How To Modify Your Car Stereo For Bluetooth Or Aux-In

If you’re an automotive enthusiast of taste, you can’t stand the idea of fitting a janky aftermarket stereo into your nice, clean ride. Flashy, modern head units can spoil the look of a car’s interior, particularly if the car is a retro, classic, or vintage ride.

Thus, we’re going to look at how to modify your existing stock car stereo to accept an auxiliary cable input or even a Bluetooth module. This way, you can pump in the latest tunes from your smartphone without a fuss, while still maintaining an all-original look on the dash.

Fundamentals

A simple Bluetooth module designed for wiring into car audio systems. There are two wires for 12 V power from the vehicle, and the audio signal is sent out over the RCA plugs. The RCA plugs can be cut off and the module hard wired inside your stereo if you have room. Cutting off the plastic case can help too.

Depending on your choice of audio player, you may prefer a 3.5 mm aux jack, or you might want to go with Bluetooth audio if your smartphone no longer has a headphone port. Whichever way you go, the process of modifying the stereo is largely the same. To achieve your goal, you need to find a way of injecting the audio signal into the head unit’s amplifier stage, while making sure no other audio sources are getting sent there as well.

Whether that audio source is a 3.5 mm jack or a Bluetooth module doesn’t matter. The only difference is, in the latter case, you’ll want to buy a Bluetooth module and hardwire it in to the auxiliary input you create, while also splicing the module into the stereo’s power supply. In the case of a simple headphone jack input, you simply need to wire up an aux cord or 3.5 mm jack somewhere you can get to it, and call it done.

This guide won’t cover every stereo under the sun, of course. Edge cases exist and depending on the minute specifics of how your original car radio works, these exact methods may or may not work for you. However, this guide is intended to get you thinking conceptually about how such mods are done, so that you can investigate the hardware in front of you and make your own decisions about how to integrate an external audio input that suits your usage case. Continue reading “How To Modify Your Car Stereo For Bluetooth Or Aux-In”

Illustrated Kristina with an IBM Model M keyboard floating between her hands.

Keebin’ With Kristina: The One With The Mad Model M

Hand-Wired Hell Help

Do you dream of building a curvy ergonomic keyboard or macro pad, even though the idea of hand wiring gives you nightmares? You can make it a bit less troublesome with a tiny PCB for each key switch, as long as you have a reflow oven or you’re okay with a bit of surface-mount soldering for the diode, LED, and capacitor.

As a bonus, these should make switches a bit more secure against movement, and you could probably even get away with using hot swap sockets if you wanted. [Pedro Barbero] has the Gerber files available if you want to get some fabbed. We sort of wish we had used these on our dactyl, though the case is awfully tight and they might not fit.

Ultra-Mechanical Keyboard Angles with Lifter Motors

Lots of people prefer an angled keyboard, but plenty of new keebs, especially mechanical ones, just don’t offer that at all. Well, the wait for an adjustable 75% is over, at least. Okay, that’s not exactly true. The wait for a group buy to begin for an adjustable 75% is almost over.

Nestled in between the arrow cluster and the menu key of the Besides Studios M-One is a rocker switch that angles the keyboard from 3° to 7° slowly but surely, like an adjustable bed. This is going to be a bare-bones group buy, meaning that it won’t come with any switches, stabs, or keycaps, but that doesn’t mean it will be cheap at $299. [BadSeed Tech] got an early prototype and built it out with Gateron Ink Black V2 switches in the video below in order to give it a proper spin.

Continue reading “Keebin’ With Kristina: The One With The Mad Model M”

Linux Fu: Superpowers For Mere Mortals

You can hardly mention the sudo command without recalling the hilarious XKCD strip about making sandwiches. It does seem like sudo is the magic power to make a Linux system do what you want. The only problem is that those superpowers are not something to be taken lightly.

CC-BY-NC-2.5 by [XKCD]
If you are surfing the web, for example, you really don’t want to be root, because if someone naughty takes over your computer they could do a lot more harm with your root password. But still, there are times when you want to run certain commands that are normally root-only and don’t want to bother with a password. Luckily, sudo can handle that use case very easily.

Why?

As a simple example, suppose you like to shut your computer down at the end of the day. You run the shutdown command from the terminal but it doesn’t work because you aren’t root. You then have to do it again with sudo and if you haven’t logged in lately, provide your password. Ugh.

Continue reading “Linux Fu: Superpowers For Mere Mortals”

Hackaday Links Column Banner

Hackaday Links: July 25, 2021

Everyone makes mistakes in their job, but very few of us get the chance to make a one-character mistake with the potential to brick millions of devices. But that’s what happened to a hapless Google developer, who made an understandable typo in the ChromeOS code that ended up making it all the way to production. The error, which was in the OS encryption keys vault, was supposed to include the “&&” operator for a logical AND. The developer instead used a single ampersand, which broke the who conditional statement. This meant the OS evaluated even correct passwords as invalid, leaving users locked out of their Chromebooks. To be fair to the developer there should be a lot of QA steps between that typo and production, but it still has to sting.

Speaking of whoopsies, sometimes it just doesn’t pay to be right on the internet. It started when a player of the popular tank battle simulator “War Thunder” took issue with the in-game 3D model of the British Challenger 2 main battle tank. The player argued that the model was inaccurate to the point of affecting gameplay, and thought the model should be changed to make things more realistic. There seemed to be some basis for this, as the player claimed to have been a Challenger 2 commander and gunnery instructor. What’s more, like any good Netizen, the player cited sources to back up the claims, including excerpts from the official Challenger 2 instruction manual. Players on the War Thunder forum flagged this as likely classified material, but the player insisted that it wasn’t — right up to the point where the UK Ministry of Defence said, “Not so fast.” It turns out that the manual hasn’t been declassified, and that releasing the material potentially runs afoul of the Official Secrets Act, which carries with it up to 14 years detention at Her Majesty’s pleasure.

For fans of pinball, the announcement that the Museum of Pinball in Banning, California is closing its doors for good is probably a mix of good news and bad. It’s obviously bad news for any museum to close, especially one that curates collections from popular culture. And there’s no denying that pinball has been a big part of that culture, and that the machines themselves are often works of electromechanical art. But it appears that the museum just couldn’t make a go of it, and now its cavernous space will be sold off to a cannabis grower. But the sad news is tempered by the potential for private collectors and other pinball aficionados to score one of the estimated 1,100 pins the museum now needs to find a home for. We’ve never been to the museum, so it’s hard to say what kinds of machines they have and how collectible they are, but regardless, the market is about to be flooded. If you’re nearby, you might want to take a chance to see and play some of these machines one last time, before they get shipped off to private game rooms around the world.

And finally, exciting news from Hackaday superfriend Fran Blanche, who will soon tick an item off her bucket list with a zero-G ride on “G-Force 1”. Not to be confused with its military cousin the “Vomit Comet”, the weightlessness-simulating aircraft will afford Fran a total of about five minutes of free-fall when she takes the ride in a couple of months. There will also be periods of the flight that will simulate the gravity on both the Moon and Mars, so Fran has promised some Matt Damon mythbusting and Buzz Aldrin moonbouncing. And always one to share, Fran will bring along a professional video crew, so she can concentrate on the experience rather than filming it. We’ve actually scheduled Fran for a Hack Chat in August, to talk about the flight and some of her other cool goings-on, so watch out for that.

Learning To Desolder Gracefully

When you’re just learning to sketch, you use graphite. Why? It’s cheap, great at training you to recognize different shades, and most of all, it’s erasable. When you’re learning, you’re going to make mistakes, and un-making them is an important part of the game. Same goes for electronics, of course, so when you’re teaching someone to solder, don’t neglect teaching them to desolder.

I want these!

We could argue all day about the best ways of pressing the molten-metal undo button, but the truth is that it’s horses for courses. I’ve had really good luck with solder braid and maybe a little heat gun to pull up reluctant SOIC surface-mount chips, but nothing beats a solder sucker for clearing out a few through-holes. (I haven’t tried the questionable, but time-tested practice of blasting the joint with compressed air.)

For bulk part removal, all you really have to do is heat the board up, and there’s plenty of ways to do that, ranging from fancy to foolish. Low-temperature alloys help out in really tough cases. And for removing rows of pinheaders, it can help to add more solder along the row until it’s one molten blob, and then tap the PCB and watch the part — and hot liquid metal! — just drop out.

But the bigger point is that an important step in learning a new technique is learning to undo your mistakes. It makes it all a lot less intimidating when you know that you can just pull out the solder braid and call “do-over”. And don’t forget the flux.

Hackaday Podcast 128: 3D-Printing Injection Molds, Squiggly Audio Tape, Curvy Mirrors, And Space Cadets

Hackaday editors Elliot Williams and Mike Szczys bubble sort the best hardware hacks so you don’t miss ’em. This week we’re smitten by the perfection of a telephone tape loop message announcer. We enjoyed seeing Blender’s ray tracing to design mirrors, and a webcam and computer monitor to stand in for triple-projector-based fractal fun. There’s a bit of injection molding, some Nintendo Switch disassembling, and the Internet on a calculator. We close the show with a pair of Space stories, including the happy news this week that Wally Funk finally made it there!

Take a look at the links below if you want to follow along, and as always, tell us what you think about this episode in the comments!

Direct download (60 MB or so.)

Places to follow Hackaday podcasts:

Continue reading “Hackaday Podcast 128: 3D-Printing Injection Molds, Squiggly Audio Tape, Curvy Mirrors, And Space Cadets”

This Week In Security: NSO, Print Spooler, And A Mysterious Decryptor

The NSO Group has been in the news again recently, with multiple stories reporting on their Pegasus spyware product. The research and reporting spearheaded by Amnesty International is collectively known as “The Pegasus project”. This project made waves on the 18th, when multiple news outlets reported on a list of 50,000 phone numbers that are reported as “potential surveillance targets.” There are plenty of interesting people to be found on this list, like 14 heads of state and many journalists.

There are plenty of questions, too. Like what exactly is this list, and where did it come from? Amnesty international has pointed out that it is not a list of people actively being targeted. They’ve reported that of the devices associated with an entry on the list that they have been able to check, roughly 50% have shown signs of Pegasus spyware. The Guardian was part of the initial coordinated release, and has some impressive non-details to add:

The presence of a phone number in the data does not reveal whether a device was infected with Pegasus or subject to an attempted hack. However, the consortium believes the data is indicative of the potential targets NSO’s government clients identified in advance of possible surveillance attempts.

Amazon’s AWS was named as part of the C&C structure of Pegasus, and in response, they have pulled the plug on accounts linked to NSO. For their part, NSO denies the validity of the list altogether. Continue reading “This Week In Security: NSO, Print Spooler, And A Mysterious Decryptor”