Roll Up Your Sleeve, Watch A Video With This Smart Watch Forearm Projector

We’re all slowly getting used to the idea of wearable technology, fabulous flops like the creepy Google Glass notwithstanding. But the big problem with tiny tech is in finding the real estate for user interfaces. Sure, we can make it tiny, but human fingers aren’t getting any smaller, and eyeballs can only resolve so much fine detail.

So how do we make wearables more usable? According to Carnegie-Mellon researcher [Chris Harrison], one way is to turn the wearer into the display and the input device (PDF link). More specifically, his LumiWatch projects a touch-responsive display onto the forearm of the wearer. The video below is pretty slick with some obvious CGI “artist’s rendition” displays up front. But even the somewhat limited displays shown later in the video are pretty impressive. The watch can claim up to 40-cm² of the user’s forearm for display, even at the shallow projection angle offered by a watch bezel only slightly above the arm — quite a feat given the irregular surface of the skin. It accomplishes this with a “pico-projector” consisting of red, blue, and green lasers and a pair of MEMS mirrors. The projector can adjust the linearity and brightness of the display to provide a consistent image across the uneven surface. An array of 10 time-of-flight sensors takes care of watching the display area for touch input gestures. It’s a fascinating project with a lot of potential, but we wonder how the variability of the human body might confound the display. Not to mention the need for short sleeves year round.

Need some basics on the micro-electrical mechanic systems (MEMS) behind the pico-projector in this watch? We’ve got a great primer on these microscopic machines.

Continue reading “Roll Up Your Sleeve, Watch A Video With This Smart Watch Forearm Projector”

ETextile Spring Break Tackles Signal Blocking, Audio Generation, And Radio Transmissions

Finding a killer application for e-textiles is the realm of the hacker and within that realm, anything goes. Whether it’s protecting your digital privacy with signal shielding, generating audio with a wearable BeagleBone or 555 timer, or making your favorite garment into an antenna, the eTextile Spring Break is testing out ways to combine electronics and fabric.

You may be asking yourself “What are e-textiles good for?”. Well, that’s an excellent question and likely the most common one facing the industry today. I’m afraid I won’t be able to give a definitive answer. As an e-textile practitioner, I too am constantly posing this question to myself. There’s an inherently personal nature to fabric worn on the body and to our electronic devices that makes this answer elusive. Instead of trying to fabricate some narrow definition, what I offer is a look at topics of interest, material experimentation, and technical exploration through the lens of a week-long event held recently in New York called eTextile Spring Break.

Continue reading “ETextile Spring Break Tackles Signal Blocking, Audio Generation, And Radio Transmissions”

Learning Software In A Soft Exosuit

Wearables and robots don’t often intersect, because most robots rely on rigid bodies and programming while we don’t. Exoskeletons are an instance where robots interact with our bodies, and a soft exosuit is even closer to our physiology. Machine learning is closer to our minds than a simple state machine. The combination of machine learning software and a soft exosuit is a match made in heaven for the Harvard Biodesign Lab and Agile Robotics Lab.

Machine learning studies a walker’s steady gait for twenty periods while vitals are monitored to assess how much energy is being expended. After watching, the taught machine assists instead of assessing. This type of personalization has been done in the past, but the addition of machine learning shows that the necessary customization can be programmed into each machine without a team of humans.

Exoskeletons are no stranger to these pages, our 2017 Hackaday Prize gave $1000 to an open-source set of robotic legs and reported on an exoskeleton to keep seniors safe.

Continue reading “Learning Software In A Soft Exosuit”

A Machinist’s Foray Into Jewelry Making

Machinists are expected to make functional items from stock material, at least hat’s the one-line job description even though it glosses over many important details. [Eclix] wanted a birthday gift for his girlfriend that wasn’t just jewelry, indeed he wanted jewelry made with his own hands. After all, nothing in his skillset prohibits him from making beautiful things. He admits there were mistakes, but in the end, he came up with a recipe for two pairs of earrings, one set with sapphires and one with diamonds.

He set the gems in sterling silver which was machined to have sockets the exact diameter and depth of the stones. The back end of the rods were machined down to form the post for the clutch making each earring a single piece of metal and a single gemstone. Maintaining a single piece also eliminates the need for welding or soldering which is messy according to the pictures.

This type of cross-discipline skill is one of the things that gives Hackaday its variety. In that regard, consider the art store for your hacking needs and don’t forget the humble library.

Cracking A Bluetooth Credit Card

You might be surprised to find out that it’s actually not a good idea to put all of your credit card information on a little Bluetooth enabled device in your pocket. Oh, what’s that? You knew already? Well in that case you won’t find the following information terribly shocking, but it’s still a fascinating look at how security researchers systematically break down a device in an effort to find the chinks in its armor.

[Mike Ryan] of ICE9 Consulting has recently published an article detailing the work done to examine and ultimately defeat the security on the FUZE Card. From using an x-ray machine to do non-destructive reconnaissance on the device’s internals to methodically discovering all the commands it responds to over Bluetooth, it’s safe to say the FUZE Card is cracked wide open at this point.

To be clear, the attacker must still pair with FUZE, so physical access is required. But as pointed out by [Mike] in the blog post, handing your card over to a merchant is standard operating procedure in many cases. It isn’t as if it would be hard to get a hold of one of these FUZE cards for a minute or two without the owner becoming suspicious. Pairing FUZE to the Linux device to continue to the next step of the attack only takes a few seconds, as demonstrated in the video after the break.

Once paired, the attacker can simply send a BLE command to FUZE which disables the lock screen. It’s really that simple. The attacker can also send commands to dump credit card info over Bluetooth, meaning they could download your information even when the card is “safely” back in your pocket. The inherent failure in the FUZE design is that you don’t need to provide any sort of authentication to pair it to a new Bluetooth device. It makes the (very dangerous) assumption that the person holding it is entitled to do so.

Even if you know better than to ever buy a device like this, the post [Mike] has written up is really a must-read for anyone who’s ever looked at a device and tried to figure out what was going on in its little silicon brain. We especially liked his assertion that reverse engineering a device essentially boils down to: “staring, thinking, a little experimentation, but mostly staring and thinking.” We’re having an internal debate here at Hackaday HQ about making that the site’s tagline.

Incidentally, this is very similar to the Bluetooth gun “safe” that was cracked not so long ago. At this point, it might be wise to just stay away from anything with that little blue logo on it if you intend to trust it with your identity and/or deadly weapon.

Continue reading “Cracking A Bluetooth Credit Card”

A Gif-Playing Top Hat For FRC 2018!

In gearing up to mentor a team at the 2018 FIRST Robotics Competition, redditor [dd0626] wanted to do something cool that resonated with this year’s 8-bit gaming theme. Over the course of a few days, they transformed a top hat into a thematically encapsulating marquee: a LED matrix display loaded with gifs!

The display is actually a sleeve — made from shipping foam, a pillow case, and an old t-shirt — that fits over the hat, leaving it intact and wearable for future events. A Teensy3.6 displays the gifs on four WS2812 16×16 RGB LED matrices, and while a sheer black fabric diffuses the light, it’s still best viewed from several feet away. This is decidedly not intended to be a stealthy hat display.

To mitigate current draw, [dd0626] is using a 5V 30A DC/DC converter and keeping the brightness at a minimum — otherwise, each panel can pull up to 15A! To offset any dip in performance, they’ve bundled in a massive 22,400mAh, 24V battery pack to keep the hat running for a while. Despite all the hardware, the hat weighs under two pounds — eminently wearable for a long day of competition. Continue reading “A Gif-Playing Top Hat For FRC 2018!”