESP32 fitted with an ILI9486 TFT display. The screen is in color and has a nice 480×320 resolution. This enables it to display a reasonably legible world map using the Web Mercator projection to fit the rectangular screen. The microcontroller then pulls in information from Seismic Portal, a site that aggregates data from seismographs and other sensors scattered all over the world.  Data from the site is pulled into the device live and overlaid on the world map, allowing the viewer to see the location of any current earthquakes at a glance.

It’s a great project, and one that we reckon would make a great addition to any university geology department. If it’s sparked an interest, consider diving deeper into the world of seismic analysis and data yourself!

Photo of a prototyping breadboard with an Arduino, whose analog inputs are connected to an array of four small op-amp circuits which perform the voltage slicing function of the Quantizer circuit described in this article.

Arduino Measures 20V Signals Using Quantizer

Canadian electronics geek and nascent YouTuber [Technoyaki] wanted to measure 20 volt signals on his Arduino. One might typically use a voltage divider to knock them down to the 5 volt range of the Arduino’s 10-bit A/Ds. But he isn’t one to take the conventional approach. Instead of using two resistors, [Technoyaki] decides to build an analog circuit out of sixteen resistors, four op amps and a separate 6 VDC supply.

Oscilloscope photo showing the output signals from each of the quantizer's four op amps. They are positioned staggered on the screen so that you can see the original sinusoidal signal clearly.

What is a quantizer? In the usual sense, a quantizer transforms an analog signal (with an infinity of possible values) to a smaller (and finite) set of digital values. An A/D converter is a perfect example of a quantizer. [Technoyaki], stretching the definition slightly, and uses the term to describe his circuit, which is basically a voltage slicer. It breaks up the 20 V signal into four separate 5 V bands. Of course, one could almost  accomplish this by just using an Arduino Due, which has a 12-bit A/D converter (almost, because it has a lower reference voltage of 3.3 V). But that wouldn’t be as much fun.

Why use all these extra components? Clearly, reducing parts count and circuit complexity was not one of [Technoyaki]’s goals. As he describes it, the reason is to avoid the loss of A/D resolution inherent with the traditional voltage divider. As a matter of semantics, we’d like to point out that no bits of resolution are lost when using a divider — it’s more accurate to say that you gain bits of resolution when using a circuit like the quantizer.  And not surprising for precision analog circuitry, [Technoyaki] notes that there are yet a few issues yet to be solved. Even if this circuit ultimately proves impractical, it’s a neat concept to explore. Check out the video below the break, where he does a great job explaining the design and his experiments.

Even though this isn’t quite a cut-and-paste circuit solution at present, it does show another way to handle large signals and pick up some bits of resolution at the same time. We wrote before about similar methods for doubling the A/D resolution of the Arduino. Let us know if you have any techniques for measuring higher voltages and/or increasing the resolution of your A/D converters.

Continue reading “Arduino Measures 20V Signals Using Quantizer”

Wearable Scope Lets Your Fingers Do The Probing

For frantic hacking sessions where seconds count, this forearm mounted oscilloscope with fingertip probes built by [aniketdhole] might be just what you need. Well, maybe. It’s not immediately clear why you might want to wear an oscilloscope on your arm, and sticking your fingers inside of powered up electronic devices sounds specifically like something your mother probably told you not to do, but here it is anyway.

The scope consists of an nRF5340 evaluation board in a 3D printed mount, with an SPI-connected Adafruit 2.8″ TFT display on top. With a pair of wires run from the board’s ADC and ground pins, [aniketdhole] just needed a bit of code to glue it all together and show some basic signal visualizations on the display. It’s been tested against PWM signals generated by an Arduino and some potentiometer controlled voltages, but anything much wilder than that is probably a bit too much to ask for from this rig in its current configuration.

In the future, [aniketdhole] wants to add some step-down circuity so you can probe higher voltages than the nRF5340 can handle normally, as well as a shunt to allow current measurement. Once the hardware is in place, the next order of business will be an improved touch-capable user interface that lets the user adjust settings and switch between functions.

Even if you’re not sold on the idea of an arm-mounted oscilloscope, this is still an interesting platform for general wearable experimentation. Throw enough sensors into it, and we’re sure there’s more than a few hackers who wouldn’t mind strapping one of these on.

Troubleshooting: A Method For Solving Problems The Right Way

We’ve all experienced that magic moment when, after countless frustrating hours of experimentation and racking your brain, the object of our attention starts working. The 3D printer finally produces good output. The hacked up laptop finally boots. The car engine finally purrs. The question is, do we know why it started working?

This is more important than you might think. Knowing the answer lets you confirm that the core problem was solved, otherwise you may have just fixed a symptom. And lack of understanding means fixing one problem may just create another.

The solution is to adopt a methodical troubleshooting method. We’re talking about a structured problem solving technique that when used properly can help us solve a problem at its core without leaving any loose ends. Such methodology will also leave you knowing why any solution did or didn’t work in the end, and will give you reproducible results.

Continue reading “Troubleshooting: A Method For Solving Problems The Right Way”

Hackaday Podcast 134: Hackers Camping, Metal Detecting, 360° Hearing, And Pocket Computing

Hackaday editors Elliot Williams and Mike Szczys are joined by contributing editor Jenny List to talk about her adventure at Born Hack last week. We also discuss the many capacitor values that go into regen receivers, the quest for a Raspberry Pi handheld that includes a slide-out keyboard, and how capacitive touch might make mice (mouses?) and touchpads better. There’s a deep dive into 3D printer bed leveling, a junk-box metal detector build, and an ambisonic microphone which can listen any-which-way.

Take a look at the links below if you want to follow along, and as always, tell us what you think about this episode in the comments!

Direct download (60 MB or so.)

Continue reading “Hackaday Podcast 134: Hackers Camping, Metal Detecting, 360° Hearing, And Pocket Computing”

The BornHack Badge Gets A Bubble

In a year of semiconductor shortages it’s a difficult task to deliver an electronic conference badge, so this year’s BornHack camp in Denmark had an SAO prototyping board as its badge. Some people made blinkies with theirs, but that wasn’t enough for [Inne] who had to go a step further with a light-up pneumatic bubble badge. It’s based upon a previous project producing silicone inflatable bubbles, but in a portable badge form.

On the front of the PCB is a multi-colour LED for illumination, while on the back is a small microcontroller board, a pressure sensor, and a motor driver circuit. A small air pump and battery sits in a pocket connected by a cable and a flexible tube, allowing the bubble to inflate at will. An interesting detail was the use of a cut-down hypodermic needle to carry the air through the silicone wall of the bubble. When seen up close at the camp it was an unnervingly organic effect, if there’s an uncanny valley of badges this is it.

We don’t see much in the way of soft robotics on these pages, so this happy crossover with BadgeLife is a special treat. It’s not entirely alone here though.

This Week In Security: Ransomware Decryption, OpenSSL, And USBGadget Spoofing

We’ve covered a lot of ransomware here, but we haven’t spent a lot of time looking at the decryptor tools available to victims. When ransomware gangs give up, or change names, some of them release a decryption tool for victims who haven’t paid. It’s not really a good idea to run one of those decryptors, though. The publishers don’t have a great track record for taking care of your data, after all. When a decryptor does get released, and is verified to work, security researchers will reverse engineer the tool, and release a known-good decryption program.

The good folks at No More Ransom are leading the charge, building such tools, and hosting a collection of them. They also offer Crypto Sheriff, a tool to identify which ransomware strain got your files. Upload a couple encrypted files, and it will inform you exactly what you’re dealing with, and whether there is a decryptor available. The site is a cooperation between the Dutch police, Interpol, Kaspersky, and McAfee. It may surprise you to know that they recommend reporting every ransomware case to the authorities. I can confirm that at the very least, the FBI in the US are very interested in keeping track of the various ransomware attacks — I’ve fielded a surprise call from an agent following up on an infection.

OpenSSL

The OpenSSL project has fixed a pair of vulnerabilities, CVE-2021-3711 and CVE-2021-3712 with release 1.1.11l. The first is a possible buffer overflow caused by a naive length calculation function. A “fixed” length header is actually dynamic, so a carefully crafted plaintext can overflow the allocated buffer. Continue reading “This Week In Security: Ransomware Decryption, OpenSSL, And USBGadget Spoofing”