Tesla Model S Battery Pack Teardown

We’ve heard a lot about the Tesla Model S over the last few years, it’s a vehicle with a habit of being newsworthy. And as a fast luxury electric saloon car with a range of over 300 miles per charge depending on the model, its publicity is deserved, and that’s before we’ve even mentioned autonomous driving  driver-assist. Even the best of the competing mass-produced electric cars of the moment look inferior beside it.

Tesla famously build their battery packs from standard 18650 lithium-ion cells, but it’s safe to say that the pack in the Model S has little in common with your laptop battery. Fortunately for those of a curious nature, [Jehu Garcia] has posted a video showing the folks at EV West tearing down a Model S pack from a scrap car, so we can follow them through its construction.

The most obvious thing about this pack is its sheer size, this is a large item that takes up most of the space under the car. We’re shown a previous generation Tesla pack for comparison, that is much smaller. Eye-watering performance and range come at a price, and we’re seeing it here in front of us.

The standard of construction appears to be very high indeed, which makes sense as this is not merely a performance part but a safety critical one. Owners of mobile phones beset by fires will testify to this, and the Tesla’s capacity for conflagration or electrical hazard is proportionately larger. The chassis and outer cover are held together by a huge array of bolts and Torx screws, and as they comment, each one is marked as having been tightened to a particular torque setting.

Under the cover is a second cover that is glued down, this needs to be carefully pried off to reveal the modules and their cells. The coolant is drained, and the modules disconnected. This last task is particularly hazardous, as the pack delivers hundreds of volts DC at a very low impedance. Then each of the sixteen packs can be carefully removed. The packs each contain 444 cells, the pack voltage is 24 V, and the energy stored is 5.3 kWh.

The video is below the break. We can’t help noticing some of the rather tasty automotive objects of desire in their lot.

Continue reading “Tesla Model S Battery Pack Teardown”

$10 Raspberry Pi Zero W Adds WiFi And Bluetooth

The Raspberry Pi was born on February 29th which means we’re only three years away from its second birthday, and a new hardware release from the Pi Foundation is becoming somewhat of a tradition. This year is no different: a new Raspberry Pi has been announced. The Raspberry Pi Zero W is the latest iteration of the Pi foundation’s tiny and extremely inexpensive single board computer. It’s a Raspberry Pi Zero with WiFi and Bluetooth.

The specs of the new Pi Zero W are nearly identical to the previous incarnation of the non-W Zero. It sports a 1GHz single-core processor, 512 MB of RAM, features Mini HDMI and USB OTG ports, uses a micro USB port for power, features the now-standard 40-pin header with four additional pins for composite video and a reset button. This board, like the second hardware revision of the Pi Zero, also features a CSI camera connector.

Of course, the big feature is the addition of WiFi and Bluetooth. The Pi Zero W adds the wireless functionality from the Raspberry Pi 3B. That’s 802.11n and Bluetooth 4.0.

The Pi Zero’s claim to fame was, of course, the price. The original Pi Zero was at first a bit of hardware glued to the cover of the MagPi magazine, later to sell for just $5 USD. The Raspberry Pi Zero W is priced at just $10.

Continue reading “$10 Raspberry Pi Zero W Adds WiFi And Bluetooth”

Audi Engineer Exposes Cheat Order

In an interesting turn of events last week in a German court, evidence has materialized that engineers were ordered to cheat emissions testing when developing automotive parts.

Last Tuesday, Ulrich Weiß brought forward a document that alleges Audi Board of Director members were involved in ordering a cheat for diesel emissions. Weiß was the head of engine development for Audi, suspended in November of 2015 but continued to draw more than half a million dollars in salary before being fired after prior to last week’s court testimony.

Volkswagen Group is the parent company of Audi and this all seems to have happened while the VW diesel emissions testing scandal we’ve covered since 2015 was beginning to come to light. Weiß testified that he was asked to design a method of getting around strict emissions standards in Hong Kong even though Audi knew their diesel engines weren’t capable of doing so legitimately.

According to Weiß, he asked for a signed order. When he received that order he instructed his team to resist following it. We have not seen a copy of the letter, but the German tabloid newspaper Bild reports that the letter claims approval by four Audi board members and was signed by the head of powertrain development at the company.

Hackaday was unable to locate any other sources reporting on the letter other than the Bild article we have linked to (also the source used in the Forbes article above). Sources such as Die Welt reference only “internal papers”. If you know of other reporting on the topic please leave a comment about it below.

 

San Francisco Tapped For Hackaday Unconference On March 18th

We want you to make the next Hackaday live event great. This is an Unconference in San Francisco on Saturday, March 18th and it depends completely on you. Get signed up now!

You’re in Control of the Hackaday Unconference

An unconference is a live event where you decide the topic, guide the discussion, and generally make it an epic Saturday. We have a handful of speakers lined up to help get things started. But we also want you to be ready to give a talk. Everyone that shows up should be prepared to stand up and deliver eight minutes on something they find exciting right now.

Kicking off the night we’ll ask each person to tell us the title or topic of their talk and approximate length of the presentation. Once all the titles are written down we’ll hammer out the schedule right then and there. If you haven’t been to an unconference this is the time to sign up, collect your thoughts, and jump into an afternoon of extemporaneous idea-sharing. If you have been to an unconference we’re guessing you signed up as soon as you saw this announcement.

Continue reading “San Francisco Tapped For Hackaday Unconference On March 18th”

The AI Is Always Watching

My phone can now understand me but it’s still an idiot when it comes to understanding what I want. We have both the hardware capacity and the software capacity to solve this right now. What we lack is the social capacity.

We are currently in a dumb state of personal automation. I have Google Now enabled on my phone. Every single month Google Now reminds me of bills coming due that I have already paid. It doesn’t see me pay them, it just sees the email I received and the due date. A creature of habit, I pay my bills on the last day of the month even though that may be weeks early. This is the easiest thing in the world for a computer to learn. But it’s an open loop system and so no learning can happen.

Earlier this month [Cameron Coward] wrote an outstanding pair or articles on AI research that helped shed some light on this problem. The correct term for this level of personal automation is “weak AI”. What I want is Artificial General Intelligence (AGI) on a personal level. But that’s not going to happen, and I am the problem. Here’s why.

Continue reading “The AI Is Always Watching”

What Does A Hacker Do With A Photocopier?

The year is 2016. Driving home from a day’s work in the engineering office, I am greeted with a sight familiar to any suburban dwelling Australian — hard rubbish. It’s a time when local councils arrange a pickup service for anything large you don’t want anymore — think sofas, old computers, televisions, and the like. It’s a great way to make any residential area temporarily look like a garbage dump, but there are often diamonds in the rough. That day, I found mine: the Ricoh Aficio 2027 photocopier.

It had spent its days in a local primary school, and had survived fairly well. It looked largely intact with no obvious major damage, and still had its plug attached. Now I needed to get it home. This is where the problems began.

Continue reading “What Does A Hacker Do With A Photocopier?”

SHAttered — SHA-1 Is Broken In

A team from Google and CWI Amsterdam just announced it: they produced the first SHA-1 hash collision. The attack required over 9,223,372,036,854,775,808 SHA-1 computations, the equivalent processing power as 6,500 years of single-CPU computations and 110 years of single-GPU computations. While this may seem overwhelming, this is a practical attack if you are, lets say, a state-sponsored attacker. Or if you control a large enough botnet. Or if you are just able to spend some serious money on cloud computing. It’s doable. Make no mistake, this is not a brute-force attack, that would take around 12,000,000 single-GPU years to complete.

SHA-1 is a 160bit standard cryptographic hash function that is used for digital signatures and file integrity verification in a wide range of applications, such as digital certificates, PGP/GPG signatures, software updates, backup systems and so forth. It was, a long time ago, proposed as a safe alternative to MD5, known to be faulty since 1996. In 2004 it was shown that MD5 is not collision-resistant and not suitable for applications like SSL certificates or digital signatures. In 2008, a team of researchers demonstrated how to break SSL based on MD5, using 200 Playstations 3.

Early since 2005 theoretical attacks against SHA-1 were known. In 2015 an attack on full SHA-1 was demonstrated (baptized the SHAppening). While this did not directly translate into a collision on the full SHA-1 hash function due to some technical aspects, it undermined the security claims for SHA-1. With this new attack, dubbed SHAttered, the team demonstrated a practical attack on the SHA-1 algorithm, producing two different PDF files with the same checksum.

The full working code will be released in three months, following Google’s vulnerability disclosure policy, and it will allow anyone to create a pair of PDFs that hash to the same SHA-1 sum given two distinct images and some, not yet specified, pre-conditions.

For now, recommendations are to start using SHA-256 or SHA-3 on your software. Chrome browser already warns if a website has SHA-1 certificate, Firefox and the rest of the browsers will surely follow. Meanwhile, as always, tougher times are ahead for legacy systems and IoT like devices.