A 36-key monoblock split keyboard with three thumb keys on each side.

Lorem Ipsum 36? Dolor Sit Amet Keyboard!

You know, it’s a tale as old as custom mechanical keyboards. [penkia] couldn’t find any PCBs with 36 keys and Gateron low-profile switch footprints, so they made their own and called it the LoremIpsum36. Isn’t it lovely?

Close-up of the RP2040 sitting flush as can be in the PCB.This baby runs on an RP2040, which sits flush as can be in a cutout in the PCB. This maneuver, along with the LP switches in hard-to-find SK-33 sockets results in quite the thin board.

[penkia] says that despite using a 3 mm tray for added rigidity, the entire thing is thinner than the Nuphy Air60 v2, which is just over half an inch (13.9 mm) thick. For keycaps, [penkia] has used both XVX profile and FKcaps’ LPF.

And yeah, that area in the middle is crying out for something; maybe a trackball or something similar. But [penkia] is satisfied with it as-is for the first version, so we are, too.

Do you like 36-key boards, but prefer curves? Check out the Lapa keyboard, which doubles as a mouse.

A Raspberry Pi HAT with retro LED displays and a buttons, sitting on the keys of a laptop.

Good-Looking HAT Does Retro Displays Right

Mick Jagger famously said that you cain’t always get what you want. But this is Hackaday, and we make what we want or can’t get. Case in point: [Andrew Tudoroi] is drawn to retro LEDs and wanted one of Pimoroni’s micro-LED boards pretty badly, but couldn’t get his hands on one. You know how this ends — with [Andrew] designing his first PCB.

The Pitanga hat is equally inspired by additional fruit that [Andrew] had lying around in the form of an 8devices Rambutan board. (Trust us, it’s a fruit.) With some research, he discovered the HT16K33 LED driver, which checked all the boxen.

Pitanga hats with various cool LED displays.The first version worked, but needed what looks like a couple of bodge wires. No shame in that! For the next revision, [Andrew] added buttons and decided to make it into a Raspberry Pi HAT.

This HAT is essentially a simple display with a basic input device, and a beauty at that. You can see all the various cool displays that [Andrew] tried both here and in the project log. Although he included pads for an ARM M0 microcontroller, he never did populate it. Maybe in the future.

Of course, this project was not without its challenges. For one thing, there was power compatibility to wrestle with. The Pi can sometimes work with I²C devices at 5 V, but this isn’t ideal long-term. So [Andrew] put the LED driver on the 3.3 V I²C bus. Despite the data sheet calling for 4.5 to 5.5 V, the setup worked fine. But for better reliability, [Andrew] threw a dedicated I²C logic level converter chip into the mix.

Don’t forget, you can run a noble amassment of HATs with the PiSquare.

All The Attacks On The RP2350

Raspberry Pi’s new microcontroller, the RP2350, has a small section of memory that is meant for storing secrets. It’s protected by anti-glitching and other countermeasures, and the Raspberries wanted to test it. So this summer, they gave them out, pre-programmed with a secret string, as part of the badge for DEFCON attendees. The results of the cracking efforts are in, and it’s fair to say that the hackers have won.

First place went to [Aedan Cullen], who also gave a great talk about how he did it at 38C3. One of the coolest features of the RP2350, from a hacker perspective, is that it has dual ARM and dual RISC-V cores onboard, and they can be swapped out by multiplexers. The security module has a critical register that has disable bits for both of these processors, but it turns out that the ARM disable bits have priority. When [Aedan] glitched the security module just right, it disabled the ARM cores but left the RISC-V cores running in the secure context, with full debug(!), and the game was over. As of yet, there is no mitigation for this one, because it’s baked into the secure boot module’s silicon.

[Marius Muench] managed to pre-load malicious code into RAM and glitch a reboot-out-of-secure-mode on the USB module. This one is possibly fixable by checking other reboot flags. [Kévin Courdesses] has a sweet laser fault-injection rig that’s based on the 3D-printable OpenFlexure Delta Stage, which we’ve seen used for microscopy purposes, but here he’s bypassing the anti-glitching circuitry by exposing the die and hitting it hard with photons.

Finally, [Andrew Zonenberg] and a team from IOActive went at the RP2350 with a focused ion beam and just read the memory, or at least the pairwise-OR of neighboring bits. Pulling this attack off isn’t cheap, and it’s a more general property of all anti-fuse memory cells that they can be read out this way. Chalk this up as a mostly-win for the offense in this case.

If you want to read up on voltage glitching attacks yourself, and we promise we won’t judge, [Matthew Alt] has a great writeup on the topic. And ironically enough, one of his tools of choice is [Colin O’Flynn]’s RP2040-based Chip Shouter EMP glitcher, which he showed us how to make and use in this 2021 Remoticon talk.

Hackaday Links Column Banner

Hackaday Links: January 5, 2025

Good news this week from the Sun’s far side as the Parker Solar Probe checked in after its speedrun through our star’s corona. Parker became the fastest human-made object ever — aside from the manhole cover, of course — as it fell into the Sun’s gravity well on Christmas Eve to pass within 6.1 million kilometers of the surface, in an attempt to study the extremely dynamic environment of the solar atmosphere. Similar to how manned spacecraft returning to Earth are blacked out from radio communications, the plasma soup Parker flew through meant everything it would do during the pass had to be autonomous, and we wouldn’t know how it went until the probe cleared the high-energy zone. The probe pinged Earth with a quick “I’m OK” message on December 26, and checked in with the Deep Space Network as scheduled on January 1, dumping telemetry data that indicated the spacecraft not only survived its brush with the corona but that every instrument performed as expected during the pass. The scientific data from the instruments won’t be downloaded until the probe is in a little better position, and then Parker will get to do the whole thing again twice more in 2025. Continue reading “Hackaday Links: January 5, 2025”

Old BBC Micro Gets Some Disk Help From A Raspberry Pi

[Peter Mount] had a simple problem. He’d treated himself to a retro purchase in the form of a BBC Master 128—a faster sequel to the BBC Micro Model B. The only problem was he needed a way to get software on to it. Cue a creative hack using a Raspberry Pi Zero W.

When [Peter] received the machine, it already had a GoTek floppy emulator, which pulled disk images off a USB drive. However, he wanted an easier and quicker way to get disk images to and from the machine for development purposes. Swapping the USB drive to and from another machine seemed too tedious.

Instead, he decided to swap in a Pi Zero W for this purpose, setting it up to emulate a flash drive by following instructions from MagPi Magazine. This would allow him to use the SCP tool to copy disk images over to the Pi Zero W via its WiFi connection. Basically, the Pi Zero W was acting as a wirelessly-updated storage device hooked up to the GoTek floppy emulator.

It’s a nifty way of doing things. [Peter] could have set about creating his own floppy emulator from scratch with wireless capability included. However, there was no need. He just needed a wirelessly-accessible USB drive, and the Pi Zero W was more than happy to act in that role.

The BBC Micro is a beloved machine of many in the British Isles, and it had rather an extended family. If you’ve pulled off your own nifty hack on this classic machine, be sure to hit us up on the tipsline!

Illustrated Kristina with an IBM Model M keyboard floating between her hands.

Keebin’ With Kristina: The One With The Curvy Centerfold

What do you get when you combine a Raspberry Pi 4B, a Kaypro keyboard, and a 9″ Apple ], you get the coolest AVR development workstation I’ve seen in a while.

A Raspberry Pi-based AVR workstation that uses a Kaypro keyboard and 9" monochrome Apple ][c display.
Image by [John Anderson] via Hackaday.IO
As you may have guessed, I really dig the looks of this thing. The paint job on the display is great, but the stripes on the keyboard and badging on are on another level. Be sure to check out the entire gallery on this one.

About that keyboard — [John] started this project with two incomplete keyboards that each had a couple of broken switches. Since the two keyboards were compliments of each other parts-wise, they made a great pair, and [John] only had to swap out three switches to get it up and clacking.

In order to make it work with the Pi, [John] wrote a user-mode serial driver that uses the uinput kernel module to inject key events to the kernel. But he didn’t stop there.

Although the Pi supports composite video out, the OS doesn’t provide any way to turn off the chroma color signal that’s modulated on top of the basic monochrome NTSC signal, which makes the picture look terrible. To fix that, he wrote a command-line app that sets up the video controller to properly display a monochrome NTSC signal. Happy AVRing on your amazing setup, [John]! Continue reading “Keebin’ With Kristina: The One With The Curvy Centerfold”

Creating A Radiation King Radio In The Real World

If you’re a fan of the Fallout series of games, you’ve probably come across a Radiation King radio before. In the game, that is, they don’t exist in real life. Which is precisely why [zapwizard] built one!

Externally, the design faithfully recreates the mid-century design of the Radiation King. It’s got the louvered venting on the front panel, the chunky knobs, and a lovely analog needle dial, too. Inside, it’s got a Raspberry Pi Zero which is charged with running the show and dealing with audio playback. It’s paired with a Pi Pico, which handles other interface tasks.

It might seem simple, but the details are what really make this thing shine. It doesn’t just play music, it runs a series of simulated radio stations which you can “tune into” using the radio dial. [zapwizard dives into how it all works—from the air core motor behind the simulated tuning dial, to the mixing of music and simulated static. It’s really worth digging into if you like building retro-styled equipment that feels more like the real thing.

It’s not just a prop—it’s a fully-functional item from the Fallout universe, made manifest. You know how much we love those. If you’re cooking up your own post-apocalyptic hacks, fictional or non-fictional, don’t hesitate to let us know.