Become The Next Fabergé With A Rose Engine Lathe

The basics of a skill may take a long time to master, but there is always something else to learn about regardless of the craft. Building a piece of fine furniture out of hardwood or being able to weld together a bicycle from scratch are all impressive feats, but there are fine details that you’ll only learn about once you get to this level of craftsmanship. One such tool that will help with these intricacies is known as the rose engine lathe.

This tool is based on an average lathe, typically used for creating round things out of stock which is not round. A rose engine lathe has a set of cams on it as well which allow the lathe to create intricate patterns in the material it’s working with, such as flower type patterns or intricate spirals. One of the most famous implementations of this method was on the Fabergé eggs. While this might make it sound overly complex, this how-to actually shows you how to build your own rose engine lathe out of a piece of MDF and a large number of miscellaneous pieces of hardware.

We recently featured another build which performs a similar function called engine turning. While similar, this is the method responsible for creating overlapping spirals on a piece of metal. Either way, both projects are sure to spice up your metal or woodworking endeavors.

Thanks to [PWalsh] for the tip!

Proposed NASA Budget Signals Changes To Space Launch System

The White House’s proposed budget for 2020 is out, and with it comes cuts to NASA. The most important item of note in the proposed budget is a delay of the Space Launch System, the SLS, a super-heavy lifting launch vehicle designed for single use. The proposed delay would defer work on the enhanced version of the SLS, the Block 1B with the Exploration Upper Stage.

The current plans for the Space Launch System include a flight using NASA’s Orion spacecraft in June 2020 for a flight around the moon. This uncrewed flight, Exploration Mission 1, or EM-1, would use the SLS Block 1 Crew rocket. A later flight, EM-2, would fly a crewed Orion capsule around the moon in 2022. A third proposed flight in 2023 would send the Europa Clipper to Jupiter. The proposed 2020 budget puts these flights in jeopardy.

Continue reading “Proposed NASA Budget Signals Changes To Space Launch System”

3D-Printed Rotary Dial Keypad Is Wonderfully Useless

Right up front, let us stipulate that we are not making fun of this project. Even its maker admits that it has no practical purpose. But this 3D-printed Commodore-style rotary dial keypad fails to be practical on so many levels that it’s worth celebrating.

And indeed, celebrating deprecated technology appears to be what [Jan Derogee] had in mind with this build. Rotary dials were not long ago the only way to place a call, and the last time we checked, pulse dialing was still supported by some telephone central office switchgear. Which brings us to the first failure: with millions of rotary dial phones available, why build one from scratch? [Jan] chalks it up to respect for the old tech, but in any case, the 3D-printed dial is a pretty good replica of the real thing. Granted, no real dial used a servo motor to return the dial to the resting state, but the 3D-printed springs [Jan] tried all returned the dial instantly, instead of the stately spin back that resulted in 10 pulses per second. And why this has been done up VIC-20 style and used as a keypad for Commodore computers? Beats us. It had to be used for something. That the software for the C-64  generates DTMF tones corresponding to the number dialed only adds to the wonderful weirdness of this. Check out the video below.

We’ll hand it to [Jan], he has a unique way of looking at the world, especially when it comes to clocks. We really enjoyed his persistence of phosphorescence clock, and his screw-driven linear clock turns the standard timekeeping UI on its head.

Continue reading “3D-Printed Rotary Dial Keypad Is Wonderfully Useless”

Spoiler, Use-After-Free, And Ghidra: This Week In Computer Security

The past few days have been busy if you’re trying to keep up with the pace of computer security news. Between a serious Chromium bug that’s actively being exploited on Windows 7 systems, the NSA releasing one of their tools as an open source project, and a new Spectre-like speculative execution flaw in Intel processors, there’s a lot to digest.
Continue reading “Spoiler, Use-After-Free, And Ghidra: This Week In Computer Security”

Google+ Communities Won’t Go Down Without A Fight

Google+ is dead. Granted people have been saying that much for years now, but this time it’s really true. As of April, Google’s social media experiment will officially go the way of Reader, Buzz, Wave, Notebook, and all the other products that the search giant decided they were no longer interested in maintaining. Unfortunately in the case of Google+, the shutdown means losing a lot of valuable content that was buried in the “Communities” section of the service. Or at least that’s what we all thought.

Thanks to the efforts of [Michael Johnson], many of those Google+ communities now have a second chance at life. After taking a deep dive into the data from his own personal Google+ account, he realized it should be possible to write some code that would allow pulling the content out of Google’s service and transplanting it into a Discourse instance. With some more work, he was even able to figure out how to preserve the ownership of the comments and posts. This is no simple web archive; you can actually log into Discourse with your Google account and have all of your old content attributed to you. Continue reading “Google+ Communities Won’t Go Down Without A Fight”

Hackers Turn Hard Drive Into Microphone That Can Listen In On Your Computer’s Fan Whine

As reported by The Register, hackers can now listen in on conversations happening around your computer by turning a hard drive into a microphone. There are caveats: the hack only works if these conversations are twice as loud as a blender, or about as loud as a lawn mower. In short, no one talks that loud, move along, nothing to see here.

The attack is to be presented at the 2019 IEEE Symposium on Security and Privacy, and describes the attack as a modification of the firmware on a disk drive to read the Position Error Signal that keeps read/write heads in the optimal position. This PES is affected by air pressure, and if something is affected by air pressure, you’ve got a microphone. In this case, it’s a terrible microphone that’s mechanically coupled to a machine that has a lot of vibrations including the spinning platter and a bunch of fans inside the computer. This is an academic exercise, and not a real attack, and either way to exfiltrate this data you need to root the computer the hard drive is attached to. It’s attacks all the way down.

The limiting factor in this attack is that it requires a very loud conversation to be held near a hard drive. To record speech, the researchers had to pump up the volume to 85 dBA, or about the same volume as a blender crushing some ice. Recording music through this microphone so that Shazam could identify the track meant playing the track back at 90 dBA, or about the same volume as a lawnmower. Basically, this isn’t happening.

The interesting bit of this hack isn’t using a hard drive as a microphone. It’s modifying the firmware on a hard drive to do something. We’ve seen some hacks like this before, but the latest public literature on hard drive firmware hacking is years old. If you’ve got a tip on how to hack hard drives, even if it’s to do something that’s horribly impractical, we’d love to see it.

Panelizing Boards In KiCad

Panelization of printed circuit boards is a very helpful trick for any PCB design tool to have. By panelizing boards, you can get them ready for automated assembly. You can put testing rigs right on the panel. You can combine different boards to reduce your PCB production cost. But Eagle, Fritzing, and KiCad don’t have proper panelization tools, only hacks and third-party tools to get something close to proper panelization. [Flemming] just created a new utility for KiCad that makes multiple copies of a board connected via mouse bites. It’s not complete panelization functionality, but for a lot of us, it’ll be good enough.

The video demo for this utility (try not to click on that because we’re going to blow some bandwidth with this link) starts off by importing a board into Pcbnew, making several copies of the board, arranging these boards to have 3-4mm spacing, and drawing ‘hint lines’ for the script, telling it where the mouse bites should go. The script runs, and boom, mouse bites and a panel.

This is a KiCad specific tool, and we’ve seen other tools for KiCad that make multiple copies of a board. We’ve also seen tools that take raw Gerbers of multiple designs and turn them into a panel. [Flemming]’s efforts are the closest we’ve seen to having all the features you want out of a panelization utility bild exclusively for KiCad.

While this tool will give you a set of Gerbers with multiple copies of a board connected with mouse bites, this is not in any way a complete solution to panelizing PCBs. If you’re panelizing PCBs, you’ll want to add fiducials in the corners of the full panel, which this tool does not allow you to do. You might want to have one complete ‘frame’ as a panel — effectively a rectangular piece of fiberglass that holds all your PCBs — which this tool does not allow you to do. Since you don’t get a frame, it’s impossible to run programming or testing signals to the frame that would be needed for assembly, but not necessary in production. That said, unless you’re going to spend thousand on Altium or use Open tools that have critical flaws such as GerberPanelizer, this is the best option you’ve got.