Retro Gadgets: Tired Of The Beatles On 8 Track? Try The Police

In the 1970s, 8-track audio players were very popular, especially in cars. For a couple of bucks, you could have the latest album, and you didn’t have to flip the tape in the middle of a drive like you did with a cassette. We’ve seen plenty of 8-tracks and most of us a certain age have even owned a few players. But we couldn’t find anyone who would admit to owning the Bearcat 8 Track Scanner, as seen in the 1979 Popular Electronics ad below.

Continue reading “Retro Gadgets: Tired Of The Beatles On 8 Track? Try The Police”

Holographic Cellphones Coming Thanks To AI

Issac Asimov foresaw 3D virtual meetings but gave them the awkward name “tridimensional personification.” While you could almost do this now with VR headsets and 3D cameras, it would be awkward at best. It is easy to envision conference rooms full of computer equipment and scanners, but an MIT student has a method that may do away with all that by using machine learning to simplify hologram generation.

As usual, though, the popular press may be carried away a little bit. The key breakthrough here is that you can use TensorFlow to generate real-time holograms at a few frames per second using consumer-grade processing power found in a high-end phone from images with depth information, which is also available on some phones. There’s still the problem of displaying the hologram on the other side, which your phone can’t do. So any implication that you’ll download an app that enables holograms phone calls is hyperbole and images of this are in the realm of photoshop.

Continue reading “Holographic Cellphones Coming Thanks To AI”

This WiFi Signal Strength Meter Ain’t Afraid Of No Ghosts

The original Ghostbusters movie is a classic that’s still delivering nearly 40 years after its release — just let that sink in for a minute. Almost every aspect of the film, from hand props to quotes, is instantly recognizable, even to people who haven’t based their lives on the teachings of [Venkman], [Stantz], and [Spengler]. To wit, we present this PKE meter-style WiFi scanner.

Of course, [Kevin McAleer]’s project is strictly in the “Just for Fun” category. But that doesn’t mean it’s not at least somewhat useful. The design is pretty close to the original PKE meter, with a little bit of creative license taken to make it easier to build. Guts include a Raspberry Pi Pico W and a generous 320×240 LCD display. The body of the meter is entirely 3D printed; design files are of course available. The meter’s arms are geared together to move with a single hobby servo.

On the software side, [Kevin]’s GUI lets users see a list of WiFi hotspots in the area and select one from the list. From there, the position of the arms is determined by the RSSI for the hotspot, similar to how the prop was supposed to indicate the proximity to a spook, specter, or ghost. There’s perhaps a bit of a missed opportunity by not adding LEDs to the arms, but we’ll let that slide.

The video below has full design and build details, but fair warning that it’s a bit on the long side. That’s probably just a reflection of how much work [Kevin] put into this, though. Of course, you may rather build a PKE meter that “actually” detects ghosts, in which case we’ve got you covered.

Continue reading “This WiFi Signal Strength Meter Ain’t Afraid Of No Ghosts”

Single Photon Detection With Photomultipliers

Unless you are an audiophile, you likely think of tubes as mostly relegated to people who work on old technology. However, photomultiplier tubes are still useful compared to more modern sensors, and [Jaynes Network] has a look into how they work, especially with scintillating detectors.

The RCA photomultiplier he examines has ten stages and can detect even a single photon. Combined with a scintillating detector, they make good radiation detectors.

We can’t help but smile when we hear someone obviously in love with the engineering behind a tube like this. We get it. The inside of the tube is crowded, so it is hard to identify the dynodes and other portions, but some diagrams make it readily apparent how the tube does its job.

We were impressed with how good the documentation that came with the tube looked, considering its age. We mean the condition it was in. The document itself was obviously a reproduction of a typewritten document with hand-drawn figures and graphs.

We were hoping for some footage of the tube in action, but we’ll have to wait for a future video. We are betting that is coming, though. Although there are some solid-state detectors, they are not suitable for all applications. There was a time, though, when the tubes were in many applications, including X-ray scanners and photography equipment.

Continue reading “Single Photon Detection With Photomultipliers”

Closeup of a film restorer's hand holding a 35mm film print to check for defects as it goes into a film scanner

35mm Film Restoration Process Explained

For a large part of the 20th century, motion pictures were distributed on nitrate film. Although cheaper for the studios, this film was highly flammable and prone to decay. On top of that, most film prints were simply discarded once they had been through their run at the cinema, so a lot of film history has been lost.

Sometimes, the rolls of projected film would be kept by the projectionist and eventually found by a collector. If the film was too badly damaged to project again, it might still get tossed. Pushing against this tide of decay and destruction are small groups of experts who scan and restore these films for the digital age.

still showing the difference in quality between a 16mm print of a 35mm animated movie and a new scan of the 35mm original
The quality difference between a smaller-format print and the original restored negative can be startling

The process is quite involved – starting with checking every single frame of film by hand and repairing any damaged perforations or splices that could come apart in the scanner. Each frame is then automatically scanned at up to 10K resolution to future-proof the process before being painstakingly digitally cleaned.

The real expertise is in knowing what is damage or dirt, and what is the character of the original film. Especially in stop-motion movies, the subtle changes between frames are really part of the original, so the automatic clean-up tools need to be selectively reined in so as not to lose the charm and art of the film-makers.

The results are quite astonishing and we all have teams like this to thank for protecting our cultural heritage.

If you’re interested in watching the process, then check out the video after the break. If you fancy a go at automatic film digitising yourself (preferably not on unique historical prints!) then we’ve shown projects to do just that in the past.

Thanks to [Cliff Claven] for the tip.

Continue reading “35mm Film Restoration Process Explained”

Citizen-Driven Network Monitors Public Service Radio For Natural Disaster Alerts

Time is of the essence in almost every emergency situation, especially when it comes to wildfires. A wind-driven fire can roar across a fuel-rich landscape like a freight train, except one that can turn on a dime or jump a mile-wide gap in a matter of seconds. Usually, the only realistic defense against fires like these is to get the hell out of their way as soon as possible and make room for the professionals to do what they can to stop the flames.

Unfortunately, most people living in areas under threat of wildfires and other natural disasters are often operating in an information vacuum. Official channels take time to distribute evacuation orders, and when seconds count, such delays can cost lives. That’s the hole that Watch Duty seeks to fill.

Watch Duty is a non-profit wildfire alerting, mapping, and tracking service that provides near-real-time information to those living in wildfire country. Their intelligence is generated by a network of experienced fire reporters, who live in wildfire-prone areas and monitor public service radio transmissions and other sources to get a picture of what’s going on in their specific area. When the data indicate an incident is occurring, maps are updated and alerts go out via a smartphone app. Reporters have to abide by a strict code of conduct designed to ensure the privacy of citizens and the safety of first responders.

While Watch Duty’s network covers a substantial area of California — the only state covered so far — there were still a significant number of dead zones, mostly in the more remote areas of the Sierra Nevada Mountains and in the northern coastal regions. To fill these gaps, Watch Duty recently launched Watch Duty Echo, which consists of a network of remote listening posts.

Each station is packed with RTL-SDR receivers that cover a huge swath of spectrum used by the local fire, law enforcement, EMS agencies — any organization likely to be called to respond to an incident. In addition, each station has an SDR dedicated to monitoring ADS-B transponders and air band frequencies, to get a heads-up on incidents requiring aerial support. The listening posts have wideband discone antennas and a dedicated 1090-MHz ADS-B antenna, with either a cellular modem or a Starlink terminal to tie into the Watch Duty network.

Hats off to the folks at Watch Duty for putting considerable effort into a system like this and operating it for the public benefit. Those who choose to live close to nature do so at their own risk, of course, but a citizen-driven network that leverages technology can make that risk just a little more manageable.

side by side, showing hardware experiments with capacitor gating through FETs, an initial revision of the modchip board with some fixes, and a newer, final, clean revision.

A Modchip To Root Starlink User Terminals Through Voltage Glitching

A modchip is a small PCB that mounts directly on a larger board, tapping into points on that board to make it do something it wasn’t meant to do. We’ve typically seen modchips used with gaming consoles of yore, bypassing DRM protections in a way that a software hacks couldn’t quite do. As software complexity and therefore attack surface increased on newer consoles, software hacks have taken the stage. However, on more integrated pieces of hardware, we’ll still want to return to the old methods – and that’s what this modchip-based hack of a Starlink terminal brings us.

[Lennert Wouters]’ team has been poking and prodding at the Starlink User Terminal, trying to get root access, and needed to bypass the ARM Trusted Firmware boot-time integrity checks. The terminal’s PCB is satellite-dish-sized, so things like laser fault injection are hard to set up – hence, they went the voltage injection route. Much poking and prodding later, they developed a way to reliably glitch the CPU into verifying a faulty firmware, and got to a root shell – the journey described in a BlackHat talk embedded below. Continue reading “A Modchip To Root Starlink User Terminals Through Voltage Glitching”