The Righteous Quest To Crack A Canon I9900

[Starhawk] is a man with a problem. More accurately, he’s a man whose mother has a problem, but ultimately that ends up being the same thing. Her wide-format Canon printer recently stopped working after better than a decade of reliable service, and he wants to know why. Rather than spend the money on buying a new printer, he’s determined to find out if she’s been the victim of planned obsolescence by reverse engineering the Canon i9900 to see what makes it tick (or stop ticking, as the case may be).

In the absence of any obvious hardware faults, [Starhawk] has suspicions that the machine’s QY6-0055 printhead has run over some internal “odometer” and simply turned itself off. We’ve all seen similar trickery at play when trying to use third party ink cartridges in our printers, so it’s certainly not outside the realm of possibility that the Canon i9900 is designed to reject heads once they’ve seen enough usage. Perhaps the biggest clue is that the QY6-0055 has a Seiko S93C56BR EEPROM on the board that’s keeping track of…something.

Right now, [Starhawk] is devoting his energies on trying to make sense of the data he pulled from the EEPROM using his TL866A programmer. But that’s no easy feat with a sample size of just one, which is why he’s looking for help. He’s hoping that other hackers with similar printers (and ideally ones that use the same QY6-0055 head) could submit their own EEPROM dumps and the community could get to work trying to decipher what’s stored on the chips. He’s really hoping that somebody at Canon might be willing to sneak him a couple tips on what he should be looking for, but at this point we think he’ll take whatever assistance he can get.

Now to be fair, there’s really no way to know definitively if there’s some flag stored on the EEPROM that’s keeping the printer from working. It could just be good old fashioned hardware failure, which would hardly be a surprise for a piece of consumer electronics from 2005. But even if the effort to understand the Canon’s EEPROM doesn’t get him any closer to a working printer, we still think it’s a fascinating example of real-world reverse engineering that’s worth it for the experience alone.

There’s a long history of hackers doing battle with their printers, from emulating an ink cartridge with a microcontroller to reinking the ribbon of a vintage 1980s behemoth. We’re interested in seeing where this project takes [Starhawk], but no matter what happens there are likely to be some interesting discoveries made along the way.

What Happened To The 100,000-Hour LED Bulbs?

Early adopters of LED lighting will remember 50,000 hour or even 100,000 hour lifetime ratings printed on the box. But during a recent trip to the hardware store the longest advertised lifetime I found was 25,000 hours. Others claimed only 7,500 or 15,000 hours. And yes, these are brand-name bulbs from Cree and GE.

So, what happened to those 100,000 hour residential LED bulbs? Were the initial estimates just over-optimistic? Was it all marketing hype? Or, did we not know enough about LED aging to predict the true useful life of a bulb?

I put these questions to the test. Join me after the break for some background on the light bulb cartel from the days of incandescent bulbs (not a joke, a cartel controlled the life of your bulbs), and for the destruction of some modern LED bulbs to see why the lifetimes are clocking in a lot lower than the original wave of LED replacements.

Continue reading “What Happened To The 100,000-Hour LED Bulbs?”

BSD Breathes New Life Into Obsolete Equipment

An old laptop or desktop computer that’s seen better days might still have a little bit of use left in it for a dedicated task. Grabbing a lightweight flavor of Linux and running a web server, firewall, or Super Nintendo emulator might get a few more years out of it. You can also get pretty creative repurposing obsolete single purpose  machines, as [Kristjan] did with some old Cisco server equipment.

The computer in question isn’t something commonly found, either. It’s an intrusion detection system meant to mount in a server rack and protect the server itself from malicious activity. While [Kristjan] mentions that Cisco equipment seems to be the definition of planned obsolescence, we think that this Intel Celeron machine with an IDE hard drive may have gone around the bend quite some time ago. Regardless, it’s modern enough to put back to work in some other capacity.

To that end, a general purpose operating system was installed, and rather than use Linux he reached for BSD to get the system up and running. There’s one other catch, though, besides some cooling issues. Since the machine was meant to be used in a server, there’s no ACPI which means no software shutdown capability. Despite all the quirks, you can still use it to re-implement a network security system if you wanted to bring it full-circle.

Planned Obsolescence Isn’t A Thing, But It Is Your Fault

The common belief is that big companies are out to get the little people by making products that break after a short period, or with substantially new features or accessories that make previous models obsolete, requiring the user to purchase a new model. This conspiracy theory isn’t true; there’s a perfectly good explanation for this phenomenon, and it was caused by the consumers, not the manufacturers.

When we buy the hottest, shiniest, smallest, and cheapest new thing we join the wave of consumer demand that is the cause of what often gets labelled as “Planned Obsolescence”. In truth, we’re all to blame for the signals our buying habits send to manufacturers. Dig in and get your flamewar fingers fired up.

Continue reading “Planned Obsolescence Isn’t A Thing, But It Is Your Fault”

Rejecting Microsoft’s Phaseout Of The Kinect

You might not be aware unless you’re up on the latest gaming hardware, but Microsoft is trying to kill the Kinect. While the Xbox One famously included it as a mandatory pack-in accessory at launch (this was later abandoned to get the cost down), the latest versions of the system don’t even have the proprietary port to plug it in. For a while Microsoft was offering an adapter that would let you plug it into one of the console’s USB ports, but now even that has been discontinued. Owners of the latest Xbox One consoles who still want to use the Kinect are left to find an adapter on eBay, where the prices have naturally skyrocketed.

Recently [Eagle115] decided to open up his Kinect and see if he couldn’t figure out a way to hook it up to his new Xbox One. The port on the Kinect is a USB 3.0 B female, but it requires 12V to operate. The official Kinect adapter took the form of a separate AC adapter and a “tap” that provided the Kinect with 12V over USB, so he reasoned he could pop open the device and provide power directly to the pads on the PCB.

[Eagle115] bought a 12V wall adapter and a USB 3.0 B cable and got to work. Once the Kinect was popped open, he found that he needed to supply power on pin 10 (which is helpfully labeled on the PCB). There’s just enough room to snake the cable from the AC adapter through the same hole in the case where the the USB cable connects.

With the Kinect getting 12V from the AC adapter, the Xbox has no problem detecting it as if you were using the official adapter. At least for now, they haven’t removed support for the Kinect in the Xbox’s operating system.

The Kinect has always been extremely popular with hackers (it even has its own category here on Hackaday), so it’s definitely sad to see that Microsoft is walking away from the product. The community will no doubt continue pulling off awesome hacks with it; but it’s looking increasingly likely we won’t be getting a next generation Kinect.

[via /r/DIY]

The Most Traveled Security Screwdriver, A Hacker’s Tale

Nespresso is a variant of disposable single serve coffee pods with an extensive, expensive, and proprietary accessory line. After selling inconvenient bits of his soul for convenience and, admittedly, fairly tasty shots of coffee, [Chriss Lott] was predictably betrayed by his Nespresso Jura coffee machine. 

Rather than simply exchange more local currency for a replacement revenue guarantee for the Nestle conglomerate, he did what any self-respecting hacker would do and tried to fix it himself. Unfortunately he quickly found their cunningly oval shaped security screws to be more trouble than his time was worth. He listed his remaining coffee pods for free on craigslist and decided to toss the machine in the planned obsolescence receptacle which comes standard in any civilized home.

This is where our story would end were it not for the kindness of a fellow hacker. [Dave H] was browsing through craigslist when he spotted the sad tale. However, possessing a different skillset from [Chris], [Dave] had solved the particular oval shaped conundrum with a security screwdriver hand made from an old bolt. He answered his fellow hacker’s vaguely ardent plea and mailed the converted bolt over to [Chris]’s house.

With the proper tool in hand, [Chris] quickly discovered that all that was standing between him and his convenient coffee was a bit of schmoo between the cost cutting membrane switch and its mating pad on the circuit board. With the practically free repair complete, the machine happily vibrated back to life and produced coffee as if its planned obsolescence wasn’t for another few years. We assume a Nestle engineer was thrown into the pit on principle for this loss (they, of course, are evil enough to have a pit).

We’re not sure how the story proliferated through the internet, but we do know that it was inspirational to many convenient caffeine deprived hackers with similar problems. [Chris] found himself the hub in a network of circumnavigating security screw circumventing hackers.

[Dave]’s hacked bolt was the first to go on an adventure resulting in the repair of many machines before the postmen lost it under a cart, standard procedure. A replacement was purchased from an eBay seller for a hefty $40 american dollars and took up the journey where it left off. Others sent in guides on making the tool for those unwilling to wait for one to be shipped. In fact, even the maker of the $40 dollar tool weighed in on the issue. Apparently he was unaware that the consumer and commercial Nespresso machines used the same tools. A hacker himself, he ran a listing of the custom tool at a quarter of the price for the home repairman and another for the commercial appliance at the higher price.

The whole page is an entertaining read, for a certain kind of person, about appliance repair, reverse engineering, and camaraderie. Happily, the hub is still alive. If you find yourself with an oval screw which needs turning, get in touch with [Chris] and a strange community’s kindness will have a nomadic security bit crossing nations your way soon.

One Hoss Shay And Our Society Of Obsolescence

Legend has it that Henry Ford would send engineers out to junkyards all over the US looking for Fords. They were supposed to study each one they found and make note of any parts that had not failed. But it wasn’t so that he could start making all of those parts stronger. Instead, Ford allegedly used this data to determine where he could cut corners in future production runs so as not to waste money by making any part last longer than any other part.

Most things tend to break down rather than completely giving out. Usually it’s only one or two components that stop working and the rest of it is still serviceable. And this is a good thing. It’s what lets us repair PCBs or scavenge parts off them, drive our cars longer, and help save each other’s lives through organ donor programs. Can you imagine how different life would be if each part of every thing failed at the same time?

Continue reading “One Hoss Shay And Our Society Of Obsolescence”