Five Bucks, Three Parts: WiFi Camera Remote

It’s just ridiculous how cheap and easy it is to do some things today that were both costly and difficult just two or three years ago. Case in point: Hackaday.io user [gamaral] built a WiFi remote control for his Canon E3 camera out of just three parts: an ESP8266 module, a voltage regulator, and a stereo plug that the camera uses as its remote trigger.

And the codebase is just about as minimal, although it’s not without its nice touches. Control is easy — just pull down a pin for focus or shutter. The ESP listens to a custom port, and when it gets the message, “presses” or “releases” the pins. It’s a good, simple example of how to work with the ESP IOT SDK.

The timing is all on the client side. [gamaral] knew that he was going to want to play around with how long to hold down the focus button, for instance, so he left that flexible. Using Netcat makes the client-side code completely trivial: echo -n "SHUTTER HOLD" | nc -w 1 -q 1 roosevelt 9021. Bam. And it worked first time. Check the well-done video just below for more details.

And keep your eye on [gamaral]’s Hackaday.io page, because he’s going to make another video when the PCBs arrive in the mail.

Continue reading “Five Bucks, Three Parts: WiFi Camera Remote”

The Trouble With Intel’s Management Engine

Something is rotten in the state of Intel. Over the last decade or so, Intel has dedicated enormous efforts to the security of their microcontrollers. For Intel, this is the only logical thing to do; you really, really want to know if the firmware running on a device is the firmware you want to run on a device. Anything else, and the device is wide open to balaclava-wearing hackers.

Intel’s first efforts toward cryptographically signed firmware began in the early 2000s with embedded security subsystems using Trusted Platform Modules (TPM). These small crypto chips, along with the BIOS, form the root of trust for modern computers. If the TPM is secure, the rest of the computer can be secure, or so the theory goes.

The TPM model has been shown to be vulnerable to attack, though. Intel’s solution was to add another layer of security: the (Intel) Management Engine (ME). Extremely little is known about the ME, except for some of its capabilities. The ME has complete access to all of a computer’s memory, its network connections, and every peripheral connected to a computer. It runs when the computer is hibernating, and can intercept TCP/IP traffic. Own the ME and you own the computer.

There are no known vulnerabilities in the ME to exploit right now: we’re all locked out of the ME. But that is security through obscurity. Once the ME falls, everything with an Intel chip will fall. It is, by far, the scariest security threat today, and it’s one that’s made even worse by our own ignorance of how the ME works.

Continue reading “The Trouble With Intel’s Management Engine”

A Power Switch For The Chromecast

Chromecasts are fantastic little products, they’re basically little HDMI sticks you can plug into any monitor or TV, and then stream content using your phone or computer as the controller. They are powered by a micro USB port in the back, and if you’re lucky, your TV has a port you can suck the juice off. But what if you want to turn it off while you use a different input on your TV so that your monitor will auto-sleep? You might have to build a power switch.

Now in all honesty, the Chromecast gets hot but the amount of power it draws when not in use is still pretty negligible compared to the draw of your TV. Every watt counts, and [Ilias] took this as an opportunity to refine his skills and combine a system using an Arduino, Bluetooth, and Android to create a robust power switch solution for the Chromecast.

The setup is rather simple. An HC-05 Bluetooth module is connected to an Attiny85, with some transistors to control a 5V power output. The Arduino takes care of a bluetooth connection and uses a serial input to control the transistor output. Finally, this is all controlled by a Tasker plugin on the Android phone, which sends serial messages via Bluetooth.

All the information you’ll need to make one yourself is available at [Ilias’] GitHub repository. For more information on the Chromecast, why not check out our review from almost three years ago — it’s getting old!

Drawn In By The Siren’s Song

When I say “siren” what do you think of? Ambulances? Air raids? Sigh. I was afraid you were going to say that. We’ve got work to do.

You see, the siren played an important role in physics and mathematics about 150 years ago. Through the first half of the 1900s, this fine apparatus was trivialized, used for its pure noise-making abilities. During the World Wars, the siren became associated with air raids and bomb shelters: a far cry from its romantic origins. In this article, we’re going to take the siren back for the Muses. I want you to see the siren in a new light: as a fundamental scientific experiment, a musical instrument, and in the end, as a great DIY project — this is Hackaday after all.

Continue reading “Drawn In By The Siren’s Song”

Misleading Tech: Kickstarter, Bomb Sights, And Medical Rejuvinators

Every generation thinks it has unique problems and, I suppose, sometimes it is true. My great-grandfather didn’t have to pick a cell phone plan. However, a lot of things you think are modern problems go back much further than you might think. Consider Kickstarter. Sure, there have been plenty of successful products on Kickstarter. There have also been some misleading duds. I don’t mean the stupid ones like the guy who wants to make a cake or potato salad. I mean the ones that are almost certainly vaporware like the induced dream headgear or the Bluetooth tag with no batteries.

Overpromising and underdelivering is hardly a new problem. In the 30’s The McGregor Rejuvenator promised to reverse aging with magnetism, radio waves, infrared and ultraviolet light. Presumably, this didn’t work. Sometimes products do work, but they don’t live up to their marketing hype. The Segway comes to mind. Despite the hype that it would revolutionize transportation, the scooter is now a vehicle for tourists and mall cops.

One of my favorite examples of an overhyped product comes from World War II: The Norden Bomb Sight. What makes the Norden especially interesting is that even today it has a reputation for being highly accurate. However, if you look into it, the Norden–although a marvel for its day–didn’t always live up to its press.

Continue reading “Misleading Tech: Kickstarter, Bomb Sights, And Medical Rejuvinators”

Giant Mersenne Prime Found

Ever hear of a Mersenne prime? These are prime numbers that are one less than a power of two. Named after Marin Mersenne, a French Minim friar, who studied them in the early 17th century, there is a distributed computing project on the Internet to find Mersenne primes called GIMPS (Great Internet Mersenne Prime Search). The project recently announced they have found the largest known prime.

Continue reading “Giant Mersenne Prime Found”

Lady Ada Turns NeXT Equipment Into Something Useful

From the late 80s to the early 90s, [Steve Jobs] wasn’t at Apple. He built another company in the meantime, NeXT Computer, a company that introduced jet black workstations to universities and institutions, developed an incredible emphasis on object-oriented programming, and laid the groundwork for the Unix-ey flavor of Apple’s OS X. Coincidently, there is a lot of old NeXT gear at the Adafruit clubhouse – not that there’s anything wrong with that, we all have our own strange affectations and proclivities. Recently, [Lady Ada] turned one of the strangest components of the NeXT computer ecosystem into something useful: a computer speaker.

The item in question for this build is the NeXT ‘sound box’. When not using the very special NeXT monitor, the NeXT computer connects the monitor, keyboard, and speakers through this odd little box. There are two versions of the NeXT sound box, and peripherals from either version are incompatible with each other. ([Jobs] was known for his sense of design and a desire for a simplified user experience, you know.)

In [Lady Ada]’s initial teardown of the sound box, she discovers a few interesting things about this peripheral. There’s an I2S DAC inside there, connected to an unobtanium DB19 connector. Theoretically, that I2S device could be used to drive the speaker with digital audio. The only problem is the DB19 connector – they’re rare, and [Steve] from Big Mess o’ Wires bought the world’s supply.

Without these connectors, and since it’s only an hour-long show, [Lady Ada] went with the most effective hack. She grabbed a USB audio dongle/card, added a small amplifier, and soldered a few wires onto the power and ground pins of an IC. It’s simple, effective, fast, and turns an awesome looking 30-year-old peripheral into a useful device.