Of course, anytime someone does a power test, you have to wonder if there were any tricks or changes that would have made a big difference. However, the relative data is interesting (even though you could posit situations where even those results would be misleading). You should watch the videos, but the bottom line was a 3000 mAh battery provided 315 days of run time for the ESP8266 and 213 days with the ESP32.
To a ham radio operator used to “short”-wave antennas with lengths listed in tens of meters, the tiny antennas used in the gigahertz bands barely even register. But if your goal is making radio electronics that’s small enough to swallow, an antenna of a few centimeters is too big. Physics determines plausible antenna sizes, and there’s no way around that, but a large group of researchers and engineers have found a way of side-stepping the problem: resonating a nano-antenna acoustically instead of electromagnetically.
Normal antennas are tuned to some extent to the frequency that you want to pick up. Since the wavelength of a 2.5 GHz electromagnetic wave in free space is 120
cm mm, most practical antennas need a wire in the 12-60 cm mm range to bounce signals back and forth. The trick in the paper is to use a special piezomagnetic material as the antenna. Incoming radio waves get quickly turned into acoustic waves — physical movement in the nano-crystals. Since these sound waves travel a lot slower than the speed of light, they resonate off the walls of the crystal over a much shorter distance. A piezoelectric film layer turns these vibrations back into electrical signals.
Ceramic chip antennas use a similar trick. There, electromagnetic waves are slowed down inside the high-permittivity ceramic. But chip antennas are just slowing down EM waves, whereas the research demonstrated here is converting the EM to sound waves, which travel many orders of magnitude slower. Nice trick.
Granted, significant material science derring-do makes this possible, and you’re not going to be fabricating your own nanoscale piezomagnetic antennas any time soon, but with everything but the antenna getting nano-ified, it’s exciting to think of a future where the antennas can be baked directly into the IC.
What to do once you have a sprinkler system installed on your property: buy a sprinkler control system or make your own? The latter, obviously.
[danaman] was determined to hack together a cheap, IoT-enabled system but it wasn’t easy — taking the better part of a year to get working. Instead of starting right from scratch, he used the open-source Sustainable Irrigation Platform(SIP) control software — a Python sprinkler scheduler with some features [danman] was looking for(eg: it won’t activate if there’s rain in the forecast). Since he wasn’t running it with a Raspberry Pi as recommended, [danman] wrote a Python plugin that runs on his home server as a daemon which listens to TCP port 20000 for connections and then updates the relevant relays. Ok, software done; on to the relay controller box!
Terminology is something that gets us all mixed up at some point. [Seytonic] does a great job of explaining the difference between WiFi jammers and deauthenticators in the video embedded below. A lot of you will already know the difference however it is useful to point out the difference since so many people call deauth devices “WiFi Jammers”.
In their YouTube video they go on to explain that jammers basically throw out a load of noise on all WiFi channels making the frequencies unusable in a given distance from the jammer. Jammers are also normally quite expensive, mostly illegal, and thus hard to find unless of course you build your own.
WiFi deauthentication on the other hand works in a very different way. WiFi sends unencrypted packets of data called management frames. Because these are unencrypted, even if the network is using WPA2, malicious parties can send deauthentication commands which boot users off of an access point. There is hope though with 802.11w which encrypts management frames. It’s been around for a while however manufacturers don’t seem bothered and don’t implement it, even though it would improve the security of a WiFi device from these types of attacks.
We love pager hacks. One of our earliest head-slappers was completely reverse-engineering a restaurant pager’s protocol, only to find out that it was industry-standard POCSAG. Doh!
[Corn] apparently scratches the same itch, but in the Netherlands where the FLEX protocol is more common. In addition to walking us through all of the details of the FLEX system, he bought a FLEX pager, gutted it, and soldered on an ATMega328 board and an ESP8266. The former does the FLEX decoding, and the latter posts whatever it hears on his local network.
These days, we’re sure that you could do the same thing with a Raspberry Pi and SDR, but we love the old-school approach of buying a pager and tapping into its signals. And it makes a better stand-alone device with a lot lower power budget. If you find yourself in possession of some old POCSAG pagers, you should check out [Corn]’s previous work: an OpenWRT router that sends pages.
[JBeale] squeezed every last drop of performance from a $5 Doppler radar module, and the secrets of that success are half hardware, half firmware, and all hack.
On the hardware side, the first prototype radar horn was made out of cardboard with aluminum foil taped around it. With the concept proven, [JBeale] made a second horn out of thin copper-clad sheets, but reports that the performance is just about the same. The other hardware hack was simply to tack a wire on the radar module’s analog output and add a simple op-amp gain stage, which extended the sensing range well beyond the ten feet or so that these things are usually used for.
With all that signal coming in, [JBeale] separates out the noise by taking an FFT of the Doppler frequency-shift signal. Figuring that people walk around 2.2 miles per hour, [JBeale] focuses on the corresponding 70 Hz frequency bin and finds that the radar will detect people out to 80 feet. Wow!
This trick of taking an el-cheapo radar unit and amplifying the signal to do something useful isn’t new to Hackaday. [Mathieu] did it with the very same HB-100 unit way back in 2013, and then again with a more modern CDM324 model. But [JBeale]’s hacked horn and clever backend processing push out the limits of what you can expect to do with these cheap units. Kudos.
We don’t know if Batman has a keychain for the keys to the Bat mobile, the Bat copter, and all his other vehicles. But we are guessing if he did, it didn’t look like the one [krishnan793] picked up cheap. It had a little button that lit up some LEDs and played a little tune. [Krishnan] thought he could do better with an ESP8266. After chopping up some headphones and adding a LiPo battery, he wound up with an improved key chain you can see in the video below. The first video is the before video. The second is after the modification. Sure, it is only a small improvement on LEDs and a simple tune, but now it is hackable to do more interesting things if you want to take the trouble to do so.