DSP Spreadsheet: IQ Diagrams

In previous installments of DSP Spreadsheet, we’ve looked at generating signals, mixing them, and filtering them. If you start trying to work with DSP, though, you’ll find a topic that always rears its head: IQ signals. It turns out, these aren’t as hard as they appear at first and, as usual, we’ll tackle them in a spreadsheet.

What does IQ stand for? The I stands for “in phase” and the Q stands for quadrature. By convention, the I signal is a cosine wave and the Q signal is a sine wave. Another way to say that is that the I and Q signals are 90 degrees out of phase. By manipulating the amplitude of I and Q, you can create complex modulation or, conversely, demodulate signals. We’ll see a spreadsheet that shows that completely next time.

Continue reading “DSP Spreadsheet: IQ Diagrams”

This Week In Security: Fuzzing Fixes, Foul Fonts, TPM Timing Attacks, And More!

An issue was discovered in libarchive through Google’s ClusterFuzz project. Libarchive is a compression and decompression library, widely used in utilities. The issue here is how the library recovers from a malformed archive. Hitting an invalid header causes the memory in use to be freed. The problem is that it’s possible for file processing to continue even after that working memory has been freed, leading to all kinds of problems. So far an actual exploit hasn’t been revealed, but it’s likely that one is possible. The problem was fixed back in May, but the issue was just announced to give time for that update to percolate down to users.

Of note is the fact that this issue was found through Google’s fuzzing efforts. Google runs the oss-fuzz project, which automatically ingests nightly builds from around 200 open source projects and runs ClusterFuzz against them. This process of throwing random data at programs and functions has revealed over 14,000 bugs.
Continue reading “This Week In Security: Fuzzing Fixes, Foul Fonts, TPM Timing Attacks, And More!”

Best Buy’s IoT Goes Dark, Leaving Some “Smart” Products Dumbfounded

Bad news if you bought several Insignia-branded smart devices from Best Buy. The company has decided to shut down the back end systems that make them work — or at least work as a smart device. On the chopping block are smart outlets, switches, a security camera, and an upright freezer. If you bought, say, the freezer, it will still keep things cold. But the security camera will apparently be of no use at all now that the backend systems have gone dark. The company is offering an unspecified partial refund to users of the affected devices.

Best Buy announced this in September, and the shutdown date was last week on November 6th. Not all Insignia products are impacted, just the ones that rely on their app.

Anytime we talk about cloud-based technology, there are always a few people who say something like, “I’ll never rely on anything in the cloud!” Perhaps they have a point — certainly in this case they were right. There are really two things to consider: hardware devices that rely on the cloud, and data that resides in the cloud. In some cases, one product — like a camera — might have both.

Continue reading “Best Buy’s IoT Goes Dark, Leaving Some “Smart” Products Dumbfounded”

Jubilee: A Toolchanging Homage To 3D Printer Hackers Everywhere

I admit that I’m late to the 3D printing game. While I just picked up my first printer in 2018, the rest of us have been oozing out beautiful prints for over a decade. And in that time we’ve seen many people reimagine the hardware for mischief besides just printing plastic. That decade of hacks got me thinking: what if the killer-app of 3D printing isn’t the printing? What if it’s programmable motion? With that, I wondered: what if we had a machine that just offered us motion capabilities? What if extending those motion capabilities was a first class feature? What if we had a machine that was meant to be hacked?

One year later, I am thrilled to release an open-source multitool motion platform I call Jubilee. For a world that’s hungry for toolchanging 3D printers, Jubilee might be the best toolchanging 3D printer you can build yourself–with nothing more than a set of hand tools and some patience. But it doesn’t stop there. With a standardized tool pattern established by E3D and a kinematically coupled hot-swappable bed, Jubilee is rigged to be extended by anyone looking to harness its programmable motion capabilities for some ad hoc automation.

Jubilee is my homage to you, the 3D printer hacker; but it’s meant to serve the open-source community at large. Around the world, scientists, artists, and hackers alike use the precision of automated machines for their own personal exploration and expression. But the tools we use now are either expensive or cumbersome–often coupled with a hefty learning curve but no up-front promise that they’ll meet our needs. To that end, Jubilee is meant to shortcut the knowledge needed to get things moving, literally. Jubilee wants to be an API for motion.

Continue reading “Jubilee: A Toolchanging Homage To 3D Printer Hackers Everywhere”

Ask Hackaday: Is Anyone Sad Phone VR Is Dead?

It’s official: smartphone-based VR is dead. The two big players in this space were Samsung Gear VR (powered by Oculus, which is owned by Facebook) and Google Daydream. Both have called it quits, with Google omitting support from their newer phones and Oculus confirming that the Gear VR has reached the end of its road. Things aren’t entirely shut down quite yet, but when it does it will sure leave a lot of empty headsets laying around. These things exist in the millions, but did anyone really use phone-based VR? Are any of you sad to see it go?

Google Cardboard, lowering cost and barrier to entry about as low as it could go.

In case you’re unfamiliar with phone-based VR, this is how it works: the user drops their smartphone into a headset, puts it on their head, and optionally uses a wireless controller to interact with things. The smartphone takes care of tracking motion and displaying 3D content while the headset itself takes care of the optics and holds everything in front of the user’s eyeballs. On the low end was Google Cardboard and on the higher end was Daydream and Gear VR. It works, and is both cheap and portable, so what happened?

In short, phone-based VR had constraints that limited just how far it could go when it came to delivering a VR experience, and these constraints kept it from being viable in the long run. Here are some of the reasons smartphone-based VR hit the end of the road: Continue reading “Ask Hackaday: Is Anyone Sad Phone VR Is Dead?”

pierced puffed exposed leads lithium ion battery

Lessons In Li-Ion Safety

If you came here from an internet search because your battery just blew up and you don’t know how to put out the fire, then use a regular fire extinguisher if it’s plugged in to an outlet, or a fire extinguisher or water if it is not plugged in. Get out if there is a lot of smoke. For everyone else, keep reading.

I recently developed a product that used three 18650 cells. This battery pack had its own overvoltage, undervoltage, and overcurrent protection circuitry. On top of that my design incorporated a PTC fuse, and on top of that I had a current sensing circuit monitored by the microcontroller that controlled the board. When it comes to Li-Ion batteries, you don’t want to mess around. They pack a lot of energy, and if something goes wrong, they can experience thermal runaway, which is another word for blowing up and spreading fire and toxic gasses all over. So how do you take care of them, and what do you do when things go poorly?

Continue reading “Lessons In Li-Ion Safety”

RISC-V: Why The ISA Battles Aren’t Over Yet

A computer processor uses a so-called Instruction Set Architecture to talk with the world outside of its own circuitry. This ISA consists of a number of instructions, which essentially define the functionality of that processor, which explains why so many ISAs still exist today. It’s hard to find that one ISA that works for as many distinct use cases as possible, after all.

A fairly new ISA is RISC-V, the first version of which was created back in 2010 at the University of California, Berkeley. Intended to be a fully open ISA, targeting both students (as a learning tool) and industrial users, it is claimed to incorporate a number of design choices that should make it more attractive for a number of applications.

In this article I’ll take a look behind the marketing to take stock of how exactly RISC-V differs from other open ISAs, including Power, SPARC and MIPS.

Continue reading “RISC-V: Why The ISA Battles Aren’t Over Yet”