MIDI controllers come in all shapes and sizes. Commercial products based on keyboards or matrixes of buttons are popular, but there’s nothing stopping you from whipping up your own creations out of whatever strikes your fancy. [Kevin] has done just that, turning an old telephone into a working MIDI device.
The phone in question is a Doro X20 wired landline phone. Being surplus to [Kevin’s] requirements left it ripe for the hacking. A Raspberry Pi Pico was wired in to the phone’s keypad, slimmed down with a hacksaw in order to allow it to neatly fit inside the original enclosure. Then it was a simple matter of whipping up some code to read the buttons and output MIDI data via the Pico’s serial output.
Later, [Kevin] brought the design into the modern world, setting it up to talk USB MIDI using the Pico’s onboard USB hardware. This makes using it with a computer a cinch, and lets [Kevin] control a DAW using the handset controller.
It’s a fun build, and one that shows how you can easily build your own MIDI hardware using nothing but a soldering iron, some buttons, and a modern microcontroller. From there, the sky really is the limit. Whether you like big knobs, easy playing, or have your own personal tastes, you can build what you like to suit your own style. When you do, drop us a line! Video after the break.
Continue reading “Old Phone Becomes MIDI Controller”
Remember when phones didn’t all look the same? We had a good thing going in the early cell phone days, which seemed like a brief holdover from the Western Electric (et. al) era where you could get a phone that suited your inner minimalist or princess, and choose the color to boot.
[Dubchinsky] found a beautiful phone from this bygone era and saved it from one of two likely fates — the landfill, or else a life languishing as a piece of vintage technology that’s just sitting around for looks. Instead, this phone found a second calling as a lovely desk lamp with secret goose neck flexibility. The lamp itself is an inexpensive LED module from ebay that’s wired up to mains power through a push button switch in the phone’s base.
We absolutely love that [Dubchinsky] wrapped the curly cord around the goose neck, but were a bit disappointed that he didn’t use the hook switch to turn the lamp on and off. In the comments, he says that the plastic felt like it was too brittle to stand up to repeated actuation of such a heavy switch. That’s understandable. [Dubchinsky] also thought about using the rotary dial as a dimmer, and we think that’s a bright idea.
Between the guide, the pictures, and the build process video after the break, this is pretty much a complete how-to. We think that is commendable given that [Dubchinsky] is selling these lamps on etsy.
Do ya miss spinning the rotary dial and long for somewhat simpler days? Hook your finger into this rotary cell phone.
Continue reading “The 70s Are Calling To Shed Some Light”
Hang up your car phone and toss that fax machine in the garbage. Even back in the late 80s it was possible to do away with these primitive technologies in favor of video conferencing, even though this technology didn’t catch on en masse until recently. In fact, Mitsubishi released a piece of video conferencing equipment called the VisiTel that can be put to use today, provided you can do a bit of work to get it to play along nicely with modern technology.
[Alex] was lucky enough to have one of these on hand, as soon as it was powered up he was able to get to work deciphering the messaging protocol of the device. To do this he showed the camera certain pictures with known properties and measured the output waveforms coming from the device, which were AM modulated over an RJ9 connection which he had changed to a 3.5 mm headphone jack.
It communicates in a series of pictures instead of sending an actual video signal, so [Alex] had a lot of work to do to properly encode and decode the stream. He goes into incredible detail on his project page about this process and is worth a read for anyone interested in signal processing. Ultimately, [Alex] was able to patch this classic piece of technology into a Zoom call and the picture quality is excellent when viewed through the lens of $399 80s technology.
We have been seeing a lot of other hacks around video conferencing in the past six months as well, such as physical mute buttons and a mirror that improves eye contact through the webcam.
Schlieren imaging is a technique for viewing the density of transparent fluids using a camera and some clever optical setups. Density of a fluid like air might change based on the composition of the air itself with various gasses, or it may vary as a result of a sound or pressure wave. It might sound like you would need a complicated and/or expensive setup in order to view such things, but with a few common things you can have your own Schlieren setup as [elad] demonstrates.
His setup relies on a cell phone, attached to a selfie stick, with a spherical mirror at the other end. The selfie stick makes adjusting the distance from the camera to the mirror easy, as a specific distance from the camera is required as a function of focal length. For cell phone cameras, it’s best to find this distance through experimentation using a small LED as the point source. Once it’s calibrated and working, a circular field of view is displayed on the phone which allows the viewer to see any change in density in front of the mirror.
The only downside of this build that [elad] notes is that the selfie stick isn’t stiff enough to prevent the image from shaking around a little bit, but all things considered this is an excellent project that shows a neat and useful trick in the photography/instrumentation world that could be useful for a lot of other projects. We’ve only seen Schlieren imaging once before and it used a slightly different method of viewing the changing densities.
Continue reading “Schlieren On A Stick”
One of the fun things about vulnerability research is that there are so many places for bugs to hide. Modern devices have multiple processors, bits of radio hardware, and millions of lines of code. When [Veronica Kovah] of Dark Mentor LLC decided to start vulnerability research on the Bluetooth Low Energy protocol, she opted to target the link layer itself, rather than the code stack running as part of the main OS. What’s interesting is that the link layer has to process data before any authentication is performed, so if a vulnerability is found here, it’s guaranteed to be pre-authentication. Also of interest, many different devices are likely to share the same BLE chipset, meaning these vulnerabilities will show up on many different devices. [Veronica] shares some great info on how to get started, as well as the details on the vulnerabilities she found, in the PDF whitepaper. (Just a quick note, this link isn’t to the raw PDF, but pulls up a GitHub PDF viewer.) There is also a video presentation of the findings, if that’s more your speed.
The first vuln we’ll look at is CVE-2019-15948, which affects a handful of Texas Instruments BT/BLE chips. The problem is in how BLE advertisement packets are handled. An advertisement packet should always contain a data length of at least six bytes, which is reserved for the sending device address. Part of the packet parsing process is to subtract six from the packet length and do a
memcpy using that value as the length. A malicious packet can have a length of less than six, and the result is that the copy length integer underflows, becoming a large value, and overwriting the current stack. To actually turn this into an exploit, a pair of data packets are sent repeatedly, to put malicious code in the place where program execution will jump to.
The second vulnerability of note, CVE-2020-15531 targets a Silicon Labs BLE chip, and uses malformed extended advertisement packets to trigger a buffer overflow. Specifically, the sent message is longer than the specification says it should be. Rather than drop this malformed message, the chip’s firmware processes it, which triggers a buffer overflow. Going a step further, this chip has non-volatile firmware, and it’s possible to modify that firmware permanently. [Veronica] points out that even embedded chips like these should have some sort of secure boot implementation, to prevent these sort of persistent attacks.
Continue reading “This Week In Security: Bluetooth Hacking, NEC Phones, And Malicious Tor Nodes”
Modern smartphones are a dizzying treatise on planned obsolescence. Whether it’s batteries that can’t be removed without four hours and an array of tiny specialized tools, screens that shatter with the lightest shock, or (worst of all) software that gets borked purposefully to make the phone seem older and slower than it really is, around every corner is some excuse to go buy a new device. The truly tragic thing is that there’s often a lot of life left in these old, sometimes slightly broken, devices.
This video shows us how to turn an old smartphone into a perfectly usable laptop. The build starts with a screen and control board that has USB-C inputs, which most phones can use to output video. It’s built into a custom aluminum case with some hinges, and then attached to a battery bank and keyboard in the base of the laptop. From there, a keyboard is installed and then the old phone is fixed to the back of the screen so that the aluminum body doesn’t interfere with the WiFi signal.
If all you need is internet browsing, messaging, and basic word processing, most phones are actually capable enough to do all of this once they are free of their limited mobile UI. The genius of this build is that since the phone isn’t entombed in the laptop body, this build could easily be used to expand the capabilities of a modern, working phone as well. That’s not the only way to get a functioning laptop with parts from the junk drawer, either, if you’d prefer to swap out the phone for something else like a Raspberry Pi.
Thanks to [NoxiousPluK] for the tip!
Continue reading “Broken Smartphones: Laptops In Disguise”
Anyone old enough to fondly recall the “bleep-burp-rattle” sequence of sounds of a modem negotiating a connection over a phone line probably also remembers the simple “tin-can telephone” experiment, where a taut string transmits sound vibrations from the bottom of one tin can to another. This tin can modem experiment puts both of those experiences together in a single project.
As [Mike Kohn] notes, this project was harder than it would seem that it should be. He actually had a much harder time getting the tin can phone part of the project optimized than getting the electronics sorted out, resulting in multiple tries with everything from the canonical tin cans to paper coffee cups before eventually settling on a pair of cardboard nut cans, the kinds with the metal bottoms. Linked together with a length of kite string — dental floss didn’t work — [Mike] added a transmitter on one end and a receiver on the other.
The transmitter used an ATtiny 2313 and everyone’s favorite audio amplifier, the LM386, while the receiver sported an electret mike preamp board, an LM566 tone decoder, and an MSP430 microcontroller. The modulation scheme was as simple as possible — a 400 Hz tone whose length varies whether it’s a one or a zero, or a stop or start bit. Connected to a pair of terminal programs, [Mike] was able to send his name over the
wire string at what he calculates to be six or seven baud.
This project has all the hallmarks of lockdown boredom, but we don’t care because it’s good fun and a great learning opportunity, particularly for the young ones. There’s plenty of room for optimization, too — maybe it could even get fast enough for the Hackaday Retro 300-baud challenge.
Continue reading “A Tin Can Modem, Just For Fun”