Art of 3D printer in the middle of printing a Hackaday Jolly Wrencher logo

What To Expect From 3D Scanning, And How To Work With It

3D scanning and 3D printing may sound like a natural match for one another, but they don’t always play together as easily and nicely as one would hope. I’ll explain what one can expect by highlighting three use cases the average hacker encounters, and how well they do (or don’t) work. With this, you’ll have a better idea of how 3D scanning can meet your part design and 3D printing needs.

How Well Some Things (Don’t) Work

Most 3D printing enthusiasts sooner or later become interested in whether 3D scanning can make their lives and projects easier. Here are a three different intersections of 3D scanning, 3D printing, and CAD along with a few words on how well each can be expected to work.

Goal Examples and Details Does it work?
Use scans to make copies of an object.
  • 3D scan something, then 3D print copies.
  • Objects might be functional things like fixtures or appliance parts, or artistic objects like sculptures.
Mostly yes, but depends on the object
Make a CAD model from a source object.
  • The goal is a 1:1 model, for part engineering purposes.
  • Use 3D scanning instead of creating the object in CAD.
Not Really
Digitize inconvenient or troublesome shapes.
  • Obtain an accurate model of complex shapes that can’t easily be measured or modeled any other way.
  • Examples: dashboards, sculptures, large objects, objects that are attached to something else or can’t be easily moved, body parts like heads or faces, and objects with many curves.
  • Useful to make sure a 3D printed object will fit into or on something else.
  • Creating a CAD model of a part for engineering purposes is not the goal.
Yes, but it depends

In all of these cases, one wants a 3D model of an object, and that’s exactly what 3D scanning creates, so what’s the problem? The problem is that not all 3D models are alike and useful for the same things.

Continue reading “What To Expect From 3D Scanning, And How To Work With It”

AVR Reverse Engineering Hack Chat

Join us on Wednesday, April 21 at noon Pacific for the AVR Reverse Engineering Hack Chat with Uri Shaked!

We’ve all become familiar with the Arduino ecosystem by now, to the point where it’s almost trivially easy to whip up a quick project that implements almost every aspect of its functionality strictly in code. It’s incredibly useful, but we tend to lose sight of the fact that our Arduino sketches represent a virtual world where the IDE and a vast selection of libraries abstract away a lot of the complexity of what’s going on inside the AVR microcontroller.

While it’s certainly handy to have an environment that lets you stand up a system in a matter of minutes, it’s hardly the end of the story. There’s a lot to be gained by tapping into the power of assembly programming on the AVR, and learning how to read the datasheet and really run the thing. That was the focus of Uri Shaked’s recent well-received HackadayU course on AVR internals, and it’ll form the basis of this Hack Chat. Then again, since Uri is also leading a Raspberry Pi Pico and RP2040 course on HackadayU in a couple of weeks, we may end up talking about that too. Or we may end up chatting about something else entirely! It’s really hard to where this Hack Chat will go, given Uri’s breadth of interests and expertise, but we’re pretty sure of one thing: it won’t be boring. Make sure you log in and join the chat — where it goes is largely up to you.

join-hack-chatOur Hack Chats are live community events in the Hackaday.io Hack Chat group messaging. This week we’ll be sitting down on Wednesday, April 21 at 12:00 PM Pacific time. If time zones have you tied up, we have a handy time zone converter.

Click that speech bubble to the right, and you’ll be taken directly to the Hack Chat group on Hackaday.io. You don’t have to wait until Wednesday; join whenever you want and you can see what the community is talking about.
Continue reading “AVR Reverse Engineering Hack Chat”

Hackaday Links Column Banner

Hackaday Links: April 18, 2021

More bad news from Mars this week, and this time not just from Perseverance. Last week the eagerly anticipated first flight of the helicopter Ingenuity was delayed for a couple of days after failing a full-speed spin-up test of its rotors. That appears to have been a bigger deal than initially thought, as it required a significant rewrite of the helicopter’s software. That meant testing, of course, and subsequent upload to the UAV, which at 174 million miles away takes a bit of doing. The good news is that they were able to complete the full-speed rotor test without the full program upload, so we’re one step closer to flight, which may take place as early as Monday morning.

Meanwhile, over at Elysium Planitia, the Mars InSight lander has troubles of its own. The geophysical laboratory, which has been trying to explore the inner structure of Mars since landing in 2018, entered an “emergency hibernation” state this week because of a lack of sufficient power generation. Unlike the radioisotope-powered Perseverance rover, InSight relies on a pair of solar panels for its electricity, and those panels are being obscured by Martian dust. The panels normally get blown clean by Martian winds, but things have been calm lately and the dust has really built up. If this seems like deja vu all over again, it’s probably because a planet-wide dust storm is what killed the plucky Opportunity rover back in 2018. Here’s hoping the wind picks up a little and InSight can get back to work.

Funny what crops up in one’s newsfeed, especially when one is responsible for putting out content that populates others’ newsfeeds. We recently took a look at the dangers of “zinc fever”, a flu-like illness that can crop up after inhaling gasses produced by molten zinc. That resulted in stumbling across an article from last year about mild steel welding fumes being classified as a human carcinogen. This comes from the Health and Safety Executive, a UK government agency concerned with workplace health issues. The release is an interesting read, and it suggests that mild steel fumes can cause not only lung cancer but kidney cancer. The announcement is mainly concerned with British workplaces, of course, but there are some interesting tidbits in there, such as the fact that welding fumes make dust particles so small that they can reach down into the very lowest reaches of lungs, the alveoli where gas exchange occurs. It’s enough to make one invest in PAPR or some kind of fume extractor.

For those of a certain vintage, our first computer was probably something that bore little resemblance to a PC or laptop. It was likely a single-board affair or something like a C64, and acquiring the essential bit of hardware usually left little in the budget for a proper monitor. Little 12″ B&W TVs were a dime a dozen, though, and easily — if grainily — enlisted into service as a monitor by way of an RF modulator. To recreate a little of that magic with modern hardware, Hackaday contributor Adam Zeloof came up with the PiMod Zero, an RF-modulator hat for the Raspberry Pi Zero that turns the component video into an NTSC analog signal. He’s open-sourced the design files, or there’s a CrowdSupply campaign for those who prefer to buy.

And finally, if you somehow traveled back in time to the 1940s with a laptop, how long would it have taken you to crack the Enigma code? Longer than you think, at least according to Dr. Mike Pound over at Computerphile, who released a fascinating video on how Enigma worked and what it took for Turing and the gang at Bletchley to crack the code. We knew some of the details of Enigma’s workings before seeing this video, but Mike’s explanation was really good. And, his explanation of the shortcut method he used to decode an Enigma message made the whole process clearer to us than it’s ever been. Interesting stuff.

Continue reading “Hackaday Links: April 18, 2021”

Junkbox Confidential

Thomas Edison famously quipped “To invent, you need a good imagination and a pile of junk.” Amen, brother. My personal junk pile (ahem, collection of pre-owned electromechanical curiosities) is certainly a source of spare parts, but also a source of surprise and wonder. Sometimes the junk itself spurs the imagination, but sometimes junk is just junk.

There are pieces of used gear that I bought for some particular plan, maybe a decade ago?, and totally forgot. While it’s fun to rediscover them — I bought six used super-soaker pump assemblies, and summer is just around the corner — the sad truth is often that the forgotten pieces were forgotten for a reason. Whatever kooky idea I had at the time has faded, and the parts are all that’s left.

But among these miserable creatures, there are some absolute gems. Parts that continually call out to be used. Bits that would fire even Thomas Edison’s imagination. Unforgetable junk.
Mostly, it’s their physicality that calls out to me. I have a stack of old 5″ hard drive platters, gutted, and converted into essentially a rotary encoder. For years, I used it as a USB scroll wheel on my desk, but most recently it has made reappearances in other goofy projects — a music box for my son that played notes in a row depending on how fast you spun it, and most recently a jog wheel for a one-meter linear motion project that hasn’t really found its full expression yet, but might become a camera slider. Anyway, when I needed a nice physical rotary encoder knob, the hard drive was just sitting there waiting to be used. Continue reading “Junkbox Confidential”

Hackaday Podcast 114: Eye Is Watching You, Alien Art, CNC Chainsaw, And The Galvie Flu

Hackaday editors Elliot Williams and Mike Szczys marvel at the hacks that surfaced over the past week. An eye-popping webcam hack comes in the form of an animatronic that gives that camera above your screen an eyeball to look around, an eyelid to blink with, and the skin, eyelashes, and eyebrow to complete the illusion (and make us shudder at the same time).

Dan did a deep dive on Zinc Flu — something to avoid when welding parts that contain zinc, like galvanized metals. A robot arm was given a chainsaw, leading to many hijinks; among them the headache of path planning such a machine. And we got to hear a really awesome story about resurrecting a computer game lost to obscurity, by using one of the main tools of the copyright office.

Take a look at the links below if you want to follow along, and as always, tell us what you think about this episode in the comments!

Direct download (~60 MB)

Places to follow Hackaday podcasts:

Continue reading “Hackaday Podcast 114: Eye Is Watching You, Alien Art, CNC Chainsaw, And The Galvie Flu”

This Week In Security: Pwn2own, Zoom Zero Day, Clubhouse Data, And An FBI Hacking Spree

Our first story this week comes courtesy of the Pwn2own contest. For anyone not familiar with it, this event is held twice a year, and features live demonstrations of exploits against up-to-date software. The one exception to this is when a researcher does a coordinated release with the vendor, and the update containing the fix drops just before the event. This time, the event was held virtually, and the attempts are all available on Youtube. There were 23 attacks attempted, and only two were outright failures. There were 5 partial successes and 16 full successes.

One of the interesting demonstrations was a zero-click RCE against Zoom. This was a trio of vulnerabilities chained into a single attack. The only caveat is that the attack must come from an accepted contact. Pwn2Own gives each exploit attempt twenty minutes total, and up to three attempts, each of which can last up to five minutes. Most complex exploits have an element of randomness, and exploits known to work sometimes don’t work every time. The Zoom demonstration didn’t work the first time, and the demonstration team took enough time to reset, they only had enough time for one more try.

BleedingTooth

We first covered BleedingTooth almost exactly six months ago. The details were sparse then, but enough time has gone by to get the full report. BleedingTooth is actually a trio of vulnerabilities, discovered by [Andy Nguyen]. The first is BadVibes, CVE-2020-24490. It’s a lack of a length check in the handling of incoming Bluetooth advertisement packets. This leads to a buffer overflow. The catch here is that the vulnerability is only possible over Bluetooth 5. Continue reading “This Week In Security: Pwn2own, Zoom Zero Day, Clubhouse Data, And An FBI Hacking Spree”

The $50 Ham: A Simple WSPR Beacon

I was having a chat recently with someone, and it surprised me that she had an amateur radio license. I suppose it shouldn’t have come as much of a surprise; after all, getting a ham radio license is a pretty common rite of passage in the life of a hardware hacker. I guess it surprised me because she’d never mentioned it in our past conversations, and as we talked about it, I learned why. “I got my license because I thought ham radio was about building radios, ” she said. “But it’s not.”

In a lot of ways, she is right about the state of ham radio. There was a time that building one’s own gear was as central to the hobby as getting on the air, and perhaps more so. Now, though, with radios as cheap as $30 and the whiz-bang gear that can make reaching out across the planet trivially easy, building your own radios has slipped down a few notches. But homebrewing is far from a dead art, and as we’ll see in this installment of “The $50 Ham”, a WSPR beacon for the HF bands is actually a fun and simple — and cheap — way for the homebrew-curious to get a taste of what it’s like to build your own transmitter.

Continue reading “The $50 Ham: A Simple WSPR Beacon”