A Closer Look At The Tanmatsu

A few weeks ago we brought you news of a new palmtop computer for hackers, powered by the new Espressif ESP32-P4 application processor. The Tanmatsu (Japanese for “Terminal”) is a compact handheld device with a QWERTY keyboard and an 800×480 DSI display, and while it currently exists at the final prototype stage there is a pre-order page upon which you can reserve an early production model for yourself. We’ve been lucky enough to be invited to give one a close-up inspection, so it was time to hot-foot it on the train to a Dutch hackerspace in order to bring you a preview.

A Little History, And First Impressions

The Tanmatsu, held in both hands.
Recesses in the case fit well against the hands.

Before looking at the device, it’s time for a little history. The Tanmatsu has its origin in badge.team, the Netherlands-based group that has produced so many European event badges over the years, and it was destined to eventually become the badge for the upcoming WHY2025 hacker camp. As sometimes happens in any community there has been a significant difference of opinion between the event orga and the badge.team folks that it’s inappropriate to go into here, so now it exists as a standalone project. It’s destined to be open-source in its entirety including hardware and software (and we will hold them to that, never fear), but because of the events surrounding its conception the full repositories will be not be made public until some time late in the summer.

Picking the Tanmatsu up and holding it, it’s a rectangular slab a bit larger and thicker than a CD case with that QWERTY keyboard and display on its front face, an array of ports including an SMA socket for a LoRA antenna on its sides, and an expansion connector on its rear. It has a sandwich construction, with a PCB front face, a 3D printed spacer, the PCB itself, and a 3D printed back cover all held together with a set of screws. The recesses on its bottom edge and the lower halves of the sides locate neatly with fingers and thumbs when it’s held in two hands for two-thumb typing. The keyboard is a silicone moulding as is common on this type of device, and while the keys are quite small it was not difficult to type on it. The display meanwhile feels of much higher quality than the SPI parts previously seen on badges. Continue reading “A Closer Look At The Tanmatsu”

Illustrated Kristina with an IBM Model M keyboard floating between her hands.

Keebin’ With Kristina: The One With The Keyboard Configurator

Have you ever wished you could experiment with different layouts super easily, just by adding or removing a few switches here and there and printing a new case? Well, [heyisjambo] says that it’s more than possible with menura, the modular keyboard system.

A collage of menura keyboards, which are modular via the VIK standard.
So many lovely options! Image by [heyisjambo] via GitHub
[heyisjambo] is happy with 36 keys, but is reduced-count-curious and wanted a way to explore without a lot of wasted time and PCBs.

At the same time, [heyisjambo] wanted to experiment with split vs. uni-body construction, and especially the different shapes that are possible when tweaking the angle and distance between them.

And as if that weren’t enough, there’s support for [Sadek Baroudi]’s VIK standard for interfacing data between PCBs, which calls for an FPC 12-pin, 0.5 mm pitch connector and allows for ultra-cool magnetic connectors. This way, you can easily add things like displays, trackpads, and trackballs in the between the halves.

Thanks for the tip, [calculus]!

Continue reading “Keebin’ With Kristina: The One With The Keyboard Configurator”

Underwater Robotics Hack Chat

Join us on Wednesday, February 5 at noon Pacific for the Underwater Robotics Hack Chat with Tony White!

Almost anywhere you look, there’s a good chance you can see a robot at work. Whether they’re sweeping your floors, delivering a snack, building a car, or even driving one, robots are everywhere on this planet. And since over 70% of this planet is covered in water, it makes sense that robots should be there, too. Getting a robot to work underwater at all is one thing, but getting it to work underwater reliably can be quite a challenge. Water always finds a way to ruin your day, after all, and this reality only worsens when you add a little salt into the mix.

join-hack-chatTony White knows the marine engineering field well, having worked in the space for over a decade. He’s currently an applications engineer at Blue Robotics, where he’s worked on everything from full-size autonomous surface vessels to underwater swarm robots. He’s stopping by the Hack Chat to talk about the harsh engineering realities of underwater automation, so if you’ve ever wanted to take the plunge, you’ll want to come to this Hack Chat for sure.

Our Hack Chats are live community events in the Hackaday.io Hack Chat group messaging. This week we’ll be sitting down on Wednesday, February 5 at 12:00 PM Pacific time. If time zones have you tied up, we have a handy time zone converter.

 

Hackaday Links Column Banner

Hackaday Links: February 2, 2025

All things considered, it was a very bad week for aviation here in the United States. Three separate crashes, two of which involved US military aircraft, have left over 70 people dead. We’ll spare you the details since there are plenty of other places to get news like that, but we did want to touch on one bright spot in this week’s aviation news: the first successful supersonic flight by a US-made civilian aircraft. There are a lot of caveats to that claim, but it’s clear that Boom Supersonic is on a path to commercializing supersonic air transportation for the first time since the Concorde was retired. Their XB-1 “Baby Boom” test aircraft managed three separate supersonic runs during the January 28 test flight over the Mojave test range. As usual, Scott Manley has excellent coverage of the test flight, including a look at how Boom used a Starlink terminal and an iPhone to stream cockpit video.

Continue reading “Hackaday Links: February 2, 2025”

This Week In Security: DeepSeek’s Oopsie, AI Tarpits, And Apple’s Leaks

DeepSeek has captured the world’s attention this week, with an unexpected release of the more-open AI model from China, for a reported mere $5 million training cost. While there’s lots of buzz about DeepSeek, here we’re interested in security. And DeepSeek has made waves there, in the form of a ClickHouse database unintentionally opened to the world, discovered by the folks from Wiz research. That database contained chat history and log streams, and API keys and other secrets by extension.

Finding this database wasn’t exactly rocket science — it reminds me of my biggest bug bounty win, which was little more than running a traceroute and a port scan. In this case it was domain and sub domain mapping, and a port scan. The trick here was knowing to try this, and then understanding what the open ports represented. And the ClickHouse database was completely accessible, leaking all sorts of sensitive data. Continue reading “This Week In Security: DeepSeek’s Oopsie, AI Tarpits, And Apple’s Leaks”

Retrotechtacular: The Tyranny Of Large Numbers

Although much diminished now, the public switched telephone network was one of the largest machines ever constructed. To make good on its promise of instant communication across town or around the world, the network had to reach into every home and business, snake along poles to thousands of central offices, and hum through the ether on microwave links. In its heyday it was almost unfathomably complex, with calls potentially passing through thousands of electronic components, any of which failing could present anything from a minor annoyance to a matter of life or death.

The brief but very interesting film below deals with “The Tyranny of Large Numbers.” Produced sometime in the 1960s by Western Electric, the manufacturing arm of the Bell System, it takes a detailed look at the problems caused by scaling up systems. As an example, it focuses on the humble carbon film resistor, a component used by the millions in various pieces of telco gear. Getting the manufacturing of these simple but critical components right apparently took a lot of effort. Initially made by hand, a tedious and error-prone process briefly covered in the film, Western Electric looked for ways to scale up production significantly while simultaneously increasing quality.

While the equipment used by the Western engineers to automate the production of resistors, especially the Librascope LGP-30 computer that’s running the show, may look quaint, there’s a lot about the process that’s still used to this day. Vibratory bowl feeders for the ceramic cores, carbon deposition by hot methane, and an early version of a SCARA arm to sputter gold terminals on the core could all be used to produce precision resistors today. Even cutting the helical groove to trim the resistance is similar, although today it’s done with a laser instead of a grinding wheel. There are differences, of course; we doubt current resistor manufacturers look for leaks in the outer coating by submerging them in water and watching for bubbles, but that’s how they did it in the 60s.

The productivity results were impressive. Just replacing the silver paint used for terminal cups with sputtered gold terminals cut 16 hours of curing time out of the process. The overall throughput increased to 1,200 pieces per hour, an impressive number for such high-reliability precision components, some of which we’d wager were still in service well into the early 2000s. Most of them are likely long gone, but the shadows cast by these automated manufacturing processes stretch into our time, and probably far beyond.

Continue reading “Retrotechtacular: The Tyranny Of Large Numbers”

Forgotten Internet: Giving (or Getting) The Finger

Hey, you know that guy in accounting, Marco? If you want to find out more about him, you’d probably go surf LinkedIn or maybe a social media site. Inside a company, you might look on instant messaging for a profile and even find out if he is at his desk or away. But back in the 1970s, those weren’t options. But if Marco was on the computer system, maybe you could finger him. While that sounds strange to say today, Finger was a common service provided by computer services at the time. It was like a LinkedIn profile page for the 1970s.

Based on RFC 742, Finger was the brainchild for [Les Earnest]. From a user’s point of view, you put a few files in your home directory (usually .project and .plan; both hidden files), and when someone “fingered” you, they’d see some human-friendly output about your account like your name and office location, if you were logged in or not, and the contents of your project and plan files.

Modern versions may also show your public PGP key and other data. You could usually put a file in your home directory called .nofinger if you wanted to stop people from fingering you.

Continue reading “Forgotten Internet: Giving (or Getting) The Finger”