3D Printed Mini MacBook With A Raspberry Pi Heart

Do you like the sleek look of Apple’s laptops? Are you a fan of the Raspberry Pi? Have a particular affinity for hot glue and 3D printed plastic? Then you’re in luck, because this tiny “MacBook” built by serial miniaturizer [Michael Pick] features all of the above (and a good bit more) in one palm-sized package. (Video link, embedded below.)

Getting the LCD panel and Raspberry Pi 4 to fit into the slim 3D printed case took considerable coaxing. In the video after the break, you can see [Michael] strip off any unnecessary components that would stand in his way. The LCD panel had to lose its speakers and buttons, and the Pi has had its Ethernet and USB ports removed. While space was limited, he did manage to squeeze an illuminated resin-printed Apple logo into the lid of the laptop to help sell the overall look.

The bottom half of the machine has a number of really nice details, like the fan grill cut from metal hardware cloth and a functional “MagSafe” connector made from a magnetic USB cable. The keyboard PCB and membrane was liberated from a commercially available unit, all [Michael] needed to do was model in the openings for the keys. Since the keyboard already came with its own little trackpad, the lower one is just there for looks.

Speaking of which, to really drive home the Apple aesthetic, [Michael] made the bold move of covering up all the screws with body filler after assembly. It’s not a technique we’d necessarily recommend, but gluing it shut would probably have made it even harder to get back into down the line.

We’ve previously seen [Michael] create a miniature rendition of the iMac and an RGB LED equipped “gaming” computer using many of the same parts and techniques. He’ll have to start branching off into less common machines to replicate soon, which reminds us that we’re about due for another tiny Cray X-MP.

Continue reading “3D Printed Mini MacBook With A Raspberry Pi Heart”

Hackaday Links Column Banner

Hackaday Links: August 23, 2020

Apple, the world’s first trillion-dollar company — give or take a trillion — has built a bit of libertarian cachet by famously refusing to build backdoors into their phones, despite the entreaties of the federal government. So it came as a bit of a surprise when we read that the company may have worked with federal agents to build an “enhanced” iPod. David Shayer says that he was one of three people in Apple who knew about the 2005 program, which was at the behest of the US Department of Energy. Shayer says that engineers from defense contractor Bechtel, seemed to want to add sensors to the first-generation iPod; he was never clued in fully but suspects they were adding radiation sensors. It would make sense, given the climate in the early 2000s, walking down the street with a traditional Geiger counter would have been a bit obvious. And mind you, we’re not knocking Apple for allegedly working with the government on this — building a few modified iPods is a whole lot different than turning masses of phones into data gathering terminals. Umm, wait…

A couple of weeks back, we included a story about a gearhead who mounted a GoPro camera inside of a car tire. The result was some interesting footage as he drove around; it’s not a common sight to watch a tire deform and move around from the inside like that. As an encore, the gearhead in question, Warped Perception, did the same trick bit with a more destructive bent: he captured a full burnout from the inside. The footage is pretty sick, with the telltale bubbles appearing on the inside before the inevitable blowout and seeing daylight through the shredded remains of the tire. But for our money, the best part is the slo-mo footage from the outside, with the billowing smoke and shredded steel belts a-flinging. We appreciate the effort, but we’re sure glad this guy isn’t our neighbor.

Speaking of graphic footage, things are not going well for some remote radio sites in California. Some towers that host the repeaters used by public service agencies and ham radio operators alike have managed to record their last few minutes of life as wildfires sweep across the mountains they’re perched upon. The scenes are horrific, like something from Dante’s Inferno, and the burnover shown in the video below is terrifying; watch it and you’ll see a full-grown tree consumed in less than 30 seconds. As bad as the loss of equipment is, it pales in comparison to what the firefighters face as they battle these blazes, but keep in mind that losing these repeaters can place them in terrible jeopardy too.

Continue reading “Hackaday Links: August 23, 2020”

Pi Saves Vintage Mac Case From A Watery Grave

Like many before it, this Mac 512K case was originally slated to get turned into a kitschy desktop aquarium. But its owner never found the time to take on the project, and instead gave it to [Tony Landi]. Luckily, he decided to forgo the fish and instead outfit the case with a new LCD display and Raspberry Pi to emulate Mac OS 7.5.

Mounting the LCD and associated electronics.

In the video after the break, [Tony] walks viewers through the process of mounting the new components into the nearly 30+ year old enclosure. Things are naturally made a lot easier by the fact that the modern electronics take up a small fraction of the Mac’s internal volume. Essentially the only things inside the case are the 10 inch 4:3 LCD panel, the Raspberry Pi, and a small adapter that turns the Mac’s pre-ADB keyboard into standard USB HID.

[Tony] had to design a 3D printed adapter to mount the modern LCD panel to the Mac’s frame, and while he was at it, he also came up with printable dummy parts to fill in the various openings on the case that are no longer necessary. The mock power switch on the back and the static brightness adjustment knob up front are nice touches, and the STLs for those parts will certainly be helpful for others working on similar Mac conversions.

With the hardware out of the way, [Tony] switches gears and explains how he got the emulated Mac OS environment up and running on the Raspberry Pi. Again, even if you don’t exactly follow his lead on this project, his thorough walk-through on the subject is worth a watch for anyone who wants to mess around with Apple software from this era.

Continue reading “Pi Saves Vintage Mac Case From A Watery Grave”

Recreating Early Apple Mice For The Modern Era

At a time when practical graphical user interfaces were only just becoming a reality on desktop computers, Apple took a leap of faith and released one of the first commercially available mice back in 1983. It was criticized as being little more than a toy back then, but we all know how that particular story ends.

While the Apple G5431 isn’t that first mouse, it’s not too far removed. So much so that [Stephen Arsenault] believed it was worthy of historic preservation. Whether you want to print out a new case to replace a damaged original or try your hand at updating the classic design with modern electronics, his CAD model of this early computer peripheral is available under the Creative Commons license for anyone who wants it.

The model is exceptionally well detailed.

[Stephen] tells us that he was inspired to take on this project after he saw new manufactured cases for the G5431 popping up online, including a variant made out of translucent plastic. Realizing that a product from 1986 is old enough that Apple (probably) isn’t worried about people cloning it, he set out to produce this definitive digital version of the original case components for community use.

With these 3D models available, [Stephen] hopes that others will be inspired to try and modify the iconic design of the G5431. Perhaps by creating a Bluetooth version, or adding the ability to right-click. Considering we’ve already seen custom PCBs for mice, it’s hardly a stretch. We’d love to see somebody take him up on the offer, but even if not, the digital preservation of computer history is always welcome.

This Week In Security: Twitter, Windows DNS, SAP RECON

Twitter just had their biggest security breach in years. Mike warned us about it on Wednesday, but it’s worth revisiting a few of the details. The story is still developing, but it appears that malicious actors used social engineering to access an internal Twitter dashboard. This dashboard, among other interesting things, allows directly changing the email address associated with an account. Once the address is changed to the attacker’s, it’s simple to do a password reset and gain access.

The bitcoin address used in the crypto scam ended up receiving nearly $120,000 USD worth of bitcoin, all of which has been shuffled off into different accounts. It’s an old and simple scam, but was apparently rather believable because the messages were posted by verified Twitter accounts.

Screenshot from Motherboard

A series of screenshots have been posted, claiming to be the internal Twitter dashboard used in the attack. More than a few eyebrows have been raised, as a result of that dashboard. First off, the fact that Twitter employees can directly change an account’s email address is asking for trouble. Even more interesting are the tags that can be added to an account. “Trends Blacklist” and “Search Blacklist” do call to mind the rumors of shadow-banning, but at this point it’s impossible to know the details. Motherboard is reporting that Twitter is removing that screenshot across the board when it’s posted, and even suspending accounts that post it. Of course, they’d do that if it were faked as well, so who knows? Continue reading “This Week In Security: Twitter, Windows DNS, SAP RECON”

X-Ray Sleuthing Unveils The Fake In Your Adaptors

Lets face it, the knock-off variety of our favourite adaptors, cables and accessories are becoming increasingly challenging to spot. We would be the first to admit, to have at some point, been stooped by a carefully crafted counterfeit by failing to spot the tell-tale yet elusive indicators such as the misplaced font face, the strategically misspelled logo or perhaps the less polished than expected plastic moulding and packaging. When you finally come around to using it, if you are lucky the item is still more or less functionally adequate, otherwise by now the inferior performance (if not the initial cost!) would have made it pretty obvious that what you have is infact a counterfeit.

[Oliver] recently found himself in a similar situation, after acquiring a seemingly original Lightning to Headphone Adaptor. Rather than dismay, [Oliver] decided to channel this energy into an excellent forensic investigation to uncover just what exactly made this imitation so deceptive. He began by comparing the packaging, printed typeface and the plastic moulding, all of which gave very little away. [Oliver] concluded that atleast superficially, the clone was rather good and the only way to settle this was to bring out the X-ray, of course!  

The resulting images of the innards make it blatantly obvious as to why the adaptor is indeed very fake. For a start, compared to the original adaptor, the clone hosts a far more thin BOM count! If you are really serious in getting some training to better spot counterfeits, check out a post we featured earlier on the subject!

Changing System Architectures And The Complexities Of Apple’s Butterfly Approach To ISAs

Apple computers will be moving away from Intel chips to its own ARM-based design. An interesting thing about Apple as a company is that it has never felt the need to tie itself to a particular system architecture or ISA. Whereas a company like Microsoft mostly tied its fortunes to Intel’s x86 architecture, and IBM, Sun, HP and other giants preferred vertical integration, Apple is currently moving towards its fifth system architecture for its computers since the company was formed.

What makes this latest change possibly unique, however, is that instead of Apple relying on an external supplier for CPUs and peripheral ICs, they are now targeting a vertical integration approach. Although the ARM ISA is licensed to Apple by Arm Holdings, the ‘Apple Silicon’ design that is used in Apple’s ARM processors is their own, produced by Apple’s own engineers and produced by foundries at the behest of Apple.

In this article I would like to take a look back at Apple’s architectural decisions over the decades and how they made Apple’s move towards vertical integration practically a certainty.

Continue reading “Changing System Architectures And The Complexities Of Apple’s Butterfly Approach To ISAs”