A graphic showing the suggested footprint dimensions for 0402 parts

Want Better 0402 Reflow? Consider These Footprints!

Assembling with a stencil is just that much more convenient – it’s a huge timesaver, and your components no longer need to be individually touched with a soldering iron for as many times as they have pads. Plus, it usually goes silky smooth, the process is a joy to witness, and the PCB looks fantastic afterwards! However, sometimes components won’t magically snap into place, and each mis-aligned resistor on a freshly assembled board means extra time spent reflowing the component manually, as well as potential for silent failures later on. In an effort to get the overall failure rate down, you will find yourself tweaking seemingly insignificant parameters, and [Worthington Assembly] proposes that you reconsider your 0402 and 0201 footprints.

Over the years, they noticed a difference in failure rates between resistor&capacitor footprints on various boards coming in for assembly – the size and positioning of the footprint pads turned out to be quite significant in reducing failure rate, even on a tenth of millimeter scale. Eagle CAD default footprints in particular were a problem, while a particular kind of footprint never gave them grief – and that’s the one they recommend we use. Seeing the blog post become popular, they decided to share their observations on 0201 as well, and a footprint recommendation too. Are your 0402 resistors giving you grief? Perhaps, checking the footprints you’re using is a good first step.

The 0402 and 0201 components are in a weird spot, where soldering iron assembly is no longer really viable, but the stencil+reflow approach might not be unilaterally successful when you start off – fortunately, that’s where writeups like these come in. Interested in learning stenciling? Get some solder paste, and read up on all the different ways you can put it onto your boards.

Comparing Cheap Capacitative Soil Moisture Sensors With Commercial Sensors

When your residence has soil moisture sensors embedded that were dictated by your friendly neighborhood HoA, you may start asking questions about the system used. That’s what [Modest Maker] did and the resulting findings along with an attempt to beat the commercial system with some cheap capacitive sensors, are covered  in a recent video that’s also embedded below. Part of the motivation here was that the commercial system in the community was not clearly installed properly.

To make a long story short, the commercial system by Hunter (Soil-Clik) appears to be a tensiometer-based system that uses the pressure produced by moisture intrusion into the measurement column. This translates to how easy it is for plant roots to extract water, depending on the soil type. [Modest Maker] had to first dodge the broken-by-design capacitive sensors that are available everywhere, but after that was able to cobble together a measurement system that he hopes will allow him to validate the commercial system’s installation.

Continue reading “Comparing Cheap Capacitative Soil Moisture Sensors With Commercial Sensors”

Electron Microscope Conversion Hack

Some of you probably know this already, but there’s actually more than one kind of electron microscope. In electronics work, the scanning electron microscope (SEM) is the most common. You hit something with electrons and watch for secondary electron emissions. However, biologists more often use a TEM — a transmissive electron microscope — which passes electrons through a sample to image it. [Breaking Taps] built a small device to convert his SEM into a TEM.

One key idea is that in a SEM, the beam’s position on the target is the only thing that matters. Any secondary electron detected is a result of that spot’s composition, no matter where you collect them. Common detectors pick up back-scattered electrons bouncing back toward the electron source.  There are also low-energy electrons bouncing off in random directions, depending on the topology of the target.

The slow electrons can be attracted by a single detector that has a strong positive charge. TEM  doesn’t detect secondary electron emissions. Instead, it passes electrons through a target and collects the ones that pass through a very thin sample using a screen that glows when electrons hit it.

The idea, then, is to create a STEM-SEM device. There’s a sample holder and an angled reflector that shoots electrons passing toward the SEM’s detector. The back-scatter detector is not used, and a shield prevents the detector from seeing secondary emissions from the target itself.

You can buy these, but they are well over $1,000, so in true hacker fashion, [Breaking Taps] made his own.  You could, too, but you’d need a pretty good machine shop and — oh yeah — a scanning electron microscope.

While we have seen some home labs with electron microscopes, you need some high-tech vacuum and high-voltage gear, so it isn’t too common. Armed with a STEM, you can even see the shadows of atoms.

Continue reading “Electron Microscope Conversion Hack”

Detecting Machine-Generated Content: An Easier Task For Machine Or Human?

In today’s world we are surrounded by various sources of written information, information which we generally assume to have been written by other humans. Whether this is in the form of books, blogs, news articles, forum posts, feedback on a product page or the discussions on social media and in comment sections, the assumption is that the text we’re reading has been written by another person. However, over the years this assumption has become ever more likely to be false, most recently due to large language models (LLMs) such as GPT-2 and GPT-3 that can churn out plausible paragraphs on just about any topic when requested.

This raises the question of whether we are we about to reach a point where we can no longer be reasonably certain that an online comment, a news article, or even entire books and film scripts weren’t churned out by an algorithm, or perhaps even where an online chat with a new sizzling match turns out to be just you getting it on with an unfeeling collection of code that was trained and tweaked for maximum engagement with customers. (Editor’s note: no, we’re not playing that game here.)

As such machine-generated content and interactions begin to play an ever bigger role, it raises both the question of how you can detect such generated content, as well as whether it matters that the content was generated by an algorithm instead of by a human being.

Continue reading “Detecting Machine-Generated Content: An Easier Task For Machine Or Human?”

Electronic Shoe Explores Alleged Chess Misbehavior

A few months ago, a scandal erupted in the chess world which led to some pretty wild speculation around a specific chess player. We won’t go into any of the details except to say that there is virtually no physical evidence of any method this player allegedly used to cheat in a specific in-person chess match. But [Teddy Warner] and partner [Jack Hollingsworth] were interested in at least providing a proof-of-concept for how this cheating could have been done, though, and came up with this device which signals a chess player through a shoe.

The compact device is small enough to fit in the sole of one of the player’s shoes, and is powered by an ATtiny412 microcontroller paired with a HC-06 Bluetooth module. The electronics are fitted into a 3D printed case along with a small battery which can then be placed into the sole of a shoe, allowing the wearer to feel the vibrations from a small offset-weight motor. With a second person behind a laptop and armed with a chess engine, the opponent’s moves can be fed into the computer and the appropriate response telegraphed through the shoe to the player.

While [Teddy] and [Jack] considers the prototype a success in demonstrating the ease at which a device like this could be used, and have made everything related to this build open source, this iteration did have a number of issues including that the motor buzzing was noticeable during play, and that his chess engine made some bizarre choices in the end game. It also requires the complicity of a second person, which is something this other chess cheating machine does away with. They also note that it’s unlikely that any chess players at the highest levels use devices like these, and that other chess experts have found no evidence of any wrongdoing in this specific scandal.

Continue reading “Electronic Shoe Explores Alleged Chess Misbehavior”

The Radioactive Source Missing In Australian Desert Has Been Found

Nuclear material is relatively safe when used, stored, and managed properly. This generally applies to a broad range of situations, from nuclear medicine to nuclear power generation. Some may argue it’s impossible to use nuclear weapons safely. In any case, stringent rules exist to manage nuclear material for good reason.

Sometimes, though, things go wrong, mistakes are made, and that nuclear material ends up going AWOL. That’s the situation that faced authorities in Australia, as they scoured over a thousand kilometers of desert highway for a tiny missing radioactive source with the potential to cause serious harm. Thankfully, authorities were able to track it down.

Continue reading “The Radioactive Source Missing In Australian Desert Has Been Found”

A modchip described in the article - a small PCB with an epoxy blob on it, soldered to the Cisco switch PCB using four thin wires

Counterfeit Cisco Hardware Bypasses Security Checks With Modchips

Some pictures recently surfaced on social media, showing a small PCB tapped into four points on Cisco-branded boards. What is this about? A NSA backdoor so data can be exfiltrated to some third party? Well, that’s theoretically possible, but it’s actually used for bypassing hardware authenticity checks in Cisco hardware being cloned — a sizable industry. Of course, “can’t believe it’s not Cisco” hardware is only valuable insofar that it’s able to run the Cisco software, and that’s where the bodge boards play a major role.

An unidentified IC on the a different counterfeit Cisco board, with markings soldered offA 2020 report by F-Secure details an investigation, comparing three switches marked as Cisco 2960X – one known genuine and two known counterfeits. The counterfeits had the aforementioned implants either soldered to the bottom of the PCB or added to the board as a separate component, and the paper goes into why they’re important for successful counterfeiting.

Apparently, these chips emulate or bypass an I2C EEPROM containing part of the code executed during the boot sequence, and Cisco depends on this EEPROM’s contents for authenticity verification. Cisco software reads the EEPROM twice — once for verification, and once again for actually running it. The microcontroller included on the mod board can return a genuine binary with a valid signature on the first read, and a binary with hardware checks patched out for subsequent reads.

The paper will tell you about way more than this — it’s thorough yet captivating. As you’d expect, it devotes quite a bit of time to comparing genuine and counterfeit boards, showing that the cloning process is pretty to-the-T, save for some part substitutions. For instance, check out the PDF page 12 to see how via locations are exactly copied between PCBs in a bizarre way, or the Cisco file format and authenticity check analysis closer to the end of the report. All in all, the 38 pages of the document make for a fun foray into what makes Cisco authentication mechanisms tick, and what helps clone hardware makers bypass them.

Are such chips ever used for adding backdoors and data exfiltration? There’s no evidence of that, as much as that’s not to be excluded — bypassing anti-cloning protections would make other hijinks more viable no doubt, that said, only hardware authentication bypass measures were found so far. This mechanism also breaks during software updates, and absolutely, leaves some to be desired when it comes to its stated functionality. That said, such fun insights can help us, say, enforce right-to-repair, enable hardware reuse, and thwart many predatory business practices in areas where laws fail us.