USB Charger Fooled Into Variable Voltage Source

USB chargers are everywhere and it is the responsibility of every hacker to use this commonly available device to its peak potential. [Septillion] and [Hugatry] have come up with a hack to manipulate a USB charger into becoming a variable voltage source. Their project QC2Control works with chargers that employ Quick Charge 2.0 technology which includes wall warts as well as power banks.

Qualcomm’s Quick Charge is designed to deliver up to 24 watts over a micro USB connector so as to reduce the charging time of compatible devices. It requires both the charger as well as the end device to have compatible power management chips so that they may negotiate voltage limiting cycles.

In their project, [Septillion] and [Hugatry] use a 3.3 V Arduino Pro Mini to talk to the charger in question through a small circuit consisting of a few resistors and diodes. The QC2.0 device outputs voltages of 5 V, 9 V and 12 V when it sees predefined voltage levels transmitted over the D+ and D- lines, set by Arduino and voltage dividers. The code provides function calls to simplify the control of the power supply. The video below shows the hack in action.

Quick Charge has been around for a while and you can dig into the details of the inner workings as well as the design of a compatible power supply from reference designs for the TPS61088 (PDF). The patent (PDF) for the Quick Charge technology has a lot more detail for the curious.

Similar techniques have been used in the past and will prove useful for someone looking for a configurable power supply on the move. This is one for the MacGyver fans.

Continue reading “USB Charger Fooled Into Variable Voltage Source”

Counterfeit Hardware May Lead To Malware And Failure

Counterfeit parts are becoming increasingly hard to tell the difference from the real deal, the technology used by the counterfeiters has come on leaps and bounds, so even the experts struggle to tell the real product from a good fake. Mere fake branding isn’t the biggest problem with a counterfeit though, as ieee.com reports, counterfeit parts could contain malware or be downright dangerous.

Way back in 2014 the FBI charged [Marc Heera] with selling clones of the Hondata S300, a plugin engine module for Honda cars that reads sensors, and depending on their values can change idle speed, air-fuel mixture and a plethora of other car/engine related settings. What, might you ask, is the problem, except they are obviously not genuine parts? According to Honda they had a number of issues such as random limits on engine rpm and occasionally failure to start. While the fake Hondata S300 parts where just poor clones that looked the part, anything connected to an engine control unit brings up huge safety concerns and researchers have shown that through ECU access, they could hijack a car’s steering and brakes.

It’s not just car parts being cloned, remember the fake USB-to-serial chips of FTDI-Gate? Entire routers are also being cloned, which doesn’t sound too bad until you realise that the cloners could configure your internet traffic to be redirected through their network for snooping. In 2010 Saudi citizen [Ehab Ashoor] was convicted of buying cloned Cisco Systems gigabit interface converters with the intention of selling them to the U.S Dept of Defense. While nothing sinister was afoot in [Ashoor]’s case other than greed, these routers were to be deployed in Iraq for use by the Marine Corps networks. They were then to be used for security, transmitting troop movements and relaying intelligence from field operations back to HQ.

So who are the cloners and why are they doing it? It is speculated that some of them may be state funded, as there are a lot of countries who do not trust American silicon. Circuits are reverse engineered and find their way to the international market. Then just like the FTDI-Gate case, cloners want to make profits from others intellectual property. This also brings up another question, if there is a mistrust of American silicon, nearly everything is made in China these days so why should we trust anything from there? Even analog circuits can be made to spy on you, as you can see from the piece we recently featured on compromising a processor using an analog charge pump. If you want to defend yourself from such attacks, perhaps look at previous Hackaday Prize finalist, ChipWhisperer.

Multipurpose ESP8266 Keychain

One of the best feature of the ESP8266 is its ability to self-host a web server, allowing for fairly complicated user interactions. The dEEbugger by [S-March] is a nifty little ESP8266 based device with a plethora of features in a small package.

The USB-powered device has a web user interface that enables it to be used as a low-bandwidth oscilloscope, I2C terminal, or UART terminal. As a scope, you may connect to it via your tablet and then use it as a remote voltage monitor. There is a peak detection feature which is a nice touch and gives the entire project a premium feel.

The serial terminal on an ESP8266 is not something new yet it is helpful in disconnecting the console window from the bench. The I2C terminal is where the device really shines as it can scan for connected devices on the connected bus. This Bus-Pirate like feature is useful for beginners as the software can scan the registers addresses of the devices as well.

[S-March] has made the schematic in PDF format as well as the entire code for the project available on GitHub so go right ahead and make it your own. We have had an ESP8266 based VT Terminal device in the past and merging the two would make for an excellent maker tool.

Thanks for the tip [René Arts]

Powerful, Professional Brushless Motor From 3D-Printed Parts

Not satisfied with the specs of off-the-shelf brushless DC motors? Looking to up the difficulty level on your next quadcopter build? Or perhaps you just define “DIY” as rigorously as possible? If any of those are true, you might want to check out this hand-wound, 3D-printed brushless DC motor.

There might be another reason behind [Christoph Laimer]’s build — moar power! The BLDC he created looks more like a ceiling fan motor than something you’d see on a quad, and clocks in at a respectable 600 watts and 80% efficiency. The motor uses 3D-printed parts for the rotor, stator, and stator mount. The rotor is printed from PETG, while the stator uses magnetic PLA to increase the flux and handle the heat better. Neodymium magnets are slipped into slots in the rotor in a Halbach arrangement to increase the magnetic field inside the rotor. Balancing the weights and strengths of the magnets and winding the stator seem like tedious jobs, but [Cristoph] provides detailed instructions that should see you through these processes. The videos below shows an impressive test of the motor. Even limited to 8,000 rpm from its theoretical 15k max, it’s a bit scary.

Looking for a more educational that practical BLDC build? Try one cobbled from PVC pipes, or even this see-through scrap-bin BLDC.

Continue reading “Powerful, Professional Brushless Motor From 3D-Printed Parts”

Thermal Panorama One Pixel At A Time

Inspiration can strike from the strangest places. Unearthing a forgotten Melexis MLX90614 thermopile from his  ‘inbox,’ [Saulius Lukse] used it to build a panoramic thermal camera.

[Lukse] made use of an ATmega328 to control the thermal sensor, and used the project to test a pair of two rotary stage motors he designed for tilt and pan, with some slip rings to keep it in motion as it captures a scene. That said, taking a 720 x 360 panoramic image one pixel at a time takes over an hour, and compiling all that information into an intelligible picture is no small feat either. An occasional hiccup are dead pixels in the image, but those are quickly filled in by averaging the temperature of adjoining pixels.

The camera  rig works — and it does turn out a nice picture — but [Lukse]  says an upgraded infrared camera to captured larger images at a time and higher resolution would not be unwelcome.

 

Another clever use of a thermopile might take you the route of this thermal flashlight. if you don’t build your own thermal camera outright.

[Thanks for the tip, Imn!]

Old Part Day: Voltage Controlled Filters

For thirty years, the classic synths of the late 70s and early 80s could not be reproduced. Part of the reason for this is market forces — the synth heads of the 80s didn’t want last year’s gear. The other part for the impossibility to build new versions of these synths was the lack of parts. Synths such as the Prophet 5, Fairlight CMI, and Korg Mono/Poly relied on voltage controlled filter ICs — the SSM2044 — that you can’t buy new anymore. If you can source a used one, be prepared to pay $30. New old stock costs about $100.

Now, these chips are being remade. A new hardware revision for this voltage controlled filter has been taped out by the original hardware designer, and these chips are being produced in huge quantities. Instead of $100 for a new old stock chip, this chip will cost about $1.60 in 1000 unit quantities.

The list of synths and music boxes sporting an SSM2044 reads like a Who’s Who of classic electronic music machines. E-Mu Drumulators, Korg polyphonic synths, Crumars, and even a Doepfer module use this chip in the filter section. The new chip — the SSI2144 — supposedly provides the same classic tone but adds a few improvements such as improved pin layouts, an SSOP package, and more consistent operation from device to device.

This news follows the somewhat recent trend of chip fabs digging into classic analog designs of the 70s, realizing the chips are being sold for big bucks on eBay, and releasing it makes sense to spin up a new production line. Last year, the Curtis CEM3340 voltage controlled oscillator was rereleased, giving the Oberheim OB, Roland SH and Jupiter, and the Memory Moog a new lease on life. These chips aren’t only meant to repair broken, vintage equipment; there are a few builders out there who are making new devices with these rereleased classic synths.

 

PogoPlug Hacking: A Step By Step Guide To Owning The Device

[Films By Kris Hardware] has started quite an interesting YouTube series on hacking and owning a PogoPlug Mobile v4. While this has been done many times in the past, he gives a great step by step tutorial. The series so far is quite impressive, going into great detail on how to gain root access to the device through serial a serial connection.

PogoPlugs are remote-access devices sporting ARM processor running at 800 MHz, which is supported by the Linux Kernel.  The version in question (PogoPlug Mobile v4) have been re-purposed in the past for things like an inexpensive PBX, an OpenWrt router and even a squeezebox replacement. Even if you don’t have a PogoPlug, this could be a great introduction to hacking any Linux-based consumer device.

So far, we’re at part three of what will be an eight-part series, so there’s going to be more to learn if you follow along. His videos have already covered how to connect via a serial port to the device, how to send commands, set the device up, and stop it calling home. This will enable the budding hacker to make the PogoPlug do their bidding. In this age of the cheap single-board Linux computer, hacking this type of device may be going out of style, but the skills you learn here probably won’t any time soon.

Continue reading “PogoPlug Hacking: A Step By Step Guide To Owning The Device”