[Udi] lives in an apartment with a pleasant balcony. He also has three kids who are home most of the time now, so he finds himself spending a little more time out on the balcony than he used to. To upgrade his experience, he installed a completely custom shade controller to automatically open and close his sunshade as the day progresses.
Automatic motors for blinds and other shades are available for purchase, but [Udi]’s shade is too big for any of these small motors to work. Finding a large servo with a 2:1 gear ration was the first step, as well as creating a custom mount for it to attach to the sunshade. Once the mechanical situation was solved, he programmed an ESP32 to control the servo. The ESP32 originally had control buttons wired to it, but [Udi] eventually transitioned to NFC for limit switch capabilities and also implemented voice control for the build as well.
While not the first shade controller we’ve ever seen, this build does make excellent use of appropriate hardware and its built-in features and although we suppose it’s possible this could have been done with a 555 timer, the project came together very well, especially for [Ubi]’s first Arduino-compatible build. If you decide to replicate this build, though, make sure that your shade controller is rental-friendly if it needs to be.
The device consists of an ultra low power microcontroller from Texas Instruments, paired with a pressure sensor. Set up for Near Field Communication, or NFC, it’s designed to be powered by the smartphone that queries the microcontroller for a reading. We featured a prototype back in 2015 which required mounting the device within the inner tube of the tyre itself. However, this required invasive installation and the devices tended to wear out over time due to flex damaging the delicate copper coil antenna.
The new design consists of the same microcontroller hardware, but mounted in a modified valve extension that fits to the fill valve of the bicycle tyre. The PCB is directly epoxied on to the valve extension, ensuring air can’t leak out over time. The assembly is then overmoulded in an injection moulding process to provide further sealing and protection against the elements. This should help immensely in rough-and-tumble mountain biking applications.
The new device provides a simple screw-on solution for tire pressure monitoring that’s set and forget — no batteries required. [CaptMcAllister] is currently investigating options for a production run, and given the simple design, we imagine it couldn’t be too hard to rattle off a few hundred or thousand units. We could imagine it would also pair well with a microcontroller, NFC reader, and a display setup on the handlebars to give live readings where required. We look forward in earnest to seeing where this project goes next!
Among Us is a hit game of deception and intrigue. Those who have played it know the frustration of trying to complete some of the intentionally difficult tasks onboard the Skeld. [Zach Freedman] decided to recreate some of these in real life.
[Zach] built what are arguably the three most frustrating tasks from the game. There’s the excruciatingly slow upload/download station built out of an old Samsung tablet and an NFC tag, and the reactor start console created using a Raspberry Pi 3B, Teensy 3.2, and a custom mechanical keyboard. But perhaps most annoying of all is the infamous card reader. Built with another Teensy, it requires the user to swipe their ID card at just the right speed, except that speed is randomly generated for every swipe. Also, the machine fails 20% of good swipes just because. Perhaps what we love most is the way [Zach] recreated the classic VFD look by putting an OLED display behind bottle-green plastic and using a 14-segment font.
Hackaday editors Elliot Williams and Mike Szczys check in on the best hacks from the past week. All the buzz is the algorithm that can reverse engineer your house keys from the way they sound going into the lock. Cardboard construction goes extreme with an RC car build that’s beyond wizard-level. Speaking of junk builds, there’s a CNC mill tipped on its side grinding out results worlds better than you expect from something made with salvaged CD-ROM drives. And a starburst character display is a clever combination of laser cutting and alternative using UV-cured resin as a diffuser.
Take a look at the links below if you want to follow along, and as always, tell us what you think about this episode in the comments!
Near-field Communication (NFC) has been around a while and is used for example in access control, small data exchange, and of course in mobile payment systems. With such sensitive application areas, security is naturally a crucial element of the protocol, and therefore any lower-level access is usually heavily restricted and guarded.
This hardware is especially well-guarded in phones, and rooting your Android device won’t be of much help here. Well, that was of course only until [Christopher Wade] took a deep look into that subject, which he presented in his NFC firmware hacking talk at for this year’s DEF CON.
To recap: [Christopher] took a rooted Samsung S6 and searched for vulnerabilities in the NFC chip’s safe firmware update process, in hopes to run a custom firmware image on it. Obviously, this wouldn’t be worth mentioning twice if he hadn’t succeeded, and he goes at serious length into describing how he got there. Picking a brain like his by reading up on the process he went through — from reverse engineering the firmware to actually exploiting a weakness that let him run his own code — is always fascinating and downright fun. And if you’re someone who prefers the code to do the talking, the exploits are on GitHub.
Naturally, [Christopher] disclosed his findings to Samsung, but the exploited vulnerability — and therefore the ability to reproduce this — has of course been out there for a long time already. Sure, you can use a Proxmark device to attack NFC, or the hardware we saw a few DEF CONs back, but a regular-looking phone will certainly raise a lot less suspicion at the checkout counter, and might open whole new possibilities for penetration testers. But then again, sometimes a regular app will be enough, as we’ve seen in this NFC vending machine hack.
We are continuously inspired by our readers which is why we share what we love, and that inspiration flows both ways. [jetpilot305] connected a Rothult unit to the Arduino IDE in response to Ripping up a Rothult. Consider us flattered. There are several factors at play here. One, the Arduino banner covers a lot of programmable hardware, and it is a powerful tool in a hardware hacker’s belt. Two, someone saw a tool they wanted to control and made it happen. Three, it’s a piece of (minimal) security hardware, but who knows where that can scale. The secure is made accessible.
The Github upload instructions are illustrated, and you know we appreciate documentation. There are a couple of tables for the controller pins and header for your convenience. You will be compiling your sketch in Arduino’s IDE, but uploading through ST-Link across some wires you will have to solder. We are in advanced territory now, but keep this inspiration train going and drop us a tip to share something you make with this miniature deadbolt.
E-paper displays are unusual in that power is only needed during a screen update. Once the display’s contents have been set, no power whatsoever is required to maintain the image. That’s pretty nifty. By making the display driver board communicate wirelessly over near-field communication (NFC) — which also provides a small amount of power — it is possible for this device to be both wireless and without any power source of its own. In a way, the technology required to do this has existed for some time, but the company Waveshare Electronics has recently made easy to use options available for sale. I ordered one of their 2.9 inch battery-less NFC displays to see how it acts.