Building A Giant Vacuum Tube Smart Lamp

Vacuum tubes are pretty, which is why they’re often showcased externally on exquisitely-expensive home Hi-Fi hardware. But if you just want to gaze at their beauty without making any noise, why not build this vacuum tube lamp from [Noel Törjék] instead?

[Noel] got into some creative reuse with this build, with the main body consisting of a bell jar and wooden bowls. The internal structure is then created from jar lids, wire, metal sheeting, steel rods, and galvanized wire mesh. Simple modelling techniques are used to assemble the internal parts of the “valve,” including the grid and the electrodes and so on. As for light, [Noel] employed a ZigBee LED driver that he could control over his smart home setup via a Philips Hue bridge.

The final result looks like an extra-large tube. Anyone who knows what it is will spot that it’s not a real one, but they’re also exactly the audience that will appreciate it for what it is. Everyone else will probably just think you’ve taken an interest in strange art-deco replica lighthouses. It’s not the first time we’ve seen replica valves around these parts, though, and we’re sure it won’t be the last!

North Korean Karaoke Machine Teardown

Karaoke is a very popular pastime in Seoul — there are venues where you can sing on a stage, sing in rooms with your friends, and even sing solo in coin-operated karaoke booths on the bullet train. Apparently it is also popular in North Korea as well — [Martyn Williams] of the North Korea Tech blog reported on an interesting teardown by web hacker [Will Scott]. It is the Tianchi v700 machine, a Chinese product tailored for North Korean users, obtained online back in 2020.

Unlike the karaoke machines encountered by this author in South Korea, the v700 form factor is a 19.5-inch Android tablet with touch-screen and all the necessary interfaces you’d expect: external video, speakers, and microphone, as well as WiFi and Ethernet for content upgrade and online payment systems. Not surprisingly, the connectivity aspects of the machine are not used in the North Korean model, but with a large catalog of pre-loaded music, it’s perfectly usable as a stand-alone device.

[Will] dug into the innards of the machine and discovered it was powered by an Allwinner ARM processor (seemingly the H6 V200, a quad-core ARM Cortex-A53). He also found it uses a swappable external disk to hold the songs, but all the files were encrypted. You can read more details in the blog post linked above, but eventually he was successful in decoding the disk and accessing the material.

The V700 consults both “/proc/cpuinfo” to learn the CPU serial number of the device it is on, and a binary file associated with the device file system structure as part of its method for determining its AES (Advanced Encryption Standard) key. It then ignores all of these device-specific items, and reverts back to a static key “87654321” stored in the binary.

All the songs on the disk were posted up on the Internet Archive. Check them out if you’re curious what North Korean karaoke songs sound and look like. One video that caught our attention was about CNC machines (see the video linked below the break). [Martyn] has been covering technology issues related to North Korea since 2011. In 2016, he learned after the fact that his website had been banned by the South Korean authorities. Believing this was in error, he appealed the ban and eventually prevailed in the courts. We wrote about some of [Will]’s research on consumer computing technology back in 2017 if you’re interested in learning more.

Continue reading “North Korean Karaoke Machine Teardown”

Go In All The Directions With Omniwheeled ESP32 Bot

The ability to change direction without turning is the specialty of omnidirectional wheels, which [maker.moekoe] used to their full potential on a pair of ESP32-controlled robots. Video after the break.

Thanks to the rollers on the wheels, the wheels could be arranged at 120° in relation to each other on the 3-wheeler and 90° 4-wheeler. [maker.moekoe] used ChatGPT and a simple python simulation to find and verify the motor control algorithm required for smooth omnidirectional driving.

A single custom PCB incorporates all the electronics, and doubles as the robot’s chassis, with the geared brushed motors bolted directly to it. An ESP32-S2 runs the show, and can also stream FPV video from the same OV2640 camera used on the popular ESP32-cam modules. The LiPo battery is held by a 3D-printed support plate screws to the bottom of the PCB. The robots can controlled by a simple web-app served by the ESP32, or a using the IMU on custom controller also built around an ESP32-S2 which uses the ESP-NOW wireless protocol.

Even though the robots’ software is still in the early stages, the movement looks extremely smooth and effortless. Plus, their all-in-one PCB chassis makes for an elegant and clean build

Continue reading “Go In All The Directions With Omniwheeled ESP32 Bot”

An Entire RISC-V Operating System In 2000 Lines

While Microsoft and Apple don’t release the source code for their operating systems, a good estimate is that it takes around 50 million lines of code to run these software behemoths. The Linux kernel alone holds around 30 million lines, with systemd containing over one million lines on its own, which doesn’t include estimates for the desktop environment or other parts of a standard installation. But millions of lines of code, or even hundreds of thousands, aren’t necessary for building a fully functioning operating system. This one sets up a complete OS in exactly 2000 lines of code.

Called egos-2000, short for Earth and Grass Operating System, the diminutive operating system is written for RISC-V computers and while it does contain most of the tools we would recognize in an OS, it was built specifically for computer science students by PhD candidate Yunhao Zhang. The slimmed-down operating system makes it possible for students to easily read and understand every feature of an operating system without it becoming too overwhelming, and can be easily used and modified to experiment with. The name itself comes from its design principles, where parts of the operating system that interact with hardware directly are part of the “Earth” layer and parts that don’t depend on hardware being placed in the “Grass” layer, with applications taking up a third layer.

The OS is available on this GitHub page under an MIT license and works on real RISC-V hardware as well as within various emulators. Building a complete operating system in so few lines of code is an impressive feat, and making it comprehensive enough to teach students with goes well beyond that accomplishment as well. Often when concepts in computer science are reduced to their bare minimum components, we end up with completely illegible (but interesting) experiments like this programming language instead.

LTE Sniffer Ferrets Out Cellular Communications

LTE networks have taken over from older technologies like GSM in much of the world. Outfitted with the right hardware, like a software defined radio, and the right software, it’s theoretically possible to sniff some of this data for yourself. The LTESniffer project was built to do just this. 

LTESniffer is able to sniff downlink traffic from base stations using a USRP B210 SDR, outfitted with two antennas. If you want to sniff uplink traffic, though, you’ll need to upgrade to an X310 with two daughterboards fitted. This is due to the timing vagaries of LTE communication. Other solutions can work however, particularly if you just care about downlink traffic.

If you’ve got that hardware though, you’re ready to go. The software will help pull out LTE signals from the air, though it bears noting that it’s only designed to work with unencrypted traffic. It won’t help you capture the encrypted communications of network users, though it can show you various information like IMSI numbers of devices on the network. Local regulations may prevent you legally even doing this, and if so, the project readme recommends setting up your own LTE network to experiment with instead.

Cellular sniffing has always been somewhat obscure and arcane, given the difficulty and encryption involved, to say nothing of the legal implications. Regardless, some hackers will always pursue a greater knowledge of the technology around them. If you’ve been doing just that, let us know what you’re working on via the tipsline.

Toothbrush Speed Controller Secrets Revealed

Typically, when we want to build something with a DC motor, we might grab a bunch of AAs, or a single lithium cell at the very least. Electric toothbrushes often run on more humble power sources, like a single NiMH battery. They’re designed to get useful motion out of just 1.2V, and [Marian Hryntsiv] has taken a look at what makes them tick.

The article focuses on an electric toothbrush built around the Low Voltage GreenPAK™ SLG47513 chip. It’s designed to work at voltages from just 1 to 1.65 V. To make the most of the limited power available, the toothbrush stays in sleep mode most of the time when it’s not working in oral health.

[Marian] steps through the various parts of the circuit, and also explains the unique functionality baked into the brush. Of particular interest are the timer routines that guide the user through brushing each section of the mouth in turn, before a notification that tells them that 2 minutes of brushing time has elapsed. There’s also a useful explanation of the inductive charging method used.

Electric toothbrushes may be mundane home items today, but they’re an example of a product that has largely already been optimized to the nth degree. Until laser-based plaque removal or enamel regeneration technology gets off the ground, this is as good as it gets. We can dream, though!

 

Big Tactile Button Is Silly But Cool

Every hacker is familiar with those teeny little tactile buttons that are so enjoyable to click over and over again. [ROBO HUB] has built a giant version as a tribute, and it works just like the real thing!

The giant button has been scaled up 20 times compared to the original. For simplicity’s sake, [ROBO HUB] designed this replica to use materials readily available around the home. Thanks to its cardboard construction, it’s easy to replicate with a minimum of tools. One need merely cut out the various sections before assembling them together with hot glue, with popsicle sticks serving as the legs. A juice bottle is used as the primary button itself, with aluminium foil serving as the contacts and rubber bands standing in for the spring.

It’s not the most useful button, given that it it’s quite fragile and has a weak spring return. However, it would be a great teaching tool to show students exactly what’s going on inside an actual button. As a bonus, it looks like it would be remarkably fun to pound on to activate some kind of massive air horn. Just an idea.

Continue reading “Big Tactile Button Is Silly But Cool”