Teardown: Verizon AC791L Jetpack 4G Mobile Hotspot

The saying “time and tide wait for no man” is usually used as a verbal kick in the pants, a reminder that sometimes an opportunity must be seized quickly before it passes by. But it can also be interpreted as a warning about the perpetual march of time and how it impacts the world around us. In that case, we would do well to add cellular technology to the list of proverbial things that wait for no one. Do you need 5G? No. Do you want it? Probably not. But it’s here, so be a good consumer and dump all your 4G hardware in the name of technical progress.

This line of logic may explain how the Verizon-branded Netgear AC791L 4G “Jetpack” hotspot you see here, despite being in perfect working order, found itself in the trash. The onset of 5G must have been particularly quick for the previous owner, since they didn’t even bother to wipe their configuration information from the device. In the name of journalistic integrity I won’t divulge the previous owner’s identity; but I will say that their endearing choice of WPA2 key, iluvphysics, makes for a nice fit with our publication.

A quick check of eBay shows these devices, and ones like it, are in ample supply. At the time of this writing, there were more than 1,500 auctions matching the search term “Verizon jetpack”, with most of them going for between $20 and $50 USD. We like cheap and easily obtainable gadgets that can be hacked, but is there anything inside one of these hotspots that we can actually use? Let’s find out.

Continue reading “Teardown: Verizon AC791L Jetpack 4G Mobile Hotspot”

Art of 3D printer in the middle of printing a Hackaday Jolly Wrencher logo

Ask Hackaday: Are Extruders The Only Feasible Tools For Toolchanging?

Toolchanging in 3D printers is no longer something from the bleeding edge; it’s going mainstream. E3D has a high-quality kit for a toolchanger and motion system, our own Joshua Vasquez has shared details about the open-source toolchanging Jubilee design, and just recently Prusa3D formally announced the Prusa XL, which promises toolchanging with up to five different extruders.

A toolchange in progress

It’s safe to say toolchanging on 3D printers has stepped to the front, but what comes next? What kind of tools other than extruders make sense on a 3D printer?

First, let’s explain what makes separate extruders such fantastic tools. Being able to change extruders on-demand during a print enables things like true multi-material printing. Printing in more than one color or material will no longer be done by pushing different filaments through a single nozzle, which limits a print to materials that extrude under similar conditions and temperatures. Toolchanging means truly being able to print in multiple materials, even if they have different requirements, because each material has its own extruder. That’s a clear benefit, but what about tools other than extruders?

Continue reading “Ask Hackaday: Are Extruders The Only Feasible Tools For Toolchanging?”

Bed of nails

Design For Test Hack Chat

Join us on Wednesday, December 15 at noon Pacific for the Design for Test Hack Chat with Duncan Lowder!

If your project is at the breadboard phase, or even if you’ve moved to a PCB prototype, it’s pretty easy to know if it works. It either does what it’s supposed to do, or it doesn’t, and a few informal tests will probably tell you all you need to know. But once you scale up to production, the testing picture becomes quite different. How do you know you’re not shipping out a problem? And how do you make sure your testing process doesn’t become a bottleneck?

Answering questions like these can be difficult, which is why we’ve invited Duncan Lowder to come talk with us. He was a test lead at places like Glowforge and Sphero before founding FixturFab, where he’s working on ways to make hardware testing as easy as possible, no matter what scale you’re working at. We’ll learn all about how to make our designs easy to test right from the get-go and take the pain out of that bed of nails.

join-hack-chatOur Hack Chats are live community events in the Hackaday.io Hack Chat group messaging. This week we’ll be sitting down on Wednesday, December 15 at 12:00 PM Pacific time. If time zones have you tied up, we have a handy time zone converter.

Hackaday Links Column Banner

Hackaday Links: December 12, 2021

It looks as though the Mars Ingenuity flight team is starting to press the edge of the envelope a bit. The tiny rotorcraft, already 280-something sols into a mission that was only supposed to last for about 30 sols, is taking riskier flights than ever before, and things got particularly spicy during flight number 17 this past week. The flight was a simple up-over-and-down repositioning of the aircraft, but during the last few meters of descent at its landing zone, Ingenuity dipped behind a small hill and lost line-of-sight contact with Perseverance. Without the 900-MHz telemetry link to the rover, operators were initially unable to find out whether the chopper had stuck the landing, as it had on its previous 16 flights. Thankfully, Perseverance picked up a blip of data packets about 15 minutes after landing that indicated the helicopter’s battery was charging, which wouldn’t be possible if the craft were on its side. But that’s it as far as flight data, at least until they can do something about the LOS problem. Whether that involves another flight to pop up above the hill, or perhaps even repositioning the rover, remains to be decided.

Thinking up strong passwords that are memorable enough to type when they’re needed is never easy, and probably contributes more to the widespread use of “P@$$w0rD123” and the like than just about anything. But we got a tip on a method the musically inclined might find useful — generating passwords using music theory. It uses standard notation for chords to come up with a long, seemingly random set of characters, like “DMaj7|Fsus2|G#9”. It’s pretty brilliant, especially if you’ve got the musical skills to know what that would sound like when played — the rest of us can click here to find out. But since we can’t carry a tune in a bucket, we’ll just stick with the “correct horse battery staple” method.

Looks like you can only light so many roofs on fire before somebody starts to take an interest in what’s going on. At least that seems to be the case with Tesla, which is now under investigation by the US Security and Exchanges Commission for not keeping its shareholders and the public looped in on all those pesky solar array fires it was having back in the day. The investigation stems from a 2019 whistleblower complaint by engineer Steven Henkes, who claims he was fired by Tesla after pointing out that it really would be best not to light their customers’ buildings on fire with poorly installed solar arrays. It’s interesting that the current investigation has nothing to do with the engineering aspects of these fires, but rather the financial implications of disclosure. We discussed some of those problems before, which includes dodgy installation practices and seems to focus on improperly torqued MC4 connectors.

Staying with the Tesla theme, it looks like the Cybertruck is going to initially show up as a four-motor variant. The silly-looking vehicle is also supposed to sport four-wheel steering, which will apparently make it possible to drive diagonally. We’ve been behind the wheel for nearly four decades at this point and can count on no hands the number of times diagonal driving would have helped, and while there might be an edge case we haven’t bumped into yet, we suspect this is more about keeping up with the competition than truly driving innovation. It seems like if they were really serious about actually shipping a product, they’d work on the Cybertruck windshield wiper problem first.

And finally, as I’m sure you’re all aware by now, our longtime boss Mike Szczys is moving on to greener pastures. I have to say the news came as a bit of shock to me, since I’ve worked for Mike for over six years now. In that time, he has put me in the enviable position of having a boss I actually like, which has literally never happened to me before. I just thought I’d take the chance to say how much I appreciate him rolling the dice on me back in 2015 and giving me a chance to actually write for a living. Thanks, Mike, and best of luck with the new gig!

Hackaday Podcast 148: Pokemon Trades, Anniversary IPod Prototype, Stupid Satellite Tricks, And LED Strip Sensors

Hackaday editors Elliot Williams and Mike Szczys get caught up on the week that was. People go to great lengths for video game saves, but this Pokemon hack that does hardware-based trade conversion between the Game Boy’s Pokemon 2 and Pokemon 3 is something else. Why do we still use batteries when super capacitors exist? They’re different components, silly, and work best at different things. Turns out you can study the atmosphere by sending radio waves through it, and that’s exactly what the ESA is doing… around Mars! And will machined parts become as easy to custom order as PCBs have become? This week we take a closer look at prototyping as a service.

Take a look at the links below if you want to follow along, and as always, tell us what you think about this episode in the comments!

Direct download (55 MB)

Continue reading “Hackaday Podcast 148: Pokemon Trades, Anniversary IPod Prototype, Stupid Satellite Tricks, And LED Strip Sensors”

This Week In Security: Printing Shellz, Ms-officecmd, And AI Security

Researchers at f-secure have developed an impressive new attack, leveraging HP printers as an unexpected attack surface. Printing Shellz (PDF) is a one-click attack, where simply visiting a malicious webpage is enough to get a shell and reverse proxy installed to a printer on the same network. The demo below uses a cross-site printing (XSP) attack to send the malicious print job to the printer without any further interactions.
Continue reading “This Week In Security: Printing Shellz, Ms-officecmd, And AI Security”

Keynote Video: Dr. Keith Thorne Explains The Extreme Engineering Of The LIGO Hardware

The Laser Interferometer Gravitational-Wave Observatory (LIGO) is a huge installation measured in kilometers that is listening for wrinkles in space-time. Pulling this off is a true story of hardware and software hacking, and we were lucky to have Dr. Keith Thorne dive into those details with his newly published “Extreme Instruments for Extreme Astrophysics” keynote from the 2021 Hackaday Remoticon.

Gravity causes space-time to stretch — think back to the diagrams you’ve seen of a massive orb (a star or planet) sitting on a plane with grid lines drawn on it, the fabric of that plane being stretch downward from the mass of the orb. If you have two massive entities like black holes orbiting each other, they give off gravitational waves. When they collide and merge, they create a brief but very strong train of waves. Evidence of these events are what LIGO is looking for.

Laser Interferometer diagramRai Weiss had the idea to look for gravitational waves using laser interferometers in about 1967, but the available laser technology was too new to accomplish the feat. In an interferometer, a laser is shot through a beam splitter and one beam reflects out and back over a distance, and is then recombined with the other half using a photodetector to measure the intensity of light. As the distance in the long leg changes, the relative phase of the lasers shift, and the power detected will vary.

LIGO is not your desktop interferometer. It uses a 5 kW laser input. The 4 km legs of the interferometer bounce the light back and forth 1,000 times for an effective 4,000 km travel distance. These legs are kept under extreme vacuum and the mirrors are held exceptionally still. It’s worth it; the instrument can measure at a precision of 1/10,000 the diameter of a proton!

Continue reading “Keynote Video: Dr. Keith Thorne Explains The Extreme Engineering Of The LIGO Hardware”