Students 3D Print Low Cost Braille Keypad

Numerical keypads are common entry devices for everything from home security systems to phones and more. Unfortunately, a great deal of them are difficult to use if you’re visually impaired. This high-contrast Braille keypad aims to solve those issues with simple design choices.

The keypad was developed as a school project by students [Nicholas Nguyen] and [Daniel Wang]. It uses a regular layout, with 1 at the top left and 9 at the bottom right. The keypad itself is 3D printed with large buttons for easier use. Each button has its numeral inlaid on the face which allows it to be easily filled in with paint for high-contrast readability.

The real neat feature, though, is that each individual button features its relevant number in Braille. The pips are directly 3D printed into the shape of each button. For those that familiar with the tactile writing system, this makes the keypad much easier to use. It obviates the need to guess at the keypad’s orientation, and we’re honestly surprised we don’t see this on more devices out in the wild.

We’ve featured a variety of neat Braille hacks over the years, including this neat tactile display.

Continue reading “Students 3D Print Low Cost Braille Keypad”

This Week In Security: Apple’s 0-day, Microsoft’s Mess, And More

First up, Apple issued an emergency patch, then yanked, and re-issued it. The problem was a Remote Code Execution (RCE) vulnerability in WebKit — the basis of Apple’s cross-platform web browser. The downside of a shared code base,is that bugs too are write-once, exploit-anywhere. And with Apple’s walled garden insisting that every browser on iOS actually run WebKit under the hood, there’s not much relief without a patch like this one.

The vulnerability in question, CVE-2023-37450, is a bit light on further details except to say that it’s known to be exploited in the wild. The first fix also bumped the browser’s user-agent string, adding an (a) to denote the minor update. This was apparently enough to break some brittle user-agent detection code on popular websites, resulting in an unhelpful “This web browser is no longer supported” message. The second patch gets rid of the notification.

Microsoft Loses It

Microsoft has announced that on May 15th, an attack from Storm-0558 managed to breach the email accounts of roughly 25 customers. This was pulled off via “an acquired Microsoft account (MSA) consumer signing key.” The big outstanding question is how Microsoft lost control of that particular key. According to an anonymous source speaking to The Washington Post, some of the targeted accounts were government employees, including a member of cabinet. Apparently the FBI is asking Microsoft this very same question.

Speaking of Microsoft, there’s also CVE-2023-36884, a vulnerability in Microsoft Office. This one appears to be related to the handling of HTML content embedded in Office documents, and results in code execution upon opening the document. This along with another vulnerability (CVE-2023-36874) was being used by storm- another unknown threat actor, Storm-0978 in an ongoing attack.

There’s an interesting note that this vulnerability can be mitigated by an Attack Surface Reduction (ASR) rule, that blocks Office from launching child processes. This might be a worthwhile mitigation step for this and future vulnerabilities in office. Continue reading “This Week In Security: Apple’s 0-day, Microsoft’s Mess, And More”

How Does Your McDonald’s Burger Get To You?

Table service and McDonalds sound as though they should be mutually exclusive as a fundamental of the giant chain’s fast food business model, but in many restaurants there’s the option of keying in the number from a plastic beacon when you order, placing the beacon on the table, and waiting for a staff member to bring your food. How does the system work? [Whiterose Infosec] scored one of the beacons, and subjected it to a teardown and some probing.

The beacon in question has the look of being an older model judging by the 2009 date codes on its radio module and the evident corrosion on its battery terminals. Its Bluetooth 4 SoC is end-of-life, so it’s possible that this represents a previous version of the system. It has a few other hardware features, including a magnet and a sensor designed to power the board down when it is stacked upon another beacon.

Probing its various interfaces revealed nothing, as did connecting to the device via Bluetooth. However some further research as well as asking some McD’s employees revealed some of its secret. It does little more than advertise its MAC address, and an array of Bluetooth base stations in the restaurant use that to triangulate its approximate position.

If you’ve ever pondered how these beacons work while munching on your McFood, you might also like to read about McVulnerabilities elsewhere in the system.

Sloth Door Greeter Uses Neat Fold-Up Electronics Enclosures

[Alan Reiner] is building a sloth-like door greeter for his house. Sloxel, as he is affectionately known, can move around and even talk, with [Alan] using some nifty tricks in the design process

Sloxel’s job is to vet visitors to [Alan’s] house, before inviting them to knock on the door or to leave their details and go away. There’s still plenty of work to do on that functionality, which [Alan] plans to implement using ChatGPT. In the meantime, though, he’s been working hard on the hardware platform that will power Sloxel. A Raspberry Pi 3B+ is charged with running the show, including talking to the ChatGPT API and handling Sloxel’s motion along a linear rail with a number of stepper motors.

What we really love about this build, though, is the enclosure. [Alan] designed a housing for everything that can be 3D printed as a single part with print-in-place hinges. The four sides of the enclosure can then be folded up and into place with a minimum of fuss. Plus, the enclosure has plenty of nifty features that makes it easy to mount all the required hardware. It’s a neat design that we’d love to repurpose for some of our own projects.

We’ve seen other neat ideas in this area before, like using PCBs themselves as an enclosure. Video after the break.

Continue reading “Sloth Door Greeter Uses Neat Fold-Up Electronics Enclosures”

At Last, A Beagle V In The Wild

The RISC-V ISA specification contains the recipe for everything from the humblest of microcontrollers to the most accomplished of high-end application processors, but it’s fair to say that at our end of the market it’s mostly been something for the lower end. There are plenty of inexpensive small RISC-V microcontrollers, but so far not much powerful enough for example to run a Linux-based operating system.

It’s a situation that’s slowly changing though, and it looks as though things may have taken a turn for the better as a new BeagleBoard has appeared using a RISC-V chip. The BeagleV-Ahead has a BeagleBone form factor and packs an Alibaba T-Head TH1520 SoC, a 2GHz quad-core part with a GPU and DSP components on-board. They link to a selection of distributors, from which one can seemingly be bought for about $170.

It’s a departure from the ARM chips that have until now powered the BeagleBoard line, but its appearance shouldn’t come as a surprise to seasoned Beagle watchers as they announced their RISC-V developments back in 2021. We’re guessing they too had to contend with the chip shortage which hit other players such as Raspberry Pi, so we’re pleased to see a product on the market. In particular though we’re pleased to see one on a BeagleBoard. because unlike a random no-name single board computer they’re a manufacturer who supports their products.

There’s a page with a good choice of operating systems for the board, and we hope that this means they provide kernel support for this SoC. This is the real benefit of buying a BeagleBoard or a Raspberry Pi, because cheap competitors will typically support only one kernel version compared with their years of support. So while this board is by no means cheap, we’re hoping it heralds a new wave of powerful RISC-V computers. Something to look forward to indeed.

Orca Slicer Is The New Game In Town

Slicers are the neat little tools that take your 3D models and turn them into G-code that your 3D printer can actually understand. They control the printing process down to the finest detail, and determine whether your prints are winners or binners. Orca Slicer is the new tool on the block, and [The Edge of Tech] took a look at what it can do.

The video explores the use of Orca Slicer with the Bambu Lab P1P and X1 Carbon. [The Edge of Tech] jumps into the feature set, noting the rich calibration tools that are built right into the software. They work with any printer, and they’re intended to help users get perfect prints time and time again, with less messy defects and print failures. It’s also set up out of the box for network printing and live updates, which is super useful for those with multiple printers and busy workflows. You can even watch camera feeds live in the app from duly equipped printers. It’s even got nifty features for calculating your filament cost per print.

If you’re not happy with your current slicer, give Orca Slicer a go. Let us know what you think in the comments. Video after the break.

Continue reading “Orca Slicer Is The New Game In Town”

Taking Mechanical Keyboard Sounds To The Next Level

When it comes to mechanical keyboards, there’s no end to the amount of customization that can be done. The size and layout of the keyboard is the first thing to figure out, and then switches, keycaps, and then a bunch of other customizations inside the keyboard like the mounting plate and whether or not to add foam strips and other sound- and vibration-deadening features. Of course some prefer to go the other direction with it as well, omitting the foam and installing keys with a more noticeable click, and still others go even further than that by building a separate machine to make their keyboard activity as disruptive as it could possibly be.

This started as a joke among [ac2ev] and some coworkers, who were already teasing about the distinct sound of the mechanical keyboard. This machine, based on a Teensy microcontroller, sits between any USB keyboard and its host computer, intercepting keystrokes and using a small solenoid to tap on a block of wood every time a keystroke is detected. There’s also a bell inside that rings when the enter key is pressed, similar to the return carriage notification for typewriters, and as an additional touch an audio amplifier with attached speaker plays the Mario power-up sound whenever the caps lock key is pressed.

[ac2ev] notes that this could be pushed to the extreme by running a much larger solenoid powered by mains electricity, but since this was more of a proof-of-concept demonstration for some coworkers the smaller solenoid was used instead. The source code for the build can be found on the project’s GitHub page and there’s also a video of this machine in action here as well. Be careful with noisy mechanical keyboards, though, as the sounds the keys produce can sometimes be decoded to determine what the user is typing.