Great Hacks At Our Maker Faire Bay Area Meetup; From Helmets And Goggles To Rovers And String

When Maker Faire Bay Area closed down early Saturday evening, the fun did not stop: there’s a strong pool of night owls among the maker demographic. When the gates close, the after-parties around San Mateo run late into the night, and Hackaday’s meetup is a strong favorite.

This year Hackaday and Tindie joined forces with Kickstarter and moved our combined event to B Street Station, a venue with more space for hacks than previous years. The drinks started flowing, great people started chatting, basked in an ever present glow of LEDs. A huge amount of awesome hardware showed up, so let’s take a look the demos and stunts that came out to play.

Continue reading “Great Hacks At Our Maker Faire Bay Area Meetup; From Helmets And Goggles To Rovers And String”

Hackaday Podcast 020: Slaying The Dragon Of EL, Siege Weapon Physics, Dis-entangled Charlieplex, Laser Internet

Join editors Elliot Williams and Mike Szczys as they unpack all the great hacks we’ve seen this week. On this episode we’re talking about laser Internet delivered from space, unwrapping the complexity of Charlieplexed circuits, and decapping ICs both to learn more about them and to do it safely at home. We have some fun with backyard siege weapons (for learning about physics, we swear!), gambling on FPGAs, and a line-scanning camera that’s making selfies fun again. And nobody thought manufacturing electroluminescent displays was easy, but who knew it was this hard?

Take a look at the links below if you want to follow along, and as always, tell us what you think about this episode in the comments!

Take a look at the links below if you want to follow along, and as always, tell us what you think about this episode in the comments!

Direct download (60 MB or so.)

Continue reading “Hackaday Podcast 020: Slaying The Dragon Of EL, Siege Weapon Physics, Dis-entangled Charlieplex, Laser Internet”

Hackaday Prize Mentor Session: Product Engineering With Giovanni Salinas

This year we’ve added something new and exciting to the Hackaday Prize mix. Mentor sessions link up hardware teams with experts from backgrounds useful in moving their product development forward. We’ve assembled a dream team of mentors, and today we’re excited to publish video of the first mentor session which you’ll find embedded below. It’s a great chance to hear about the engineering going into each entry, and to learn from these back and forth conversations that help move the effort forward. We encourage you to sign up for an upcoming session!

Giovanni Salinas, the Product Development Engineer at Supplyframe’s DesignLab, is the mentor for this session. He has a huge breadth of experience in product development, and in today’s installment he’s working with four different product teams.

Continue reading “Hackaday Prize Mentor Session: Product Engineering With Giovanni Salinas”

From Dirt To Space, Backyard Iron Smelting Hackerspace Style

When I went to a hacker camp in the Netherlands in February I was expecting to spend a few days in a comfortable venue with a bunch of friends, drink some beer, see a chiptune gig, and say “Ooh!” a lot at the exciting projects people brought along. I did all of those things, but I also opened the door to something unexpected. The folks from RevSpace in the Hague brought along their portable forge, and before long I found myself working a piece of hot rebar while wearing comically unsuitable clothing. One thing led to another, and I received an invite to come along and see another metalworking project of theirs: to go form ore to ornamental technology all in one weekend.

From Dirt To Space is a collaboration between Dutch hackerspaces with a simple aim: to take iron ore and process it into a component that will be launched into space. The full project is to be attempted at the German CCCamp hacker camp in August, but to test the equipment and techniques a trial run was required. Thus I found myself in a Le Shuttle car transporter train in the Channel Tunnel, headed for the Hack42 hackerspace in Arnhem where all the parties involved would convene.

Continue reading “From Dirt To Space, Backyard Iron Smelting Hackerspace Style”

New Part Day: Espressif Announces ESP32-S2 With USB

Espressif, the company behind the extremely popular ESP8266 and ESP32 microcontrollers has just announced their latest chip. It’s the ESP32-S2. It’s a powerful WiFi-enabled microcontroller, and this one has support for USB OTG.

Compared to the ESP32 we know and love, there are a few differences. The ESP32-S2 uses a single core Xtensa LX7 core running at up to 240 MHz, where the current ESP32 uses either a single or dual core LX6. The differences between these cores is hidden away in marketing speak and press releases, but it appears the LX7 core is capable of many more floating point operations per cycle: apparently 2 FLOPS / cycle for the LX6, but 64 FLOPS / cycle for the LX7. This is fantastic for DSP and other computationally heavy applications. Other features on the chip include 320 kB SRAM, 128 kB ROM, and 16 kB of RTC memory.

Connectivity for the ESP32-S2 is plain WiFi; Bluetooth is not supported. I/O includes 42 GPIOs, 14 capacitive touch sensing IOs, the regular SPI, I2C, I2S, UART, and PWM compliment, support for parallel LCDs, a camera interface, and interestingly full-speed USB OTG support. Yes, the ESP32-S2 is getting USB, let us all rejoice.

Other features include an automatic power-down of the RF circuitry when it isn’t needed, support for RSA and AES256, and plenty of support for additional Flash and SRAMs should you need more memory. The packaging is a 7 mm x 7 mm QFN, so get out the microscope, enhance your calm, and bust out the flux for this one. Engineering samples will be available in June, and if Espressif’s past performance in supplying chips to the community holds true, we should see some projects using this chip by September or thereabouts.

(Banner image is of a plain-old ESP32, because we don’t have any of the new ones yet, naturally.)

This Week In Security: What’s Up With Whatsapp, Windows XP Patches, And Cisco Is Attacked By The Thrangrycat

Whatsapp allows for end-to-end encrypted messaging, secure VoIP calls, and until this week, malware installation when receiving a call. A maliciously crafted SRTCP connection can trigger a buffer overflow, and execute code on the target device. The vulnerability was apparently found first by a surveillance company, The NSO Group. NSO is known for Pegasus, a commercial spyware program that they’ve marketed to governments and intelligence agencies, and which has been implicated in a number of human rights violations and even the assassination of Jamal Khashoggi. It seems that this Whatsapp vulnerability was one of the infection vectors used by the Pegasus program. After independently discovering the flaw, Facebook pushed a fixed client on Monday.

Windows XP Patched Against Wormable Vulnerability

What year is it!? This Tuesday, Microsoft released a patch for Windows XP, five years after support for the venerable OS officially ended. Reminiscent of the last time Microsoft patched Windows XP, when Wannacry was the crisis. This week, Microsoft patched a Remote Desktop Protocol (RDP) vulnerability, CVE-2019-0708. The vulnerability allows an attacker to connect to the RDP service, send a malicious request, and have control over the system. Since no authentication is required, the vulnerability is considered “wormable”, or exploitable by a self-replicating program.

Windows XP through Windows 7 has the flaw, and fixes were rolled out, though notably not for Windows Vista. It’s been reported that it’s possible to download the patch for Server 2008 and manually apply it to Windows Vista. That said, it’s high time to retire the unsupported systems, or at least disconnect them from the network.

The Worst Vulnerability Name of All Time

Thrangrycat. Or more accurately, “😾😾😾” is a newly announced vulnerability in Cisco products, discovered by Red Balloon Security. Cisco uses secure boot on many of their devices in order to prevent malicious tampering with device firmware. Secure boot is achieved through the use of a secondary processor, a Trust Anchor module (TAm). This module ensures that the rest of the system is running properly signed firmware. The only problem with this scheme is that the dedicated TAm also has firmware, and that firmware can be attacked. The TAm processor is actually an FPGA, and researchers discovered that it was possible to modify the FPGA bitstream, totally defeating the secure boot mechanism.

The name of the attack, thrangrycat, might be a satirical shot at other ridiculous vulnerability names. Naming issues aside, it’s an impressive bit of work, numbered CVE-2019-1649. At the same time, Red Balloon Security disclosed another vulnerability that allowed command injection by an authenticated user.

Odds and Ends

See a security story you think we should cover? Drop us a note in the tip jar!

Flexible PCBs Hack Chat With OSH Park

Join us Thursday at noon Pacific time for the Flexible PCBs Hack Chat with Drew and Chris from OSH Park!
Note the different day from our usual Hack Chat schedule!
Printed circuit boards have been around for decades, and mass production of them has been an incalculable boon to the electronics industry. But turning the economics of PCB production around and making it accessible to small-scale producers and even home experimenters is a relatively recent development, and one which may have an even broader and deeper impact on the industry in the long run.

And now, as if professional PCBs at ridiculous prices weren’t enough, the home-gamer now has access to flexible PCBs. From wearables to sensor applications, flex PCBs have wide-ranging applications and stand to open up new frontiers to the hardware hacker. We’ve even partnered with OSH Park in the Flexible PCB Contest, specifically to stretch your flexible wings and get you thinking beyond flat, rigid PCBs.

join-hack-chatOur Hack Chats are live community events in the Hackaday.io Hack Chat group messaging. This week we’ll be sitting down on Thursday, May 23 at 12:00 PM Pacific time. If time zones have got you down, we have a handy time zone converter.

Click that speech bubble to the right, and you’ll be taken directly to the Hack Chat group on Hackaday.io. You don’t have to wait until Thursday; join whenever you want and you can see what the community is talking about.