All I Want For Mr. Christmas Is Some New Music

It’s true — you really can find anything (except maybe LEGO) in thrift stores. When [thecowgoesmoo] picked up a Mr. Christmas Symphonium music box one day, they knew they wanted to make it play more than just the standard Christmas and classical fare that ships with the thing.

So they did what any self-respecting hacker would do, and they wrote a MATLAB script that generates new disk silhouette images that they then cut from cardboard with a laser cutter. They also used various other materials like a disposable cutting mat. Really, whatever is lying around that’s stiff enough and able to be cut should work. You know you want to hear Van Halen’s “Jump” coming from a tinkling music box, don’t you? Be sure to check out the video demonstration after the break.

If you don’t want to wait around until a Mr. Christmas lands in your lap, why not make your own hand-cranked music box and accompanying scores?

Continue reading “All I Want For Mr. Christmas Is Some New Music”

In Praise Of Old Meters

We are spoiled with multimeters today. Even the cheapest meter you will get these days is almost surely digital with a tremendous input impedance. But a few decades ago, meters were almost always analog affairs. To make a precise measurement, you needed a mirror under the meter to ensure you read the needle correctly. Moreover, a common meter wouldn’t have that high of an input impedance. If you spent more, you could get a VTVM and, later, one that used FETs to provide high input impedance. [Peter AA2VG] just picked up a vintage Micronta FET volt-ohm meter to join some of the other new and old meters in his shack. You can check it out in the video below.

[Peter] already has a Simpson and a more modern Fluke meter. The Simpson, however, doesn’t have a tube or FET amplifier. The Fluke is nice, but there is something about the needle on an analog meter. If you aren’t old enough to remember, the Micronta brand was a Radio Shack label.

Continue reading “In Praise Of Old Meters”

A Homebrew GPS Correction System For DIY Land Surveying

For those of you rushing to the comment section after reading the title to tell [Ben Dauphinee] that his DIY land surveying efforts are for naught because only a licensed surveyor can create a legally binding property description, relax — he already knows. But what he learned about centimeter-resolution GPS is pretty interesting, especially for owners of large rural properties like him.

[Ben]’s mapping needs are less rigorous than an official survey; he just wants to get the locations of features like streams and wood lines, and to get topographic elevations so that he has a general “lay of the land” for planning purposes. He originally engaged a surveyor for that job, but after shelling out $4,600 to locate a single property line, he decided to see what else could be done. Luckily, real-time kinematics, or RTK, holds the key. RTK uses a fixed GPS station to provide correction signals to a mobile receiver, called a rover. If the fixed station’s position is referenced to some monument of known position, the rover’s position can be placed on a map to within a couple of centimeters.

To build his own RTK system, [Ben] used some modules from SparkFun. The fixed station has an RTK breakout board and a multi-band GNSS antenna to receive positioning data, along with a Raspberry Pi to run the RTK server. An old iPhone with a prepaid SIM provides backhaul to connect to the network that provides correction data. [Ben]’s rover setup also came mainly from SparkFun, with an RTK Facet receiver mounted on a photographer’s monopod. Once everything was set up and properly calibrated, he was able to walk his property with the rover and measure locations to within 4 centimeters.

This was not an inexpensive endeavor — all told, [Ben] spent about $2,000 on the setup. That’s a lot, especially on top of what he already paid for the legal survey, but still a fraction of what it would have cost to have a surveyor do it, or to buy actual surveyor’s equipment. The post has a ton of detail that’s worth reading for anyone interested in the process of mapping and GPS augmentation.

Hackaday Podcast Episode 252: X1Plus Hacks Bambu, Scotto Builds A Katana Keyboard, And Bass Puts Out Fire

This week, Editor-in-Chief Elliot Williams and Kristina Panos met up to discuss the best hacks of the previous week. It’s CES time once again in Las Vegas, and you know what that means — some wacky technologies like this AI pet door that rejects dead mice.

Then it’s on to What’s That Sound, which Kristina managed to nail for once. Can you get it? Can you figure it out? Can you guess what’s making that sound this week? If you can, and your number comes up, you get a special Hackaday Podcast t-shirt.

But then it’s on to the hacks, beginning with a new keyboard from [Joe Scotto] and an exploration of all you can do with an LED strip, like 1D fireworks and roller coasters without any moving parts. From there, we marvel at the ability of sound waves to extinguish flames, and the tech behind life as a quadriplegic. Finally, we examine not one, but two of Jenny List’s finely-crafted rants, one about web browsers, and the other about the responsible use of new technology.

Check out the links below if you want to follow along, and as always, tell us what you think about this episode in the comments!

Download and savor at your leisure.

Continue reading “Hackaday Podcast Episode 252: X1Plus Hacks Bambu, Scotto Builds A Katana Keyboard, And Bass Puts Out Fire”

The Simple Tech Behind Hidden Camera Detectors

If you’ve ever been concerned about privacy in a rental space or hotel room, you might have considered trying one of the many “spy camera detectors” sold online. In the video after break [Big Clive], tears one down and gives us  an in-depth look at how these gadgets actually work, and their limitations.

Most detector follow the same basic design: a ring of LEDs through which the user inspects a room, looking for reflections indicating a potential hidden camera. Although this device can help spot a camera, it’s not entirely foolproof. The work best when you’re close to the center of a camera’s field of view, and some other objects, like large LEDs can produce similar reflections

The model examined in this video takes things one step further by adding a disc of dichroic glass. Coated with a metallization layer close to the wavelength of the LEDs, it effectively acts a bandpass filter, reducing reflections from other light sources. [Big Clive] also does his customary reverse-engineering of the circuit, which is just a simple flasher powered by USB-C.

[Big Clive]’s teardowns are always an educational experience, like we’ve seen in his videos on LED bulb circuits and a fake CO2 sensor.

Continue reading “The Simple Tech Behind Hidden Camera Detectors”

This Week In Security: AI Is Terrible, Ransomware Wrenches, And Airdrop

So first off, go take a look at this curl bug report. It’s a 8.6 severity security problem, a buffer overflow in websockets. Potentially a really bad one. But, it’s bogus. Yes, a strcpy call can be dangerous, if there aren’t proper length checks. This code has pretty robust length checks. There just doesn’t seem to be a vulnerability here.

OK, so let’s jump to the punch line. This is a bug report that was generated with one of the Large Language Models (LLMs) like Google Bard or ChatGPT. And it shouldn’t be a surprise. There are some big bug bounties that are paid out, so naturally people are trying to leverage AI to score those bounties. But as [Daniel Stenberg] point out, LLMs are not actually AI, and the I in LLM stands for intelligence.

There have always been vulnerability reports of dubious quality, sent by people that either don’t understand how vulnerability research works, or are willing to waste maintainer time by sending in raw vulnerability scanner output without putting in any real effort. What LLMs do is provide an illusion of competence that takes longer for a maintainer to wade through before realizing that the claim is bogus. [Daniel] is more charitable than I might be, suggesting that LLMs may help with communicating real issues through language barriers. But still, this suggests that the long term solution may be “simply” detecting LLM-generated reports, and marking them as spam. Continue reading “This Week In Security: AI Is Terrible, Ransomware Wrenches, And Airdrop”

Bambu Lab To Allow Installing Open Firmware After Signing Waiver

On January 10th Bambu Lab published a blog post in which they address the issue of installing custom firmware on your Bambu Lab X1 3D printer. This comes hot on the heels of a number of YouTube channels for the first time showing off the X1Plus firmware that a number of X1 users have been working on as an open source alternative to the closed, proprietary firmware. Per the Bambu Lab blog post, there is good and bad news for those wanting to use X1Plus and similar projects that may pop up in the future.

After Bambu Lab consulted with the people behind X1Plus it was decided that X1 users would be provided with the opportunity to install such firmware without complaints from Bambu Lab. They would however have to sign a waiver that declares that they agree to relinquish their rights to warranty and support with the printer. Although some details are left somewhat vague in the blog post, it appears that after signing this waiver, and with the target X1 printer known to Bambu Lab, it will have a special firmware update (‘Firmware R’) made available for it.

This special firmware then allows for third-party firmware to be installed, with the ability to revert to OEM firmware later on. The original exploit in pre-v1.7.1 firmware will also no longer be used by X1Plus. Hopefully Bambu Lab will soon clarify the remaining questions, as reading the Reddit discussion on the blog post makes it clear that many statements can be interpreted in a variety of ways, including whether or not this ‘Firmware R’ is a one-time offer only, or will remain available forever.

It’s not the first time we’ve seen a 3D printer manufacturer give users this sort of firmware ultimatum. Back in 2019 Prusa added a physical “appendix” to their new 32-bit control board that the user would have to snap off before they could install an unsigned firmware, which the company said signified the user was willing to waive their warranty for the privilege.

Thanks to [Aaron] for the tip.