3D Printed Dump Truck Carries Teeny Loads

What do you do when you already have a neat little radio-controlled skid-steer loader? Well, if you’re [ProfessorBoots], you build a neat little dump truck to match!

The dump truck is built out of 3D printed components, and has proportions akin to a heavy-duty mining hauler. The dump bed and wheels were oversized relative to the rest of the body to give it a more cartoonish look.

An ESP32 is the brains of the operation. The build is powered by a nifty little 3.6 V rechargeable lithium-ion battery with an integral Micro USB charge port. It’s paired with a boost converter to provide a higher voltage for the servos and motors. Drive is to the rear wheels, thanks to a small DC gear motor. Unlike previous skid-steer designs from [ProfessorBoots], this truck has proper servo-controlled steering. The printed tires are wrapped in rubber o-rings, which is a neat way to make wheels that grip without a lot of fuss. The truck also has a fully-functional dump bed, which looks great fun to play with.

The final build pairs great with the loader that [ProfessorBoots] built previously.

Continue reading “3D Printed Dump Truck Carries Teeny Loads”

African man hunched over a small robot car chassis

The Dar Es Salaam Hacker Scene And Gamut Detection

We’re on a sort of vacation in Tanzania at the moment and staying in a modest hotel away from the tourist and government district. It’s a district of small shops selling the same things and guys repairing washing machines out on the sidewalk. The guys repairing washing machines are more than happy to talk. Everybody’s amazingly friendly here, the hotel guy grilled us for an hour about our home state. But I really didn’t expect to end up in a conversation about computer vision.

In search of some yogurt and maybe something cooler to wear, we went on a little walk away from the hotel. With incredible luck we found a robotics shop a few blocks away. Mecktonix is a shop about two meters each way, stuffed full of Arduinos, robots, electronics components, servos, and random computer gear, overseen by [Yohanna “Joe” Harembo]. Nearby is another space with a laser engraver and 3D printer. The tiny space doesn’t stop them from being busy. A constant stream of automotive tech students from the nearby National Institute of Transport shuffle in for advice and parts for class assigned projects.

In between students, Joe demos an autonomous car he’s working on. In classic hacker fashion, he first has to reattach the motor driver board and various sensors, but then he demos the car and its problem –  the video frame rate is very slow. We dive in with him and try to get some profiling using time.monotonic_ns(). He’s never done profiling before, so this is a big eye opener. He’s only processing one video frame every 4.3 seconds, using YOLO on a Pi 3, and yup, that’s the problem.  I suggest he change to gamut detection or a Pi 4. Continue reading “The Dar Es Salaam Hacker Scene And Gamut Detection”

Hackaday Podcast 242: Mechanical Math, KaboomBox, And Racing The Beam

This week, Editor-in-Chief Elliot Williams and Kristina Panos met up from their separate but equally pin drop-quiet offices to discuss the best hacks of the previous week. Well, we liked these one, anyway.

First up in the news, it’s finally time for Supercon! So we’ll see you there? If not, be sure to check out the talks as we live-stream them on our YouTube channel!

Don’t forget — this is your last weekend to enter the 2023 Halloween Hackfest contest, which runs until 9 AM PDT on October 31st. Arduino are joining the fun this year and are offering some spooky treats in addition to the $150 DigiKey gift cards for the top three entrants.

It’s time for a new What’s That Sound, and Kristina was able to stump Elliot with this one. She’ll have to think of some more weirdo sounds, it seems.

Then it’s on to the hacks, beginning with an insanely complex mechanical central air data computer super-teardown from [Ken Shirriff]. We also learned that you can 3D-print springs and things by using a rod as your bed, and we learned whole lot about rolling your own electrolytic capacitors from someone who got to visit a factory.

From there we take a look at a Commodore Datassette drive that sings barbershop, customizing printf, and a really cool dress made of Polymer-dispersed Liquid Crystal (PDLC) panels. Finally we talk about racing the beam when it comes to game graphics, and say goodbye to Kristina’s series on USPS technology.

Check out the links below if you want to follow along, and as always, tell us what you think about this episode in the comments!

Download and savor at your leisure.

Continue reading “Hackaday Podcast 242: Mechanical Math, KaboomBox, And Racing The Beam”

A Simple And Effective 3D Filament Splicer

There are times in every 3D print enthusiast’s life when it would be convenient to join two pieces of filament. The problem with simply melting them together is that the resulting join has a blob of plastic surrounding it which has difficulty making it through the printer’s internals. [Pete Prodoehl] has a solution, in the form of a well-executed splicing jig that’s sure to leave a join which will glide through your printer.

The trick lies in performing the join in a space only marginally wider than the filament width, in the case of 1.75 mm filament a short piece of 1.775 mm PTFE tube encased in a 3D printed clamp. A 90-degree cut piece of filament is fed through the tube and heated with a candle, then withdrawn into the tube where a 45-degree cut piece is pushed in to fuse with it. The result is a seamless and bulge-less join, that can pass through an extruder without issue and print continuous pieces from different filaments.

It’s a very effective technique, but it’s not the only one we’ve seen over the years. This one by comparison heats the filament in a hair straightener, and relies on gently pulling the join apart as it solidifies in order to reduce the bulge.

This Week In Security: 1Password, Polyglots, And Roundcube

This week we got news of a security incident at 1Password, and we’re certain we aren’t the only ones hoping it’s not a repeat of what happened at LastPass. 1Password has released a PDF report on the incident, and while there are a few potentially worrying details, put into context it doesn’t look too bad.

The first sign that something might be amiss was an email from Okta on September 29th — a report of the current list of account administrators. Okta provides authentication and Single Sign-On (SSO) capabilities, and 1Password uses those services to manage user accounts and authentication. The fact that this report was generated without anyone from 1Password requesting it was a sign of potential problems.

And here’s the point where a 1Password employee was paying attention and saved the day, by alerting the security team to the unrequested report. That employee had been working with Okta support, and sent a browser session snapshot for Okta to troubleshoot. That data includes session cookies, and it was determined that someone unauthorized managed to access the snapshot and hijack the session, Firesheep style.

Okta logs seemed to indicate that the snapshot hadn’t been accessed, and there weren’t any records of other Okta customers being breached in this way. This pointed at the employee laptop. The report states that it has been taken offline, which is good. Any time you suspect malicious action on a company machine, the right answer is power it off right away, and start the investigation.

And here’s the one part of the story that gives some pause. Someone from 1Password responded to the possible incident by scanning the laptop with the free edition of Malwarebytes. Now don’t get us wrong, Malwarebytes is a great product for finding and cleaning the sort of garden-variety malware we tend to find on family members’ computers. The on-demand scanning of Malwarebytes free just isn’t designed for detecting bespoke malicious tools like a password management company should expect to be faced with.

But that turns out to be a bit of a moot point, as the real root cause was a compromised account in the Okta customer support system, as revealed on the 20th. The Okta report talks about stolen credentials, which raises a real question about why Okta support accounts aren’t all using two-factor authentication.

Continue reading “This Week In Security: 1Password, Polyglots, And Roundcube”

Retrotechtacular: Crash Testing Truck Attenuators, For Science

There are those among us who might bristle at something from the early 1980s qualifying for “Retrotechtacular” coverage, but it’s been more than 40 years since the California Department of Transportation’s truck-mounted attenuators crash testing efforts, so we guess it is what it is.

If you’re worried that you have no idea what a “truck-mounted attenuator” might be, relax — you’ve probably seen these devices attached to the backs of trucks in highway work zones. They generally look like large boxes attached to frames at the rear of the truck which are intended to soften the blow should a car somehow not see the giant orange truck covered with flashing lights and drive into the rear of it at highway speeds. Truck-mounted attenuators are common today, but back in 1982 when this film was produced, the idea was still novel enough to justify crash-testing potential designs.

Continue reading “Retrotechtacular: Crash Testing Truck Attenuators, For Science”

Why Game Boy IPS Screens Flicker

The Nintendo Game Boy was a very popular handheld in its time, but its display technology has not aged gracefully. Ripping out the original screen and dropping in a modern IPS LCD is a popular mod, but that often comes with a weird flicker now and then. [makho] is here to explain why.

The problem was that the Game Boy didn’t have any way to do transparency in the original hardware. Instead, sprites that were supposed to be a little bit transparent were instead flickered on and off rapidly. The original LCD was so slow that this flicker would be largely hidden, with the sprites in question looking suitably transparent. However, switch to a modern IPS LCD with its faster refresh rate, and the flickering will be readily visible. So it’s not a bug — it’s something that was intentionally done by developers that were designing for the screen technology of the 1980s, not the 2020s.

IPS screens have become the must-have upgrade for modern Game Boy users. Most would tell you the improved image quality and rich color is worth a little flicker here and there.

Continue reading “Why Game Boy IPS Screens Flicker”