Gearing Up With The 2023 Hackaday Prize

You know how it goes. You’re working on a project, and you need to do some ultra-precise probing, so you end up making a custom PCB probing octopus along the way. Or you find that you spend more time making the jig to hold down a part for machining than you do machining it. Hackers are not merely a tool-using species, we’re a tool-making species – it’s in our nature to want to build the tools that make it easier to get the job done.

The Gearing Up round of the Hackaday Prize celebrates the tool makers. If you’ve got a project that maybe isn’t an end in itself, but rather one of those utility project that can make all the difference, we want to see it here. Maybe it’s obscure measurement gear, maybe it’s a test rig or a bolt sorter, maybe you’ve built your own reflow hot plate. This is the challenge round for you!

The Gearing Up round runs from yesterday, July 4th, until August 8th. As with all of the 2023 Hackaday Prize rounds, ten finalists will receive $500 and get entered for the big prizes to be announced in November. Continue reading “Gearing Up With The 2023 Hackaday Prize”

A man in a dark shirt stands at a podium in front of a projector screen with the text "50% OF US CAR TRIPS" in white above yellow text saying "1 HUMAN < 3 MILES". The screen is flanked by decor saying "Supercon" in white on a black background.

Supercon 2022: Bradley Gawthrop Wants You To Join The PEV Revolution

During the 20th Century, much of the western world decided that motor vehicles were the only desirable form of transportation. We built our cities to accommodate cars through parking, stop lights, and any number of other infrastructure investments so that you could go get milk and bread in style. In the US, 50% of automobile trips are less than three miles and have only one occupant. [Bradley Gawthrop] asked if there might be a more efficient way to do all this? Enter the Personal Electric Vehicle (PEV).

What Are PEVs?

PEVs are a nascent part of the transportation mix that fall under the wider umbrella of “micromobility,” including scooters, bikes, skateboards, and the like. The key differentiator here is that they are at least partially electrically-driven. [Gawthrop] walks us through several of the different types during his Supercon 2022 talk, but since they are all small, electric powered devices for transporting one or two people, they can trace their lineage back to the infamous Segway Human Transporter.

Using an electric motor or two connected to a controller and batteries, the overall system complexity for any of these devices is quite low and ripe for the hacking. Given the right tools and safety precautions, anyone should be able to crack a PEV open and repair or tinker with it. As with many things in life, the real story is more complicated.

As [Gawthrop] notes, many a hacker has said, “I wish I’d been able to be involved in X before…” where X equals some technology like home automation and it’s before it got creepy or dystopian in some manner. He exhorts us that the time to be in on the ground floor with PEVs is now. Continue reading “Supercon 2022: Bradley Gawthrop Wants You To Join The PEV Revolution”

3D Printing Food Hack Chat

Join us on Wednesday, July 5 at noon Pacific for the 3D Printing Food Hack Chat with Ellie Weinstein!

In the right hands, food goes beyond mere sustenance and becomes a work of art. We’ve all seen examples — the carefully crafted blends of flavors, the quality ingredients expertly cooked, the artful platings that make a dramatic presentation at the table. But where the artistry really seems to take off is with desserts, which pastry chefs and confectioners can take to the next level with edible sculptures of chocolate and other sweets that can tower dramatically over the table.

join-hack-chatThat’s all well and good for the haute cuisine set, but what about the rest of us? We can’t all have the talent and drive needed to produce edible art, so perhaps we can leverage technology to help us out. That’s just one of the rationales behind food 3D printing, which is what we’ll be exploring with Ellie Weinstein. She’s the CEO of Cocoa Press, where they’re bringing chocolate 3D printing to the mainstream. It’s not as easy as you might think — there are plenty of nuances and engineering challenges when you’re trying to print chocolate or any other kind of food. Make sure you stop by and check it out; it’s sure to be a treat.

Our Hack Chats are live community events in the Hackaday.io Hack Chat group messaging. This week we’ll be sitting down on Wednesday, July 5 at 12:00 PM Pacific time. If time zones have you tied up, we have a handy time zone converter.

Hackaday Links Column Banner

Hackaday Links: July 2, 2023

Members of Pixelbar woke up to shocking news on Wednesday morning this week as they learned that a fire had destroyed the building housing their Rotterdam hackerspace. Pictures of the fire are pretty dramatic and show the entire building ablaze. We’re not familiar with Pixelbar specifically, but most hackerspaces seem to share space with other businesses in repurposed warehouses and other industrial buildings, and it looks like that was the case here. Local coverage doesn’t indicate that a cause has been determined, but they do say that “large batches of wood” were stored in or near the structure, which likely contributed to the dramatic display. There don’t seem to be reports of injuries to civilians or first responders, so that’s a blessing, but Pixelbar seems to have been completely destroyed. If you’re in a position to help, check out their GoFundMe page. As our own Jenny List, who currently lives in The Netherlands, points out, spaces suitable for housing a hackerspace are hard to come by in a city like Rotterdam, which is the busiest port in Europe. That means Pixelbar members will be competing for space with businesses that have far deeper pockets, so anything you can donate will likely go a long way toward rebuilding.

Continue reading “Hackaday Links: July 2, 2023”

Shall We Hack A Game?

A fantastic summertime game has consumed many of the kids in my neighborhood. It’s basically a treasure hunt, but the treasures are all shoebox-sized NFC readers that are “easily” findable on a map. Players all have a smart card and run around from box to box, collecting points that depend on how far apart the boxes are from each other. Walk, skate, or bike 1 km between check-ins, and ten points show up on the e-paper screen.

It’s been going on for a few weeks now, and it’s not uncommon to see a line of two or three kids at any given box, all with the purple lanyards and smart cards around their necks. So far, the highest-rated plausible single efforts have 450 km (280 miles) under their belt. My son’s grade-school average is 45 km (28 miles) over three weeks. The goal is getting kids out on the early summer afternoons, and that seems to be working!

Of course I had to reverse engineer the infrastructure, so here’s what I started with. Each box knows your point standing as soon as you tap the card, with a small delay. Scores appear online about every four hours. And the boxes are all ~1 km from each other or less.

My first thought was some kind of mesh network – that would be by far the coolest solution. Each box could simply report your card number to a central database, and the rest is a simple matter of software. LoRa radios rounded out my fantasy design.

But the length of time between getting the points and their appearance online suggests otherwise. And, a little bit of playing around with my cellphone’s NFC reader gives up the juice – they are MiFare Classic cards with data storage. So I got my own card, ran around town, and diffed the results. I haven’t cracked the location/time-stamping yet, but I know exactly where my total points are stored.

I’m going to keep observing until I’ve got it figured out completely, but I’m so tempted to tweak the points and see what happens. Are some of the digits in what I think are a timestamp in reality a checksum? Will I get disqualified? Or worse, what if I make a mistake and get myself publicly into first place? OK, better to sit this one out on the sidelines – I really don’t want to be the jerk who crashes a fantastic kid’s game. Sometimes you’ve gotta know when not to hack.

Hackaday Podcast 225: Leafy Meats, Wind To Heat, And A Machine That’s Neat

This week, Editor-in-Chief Elliot Williams and Kristina Panos don’t have a whole lot in the way of news, but we do know this: the Green Hacks Challenge of the 2023 Hackaday Prize ends precisely at 7AM PDT on July 4th. Show us what you can do in the realm of hacking for the planet, be it solar-based, wind-powered, recycled-trash-powered — you get the idea.

Kristina is now completely down for the count on What’s That Sound, although this week, she was sort of in the neighborhood. But no matter, because we know several of you will nail it. Then it’s on to the hacks, where we have quite a bit to say this week when it comes to cars.

From there we take a look at a really fun gumball run, ponder the uses of leafy meats, and fawn over an Amiga-inspired build. Finally we talk PCB earring art, hacking the IKEA Kvart, and discuss the potential uses for wind-to-heat power.

Check out the links below if you want to follow along, and as always, tell us what you think about this episode in  the comments!

Download and savor at your leisure.

Continue reading “Hackaday Podcast 225: Leafy Meats, Wind To Heat, And A Machine That’s Neat”

This Week In Security:Camaro Dragon, RowPress, And RepoJacking

Malicious flash drives have come a long ways since the old days of autorun infections. It’s not an accident that Microsoft has tightened down the attack surface available of removable media. So how exactly did a malicious flash drive lead to the compromise of a European hospital? Some sophisticated firmware on the drive? A mysterious zero day? Nope, just hidden files, and an executable using the drive name and icon. Some attacker discovered that a user trying to access a flash drive, only to be presented with what looks like the same flash drive icon, will naturally try to access it again, running an .exe in the process.

That executable runs a signed Symantec binary, included on the drive, and sideloads an OCX that hijacks the process. From there, the computer is infected, as well as any other flash drives in the machine. Part of the obfuscation technique is an odd chain of executables, executed recursively for a hundred copies. Naturally once the infection has rooted itself in a given machine, it takes commands from a C&C server, and sends certain files out to its waiting overlords. Checkpoint Research has attributed this campaign to Camaro Dragon, a name straight from the 80s that refers to a Chinese actor with an emphasis on espionage. Continue reading “This Week In Security:Camaro Dragon, RowPress, And RepoJacking”