Raspberry Pi Hack Chat With Eben Upton

Join us on Wednesday, January 15 at noon Pacific for the Raspberry Pi Hack Chat with Eben Upton!

join-hack-chatThe Hack Chat has been on an extended hiatus, but we’re back for 2025 and coming strong out of the gate! We’ve been trying to get Raspberry Pi co-founder and CEO Eben Upton on the chat for a while, but there was that whole thing of taking the company public that probably distracted him a wee bit. That’s fine though, because we know he loves getting in the trenches with the hacker community and talking about the things we all love to talk about. It’s not often that you get a chance for a one-on-one like this, so make sure you join us with all your Pi-related questions.

Our Hack Chats are live community events in the Hackaday.io Hack Chat group messaging. This week we’ll be sitting down on Wednesday, January 15 at 12:00 PM Pacific time. If time zones have you tied up, we have a handy time zone converter.

[Image credit: Sniper Zeta, CC BY-SA 4.0]

Illustrated Kristina with an IBM Model M keyboard floating between her hands.

Keebin’ With Kristina: The One With The Holey And Wholly Expensive Keyboard

An Ultimate Hacking Keyboard (UHK) with DIY rainbow keycaps.
Image by [jwr] via reddit
The Ultimate Hacking Keyboard (UHK) line is, as the name suggests, a great choice for a lot of people. They’re each a toe-dip into the ergonomic waters with their split-ability and those beginner thumb clusters.

However, [jwr] was not completely satisfied and decided to make a custom set of keycaps. The idea was to create ‘caps without the “annoyingly abrasive texture of PBT”, that are larger than average for larger-than-average fingers. Finally, [jwr] wanted the Function row to tower over the number row a little, so these have a taller profile.

So, what are they made of? The look kind rubbery, don’t they? They are cast of pigmented polyurethane resin. First, [jwr] designed five molds in Fusion360, one for each row. Then it was time to machine master molds via CNC in foam tooling board. These were filled with silicone along with 3D-printed inserts, which produced silicone molds for casting keycaps four at a time in resin.

Continue reading “Keebin’ With Kristina: The One With The Holey And Wholly Expensive Keyboard”

Hackaday Links Column Banner

Hackaday Links: January 12, 2025

The big news story of the week of course has been the wildfires in California, which as of Saturday have burned over 30,000 acres, destroyed 12,000 structures, caused 150,000 people to evacuate, and killed eleven people. Actually, calling them wildfires underplays the situation a bit because there are places where they’ve clearly become firestorms, burning intensely enough to create their own winds, consuming everything in their path in a horrific positive feedback loop. We’ve even seen fire tornados caught on video. We’ve got quite a few connections to the affected area, both personally and professionally, not least of which are all our Supplyframe colleagues in Pasadena, who are under immediate threat from the Eaton fire. We don’t know many details yet, but we’ve heard that some have lost homes. We’ve also got friends at the Jet Propulsion Labs, which closed a few days ago to all but emergency personnel. The fire doesn’t seem to have made it down the mountain yet, but it’s very close as of Saturday noon.

Continue reading “Hackaday Links: January 12, 2025”

Retrotechtacular: The 1951 Telephone Selector

Telephone systems predate the use of cheap computers and electronic switches. Yesterday’s phone system used lots of stepping relays in a box known as a “selector.” If you worked for the phone company around 1951, you might have seen the Bell System training film shown below that covers 197 selectors.

The relays are not all the normal ones we think of today. There are slow release relays and vertical shafts that are held by a “dog.” The shaft moves to match the customer’s rotary dial input.

Continue reading “Retrotechtacular: The 1951 Telephone Selector”

In Praise Of Simple Projects

Hackaday was at Chaos Communication Congress last week, and it’s one of those big hacker events that leaves you with so much to think about that I’m still processing it. Just for scope, the 38th CCC is a hacker event with about 15,000 attendees from all around Europe, and many from even further. If I were to characterize the crowd on a hardware-software affinity scale, I would say that it skews heavily toward the software side of the hacker spectrum.

What never ceases to amaze me is that there are a couple of zones that are centered on simple beginner soldering and other PCB art projects that are completely full 20 hours of the day. I always makes me wonder how it is possible to have this many hackers who haven’t picked up a soldering iron. Where do all these first-timers come from? I think I’m in a Hackaday bubble where not only does everyone solder at least three times a day, some of us do it with home-made reflow ovens or expensive microscopes.

But what this also means is that there’s tremendous reach for interesting, inviting, and otherwise cool beginner hardware projects. Hands-on learning is incredibly addictive, and the audience for beginner projects is probably ten times larger than that for intermediate or advanced builds. Having watched my own son putting together one of these kits, I understand the impact they can have personally, but it’s worth noting that the guy next to him was certainly in his mid-30s, and the girl across the way was even a few years younger than my son.

So let’s see some cool beginner projects! We’d love to feature more projects that could lure future hackers to the solder-smoky side.

Hackaday Podcast Episode 303: The Cheap Yellow Display, Self-Driving Under $1000, And Don’t Remix That Benchy

As the holiday party season fades away into memory and we get into the swing of the new year, Elliot Williams is joined on the Hackaday Podcast by Jenny List for a roundup of what’s cool in the world of Hackaday. In the news this week, who read the small print and noticed that Benchy has a non-commercial licence? As the takedown notices for Benchy derivatives fly around, we muse about the different interpretations of open source, and remind listeners to pay attention when they choose how to release their work.

The week gave us enough hacks to get our teeth into, with Elliot descending into the rabbit hole of switch debouncing, and Jenny waxing lyrical over a crystal oscillator. Adding self-driving capability to a 30-year-old Volvo caught our attention too, as did the intriguing Cheap Yellow Display, an ESP32 module that has (almost) everything. Meanwhile in the quick hacks, a chess engine written for a processor architecture implemented entirely in regular expressions impressed us a lot, as did the feat of sending TOSLINK across London over commercial fibre networks. Enjoy the episode, and see you again next week!

Continue reading “Hackaday Podcast Episode 303: The Cheap Yellow Display, Self-Driving Under $1000, And Don’t Remix That Benchy”

This Week In Security: Backdoored Backdoors, Leaking Cameras, And The Safety Label

The mad lads at watchTowr are back with their unique blend of zany humor and impressive security research. And this time, it’s the curious case of backdoors within popular backdoors, and the list of unclaimed domains that malicious software would just love to contact.

OK, that needs some explanation. We’re mainly talking about web shells here. Those are the bits of code that get uploaded to a web server, that provide remote access to the computer. The typical example is a web application that allows unrestricted uploads. If an attacker can upload a PHP file to a folder where .php files are used to serve web pages, accessing that endpoint runs the arbitrary PHP code. Upload a web shell, and accessing that endpoint gives a command line interface into the machine.

The quirk here is that most attackers don’t write their own tools. And often times those tools have special, undocumented features, like loading a zero-size image from a .ru domain. The webshell developer couldn’t be bothered to actually do the legwork of breaking into servers, so instead added this little dial-home feature, to report on where to find all those newly backdoored machines. Yes, many of the popular backdoors are themselves backdoored.

This brings us to what watchTowr researchers discovered — many of those backdoor domains were either never registered, or the registration has been allowed to expire. So they did what any team of researchers would do: Buy up all the available backdoor domains, set up a logging server, and just see what happens. And what happened was thousands of compromised machines checking in at these old domains. Among the 4000+ unique systems, there were a total of 4 .gov. domains from governments in Bangladesh, Nigeria, and China. It’s an interesting romp through old backdoors, and a good look at the state of still-compromised machines.

Continue reading “This Week In Security: Backdoored Backdoors, Leaking Cameras, And The Safety Label”