This Is A 3D Ink Jet Printer

We spend a lot of time thinking of how to create 3D objects, but what about being able to print full color graphics on the objects we create? This isn’t just multicolor, this is full-color! Here’s one elegant solution that uses ink jets to print full color images on 3D terrain models.

Admittedly we are very late to the party on this one as the technology was spotted on season 22, episode 7 of How It’s Made that aired way back in 2013. The segment shows terrain models — think of the physical contour map under glass that you might see at a National Park or at the main lodge of a ski resort. It’s easy enough to envision how the elevation is carved out of foam by a CNC. But the application of color printing to those surfaces is what caught our eye this time around. It’s a custom rig that a company called Solid Terrain Modeling built for this purpose. Since the height at any point on the work material is already known from the milling process, four ink heads (black, cyan, magenta, yellow) have been added to individual Z-axis actuators, applying a raster image as they traverse the surface.

Part of what makes this work is the post-processing steps that follow milling. The model is very carefully cleared of debris before being sprayed with primer. Another coat of an undetermined material (“a specialty coating to receive the ink”) gets the piece ready for the ink. The final step after printing is a protective clear coat. In the How It’s Made episode, buildings and other structures are then 3D-printed and added.

It seems like the trick is to get the heads to have as small of a footprint as possible for clearance when printing in sloped areas. We’re not experts in all the available consumer ink-jet printers out there, but finding a setup where the heads are separated from the reservoirs would be key. Watching this segment made us so excited to think of the person/people who got to hack this rig together as part of their job.

Looking for other ways to abuse ink jet parts? [Sprite_TM] came up with a way to make them handheld so you print on anything from latte foam to your buddy’s forearm. There’s no better name for that than the Magic Paintbrush.

Continue reading “This Is A 3D Ink Jet Printer”

It Takes A Lot To Build A Hacker’s Laptop

An essential tool that nearly all of us will have is our laptop. For hardware and software people alike it’s our workplace, entertainment device, window on the world, and so much more. The relationship between hacker and laptop is one that lasts through thick and thin, so choosing a new one is an important task. Will it be a dependable second-hand ThinkPad, the latest object of desire from Apple, or whatever cast-off could be scrounged and given a GNU/Linux distro? On paper all laptops deliver substantially the same mix of performance and portability, but in reality there are so many variables that separate a star from a complete dog. Into this mix comes a newcomer that we’ve had an eye on for a while, the Framework. It’s a laptop that looks just like so many others on the market and comes with all the specs at a price you’d expect from any decent laptop, but it has a few tricks up its sleeve that make it worth a glance.

These USB-C based modules are a neat idea.
These USB-C based modules are a neat idea.

Probably the most obvious among them is that as well as the off-the-shelf models, it can be bought as a customised kit for self-assembly. Bring your own networking, memory, or storage, and configure your new laptop in a much more personal way than the norm from the big manufacturers. We like that all the parts are QR coded with a URL that delivers full information on them, but we’re surprised that for a laptop with this as its USP there’s no preinstalled open source OS as an option. Few readers will find installing a GNU/Linux distro a problem, but it’s an obvious hole in the line-up.

On the rear is the laptop’s other party trick, a system of expansion cards that are dockable modules with a USB-C interface. So far they provide USB, display, and storage interfaces with more to come including an Arduino module, and we like this idea a lot.

It’s all very well to exclaim at a few features and party tricks, but the qualities that define a hacker’s laptop are only earned through use. Does it have a keyboard that will last forever, can it survive being dropped, and will its electronics prove to be fragile, are all questions that can be answered only by word-of-mouth from users. It’s easy for a manufacturer to get those wrong — the temperamental and fragile Dell this is being typed on is a case in point — but if they survive the trials presented by their early adopters and match up to the competition they could be on to a winner.

This Week In Security: NSO, Print Spooler, And A Mysterious Decryptor

The NSO Group has been in the news again recently, with multiple stories reporting on their Pegasus spyware product. The research and reporting spearheaded by Amnesty International is collectively known as “The Pegasus project”. This project made waves on the 18th, when multiple news outlets reported on a list of 50,000 phone numbers that are reported as “potential surveillance targets.” There are plenty of interesting people to be found on this list, like 14 heads of state and many journalists.

There are plenty of questions, too. Like what exactly is this list, and where did it come from? Amnesty international has pointed out that it is not a list of people actively being targeted. They’ve reported that of the devices associated with an entry on the list that they have been able to check, roughly 50% have shown signs of Pegasus spyware. The Guardian was part of the initial coordinated release, and has some impressive non-details to add:

The presence of a phone number in the data does not reveal whether a device was infected with Pegasus or subject to an attempted hack. However, the consortium believes the data is indicative of the potential targets NSO’s government clients identified in advance of possible surveillance attempts.

Amazon’s AWS was named as part of the C&C structure of Pegasus, and in response, they have pulled the plug on accounts linked to NSO. For their part, NSO denies the validity of the list altogether. Continue reading “This Week In Security: NSO, Print Spooler, And A Mysterious Decryptor”

Giving Control Of A Smartphone Robot To A Raspberry Pi

Most gadgets that interface with smartphones have a rather short lifespan and inevitably end up as E-waste. Unless hackers give them a second life, as is the case with the Romo, a little smartphone-controlled robot. [David Goeken] has successfully reverse-engineered the communication protocol to allow the Romo to controlled Raspberry Pi (or microcontroller)

The Romo was a little iPhone-controlled robot brought to market with a Kickstarter campaign back in 2013. It originally used the audio jack from the iPhone for the control interface, but was quickly followed by an updated version that used iPhone 4’s 30 pin connector and later the Lightning port. Romotive, the company behind Romo, eventually went out of business, but fortunately, they open-sourced the IOS app and the firmware. This has led to a few third-party apps currently on the app store.

[David] wanted to use other hardware for control, so he set about reverse-engineering the protocol using the open-source software and a logic analyzer. Unsurprisingly, it uses a serial interface to send and receive commands, with two additional pins to detect the connection and wake up the Romo. After breaking out the interface header on the board, he was able to modify the Romo to mount a Raspberry Pi Zero, and power it using the internal battery.

[David] has not made his code public yet, but it sounds like he plans to. It looks like Romo’s can be a fun little experimentation platform, and they can be found for cheap on eBay. We covered another cool Romo hack back in 2014, which used a projector and vision system to create a Mariokart-like game.  For a completely open-source smartphone robot, check out the OpenBot.

Samsung Shuttering Original SmartThings Hubs

Samsung is causing much angst among its SmartThings customers by shutting down support for its original SmartThings home automation hub as of the end of June. These are network-connected home automation routers providing Zigbee and Z-Wave connectivity to your sensors and actuators. It’s not entirely unreasonable for manufacturers to replace aging hardware with new models. But in this case the original hubs, otherwise fully functional and up to the task, have intentionally been bricked.

Users were offered a chance to upgrade to a newer version of the hub at a discount. But the hardware isn’t being made by Samsung anymore, after they redirected their SmartThings group to focus entirely on software. With this new dedication to software, you’d be forgiven for thinking the team implemented a seamless transition plan for its loyal user base — customers who supported and built up a thriving community since the young Colorado-based SmartThings company bootstrapped itself by a successful Kickstarter campaign in 2012. Instead, Samsung seems to leave many of those users in the lurch.

There is no upgrade path for switching to a new hub, meaning that the user has to manually reconnect each sensor in the house which often involves a cryptic sequence of button presses and flashing lights (the modern equivalent of setting the time on your VCR). Soon after you re-pair all your devices, you will discover that the level of software customization and tools that you’ve relied upon for home automation has, or is about to, disappear. They’ve replaced the original SmartThings app with a new in-house app, which by all accounts significantly dumbs down the features and isn’t being well-received by the community. Another very popular tool called Groovy IDE, which allowed users to add support for third-party devices and complex automation tasks, is about to be discontinued, as well.

Continue reading “Samsung Shuttering Original SmartThings Hubs”

Hackaday Podcast 127: Whippletree Clamps, Sniffing Your Stomach Radio, Multimeter Hum Fix, And C64 Demo; No C64

Hackaday editors Mike Szczys and Elliot Williams help you get caught up on a week of wonder hacks. We don’t remember seeing a floppy drive headline the demoscene, but sure enough, there’s a C64 demo that performs after the computer is disconnected. What causes bench tools to have unreliable measurements? Sometimes a poor crystal choice lets AC ruin the party. We dive into the ongoing saga of the Audacity open source project’s change of ownership, and talk about generator exciter circuits — specifically their role in starting grid-scale generators from shutdown.

Take a look at the links below if you want to follow along, and as always, tell us what you think about this episode in the comments!

Direct download (60 MB or so.)

Places to follow Hackaday podcasts:

Continue reading “Hackaday Podcast 127: Whippletree Clamps, Sniffing Your Stomach Radio, Multimeter Hum Fix, And C64 Demo; No C64”

Dial-a-SID Is A Glorious Chiptune Jukebox

Old-school rotary telephones aren’t particularly useful for their original intended purpose in this day and age, but they’re great fun to hack into new projects. [Linus Åkesson] has done just that, with his Dial-a-SID jukebox build. (Video, embedded below.)

The build installs a Raspberry Pi 3 inside the body of the telephone, running a SID chip emulator and loaded up with the High Voltage SID Collection. The Pi inside outputs sound to an external stereo system for playing chiptunes at a party.

The real party piece, however, is that the handset can be lifted and the telephone dialled in order to listen to and select tracks for the playlist. Tracks can be selected by individual codes, by composer, or even by year. In the event the playlist grows empty, the default behaviour can be set to keep playing random tracks in the meantime.

With over 2000 hours of SID music inside, it’s unlikely the Dial-a-SID will run out of tunes anytime soon. We’d love to see a similar interface used for a jukebox hooked up to a modern streaming service, too. If you build one, let us know! Alternatively, consider hooking up your rotary phone to your smartphone. Video after the break.

Continue reading “Dial-a-SID Is A Glorious Chiptune Jukebox”