The news doesn’t go long without some kind of superconductor announcement these days. Unfortunately, these come in several categories: materials that require warmer temperatures than previous materials but still require cryogenic cooling, materials that require very high pressures, or materials that, on closer examination, aren’t really superconductors. But it is clear the holy grail is a superconducting material that works at reasonable temperatures in ambient temperature. Most people call that a room-temperature superconductor, but the reality is you really want an “ordinary temperature and pressure superconductor,” but that’s a mouthful.
In the Hackaday bunker, we’ve been kicking around what we will do when the day comes that someone nails it. It isn’t like we have a bunch of unfinished projects that we need superconductors to complete. Other than making it easier to float magnets, what are we going to do with a room-temperature superconductor? Continue reading “Ask Hackaday: What If You Did Have A Room Temperature Superconductor?”→
Pinokio is billed as an autonomous virtual computer, which could mean anything really, but don’t click away just yet, because this is one heck of a project. AI enthusiast [cocktail peanut] (and other undisclosed contributors) has created a browser-style application which enables a virtual Unix-like environment to be embedded, regardless of the host architecture. A discover page loads up registered applications from GitHub, allowing a one-click install process, which is ‘simply’ a JSON file describing the dependencies and execution flow. The idea is rather than manually running commands and satisfying dependencies, it’s all wrapped up for you, enabling a one-click to download and install everything needed to run the application.
But what applications? we hear you ask, AI ones. Lots of them. The main driver seems to be to use the Pinokio hosting environment to enable easy deployment of AI applications, directly onto your machine. One click to install the app, then another one to download models, and whatever is needed, from the likes of HuggingFace and friends. A final click to launch the app, and a browser window opens, giving you a web UI to control the locally running AI backend. Continue reading “On-click Install local AI Applications Using Pinokio”→
The phenomenon of prison electronics is by now relatively well-documented, with striking transparent radios, televisions, and kin easy to recognize. Yet what about prison laptops? As it turns out, these are a thing as well, and [Zephray Wenting] got one from eBay to investigate, as documented over at Twitter (ThreadReader single page). Much like their audiovisual brethren, these laptops lack basic features in the name of prison security, which in the case of this laptop means for example no USB ports. Even the spacebar stabilizer rod is missing. Weaponized keyboards are apparently a thing in corrections facilities.
The Justice Tech Solutions Securebook 5. (Credit: Zephray Wenting)
Called the Justice Tech Solutions Securebook 5, it has been superseded by the Securebook 6. Inside this earlier unit, you’ll find an Intel N3450 with 4 GB LPDDR3, with SATA for storage and a special dock connector. Some laptops come with WiFi hardware installed, others are unpopulated. It appears that these Securebooks by default have a BIOS password that cannot be erased, even by removing it from the NVRAM (‘CMOS’), as it’ll return on the next boot due to an automatic BIOS reset. This was temporarily bypassed through a hacky external SPI Flash adapter, but the reward for all this trouble was a BIOS setup screen with just the ‘Security’ tab.
It’s now been sleuthed out that the default password is N%(dU32p as reported by Hackaday’s own [Adam Fabio] on Twitter. It turns out the password was available on a (now private) YouTube video. [Techknight] on Twitter has delved into EFI BIOS hacking. He has an alternate BIOS image that does provide access to the full BIOS setup utility. With BIOS access not being necessary to boot the system, the question that [Zephray] went ahead with was how to boot it into an OS since the original HDD or SSD had been removed prior to being sold. The bad news here is that it turned out that the system has a HDD whitelist (which [Sark] found a way to bypass). The good news is that someone has probed the system before, with the storage device being reported as ‘China SATA3 240GB SSD’.
Rather than mess with this, it was attempted to boot from USB, by tapping into the USB lines for the touchpad, which turned out to allow booting into a live image of Ubuntu without fuss. As an ongoing project, it’ll be interesting to see what more functionality can be wrung out of this piece of prison kit, all hopefully from the right side of the prison bars.
Most MIDI controllers are modelled after traditional instruments, like pianos, flutes, or guitars. [Oliver Child] went in a different direction for the TuneShroom, instead modelling his DIY controller after the terrifying, unclassifiable living organism we call the mushroom.
The project was a fun way for [Oliver] to try creating a project with an artistic PCB design, and it worked out well in that regard. He penned a circuit board in the shape of a toadstool, with conductive pads serving as capacitive touch points to activate various notes.
The design is based around the Sparkfun Pro Micro, but it’s not programmed in Arduino. [Oliver] wanted to make full use of the ATmega32U4 microcontroller and have freedom to use the pins at will, so instead the project was programmed with a patched version of LUFA to handle the USB side of things. MIDI data is naturally piped out over this interface to an attached computer.
There may be few cases where the maxim that “you get what you pay for” rings true, than a lathe. The less you spend on a lathe, the closer you get to a lathe-shaped object and the further from, well, a lathe. [Camden Bowen] has bought a cheap lathe, and he’s not content with a lathe-shaped object, so he takes us in the video below through a set of upgrades for it. In the process he makes a much nicer lathe for an entirely reasonable sum.
First up are the bearings, in this case a set of ball races which aren’t really appropriate for taking lateral force. After a lot of effort and a tiny bit of damage he manages to remove the old bearings and get the new ones in place, though their slightly different dimensions means he has to replace a spacer with a temporary 3D printed item which he’ll turn in metal later. We learn quite a bit about cheap lathe tools and tool alignment along the way, and he ends up buying a better tool post to solve some of its problems. We were always not very good at grinding HSS edges, too.
At the end of it all he has a much better lathe, upping cost from $774 to $1062 which is still pretty good for what he has. Worth a look, if you too have a lathe-shaped object.
When all else fails, blame it on the cloud? It seems like that’s the script for just about every outage that makes the news lately, like the Wyze camera outage this week that kept people from seeing feeds from their cameras for several hours. The outage went so far that some users’ cameras weren’t even showing up in the Wyze app, and there were even reports that some people were seeing thumbnails for cameras they don’t own. That’s troubling, of course, and Wyze seems to have taken action on that quickly by disabling a tab on the app that would potentially have let people tap into camera feeds they had no business seeing. Still, it looks like curiosity got the better of some users, with 1,500 tapping through when notified of motion events and seeing other people walking around inside unknown houses. The problem was resolved quickly, with blame laid on an “AWS partner” even though there were no known AWS issues at the time of the outage. We’ve said it before and we’ll say it again: security cameras, especially mission-critical ones, have no business being connected with anything but Ethernet or coax, and exposing them to the cloud is a really, really bad idea.
Streaming content online has never been more popular than it is now, from YouTube to Twitch there are all kinds of creators around with interesting streams across a wide spectrum of interests. With that gold rush comes plenty of people selling figurative shovels as well, with audio mixing gear, high-quality web cams, and dedicated devices for controlling all of this technology. Often these devices take the form of a tablet-like device, but [Lenochxd] thinks that any tablet ought to be able to perform this task without needing dedicated, often proprietary, hardware.
The solution offered here is called WebDeck, an application written in Flask that turns essentially any device with a broswer into a stream control device. Of course it helps to have a touch screen as well, but an abundance of tablets and smartphones in the world makes this a non-issue. With the software running on the host computer, the streamer can control various aspects of that computer remotely by scanning a QR code which opens a browser window with all of the controls accessible from within. It has support for VLC, OBS Studio, and Spotify as well which covers the bases for plenty of streaming needs.
Currently the host software only runs on Windows, but [Lenochxd] hopes to have MacOS and Linux versions available soon. We’re always in favor of any device that uses existing technology and also avoids proprietary hardware and software. Hopefully that’s a recipe to avoid planned obsolescence and unnecessary production. If you prefer a version with a little bit of tactile feedback, though, we’ve seen other decks which add physical buttons for quick control of the stream.