Review: The New Essential Guide To Electronics In Shenzhen

The city of Shenzhen in China holds a special fascination for the electronic hardware community, as the city and special economic zone established by the Chinese government at the start of the 1980s it has become probably one of the most important in the world for electronic manufacturing. If you’re in the business of producing electronic hardware you probably want to do that business there, and if you aren’t, you will certainly own things whose parts were made there. From the lowly hobbyist who buys a kit of parts on AliExpress through the project featured on Hackaday with a Shenzhen-made PCB, to the engineer bringing an electronic product to market, it’s a place which has whether we know it or not become part of our lives.

First, A Bit Of History

A picture of booths in a Shenzhen market
These are the markets we have been looking for. Credit: Naomi Wu.

At a superficial level it’s very easy to do business there, as a quick trawl through our favourite Chinese online retailers will show. But when you’ve graduated from buying stuff online and need to get down to the brass tacks of sourcing parts and arranging manufacture, it becomes impossible to do so without  being on the ground. At which point for an American or European without a word of Chinese even sourcing a resistor becomes an impossibly daunting task. To tackle this, back in 2016 the Chinese-American hardware hacker and author Andrew ‘bunnie’ Huang produced a slim wire-bound volume, The Essential Guide to Electronics in Shenzhen. This book contained both a guide to the city’s legendary Huaquanbei electronics marts and a large section of point-to-translate guides for parts, values, and all the other Chinese phrases which a non-Chinese-speaker might need to get their work done in the city. It quickly became an essential tool for sourcing in Shenzhen, and more than one reader no doubt has a well-thumbed copy on their shelves.

There are places in the world where time appears to move very slowly, but this Chinese city is not one of them. A book on Shenzhen written in 2016 is now significantly out of date, and to keep pace with its parts that have since chanced beyond recognition, an update has become necessary. In this endeavour the mantle has passed to the hardware hacker and Shenzhen native Naomi Wu, someone with many years experience in introducing the people, culture, and industries of her city to the world. Her updated volume, The New Essential Guide to Electronics in Shenzhen has been the subject of a recent crowdfunding effort, and I was lucky enough to snag one. It’s a smart hardcover spiral-bound book with a red and gold cover, and it’s time to open it up and take a look. Continue reading “Review: The New Essential Guide To Electronics In Shenzhen”

Bunnie Huang’s Shenzhen Guide Gets A New Edition – Written By Naomi Wu

If there’s one city which can truly claim to be the powerhouse of high-tech manufacturing here in the 21st century, it’s the Chinese city of Shenzhen. It’s likely that few people don’t own something made in that city or with parts that have passed through companies in the legendary electronic component markets of its Huaqiangbei district.

For years now the essential introduction to this world has come in the form of [Bunnie Huang]’s Essential Guide to Electronics in Shenzhen, a publication that unlocks the Chinese-speaking maze of vendors. All paper publications eventually become dated though, and this guide is no exception, so we’re very pleased to see a new version is on its way. Better still, it comes courtesy of Shenzhen native and maker extraordinaire [Naomi Wu], whose video series on YouTube has opened up so many corners of her city for those of us thousands of miles away. We can’t wait to see what she puts in it.

It’s also very good indeed on another level to see [Naomi]’s involvement, as earlier in the year she had to curtail her social media output under pressure from the Chinese government. We miss her unique window into the wonders of her city, and aside from her online shop it’s been concerning to hear very little from her of late. You can hear her talking about the book in a promotional video below the break.

Continue reading “Bunnie Huang’s Shenzhen Guide Gets A New Edition – Written By Naomi Wu”

Here’s How The Precursor Protects Your Privacy

At some point, you will find yourself asking – is my device actually running the code I expect it to? [bunnie] aka [Andrew Huang] is passionate about making devices you can fundamentally, deeply trust, and his latest passion project is the Precursor communicator.

At the heart of it is an FPGA, and Precursor’s CPU is created out of the gates of that FPGA. This and a myriad of other design decisions make the Precursor fundamentally hard to backdoor, and you don’t have to take [bunnie]’s word for it — he’s made an entire video going through the architecture, boot protections and guarantees of the Precursor, teaching us what goes into a secure device that’s also practical to use.

Screenshot from the video, showing a diagram of how precursor's software and hardware components relate to each other If you can’t understand how your device works, your trust in it might be misplaced. In the hour long video, [bunnie] explains the entire stack, from the lower levels of hardware to root keys used to sign and verify the integrity of your OS, along the way demonstrating how you can verify that things haven’t gone wrong.

He makes sure to point out aspects you’d want to be cautious of, from physical security limitations to toolchain nuances. If you’re not up for a video, you can always check out the Precursor wiki, which has a treasure trove of information on the device’s security model.

As you might’ve already learned, it’s not enough for hardware to be open-source in order to be trustworthy. While open-source silicon designs are undoubtedly the future, their security guarantees only go so far.

Whether it’s esoteric hard drive firmware backdoors, weekend projects turning your WiFi card into a keylogger, or rootkits you can get on store-bought Lenovo laptops, hell, even our latest This Week In Security installment has two fun malware examples – there’s never a shortage of parties interested in collecting as much data as possible.

Bunnie’s Betrusted Makes First Appearance As Mobile, FPGA-Based SoC Development Kit

Recently, [Bunnie Huang] announced his Precursor project: a spiffy-looking case housing a PCB with two FPGAs, a display, battery and integrated keyboard. For those who have seen [bunnie]’s talk at 36C3 last year, the photos may look very familiar, as it is essentially the same hardware as the ‘Betrusted’ project is intended to use. This also explains the name, with this development kit being a ‘precursor’ to the Betrusted product.

In short, it’s a maximally open, verifiable, and trustworthy device. Even the processor is instantiated on an FPGA so you know what’s going on inside the silicon.

He has set up a Crowd Supply page for the Precursor project, which provides more details. The board features a Xilinx Spartan 7 (XC7S50) and Lattice iCE40UP5K FPGA, 16 MB SRAM, 128 MB Flash, integrated WiFi (Silicon Labs WF200-based), a physical keyboard and 1100 mAh Lio-Ion battery. The display is a 200 ppi monochrome 336 x 536 px unit, with both the display and keyboard backlit.

At this point [bunnie] is still looking at how much interest there will be for Precursor if a campaign goes live. Regardless of whether one has any interest in the anti-tamper and security features, depending on the price it might be a nice, integrated platform to tinker with.

Busting GPS Exercise Data Out Of Its Garmin-controlled IoT Prison

If you take to the outdoors for your exercise, rather than walking the Sisyphusian stair machine, it’s nice to grab some GPS-packed electronics to quantify your workout. [Bunnie Huang] enjoys paddling the outrigger canoe through the Singapore Strait and recently figured out how to unpack and visualize GPS data from his own Garmin watch.

By now you’ve likely heard that Garmin’s systems were down due to a ransomware attack last Thursday, July 23rd. On the one hand, it’s a minor inconvenience to not be able to see your workout visualized because of the system outage. On the other hand, the services have a lot of your personal data: dates, locations, and biometrics like heart rate. [Bunnie] looked around to see if he could unpack the data stored on his Garmin watch without pledging his privacy to computers in the sky.

Obviously this isn’t [Bunnie’s] first rodeo, but in the end you don’t need to be a 1337 haxor to pull this one off. An Open Source program called GPSBabel lets you convert proprietary data formats from a hundred or so different GPS receivers into .GPX files that are then easy to work with. From there he whipped up less than 200 lines of Python to plot the GPS data on a map and display it as a webpage. The key libraries at work here are Folium which provides the pretty browsable map data, and Matplotlib to plot the data.

These IoT devices are by all accounts amazing, listening for satellite pings to show us how far and how fast we’ve gone on web-based interfaces that are sharable, searchable, and any number of other good things ending in “able”. But the flip side is that you may not be the only person seeing the data. Two years ago Strava exposed military locations because of an opt-out policy for public data sharing of exercise trackers. Now Garmin says they don’t have any indications that data was stolen in the ransomware attack, but it’s not a stretch to think there was a potential there for such a data breach. It’s nice to see there are Open Source options for those who want access to exercise analytics and visualizations without being required to first hand over the data.

Form 3 SLA Printer Teardown, Bunnie Style

[Bunnie Huang] has shared with all of us his utterly detailed teardown on the Form 3 SLA printer from Formlabs (on the left in the image above) and in it he says one of the first things he noticed when he opened it to look inside was a big empty space where he expected to see mirrors and optics. [Bunnie] had avoided any spoilers about the printer design and how it worked, so he was definitely intrigued.

The view inside the Form 3.

Not only does the teardown reveal the kind of thoughtful design and construction that [Bunnie] has come to expect of Formlabs, but it reveals that the Form 3 has gone in an entirely new direction with how it works. Instead of a pair of galvanometers steering a laser beam across a build surface (as seen in the Form 1 and Form 2 printers) the new machine is now built around what Formlabs calls an LPU, or Light Processing Unit, which works in conjunction with a new build tank and flexible build surface. In short, the laser and optics are now housed in a skinny, enviromentally-sealed unit that slides left and right within the printer. A single galvo within steers the laser vertically, as the LPU itself moves horizontally. Payoffs from this method include things such as better laser resolution, the fact that the entire optical system is no longer required to sit directly underneath a vat of liquid resin, and that build sizes can be bigger. In addition, any peeling forces that a model is subjected to are lower thanks to the way the LPU works.

Details about exactly how the Form 3 works are available on Formlabs’ site and you can also see it in action from a practical perspective on Adam Savage’s Tested (video link), but the real joy here is the deeply interesting look at the components and assembly through the eyes of someone with [Bunnie]’s engineering experience. He offers insights from the perspective of function, supply, manufacture, and even points out a bit of NASA humor to be found inside the guts of the LPU.

[Bunnie] knows his hardware and he’s certainly no stranger to Formlabs’ work. His earlier Form 2 teardown was equally detailed as was his Form 1 teardown before that. His takeaway is that the Form 3 and how it works represents an evolutionary change from the earlier designs, one he admits he certainly didn’t see coming.

Hackaday Podcast 048: Truly Trustworthy Hardware, Glowing Uranium Marbles, Bitstreaming The USB, Chaos Of Congress

Hackaday editors Elliot Williams and Mike Szczys kick off the first podcast of the new year. Elliot just got home from Chaos Communications Congress (36c3) with a ton of great stories, and he showed off his electric cargo carrier build while he was there. We recount some of the most interesting hacks of the past few weeks, such as 3D-printed molds for making your own paper-pulp objects, a rudimentary digital camera sensor built by hand, a tattoo-removal laser turned welder, and desktop-artillery that’s delivered in greeting-card format.

Take a look at the links below if you want to follow along, and as always tell us what you think about this episode in the comments!

Take a look at the links below if you want to follow along, and as always, tell us what you think about this episode in the comments!

Direct download (60 MB or so.)

Continue reading “Hackaday Podcast 048: Truly Trustworthy Hardware, Glowing Uranium Marbles, Bitstreaming The USB, Chaos Of Congress”