Hacked Interactive R2D2 Controlled By Raspberry Pi

hacked-R2D2-controlled-by-raspberry-pi

Ah R2D2. Probably one of the most recognized little robots on the planet. There have to be a hundred different toys of R2 out there, but one of the more impressive is the 30th Anniversary Interactive edition. Complete with all kinds of bells and whistles, it’s about as realistic as they come. One Star Wars fan found himself in possession of a broken Interactive R2, and with his girlfriend’s birthday coming up, decided to do a little droid surgery to create the ultimate gift.

Giving Anakin a run for his money, all the controls for this R2 unit were custom built.  A Raspberry Pi running Rasbian acts as the brain. Facial recognition was implemented using OpenCV. Voice commands in either English or Chinese were made possible by PocketSphinx. Some of the other features he included are: message recording and playback, ultrasonic distance detection, motion detection, wifi, and a rechargeable battery. Many of those features were included in the original toy, but since this unit was broken, had to be rebuilt from scratch.

In the end, it must have impressed his girlfriend – she’s now his wife. Good work Jedi. Check out some build photos and a video demonstration after the break.

Continue reading “Hacked Interactive R2D2 Controlled By Raspberry Pi”

LiFePO4 Batteries Work Much Better In A Camera Than NiMH

SAMSUNG

We agree with [Zapmaker] that Canon cameras chew through nickel metal hydride batteries. But we’re not going to use Alkaline because we think it’s wasteful. His solution is to use a battery that has a higher voltage rating. What you see here is a single lithium iron phosphate cell paired with a dummy cell to increase life between charges.

The reason that NiMH batteries don’t last very long is that they’re only rated at 2.4V. It won’t take long for that voltage to drop below the camera’s cutoff threshold since they didn’t start very high to begin with. But a single LiFePO4 cell has the same form-factor but produces 3.2V and maintains voltage well through it’s discharge cycle.

The size is right, but using one cell won’t work by itself. He built a filler for the other slot which is just a wood dowel with a screw all the way through it. The point was ground down and a bit of foil added to ensure a proper connection. We’d be interested to hear back about how this performs over the long term.

Shocking Operation Makes Sure You Have Skin In The Game

operation-shocks-you

Odds are you played the game of Operation when you were a kid. The classic electronic toy challenges you to use a tethered tweezers to extract plastic pieces without touching the sides of the holes they’re hiding in. This upgrade makes the challenge more interesting for a grown-up audience. If you touch the sides you won’t hear a jarring sound, you’ll get a painful shock!

The modification starts by clipping off the melted plastic portions that hold the paperboard face plate on the game. From there the original electronics are completely removed. We think this a bit of a mistake as we’d still like spectators to hear the sound as the player gets a shock. But we digress. The circuit board from a disposable camera is patched into the game. A wrist band forms an electrical connection with your body, providing a path for the camera’s flash capacitor to discharge if you happen to touch the sides with the tweezers.

This write-up is missing one important thing: video of someone getting shocked. [Psycosisnine] promises to add some soon, but for now you’ll just have to fall back on our absolute favorite Mindflex shock project.

HTML Link Tag Hack Sends You To The Wrong Place

hacking-html-a-tag

We consider ourselves fairly cautions Internet warriors. We know when to watch out for malicious links and tread lightly during those times. But this hack will still bite even the most cautions of link followers. It’s a hack that changes where a link is sending you after you click on it.

The concept is driven home right away by a link in the post which lists PayPal as the target when you hover over it with your mouse. Clicking on it will give you a warning that it could have been a malicious page you were redirected to. Of course the address line of the page shows that you were sent somewhere else, but it’s still an interesting issue. The hack is accomplished with just a few lines of JavaScript. In fact, the original example was 100 characters but a revision boils that down to just 67.

So who’s vulnerable to this kind of thing? It sounds like everyone that’s not using the Opera browser, which has been patched against the exploit. There are also some updates at the bottom of the post which mention that Firefox has been notified about it and Chrome is working on a patch.

[via Reddit]

Hacking The Right Side Of A Keyboard Completely Off

hacking-the-right-side-of-your-keyboard

The form factor of this keyboard just doesn’t look right. What’s missing? Oh, the numpad has been completely removed! We use our numpad almost exclusively (especially when coding) so it’s a little hard to figure out why [Ludw] did this. His only mention of motive is that he wanted the mouse closer to the main part of the keyboard and that he didn’t use the numpad. No matter what the reason, we still think he did an amazing job of giving new life to the older keyboard.

It started out as a plain old beige Cherry G80-3000 keyboard. After cracking open the case [Ludw] carefully traced out the connections between the key matrix and the PCB which provides the USB connection. This is because the controller is mounted over on the part of the PCB he his about to remove. Before making the cuts he desoldered all seventeen switches (these can be reused to fabricate a new keyboard, or add switches to various projects). He then lopped off the depopulated substrate and used point-to-point soldering to reconnect the controller. A bit of case alteration removed the extra space while also reusing the nicely molded edges. A clean and tidy paint job finishes the hack.

[via Reddit]

Comparing USB To Ethernet Converters: Apple Vs. Knock-off

usb-ethernet-comparison

[Angus Gratton] recently cracked open a pair of USB to Ethernet converters to see what’s inside. One was an Apple branded device, the other a no-name from eBay. The former rings in at $30, with the latter just $4. This type of comparison is one of our favorites. It’s especially interesting with Apple products as they are known for solid hardware choices and the knock-offs are equally infamous for shoddy imitations.

From the outside both devices look about the same. The internal differences start right away with a whole-board metal shield on the Apple dongle and none on the off-brand. But the hardware inside is actually quite similar. There’s an RJ-45 jack on the left, followed by the Ethernet isolation chip next to it. From there we start to see differences. The off-brand had a blank chip where Apple’s ASIX AX88772ALF USB to Ethernet bridge controller is located. There is also a difference with the clock; Apple is using two crystals with the other using just one.

[via Reddit]

Atari 800 EPROM Cartridge Hack

atari-800-eeprom-hack

[FozzTexx] had an old Atari 800 collecting dust and decided to pull it out and get to work. The problem is that it’s seen some rough storage conditions over the years including what appears to be moisture damage. He’s read about a cartridge called SALT II which can run automatic diagnostics. Getting your hands on that original hardware can be almost impossible, but if he had a flashable cartridge he could just download an image. So he bought the cheapest cartridge he could find and modified it to use an EPROM.

When he cracked open his new purchase he was greeted with the what you see on the left. It’s a PCB with the edge connector and two 24-pin sockets. These are designed to take 4k ROMs. He dropped in an EPROM of the same size but the pin-out doesn’t match what the board layout had in mind. After following the traces he found that it is pretty much an exact match for an Intel 2764 chip. The one problem being that the chip has 28-pins, four too many for the footprint. The interesting thing is that the larger footprint (compared to the 2732) uses all the same pins, simply adding to the top and moving the power pins. A small amount of jumper wire soldering and [FozzTexx] is in business.