Raspberry Pi Pico Becomes MIDI-Compatible Synth

ECE 4760 is a microcontroller course that runs at Cornell every year, and it gives students a wide remit to pursue various kinds of microcontroller projects. [Pelham Bergesen] took the class and built himself a MIDI-controllable synthesizer out of a Raspberry Pi Pico.

[Pelham] coded a library to parse MIDI messages on the Pico, with the microcontroller’s UART charged with receiving the input data. MIDI is basically just serial at a baud rate of 31.25k, with a set message structure, after all. From there, the Pico takes the note data and plays the relevant frequencies by synthesizing square waves using a PWM output. A second PWM channel can also be blended with the first to generate more complex tones.  The synthesizer is designed to be used with a source of MIDI note data such as a keyboard controller; [Pelham] demonstrates the project in use with a Roland JD-XI. It’s a fairly basic synthesizer, but [Pelham] does a good job of explaining all the steps required to get this far. If you’ve never done an audio or MIDI project before, you might find his guide very helpful for the way it steps through the basics.

[Pelham] didn’t get to implement fancier features like direct digital synthesis (DDS) or analog audio effects before the class closed out. However, that would be an excellent project for anyone else developing their own Pico synthesizer. If you whip up something that sounds good, or even just interesting, be sure to notify us on the tipsline. Video after the break.

Continue reading “Raspberry Pi Pico Becomes MIDI-Compatible Synth”

$30 Guitar Build Shows What You Can Do With Amazon Parts

Most guitarists buy their axes fully assembled from big names like Fender, Gibson, and… maybe Yamaha? Sure. But there are a dedicated set that relish in mixing and matching parts and even building and assembling their own instruments. [Danny Lewis] decided to see what he could do with the cheapest guitar parts from Amazon and a body of his own design, and he put together something pretty passable for just $30.

The wood for the body was cut on a bandsaw, and was essentially free scrap sourced from old furniture. [Danny] went for an unconventional design using a roughly Telecaster outline and large cutouts either side of the bridge. The neck was free, by virtue of being an old Harmony neck sourced off Craigslist. We’d have preferred to see what could be done with a cheap Amazon neck, but it nonetheless fits the vibe of the build.

The guitar then received a $9.99 pickup and controls, an $8.80 solidtail bridge, and $11 tuning machines for the headstock. Strung up, it actually sounds passable. We’d want to throw it on a proper amp and give the whole thing a setup before fully assessing it, but hey, for $30, it’s hard to go wrong.

We do love some hacky guitars around here; we’ve even featured some with surprise effects gear built into the bodies. Video after the break.

Continue reading “$30 Guitar Build Shows What You Can Do With Amazon Parts”

Hackaday Podcast Episode 249: Data By Laser And Parachute, Bluetooth Hacks, Google’s Gotta Google

‘Twas the podcast before Christmas, and all through the house, the best hacks of the week are dancing around Elliot and Tom’s heads like sugar-plums. Whatever that means.

I’d just like to interject for a moment. What you’re referring to as Christmas is, in fact, Happy/Holidays.

Before settling their brains in for a long winter’s nap, they’ll talk about the open source software podcast that now calls Hackaday home, the latest firmware developments for Google’s Stadia controller, high-definition cat videos from space, and upgrades for the surprisingly old-school battery tech that powers the Toyota Prius.

Out on the lawn, expect a clatter about the the state-of-the-art in DIY camera technology, the acoustic properties of hot chocolate, and a storage media from the 1990s that even Al Williams had never heard of.

Finally, after tearing open the shutters and throwing up the sash, the episode wraps up with a discussion about wiring techniques that let you leave the soldering iron at home, and the newest chapter in the long history of transferring data via parachute. Miniature sleigh and eight tiny reindeer sold separately.

Download the gift you really want this year: this week’s podcast in DRM-free MP3.

Continue reading “Hackaday Podcast Episode 249: Data By Laser And Parachute, Bluetooth Hacks, Google’s Gotta Google”

This Week In Security: Terrapin, Seized Unseized, And Autospill

There’s a new SSH vulnerability, Terrapin (pdf paper), and it’s got the potential to be nasty — but only in an extremely limited circumstance. To understand the problem, we have to understand what SSH is designed to do. It replaces telnet as a tool to get a command line shell on a remote computer. Telnet send all that text in the clear, but SSH wraps it all inside a public-key encrypted tunnel. It was designed to safely negotiate an unfriendly network, which is why SSH clients are so explicit about accepting new keys, and alerting when a key has changed.

SSH uses a sequence counter to detect Man-in-the-Middle (MitM) shenanigans like packet deletion, replay, or reordering. That sequence isn’t actually included in the packet, but is used as part of the Message Authentication Check (MAC) of several encryption modes. This means that if a packet is removed from the encrypted tunnel, the MAC fails on the rest of the packets, triggering a complete connection reset. This sequence actually starts at zero, with the first unencrypted packet sent after the version banners are exchanged. In theory, this means that an attacker fiddling with packets in the pre-encryption phase will invalidate the entire connection as well. There’s just one problem.

The innovation from the Terrapin researchers is that an attacker with MitM access to the connection can insert a number of benign messages in the pre-encryption phase, and then silently drop the first number of messages in the encrypted phase. Just a little TCP sequence rewriting for any messages between, and neither the server nor client can detect the deception. It’s a really interesting trick — but what can we do with it?

For most SSH implementations, not much. The 9.6 release of OpenSSH addresses the bug, calling it cryptographically novel, but noting that the actual impact is limited to disabling some of the timing obfuscation features added to release 9.5.

Continue reading “This Week In Security: Terrapin, Seized Unseized, And Autospill”

Bed Sensors Do More Than You’d Think

Bed sensors do sort of sound like a gimmick — after all, who cares whether someone is occupying the bed? But if you think about it, that information is quite useful from a home automation standpoint. A person could do all sorts of things in this state, from ensuring the overhead lights in the room can’t come on, to turning off other smart devices that are likely not being used while both occupants are sleeping.

[The Home Automation Guy] presents a couple of ways of doing this, but both center around a fairly inexpensive pressure-sensing mat.

In the first method, he connects the pressure mat up to a Zigbee Aqara Leak Sensor, which conveniently has two terminals on the back to accept the wires from the pressure sensor. Then he simply connects it up to a Zigbee-compatible home assistant like the Aqara Hub.

In slightly harder mode, he forgoes the Aqara Leak Sensor and connects the pressure mat up to an ESP32 using a nifty screw terminal dev board. Then he sets up the sensor and all the desired actions in ESPHome. Of course, with an ESP32, it’s easy to add a second pressure mat for [Mrs. The Home Automation Guy]’s side of the bed.

Now, once they’ve both gone off to bed, the house goes into night mode — all the smart plugs, Sonos devices, and other things are powered down, and the alarm system is put into night mode. Be sure to check out the build video after the break.

Continue reading “Bed Sensors Do More Than You’d Think”

Animated gif of large 1950s computer spitting out a sheet of paper.

Retrotechtacular: 1960s Doc Calls Computers The Universal Machine

It’s weird to think that an abacus would have still been used sixty years ago, or so posits the documentary series The Computer and the Mind of Man. This six part series originally aired on San Francisco local television station KQED in 1962, a time where few people outside of academia had even stood next to such a device.

Episode 3 titled “The Universal Machine” was dedicated to teaching the public how a computer can enhance every type of business provided humans can sufficiently describe it in coded logic. Though mainly filtered through IBM’s perspective as the company was responsible for funding the set of films; learning how experts of the time contextualized the computer’s potential was illuminating.

Continue reading “Retrotechtacular: 1960s Doc Calls Computers The Universal Machine”

Up Close And Personal With A MEMS Microphone

If you’ve ever wondered what lies beneath the barely visible hole in the can of a MEMS microphone, you’re in luck, because [Zach Tong] has a $10 pair of earbuds to sacrifice for the cause and an electron microscope.

For the uninitiated, MEMS stands for microelectromechanical systems, the tiny silicon machines that power some of the more miraculous functions of smartphones and other modern electronics. The most familiar MEMS device might be the accelerometer that gives your phone a sense of where it is in space; [Zach] has a deep dive into MEMS accelerometers that we covered a while back.

MEMS microphones seem a little bit easier to understand mechanically, since all they have to do is change vibrations in air into an electrical signal. The microphone that [Zach] tore down for this video is ridiculously small; the SMD device is only about 3 mm long, with the MEMS chip under the can a fraction of a millimeter on a side. After some overall views with the optical microscope, [Zach] opened the can and put the guts under his scanning electron microscope. The SEM shots are pretty amazing, revealing a dimpled silicon diaphragm over a second layer with holes etched right through it. The dimples on the diaphragm nest into the holes, forming an air-dielectric capacitor whose capacitance varies as sound waves vibrate the diaphragm.

The most visually interesting feature, though, might be the deep cavity lying behind the two upper surfaces. The cavity, which [Zach] says bears evidence of having been etched by the deep reactive ion etching method, has cool-looking corrugations in its walls. The enormity of the cavity relative to the thin layers covering it suggests it’s a resonating cavity for the sound waves.

Thanks to [Zach] for this in-depth look at a device that’s amazingly complex yet remarkably simple.

Continue reading “Up Close And Personal With A MEMS Microphone”