No Wonder These Projects Won The Circuit Sculpture Contest

There are five winners of the Hackaday Circuit Sculpture contest, and every one of them comes as no surprise, even in a tightly packed race to the top.

Beginning with the gorgeous photo above, we have [Eirik Brandal’s] waldian being named the most beautiful. Imagine this hanging on your living room wall, then head over and listen to the video demo as it’s light-actuated synthesizer chimes like distant (or maybe not so distant) church bells. This isn’t a one-off dip into circuit sculpture for [Eirik], we featured his broader body of work back in 2018, all of it worth checking out in more depth.

The glowing mask is actually made of PCB. The seams are secured with super glue bolstered with baking soda. The labor behind this one is intense. As we mention back in September, the project took place over about two years, mostly due to the sheer volume of cutting and sanding [Stephen Hawes] needed to do to bring together so many pieces. This one grabbed him the most artistic award.

[Jiří Praus] takes the top spot for best video with his luminescent RGB LED sphere. We swooned over this one when it first dropped back in December. [Jiří] shows off a combination of patience and ingenuity by using a 3D-printed mold to hold each LED while he soldered brass rod in place to serve as both electrical and mechanical support.

Speaking of molds, one of the challenges was to show off the best jig for creating a circuit sculpture. [Inne’s] Soft Soldering Jig provides the channels needed to keep crisp right angles on the brass rod as you work, with voids to position components at intersections for soldering. Drawing on the advice of numerous circuit sculpture success from people like [Mohit Bohite] and [Jiří Praus], he was looking for a way to easily position everything on a surface that would not be burnt by the soldering iron. The answer comes in the form of Silicone jigs made with 3D-printed molds.

Finally we have the Binary Calculator project which won the most functional award. While it does operate as a binary calculator, the beauty of it is not to be overlooked. Among its many attributes are a set of cherry-wood keycaps that were milled for the project and a bell-jar display stand where the calculator rests and serves as a binary clock when not in use. You may remember seeing our feature of this project last week.

As prizes, the binary calculator, orb, and wall sculpture creators will each be receiving $200 in goodies from Digi-Key who sponsored the contest and will be featuring entries in a 2021 wall calendar. Creators of the soldering jig and the PCB mask will receive a $100 Tindie gift card.

Desktop Wind Tunnel Brings Aerospace Engineering To The Home Gamer

Computer simulation is indispensable in validating design and used in every aspect of engineering from finite element analysis to traffic simulation to fluid dynamics. Simulations do an amazing job and at a fraction of the time and expense of building and testing a scale model. But those visceral ah-ha moments, and some real-world gremlins, can be easier to uncover by the real thing. Now you don’t need a university research or megacorp lab to run aerodynamic study IRL, you can just build a functional desktop wind tunnel for a pittance.

[Mark Waller] shows off this tidy little design that takes up only about two feet of desk space, and includes the core features that make a wind tunnel useful. Air is pulled through the tunnel using a fan mounted at the exhaust side of the tunnel. The intake is the horn-like scoop, and he’s stacked up a matrix of drinking straws there to help ensure laminar flow of the air as it enters the tunnel. (The straw trick is frequently used with laminar flow water fountains). It also passes through a matrix of tubes about the diameter of a finger at the exhaust to prevent the spin of the fan from introducing a vortex into the flow.

For analysis, five tubes pipe in smoke from an vape pen, driven into the chamber by an aquarium pump. There’s a strip of LEDs along the roof of the tunnel, with a baffle to prevent the light shining on the black rear wall of the chamber for the best possible contrast. The slow-motion video after the break shows the effectiveness of the setup.

Whether you’re a Hackaday Editor cutting their own glider wing profiles using foam and hot wire, or just want to wrap your head around how different profiles perform, this will get you there. And it’ll do it at a fraction of the size that we’ve seen in previous wind tunnel builds.

Continue reading “Desktop Wind Tunnel Brings Aerospace Engineering To The Home Gamer”

Ask Hackaday: What Tools Do You Really Need For A Life On The Road?

How do you dispose of an old hard drive? Inventive stories about heat and flame or industrial shredders will no doubt appear in the comments, but for me I just dismantle them and throw the various parts into the relevant scrap bins at my hackerspace. The magnets end up stuck to a metal door frame, and I’m good to go. So a week or so ago when I had a few ancient drives from the 1990s to deal with, I sat down only to find my set of Torx and Allen drivers was missing. I was back to square one.

What A Missing Tool Tells You About Necessities

Clint Eastwood always seemed to have just what he needed, why can I never manage it! Produzioni Europee Associati, Public domain.
Clint Eastwood always seemed to have just what he needed, why can I never manage it! Produzioni Europee Associati, Public domain.

Life deals an odd hand, sometimes. One never expects to find oneself homeless and sofa-surfing, nearly all possessions in a container on a farm somewhere. But here I am, and somewhere in one of those huge blue plastic removal crates is my driver set, alongside the other detritus of an engineer scribe’s existence. It’s all very well to become a digital nomad with laptop and hotspot when it comes to writing, but what has the experience taught me about doing the same as a solderer of fortune when it comes to hardware? My bench takes up several large removal crates and there is little chance of my carrying that much stuff around with me, so what makes the cut? Evidently not the tools for hard drive evisceration, so I had to borrow the set of a hackerspace friend to get the job done. Continue reading “Ask Hackaday: What Tools Do You Really Need For A Life On The Road?”

Hackaday Podcast 094: Fake Sun, Hacked Super Mario, Minimum Viable Smart Glasses, And 3D Printers Can’t Do That

Hackaday editors Elliot Williams and Mike Szczys traverse the hackerscape looking for the best the internet had to offer last week. Nintendo has released the new Game & Watch handheld and it’s already been hacked to run custom code. Heading into the darkness of winter, this artificial sun build is one not to miss… and a great way to reuse a junk satellite dish. We’ve found a pair of smartglasses that are just our level of dumb. And Tom Nardi cracks open some consumer electronics to find a familiar single-board computer doing “network security”.

Take a look at the links below if you want to follow along, and as always, tell us what you think about this episode in the comments!

Direct download (~60 MB)

Places to follow Hackaday podcasts:

Continue reading “Hackaday Podcast 094: Fake Sun, Hacked Super Mario, Minimum Viable Smart Glasses, And 3D Printers Can’t Do That”

New Part Day: Bouffalo Labs BL602 RISC-V Wi-Fi/Bluetooth SoC

We should all by now be used to microcontrollers with wireless hardware on board, with Espressif or Nordic Labs dominating the hacker scene. There have been several other contenders in this arena over the years that haven’t really caught the attention of our community, usually because of the opacity of their available information.

A new contender should be worth a second look though. The BL602 from Bouffalo Labs is a Wi-Fi- and Bluetooth LE-capable microcontroller with a 32-bit RISC-V derived core. If that doesn’t interest you much, perhaps news that the PINE64 folks are spearheading an effort to reverse engineer it for a fully open-source blob-free wireless implementation might sharpen your attention.

So where can you get your hands on one? Hold your horses, this chip is at an early stage in its gestation. We can see that there are some exciting possibilities in store, but we’re still figuring out the hardware interfaces and other software required to make it work. A community is hard at work reverse engineering it, which leads us back to the PINE64 story we mentioned earlier.

You can find BL602 modules from AliExpress vendors, but the PINE64 folks will offer you a free one if you join their blob reverse engineering effort. Take note though, this offer is for those prepared to show commitment to the project, so don’t spam them in the hope of free stuff if you won’t be helping deliver the goods.

We might see the BL602 gaining an open-source toolchain and internal blobs over the coming months thanks to the efforts of those working on it. Just as the ESP8266 did back in 2014, it’s starting as a black box with a relative scarcity of information. But if this hacking effort pays off, we’ll have a cheap RISC-V Wi-Fi and Bluetooth module with entirely open-source software from the silicon upwards. What a time to be alive!

Thanks [Renze] for the tip.

This Week In Security: SAD DNS, Incident Documentation Done Well, And TCL Responds

One of the big stories from the past few days is the return of DNS cache poisoning. The new attack has been dubbed SADDNS, and the full PDF whitepaper is now available. When you lookup a website’s IP address in a poisoned cache, you get the wrong IP address.

This can send you somewhere malicious, or worse. The paper points out that DNS has suffered a sort of feature creep, picking up more and more responsibilities. The most notable use of DNS that comes to mind is LetsEncrypt using DNS as the mechanism to prove domain ownership, and issue HTTPS certificates.

DNS Cache poisoning is a relatively old attack, dating from 1993. The first iteration of the attack was simple. An attacker that controlled an authoritative DNS server could include extra DNS results, and those extra results would be cached as if they came from an authoritative server. In 1997 it was realized that the known source port combined with a non-random transaction ID made DNS packet spoofing rather trivial. An attacker simply needs to spoof a DNS response with the appropriate txID, at the appropriate time to trick a requester into thinking it’s valid. Without the extra protections of TCP connections, this was an easy task. The response was to randomize the txID in each connection.

I have to take a moment to talk about one of my favorite gotchas in statistics. The Birthday paradox. The chances that two randomly selected people share a birthday is 1 in 365. How many people have to be in a room together to get a 50% chance of two of them sharing a birthday? If you said 182, then you walked into the paradox. The answer is 23. Why? Because we’re not looking for a specific birthday, we’re just looking for a collision between dates. Each non-matching birthday that walks into the room provides another opportunity for the next one to match.

This is the essence of the DNS birthday attack. An attacker would send a large number of DNS requests, and then immediately send a large number of spoofed responses, guessing random txIDs. Because only one collision is needed to get a poisoned cache, the chances of success go up rapidly. The mitigation was to also randomize the DNS source port, so that spoof attempts had to have both the correct source port and txID in the same attempt. Continue reading “This Week In Security: SAD DNS, Incident Documentation Done Well, And TCL Responds”

3D Printable Cloth Takes Advantage Of Defects

Normally, a 3D printer that under extrudes is a bad thing. However, MIT has figured out a way to deliberately mix full extrusions with under extruded layers to print structures that behave more like cloth than normal 3D printed items. The mesh-like structure apparently doesn’t require any modification to a normal 3D printer, just different software to create special code sequences to create the material.

Called DefeXtiles, [Jack Forman] is producing sheets and complex structures that appear woven. The process is known as “blob-stretch” because of the way the plastic makes blobs connected by fine filaments of plastic.

Continue reading “3D Printable Cloth Takes Advantage Of Defects”