Maker Faire NY: Getting Physical With Minecraft

If you’ve been hanging around Hackaday for a while, you’ve likely seen a few attempts to bridge the real world with the voxel paradise that is Minecraft. In the past, projects have connected physical switches to virtual devices in the game, or took chunks of the game’s blocky landscape and turned it into a 3D printable file. These were interesting enough endeavors, but fairly limited in their scope. They assumed you had an existing world or creation in Minecraft that you wanted to fiddle with in a more natural way, but didn’t do much for actually playing the game.

But “Physical Minecraft” presented at the 2018 World Maker Faire in New York, offered a unique way to bring players a bit closer to their cubic counterparts. Created by [Manav Gagvani], the physical interface has players use a motion detecting wand in combination with an array of miniature Minecraft blocks to build in the virtual world.

The wand even detects various gestures to activate an array of “Spells”, which are effectively automated build commands. For example, pushing the wand forward while making a twisting motion will automatically create a tunnel out of the selected block type. This not only makes building faster in the game, but encourages the player to experiment with different gestures and motions.

A Raspberry Pi 3 runs the game and uses its onboard Bluetooth to communicate with the 3D printed wand, which itself contains a MetaWear wearable sensor board. By capturing his own moves and graphing the resulting data with a spreadsheet, [Manav] was able to boil down complex gestures into an array of integer values which he plugged into his Python code. When the script sees a sequence of values it recognizes, the relevant commands get passed onto the running instance of Minecraft.

You might assume the wand itself is detecting which material block is attached to it, but that bit of magic is actually happening in the base the blocks sit on. Rather than trying to uniquely identify each block with RFID or something along those lines, [Manav] embedded an array of reed switches into the base which are triggered by the presence of the magnet hidden in each block.

These switches are connected directly to the GPIO pins of the Raspberry Pi, and make for a very easy way to determine which block has been removed and installed on the tip of the wand. Things can get tricky if the blocks are put into the wrong positions or more than one block are removed at a time, but for the most part it’s an effective way to tackle the problem without making everything overly complex.

We’ve often talked about how kid’s love for Minecraft has been used as a way of getting them involved in STEM projects, and “Physical Minecraft” was a perfect example. There was a line of young players waiting for their turn on the wand, even though what they were effectively “playing” was the digital equivalent of tossing rocks. [Manav] would hand them the wand and explain the general idea behind his interface, reminding them that the blocks in the game are large and heavy: it’s not enough to just lower the wand, it needs to be flicked with the speed and force appropriate for the hefty objects their digital avatar is moving around.

Getting kids excited about hardware, software, and performing physically demanding activities at the same time is an exceptionally difficult task. Projects like “Physical Minecraft” show there can be more to playing games than mindless button mashing, and represent something of a paradigm shift for how we handle STEM education in an increasingly digital world.

Give Yourself A Sixth Sense With An Arduino

If you carry a smartphone around in your pocket, you have a GPS navigation system, a compass, an altimeter, and a very powerful computer at your fingertips. It’s the greatest navigational device ever created. To use this sextant of the modern era you’ve got to look down at a screen. You need to carry a phone around with you. It’s just not natural.

For this entry into the Hackaday Prize, [Vojtech Pavlovsky] has an innovative solution to direction finding that will give you a sixth sense. It’s a headband that turns your temples into the input for a clever way to find yourself around the city or a forest, and it does it with just an Arduino and a few other bits.

The idea behind the Ariadne Headband is to create a haptic navigation system for blind people, runners, bikers, or really anybody. It does this by mounting four vibration motors on a headband, connecting those motors to an Arduino, sniffing data from a digital compass, and getting data over Bluetooth from an Android app.

All of these parts come together to form a new sense — a sense of direction. By simply telling the app to make sure you’re always oriented North, or to guide you along the grid of city streets, this headband becomes an inconspicuous and extraordinarily useful way to get around.

Bring Your Own Controller Kits Just Add Bluetooth

Known for their build quality and low latency, the [8bitdo] line of Bluetooth controllers are generally well liked among classic videogame devotees. They match modern conveniences like rechargeable batteries and Bluetooth connectivity with old school color schemes and the tried-and-true feel of a D-pad. All of their current offerings are modeled to invoke the same feel of console controllers of the past, however, for some there is no substitute for the original. For that type of hobbyist, the company created DIY Bluetooth mod kits in the form of drop-in replacement PCBs.

The featured mod kits are for the original NES controller, SNES controller, and 6-button Genesis Controller. They feature a 180 mAh Li-ion battery for an estimated 7.5 hours of gameplay, and a unique barrel plug type USB charging cable. The charging port fills the void left by the controller’s connection cable and also doubles a the LED status indicator. Though for the Sega Genesis mod kit, the charge port changes to a standard micro USB.

The [8bitdo] website boasts compatibility across Android, Linux, Mac, and Windows (drivers permitting) and even Nintendo Switch. With the addition of one of the company’s Retro Receivers, you are able to use the controllers on the original NES or SNES alongside their contemporary NES/SNES classic console counterparts.

Continue reading “Bring Your Own Controller Kits Just Add Bluetooth”

Knock-Off AirPods Merged Into Bluetooth Receiver

Whether or not you personally like the concept of the AirPod Bluetooth headphones is irrelevant, as an Apple product one thing is certain: all the cool kids want them. That also means that plenty of overseas manufacturers are pumping out janky clones for a fraction of the price for those who are more about the Apple look than the Apple price tag. Are they any good? No, of course not. But that doesn’t mean you can’t do something interesting with them.

[Igor Kromin] took apart a pair of fake AirPods and was predictably underwhelmed. So much so that he didn’t even bother putting the things back together. Instead, he took the two poor Bluetooth audio receivers and combined them into one slightly less poor Bluetooth audio receiver. It probably doesn’t meet the classical definition of a “good” use of time and/or money, but at least he got some entertainment out of a product that was otherwise destined for the trash.

As you might imagine, the left and right “AirPod” each has its own battery, Bluetooth receiver, and speaker. It has to, as they have no physical connection to each other. That also means that each receiver is only playing one channel, making them useless individually. What [Igor] realized was that he could put together a little PCB that combines the two audio channels back into a regular stereo 3.5 mm audio jack.

While he was at it, he also wired the individual buttons on each headphone to a center button on the PCB which would allow him to physically synchronize them. Even still, [Igor] mentions that occasionally they don’t come on at the same time. But what do you expect for something that’s nearly a 20th the price of the original?

The last time we saw a hack related to the Apple AirPod, it was when somebody threw them out the window, so one might presume most hackers prefer their iDevice tethered.

Beginning BLE Experiments And Making Everything Better

Successfully connecting things without physical wires has a profound effect on the maker brain. Machines talking to each other without any cables is as amazing today as it was a decade ago. When Bluetooth came out, it was a breakthrough since it offered a wireless way to connect cellphones to a PC. But Bluetooth is a complicated, high-bandwidth power hog, and it didn’t make sense for battery-powered devices with less demanding throughput requirements to pay the energy price. Enter Bluetooth LE (BLE), with power requirements modest enough to enable a multitude of applications including low power sensor nodes and beacons.

Over the years, a number of gadgets with BLE have popped up such as the LightBlue Bean, BLE Beacons as well as quadcopters like the FlexBot that rely on BLE for communication. Android or iOS apps are the predominant method of talking to these wonderful gadgets though there are alternatives.

This is the first in a two part series on building with BLE devices. First, I’ll survey some BLE devices and how to get started with BLE from the Linux command line. Later, we will go into describing the process of making a NodeJS cross-platform app that will leverage the BLE capabilities and connect it to the Internet.
Lets get started.
Continue reading “Beginning BLE Experiments And Making Everything Better”

Side Channel Attacks Against Mixed Signal Microcontrollers

You shouldn’t transmit encryption keys over Bluetooth, but that’s exactly what some popular wireless-enabled microcontrollers are already doing. This is the idea behind Screaming Channels, an exploit published by researchers at EUERCOM, and will be a talk at Black Hat next week. So far, the researchers have investigated side-channel attacks on Bluetooth-enabled microcontrollers, allowing them to extract tinyAES keys from up to 10 meters away in controlled environments. A PDF of the paper is available and all the relevant code is available on GitHub.

The experimental setup for this exploit consisted of a BLE Nano, a breakout board for a Nordic nRF52832 Bluetooth microcontroller, a Hack RF, a USRB N210 software defined radio from Ettus, and a few high-gain antennas and LNAs. The example attack relies on installing firmware on the BLE Nano that runs through a few loops and encrypts something with tinyAES. Through very careful analysis of the RF spectrum, the AES keys can be extracted from the ether.

Side channel attacks have received a bit more popularity over recent years. What was once limited to Three Letter Agency-level Van Eck phreaking can now be done inexpensively and in a system with devices like the ChipWhisperer.

Of course, this is only a demonstration of what is possible with side-channel attacks in a highly controlled environment with a significant amount of work gone into the firmware running on the microcontroller. This isn’t evidence that balaclava-wearing hackers are sniffing your phone from across the parking lot to get the password to your Instagram account, but it does show what is possible with relatively cheap, off-the-shelf hardware.

Why Have Only One Radio, When You Can Have Two?

There are a multitude of radio shields for the Arduino and similar platforms, but they so often only support one protocol, manufacturer, or frequency band. [Jan Gromeš] was vexed by this in a project he saw, so decided to create a shield capable of supporting multiple different types. And because more is so often better, he also gave it space for not one, but two different radio modules. He calls the resulting Swiss Army Knife of Arduino radio shields the Kite, and he’s shared everything needed for one on a hackaday.io page and a GitHub repository.

Supported so far are ESP8266 modules, HC-05 Bluetooth modules, RFM69 FSK/OOK modules, SX127x series LoRa modules including SX1272, SX1276 and SX1278, XBee modules (S2B), and he claims that more are in development. Since some of those operate in very similar frequency bands it would be interesting to note whether any adverse effects come from their use in close proximity. We suspect there won’t be because the protocols involved are designed to be resilient, but there is nothing like a real-world example to prove it.

This project is unique, so we’re struggling to find previous Hackaday features of analogous ones. We have however looked at an overview of choosing the right wireless tech.