Two months after its surprise reveal at the 2019 East Coast RepRap Festival, the Prusa Mini has started shipping out to the first wave of early adopters. True to form, with the hardware now officially released to the public, the company has begun the process of releasing the design as open source. In their GitHub repository, owners can already find the KiCad files for the new “Buddy” control board and STLs for the machine’s printable parts.
But even so, not everyone feels that Prusa Research has made the Mini as “open” as its predecessors. Some concerned owners have pointed out that according to the documentation for the Buddy board, they’ll need to physically snap off a section of the PCB so they can flash custom firmware images via Device Firmware Upgrade (DFU) mode. Once this piece of the board has been broken off, which the documentation refers to as the Appendix, Prusa Research will no longer honor any warranty claims for the electronic components of the printer.
For the hardcore tinkerers out there, this news may come as something of a shock. Previous Prusa printers have enjoyed a fairly active firmware development community, and indeed, features that started out as user-developed modifications eventually made their way into the official upstream firmware. What’s more, certain hardware modifications require firmware tweaks to complete.
Prusa Research explains their stance by saying that there’s no way the company can verify the safety of community developed firmware builds. If thermal runaway protections have been disabled or otherwise compromised, the results could be disastrous. We’ve already seen it happen with other printers, so it’s hard to fault them for being cautious here. The company is also quick to point out that the installation of an unofficial firmware has always invalidated the printer’s warranty; physically breaking the board on the Mini is simply meant as a way to ensure the user understands they’re about to leave the beaten path.
How much support is a manufacturer obligated to provide to a user who’s modified their hardware? It’s of course an issue we’ve covered many times before. But here the situation is rather unique, as the user is being told they have to literally break a piece off of their device to unlock certain advanced functionality. If Prusa wanted to prevent users from running alternate firmware entirely they could have done so (or at least tried to), but instead they’ve created a scenario that forces the prospective tinkerer to either back down or fully commit.
So how did Prusa integrate this unusual feature into their brand new 32-bit control board? Perhaps more importantly, how is this going to impact those who want to hack their printers? Let’s find out.
Continue reading “Prusa Dares You To Break Their Latest Printer”
If you’ve built a few PCs, you know how frustrating troubleshooting can be. Finding a faulty component inside the cramped confines of a case can be painful — whether its literal when sharp edges draw blood, or just figurative when you have to open that cramped case multiple times to make adjustments.
[Colonel Camp] decided to make life a bit easier by building this PC test bench which makes component troubleshooting much easier and can be built with old parts you probably have lying around. [Camp] was inspired by an old Linus PC Tech Tips video on the same topic. The key to the build is an old PC case. These cases are often riveted together, s a drill makes quick work of disassembling the chassis to easily get to all of the components. The motherboard pan and rear panel/card cage become the top shelf of the test bench, while the outer shell of the case becomes the base and a storage area. Two pieces of lumber support the upper shelf. The build was primed and painted with several coats of grey.
[Camp] built up his testbench with a modest motherboard, cooler and a 970 video card. He loaded up Manjaro Linux to verify everything worked. The basic hardware has already been replaced with a new system including a ridiculously huge cooler. But that’s all in a day’s work for a test bench PC.
We’ve seen some wild workbenches over the years, and this one fits right in for all your PC projects. Check out the video after the break!
Continue reading “DIY PC Test Bench Puts Hardware Troubleshooting Out In The Open”
Spending an hour or two around any consumer-level padlock or house deadbolt lock with a simple lockpicking kit will typically instil a good amount of panic and concern about security. While it’s true that any lock can be defeated, it’s almost comically easy to pick basic locks like this. So, if you’re looking for a level of security that can’t be defeated in two minutes with a tiny piece of metal, you might want to try something a little more advanced.
This project stemmed from an idea to use a YubiKey, a USB hardware token typically used for two-factor authentication, for physical locks instead. The prototype was built around an Arduino UNO, and all of the code and build instructions are available on the project’s site. The creator, [rprinz08], does not have one built inside of a secure enclosure so that would remain an exercise for the reader, but the proof-of-concept is interesting and certainly useful.
While digital keys like this can have their own set of problems (as all locks do), this would be a great solution for anyone needing to lock up anything where physical keys are a liability or a nuisance, where logging is important, or where many people need access to the same lock. The open source code and well-known platform make it easy for anyone to build, too.
When [Mr. Sobolak] started his DIY Midi Fighter he already had experience with the MIDI protocol, and because it is only natural once you have mastered something to expand on the success and build something more impressive, more useful, and more button-y. He is far from rare in this regard. More buttons mean more than extra mounting holes, for example an Arduino’s I/O will fill up quickly as potentiometers hog precious analog inputs and button arrays take digital ones. Multiplexing came to the rescue, a logic-based way to monitor or control more devices, in contrast to the serial protocols used by an IO expander.
Multiplexing was not in [Mr. Sobolak]’s repertoire, but it was a fitting time to learn and who doesn’t love acquiring a new skill by improving upon a past project? All the buttons were easy enough to mount but keeping the wires tidy was not in the scope of this project, so if you have a weak stomach when it comes to a “bird’s nest” on the underside you may want to look away and think of something neat. Regardless of how well-groomed the wires are, the system works and you can listen to a demo after the break. Perhaps the tangle of copper beneath serves a purpose as it buoys the board up in lieu of an enclosure.
We are looking forward to the exciting new versions where more solutions are exercised, but sometimes, you just have to tackle a problem with the tools you have, like when the code won’t compile with the MIDI and NeoPixel libraries together so he adds an Uno to take care of the LEDs. Is it the most elegant? No. Did it get the job done? Yes, and if you don’t flip over the board, you would not even know.
Continue reading “Getting MIDI Under Control”
Just a few days ago, on the other side of the planet from this author, there was a mechanical keyboard meetup in Tokyo. Fortunately through the magic of the Internet we can all enjoy the impressive collection of devices people brought, and boy were there some interesting specimens. There were certainly the inevitable collections of strange artisan keycaps, unusual handmade switches, and keycap sets only available in one group buy five years ago in Nicaragua. But among the bright colors were some truly unique custom designs the likes of which we haven’t see before. A single source is hard to credit, you could check the hashtag #tokyomk6 on Twitter, or [obra]’s thread of photos, or this great blog post (video walkthroughs and photos included) from [romly].
Speaking of [romly], one of their designs stands out as particularly unusual. There are a few things to note here. One is the very conspicuous surface profile of the (clearly totally custom) keycaps themselves. Instead of flat or cylindrical or spherical, these are round. Round like the outside of a log. If we didn’t know better it might look like the entire thing was sculpted or extruded as a single unit. And just below the deck are the perpendicular thumb clusters. Frankly we aren’t sure how to refer to this design feature. The switches are mounted at right angles facing inward so the user places a thumb inside it in a style reminiscent of the DataHand. It’s quite interesting, and we’d be love to know more about what specific functionality it provides.
Another interesting entrant is this keyboard with unusually staggered switches and hexagonal caps (check out the individual markings!). Very broadly there are two typical keyboard layout styles; the diagonal columns of QWERTY (derived from a typewriter in the 1800’s) or the non slanted columns of an “ortholinear” or matrix style layout. By those metrics this is something like an ortholinear keyboard in that its switches overlap their neighbors by half, but the edge to edge close packed caps imply that it might be something else. We’d be very interested to know how typing on this beast would be!
There were so many more awesome designs present at the meetup that this would never end if we tried to document them all. Take a look through the posts and call out anything else too excellent to go unnoticed!
Thanks [obra] for Tweeting about this so we could discover it.
Back in October 2018, a bombshell rocked the tech industry when Bloomberg reported that some motherboards made by Supermicro had malicious components on them that were used to spy or interfere with the operation of the board, and that these motherboards were found on servers used by Amazon and Apple. We covered the event, looking at how it could work if it were true. Now seven months have passed, and it’s time to look at how things shook out.
Continue reading “What Happened With Supermicro?”
Join us Wednesday at noon Pacific time for the From Software to Tindie Hack Chat!
Brian Lough has followed a roundabout but probably not unusual route to the hardware hacking scene. Educated in Electronic and Computer Engineering, Brian is a software developer by trade who became enamored of Arduino development when the ESP8266 hit the market. He realized the microcontrollers such as these offered incredible capabilities on the cheap, and the bug bit him.
Since then, Brian has fully embraced the hardware hacking way, going so far as to live stream complete builds in a sort of collaborative “hack-along” with his viewers. He’s also turned a few of his builds into legitimate products, selling them on his Tindie store and even going so far as to automate testing before shipping to catch errors and improve quality.
Please join us for this Hack Chat, where we’ll discuss:
- How software hacking leads to hardware hacking;
- The creative process and how live streaming helps or hinders it;
- The implications of going from project to product; and
- What sorts of new projects might we see soon?
Continue reading “From Software To Tindie Hack Chat With Brian Lough”