Retrotechtacular: 934 MHz CB Radio

The radio spectrum is carefully regulated and divided up by Governments worldwide. Some of it is shared across jurisdictions under the terms of international treaties, while other allocations exist only in individual countries. Often these can contain some surprising oddities, and one of these is our subject today. Did you know that the UK’s first legal CB radio channels included a set in the UHF range, at 934 MHz? Don’t worry, neither did most Brits. Behind it lies a tale of bureaucracy, and of a bungled attempt to create an industry around a barely usable product.

Hey, 2019, Got Your Ears On?

Did this car make you want a CB radio? Stuurm [CC BY-SA 3.0]
Did this car make you want a CB radio? Stuurm [CC BY-SA 3.0]
Mention CB radio in 2019 it’s likely that the image conjured in the mind of the listener will be one from a previous decade. Burt Reynolds and Jerry Reed in Smokey and the Bandit perhaps, or C. W. McCall’s Convoy. It may not be very cool in the age of WhatsApp, but in the 1970s a CB rig was the last word in fashionable auto accessories and a serious object of desire into which otherwise sane adults yearned to speak the slang of the long-haul trucker.

If you weren’t American though, CB could be a risky business. Much of the rest of the world didn’t have a legal CB allocation, and correspondingly didn’t have access to legal CB rigs. The bombardment of CB references in exported American culture created a huge demand for CB though, and for British would-be CBers that was satisfied by illegally imported American equipment. A vibrant community erupted around UK illegal 27 MHz AM CB in the late 1970s, and Government anger was met with campaigning for a legal allocation. Brits eventually got a legal 27 MHz allocation in November 1981, but the years leading up to that produced a few surprises.

Continue reading “Retrotechtacular: 934 MHz CB Radio”

Texas Tesla Tower Titillates

One of the nice things about a road trip is you often get to see something that really surprises you. A recent trip through Texas may have resulted in my second most surprising sighting. There’s a strange tower that looks oddly like a Tesla tower in the middle of rural Texas, right off the main interstate. What is it? Although Google did answer the question — sort of — I’m still not sure how legitimate its stated purpose is.

First Sighting

I was driving between Wimberly and Frisco — two towns that aren’t exactly household names outside of Texas. Near Milford, there’s a very tall structure that looks like a giant mechanical mushroom on top of a grain silo. If the mushroom were inverted or pointing towards the horizon, it would be easy to imagine it was some very odd antenna. This dish, however, is pointed right down its own odd-shaped mast. The top of the thing sure looks like the top of a Van de Graf generator.

Continue reading “Texas Tesla Tower Titillates”

KiCad Action Plugins

The last two years has been a particularly exciting time for KiCad, for users, casual contributors, and for the core developers too. Even so, there are many cool new features that are still in process. One bottleneck with open-source development of complex tools like KiCad is the limited amount of time that developers can devote for the project. Action plugins stand to both reduce developer load and increase the pace of development by making it easier to add your own functionality to the already extensible tool.

Sometime around version 4.0.7 (correct us if we’re wrong), it was decided to introduce “action plugins” for KiCad, with the intention that the larger community of contributors can add features that were not on the immediate road map or the core developers were not working on. The plugin system is a framework for extending the capabilities of KiCad using shared libraries. If you’re interested in creating action plugins, check out documentation at KiCad Plugin System and Python Plugin Development for Pcbnew. Then head over to this forum post for a roundup of Tutorials on python scripting in pcbnew, and figure out how to Register a python plugin inside pcbnew Tools menu. Continue reading “KiCad Action Plugins”

A Newbie Takes The SMD Challenge At Supercon

First-time visitors to Disneyworld often naively think they’re going to “do” the park in three days: one day for the Magic Kingdom, one day for Epcot, and one day for everything else. It’s easy to spot such people, collapsed on a bench or dragging exhausted kids around while trying to make their way to the next must-see attraction. Supercon is something like that — a Disney-esque theme park for hackers that will exhaust you if you don’t have a plan, and if you don’t set reasonable expectations. Which is why I was glad that I set only one real goal for my first Supercon: take the SMD Soldering Challenge.

Now, while I’m pretty handy with a soldering iron, I was under no illusion that I would be at all competitive. All my soldering experience has been with through-hole components, and while I also used to doing some production soldering on fine-pitch connectors, the whole surface-mount thing is new to me. I entered mainly because I wanted to see what was possible coming in raw. At best I’d learn what my limits are, and at worst I’d fail spectacularly and provide grist for a “Fail of the Supercon” post. It’s a win either way.

Continue reading “A Newbie Takes The SMD Challenge At Supercon”

Hackaday Links Column Banner

Hackaday Links: November 17, 2019

Friday, November 15, 2019 – PASADENA. The 2019 Hackaday Superconference is getting into high gear as I write this. Sitting in the Supplyframe HQ outside the registration desk is endlessly entertaining, as attendees pour in and get their swag bags and badges. It’s like watching a parade of luminaries from the hardware hacking world, and everyone looks like they came ready to work. The workshops are starting, the SMD soldering challenge is underway, and every nook and cranny seems to have someone hunched over the amazing Hackaday Superconference badge, trying to turn it into something even more amazing. The talks start on Saturday, and if you’re not one of the lucky hundreds here this weekend, make sure you tune into the livestream so you don’t miss any of the action.

The day when the average person is able to shoot something out of the sky with a laser is apparently here. Pablo, who lives in Argentina, has beeing keeping tabs on the mass protests going on in neighboring Chile. Huge crowds have been gathering regularly over the last few weeks to protest inequality. The crowd gathered in the capital city of Santiago on Wednesday night took issue with the sudden appearance of a police UAV overhead. In an impressive feat of cooperation, they trained 40 to 50 green laser pointers on the offending drone. The videos showing the green beams lancing through the air are quite amazing, and even more amazing is the fact that the drone was apparently downed by the lasers. Whether it was blinding the operator through the FPV camera or if the accumulated heat of dozens of lasers caused some kind of damage to the drone is hard to say, and we’d guess that the drone was not treated too kindly by the protestors when it landed in the midsts, so there’s likely not much left of the craft to do a forensic analysis, which is a pity. We will note that the protestors also trained their lasers on a police helicopter, an act that’s extremely dangerous to the human pilots which we can’t condone.

In news that should shock literally nobody, Chris Petrich reports that there’s a pretty good chance the DS18B20 temperature sensor chips you have in your parts bin are counterfeits. Almost all of the 500 sensors he purchased from two dozen vendors on eBay tested as fakes. His Github readme has an extensive list that lumps the counterfeits into four categories of fake-ness, with issues ranging from inaccurate temperature offsets to sensors without EEPROM that don’t work with parasitic power. What’s worse, a lot of the fakes test almost-sorta like authentic chips, meaning that they may work in your design, but that you’re clearly not getting what you paid for. The short story to telling real chips from the fakes is that Maxim chips have laser-etched markings, while the imposters sport printed numbers. If you need the real deal, Chris suggests sticking with reputable suppliers with validated supply chains. Caveat emptor.

A few weeks back we posted a link to the NXP Homebrew RF Design Challenge, which tasked participants to build something cool with NXP’s new LDMOS RF power transistors. The three winners of the challenge were just announced, and we’re proud to see that Razvan’s wonderfully engineered broadband RF power amp, which we recently featured, won second place. First place went to Jim Veatch for another broadband amp that can be built for $80 using an off-the-shelf CPU heatsink for thermal management. Third prize was awarded to a team lead by Weston Braun, which came up with a switch-mode RF amp for the plasma cavity for micro-thrusters for CubeSats, adorably named the Pocket Rocket. We’ve featured similar thrusters recently, and we’ll be doing a Hack Chat on the topic in December. Congratulations to the winners for their excellent designs.

DSP Spreadsheet: IQ Diagrams

In previous installments of DSP Spreadsheet, we’ve looked at generating signals, mixing them, and filtering them. If you start trying to work with DSP, though, you’ll find a topic that always rears its head: IQ signals. It turns out, these aren’t as hard as they appear at first and, as usual, we’ll tackle them in a spreadsheet.

What does IQ stand for? The I stands for “in phase” and the Q stands for quadrature. By convention, the I signal is a cosine wave and the Q signal is a sine wave. Another way to say that is that the I and Q signals are 90 degrees out of phase. By manipulating the amplitude of I and Q, you can create complex modulation or, conversely, demodulate signals. We’ll see a spreadsheet that shows that completely next time.

Continue reading “DSP Spreadsheet: IQ Diagrams”

This Week In Security: Fuzzing Fixes, Foul Fonts, TPM Timing Attacks, And More!

An issue was discovered in libarchive through Google’s ClusterFuzz project. Libarchive is a compression and decompression library, widely used in utilities. The issue here is how the library recovers from a malformed archive. Hitting an invalid header causes the memory in use to be freed. The problem is that it’s possible for file processing to continue even after that working memory has been freed, leading to all kinds of problems. So far an actual exploit hasn’t been revealed, but it’s likely that one is possible. The problem was fixed back in May, but the issue was just announced to give time for that update to percolate down to users.

Of note is the fact that this issue was found through Google’s fuzzing efforts. Google runs the oss-fuzz project, which automatically ingests nightly builds from around 200 open source projects and runs ClusterFuzz against them. This process of throwing random data at programs and functions has revealed over 14,000 bugs.
Continue reading “This Week In Security: Fuzzing Fixes, Foul Fonts, TPM Timing Attacks, And More!”