Better Living Through Hackery

Hackaday’s own [Arya Voronova] has been on a multi-year kick to make technology more personal by making it herself, and has just now started writing about it. Her main point rings especially true in this day and age, where a lot of the tech devices we could use to help us are instead used to spy on us or are designed to literally make us addicted to their services.

The project is at the same time impossible and simple. Of course, you are not going to be able to build a gadget that will bolster all of your (perceived or otherwise) personal weaknesses in one fell swoop. But what if you start looking at them one at a time? What if you start building up the good habits with the help of a fun DIY project?

That’s where [Arya]’s plan might just be brilliant. Because each project is supposed to be small, it forces you to focus on one specific problem, rather than getting demoralized at the impossibility of becoming “better” in some vague overall sense. Any psychologist would tell you that introspection and dividing up complex problems are the first steps. And what motivates a hacker to take the next steps? You got it, the fun of brainstorming, planning, and building a nice concrete DIY project. It’s like the ultimate motivation, Hackaday style.

And DIY solutions are a perfect match to personal problems. Nothing is so customizable as what you design and build yourself from the ground up. DIY means making exactly what you need, or at least what you think you need. Iteration, improvement, and the usual prototyping cycle applied to personal growth sounds like the ideal combo, because that’s how the tech works, and that’s also how humans work. Of course, even the coolest DIY gadget can’t instantly make you more mindful, for instance, but if it’s a tool that helps you get there, I don’t think you could ask for more.

Hacker Olympics

The opening ceremony of the Summer Olympics is going on today. It’s an over-the-top presentation meant to draw people into sport. And for the next few weeks, we’ll be seeing people from all across the world competing in their chosen physical activities. There will be triumph and defeat, front-runners who nonetheless lag behind on that day, and underdogs who sneak ahead. In short, a lot of ado about sport, and I don’t necessarily think that’s a bad thing. Sports are fun.

But where is the Hacker Olympics? Or even more broadly the Science Olympics or Engineering Olympics? Why don’t we celebrate the achievements of great thinkers, planners, and builders the same way that we celebrate fast runners or steady shooters? With all the pomp and showmanship and so on?

Here at Hackaday, we try our best! When we see a cool hack, we celebrate it. But we’re one little blog, with about a millionth the budget of the International Olympic Commission. However, we have you all as our biggest multiplier. It would be awesome if we could take over the entire city of Paris in celebration of science and engineering, but until then, if you see something smart, share it with us. And if you see something on Hackaday that you think was awesome, share it with your friends.

Ask Hackaday: Is Shortwave On Life Support?

A QSL Card from Radio Moscow probably got many 14-year-olds on government watch lists. (Public domain)

Between World War II and Y2K, shortwave listening was quite an education. With a simple receiver, you could listen to the world. Some of it, of course, was entertainment, and much of it was propaganda of one sort or another. But you could learn a lot. Kids with shortwave radios always did great in geography. Getting the news from a different perspective is often illuminating, too. Learning about other cultures and people in such a direct way is priceless. Getting a QSL card in the mail from a faraway land seemed very exciting back then.

Today, the shortwave landscape is a mere shadow of itself. According to a Wikipedia page, there are 235 active shortwave broadcasters from a list of 414, so nearly half are defunct. Not only are there many “dead” shortwave outlets, but many of the ones that are left are either not aimed at the world market or serve a niche group of listeners.

You can argue that with the Internet, you don’t need radio, and that’s probably correct in some ways but misses a few important points. Indeed, many broadcasters still exist as streaming stations or a mix of radio and streaming. I have to admit I listen to the BBC often but rarely on the air. My computer or phone plays it in crystal clarity 24 hours a day.

A future Hackaday author in front of an Eico shortwave radio

So, while a 14-year-old in 1975 might be hunched over a radio wearing headphones, straining to hear NHK World Radio, these days, they are likely surfing the popular social media site of the week. You could easily argue that content on YouTube, Instagram, and the like can come from all over the world, so what’s the problem?

The problem is information overload. Faced with a shortwave radio, there were a limited number of options available. What’s more, only a small part of the band might be “open” at any given time. It isn’t like the radio could play games or — unless you were a ham — allow you to chat with your friends. So you found radio stations from Germany to South Africa. From China and Russia, to Canada and Mexico. You knew the capital of Albania. You learned a little Dutch from Radio Nederlands.

Continue reading “Ask Hackaday: Is Shortwave On Life Support?”

Do Your Research

We were talking about a sweet hack this week, wherein [Alex] busts the encryption for his IP web cam firmware so that he can modify it later. He got a number of lucky breaks, including getting root on the device just by soldering on a serial terminal, but was faced with having to reverse-engineer a binary that implemented RSA encryption and decryption.

Especially when they’re done right, and written to avoid side-channel attacks, encryption routines aren’t intuitive, even when you’re looking at the C source. Reversing it from the binary would be a tremendous hurdle.

That’s when [Alex] started plugging in strings he found in the binary into a search engine. And that’s when he found exactly the open source project that the webcam used, which gave him the understanding he needed to crack the rest of the nut.

Never forget! When you’re doing some reverse engineering, whether hardware or software, do a search for every part number and every string you find in memory. If you’re like me, it might feel like cheating a little bit, but it’s just being efficient. It’s what all your hacker heroes say they do, and if you’re lucky, it might just be the break you need too.

It’s Not Unusual To Love Hacking

Most of what we do here at Hackaday is look out for cool projects and then write them up so that you all know about them. Nothing is better than being really stoked about a clever hack and then being able to share it with tens of thousands of like-minded folks. Sure, it’s our job, but we really do it because we love to share. And it’s clear that you all do too! After all, we write up the hacks that you document for us.

We recently featured a hack where the guy who did the work in question said that he didn’t think it was “worthy of Hackaday”. (Of course, it was!) And I don’t like that sentiment at all, honestly, because a hack that you enjoyed doing is a hack worth sharing, even if just for sharing the joy of doing it, and that came across fully.

Of course we gladly feature the ultra-bravado hacks where the nearly impossible is made real. But there’s equal value in the simple hacks that inspire others to pursue one odd path or another. Or even pieces where there’s no hack involved, but simply the sharing of something cool.

This week, [Arya Voronova] wrote a piece about her experience using MicroPython on embedded devices, and it apparently resonated with a lot of our readers. It’s not a deep-dive into MicroPython, or a mind-bending abuse of the language. Instead, it’s a simple “this is what I love about doing things this way”, and that’s a great perspective that often gets lost when we get deep in the technical weeds.

I had the same realization a few months back at Hackaday Europe. In the lightning talks, most everyone gave talks about cool projects that they are working on, and they’re absolutely worth watching for that. [Jaap Meijers] gave a wonderful talk about making animated QR codes, but it wasn’t about how he invented animated QR codes, because he was just using someone else’s project. Instead, it was about how neat he thought someone else’s work was, and how he really wanted to share it with us. (And now you know too.)

Epic hacks are fantastic, no question. But the simple expression of the love of hacking, whether in words or in the doing, is equally important. Show us your work, but don’t forget to show us your joy along the way.

Hack All The Things, Get All The Schematics

When I was growing up, about 4 or 5 years old, I had an unorthodox favourite type of reading material: service manuals for my dad’s audio equipment. This got to the point that I kept asking my parents for more service manuals, and it became a running joke in our family for a bit. Since then, I’ve spent time repairing tech and laptops in particular as a way of earning money, hanging out at a flea market in the tech section, then spending tons of time at our hackerspace. Nowadays, I’m active in online hacker groups, and I have built series of projects closely interlinked with modern-day consumer-facing tech.

Twenty three years later, is it a wonder I have a soft spot in my heart for schematics? You might not realize this if you’re only upcoming in the hardware hacking scene, but device schematics, whichever way you get them, are a goldmine of information you can use to supercharge your projects, whether you’re hacking on the schematic-ed device itself or not. What’s funny is, not every company wants their schematics to be published, but it’s ultimately helpful for the company in question, anyway.

If you think it’s just about repair – it’s that, sure, but there’s also a number of other things you might’ve never imagined you can do. Still, repair is the most popular one.
Continue reading “Hack All The Things, Get All The Schematics”

Danger Is My Middle Name

Last week, [Al Williams] wrote up a his experience with a book that provided almost too much detailed information on how to build a DIY x-ray machine for his (then) young soul to bear. He almost had to build it! Where the “almost” is probably both a bummer because he didn’t have an x-ray machine as a kid, but also a great good because it was a super dangerous build, of a typical sort for the 1950s in which it was published.

Part of me really loves the matter-of-factness with which “A Boy’s First Book of Linear Accelerators” tells you how you (yes you!) can build a 500 kV van der Graff generator. But at the same time, modern me does find the lack of safety precautions in many of these mid-century books to be a little bit spooky. Contrast this with modern books where sometimes I get the feeling that the publisher’s legal team won’t let us read about folding paper airplanes for fear of getting cut.

A number of us have built dangerous projects in our lives, and many of us have gotten away with it. Part of the reason that many of us are still here is that we understood the dangers, but I would be lying if I said that I always fully understood them. But thinking about the dangers is still our first and best line of defense. Humility about how well you understand all of the dangers of a certain project is also very healthy – if you go into it keeping an eye out for the unknown unknowns, you’re in better shape.

Safety isn’t avoiding danger, but rather minimizing it. When we publish dangerous hacks, we really try to at least highlight the most important hazards so that you know what to look out for. And over the years, I’ve learned a ton of interesting safety tricks from the comments and fellow hackers alike. My ideal, then, is the spirit of the 1950s x-ray book, which encourages you to get the hack built, but modernized so that it tells you where the dangers lie and how to handle them. If you’re shooting electrons, shouldn’t the book also tell you how to stay out of the way?