What do you do when your keenly anticipated hacker camp releases details of its upcoming badge and you really want to have a go at coding for it, but there are no badges for you to try yet? If you are [Artdanion], this is not a problem, you simply build your own.
He found his requirement to interface with genuine hardware exceeded the abilities of the emulator that the SHACamp 2017 badge team had thoughtfully provided, so he reached for breakout boards for the ESP32, the MPR121 touch sensor, and the e-ink display, and assembled his own clone on a piece of stripboard. Not only did it provide him with enough to develop his own apps, he found when he brought it to the event that the public release of the official firmware ran on it with only a few configuration tweaks. He had an official event badge, that wasn’t the event badge. Is this the first time this has been done? We think it might be.
The home-made badge is an impressive piece of work, but it ties into an observation we made at the end of our review of the official version of the SHA2017 badge. The use of an ESP32 with well-designed peripherals and a solid firmware means that this is a design that is likely to form the bedrock upon which some future badges are built. [Artdanion] has proved how straightforward it is to clone, we’d like to be so bold as to make the prediction that we’ll see more developments of this platform at future events. Meanwhile this home-made badge is a neat achievement, and we can only imagine the surprise of the SHA2017 badge team on being presented with a clone of their work for reflashing.
A few weeks ago, we took a look at the best badge hacks at the Hackaday Supercon. These were the best badge hacks anyone has ever seen – including what comes out of DEF CON and the SDR badge from the latest CCC. I’m ascribing this entirely to the free-form nature of the badge; give people a blank canvas and you’re sure to get a diverse field of builds. Now it’s time to take a look at the cream of the crop, hear what the jolly wrencher sounds like, and how to put 1000 Volts in a badge.
There were three categories for the badge hacking competition at the SuperCon – best deadbug, best blinky, and most over the top. A surprising number of people managed to solder, glue, and tape some components to a the piece of FR4 we used as a conference badge, but in the end, only three would win.
Continue reading “The Best Badges Of The SuperCon”
Following up on their post about the new Defcon 17 badges, Wired recently posted some of the best badge hacks of the con. Among the hacks featured were an LED frequency meter hack, a sound seeking dirigible powered by three badges, and a wireless geiger counter random number generator that sent random numbers back to a laptop equipped with a zigbee card. Probably one of the most impressive hacks mentioned, the hack that won the badge hacking contest, was the LED equipped baseball cap modeled above by [Joe Grand], Defcon’s defacto badge designer.
The hacked badge is connected to the cap by an ethernet cable, where the LEDs pulse on and off in order to defeat facial recognition systems. The cap’s designer told Wired that he initially designed the cap in order to sneak into [Grand]’s room to steal the über badges under his protection. Needless to say, the winner doesn’t have to worry about stealing the badges anymore as he was awarded his own über badge at the award ceremony. While we’re not completely sure who pulled off this awesome hack, we congratulate you and all of the participants of the badge hacking contest on your fantastic hacks.
Update: We’ve confirmed that the badge contest winner was in fact [Zoz Brooks], [Grand]’s co-star on the popular Discovery channel show Prototype This. From all indications, his hack seems to be legitimate and not a clever idea, however we are still looking to confirm this. Also, even though Wired’s article stated that the dirigible was sound seeking, we have confirmed that it is sound avoiding. Thank’s to everyone in the comments for pointing these things out.