Garage Semiconductor Fab Gets Reactive-Ion Etching Upgrade

It’s a problem that few of us will likely ever face: once you’ve built your first homemade integrated circuit, what do you do next? If you’re [Sam Zeloof], the answer is clear: build better integrated circuits.

At least that’s [Sam]’s plan, which his new reactive-ion etching setup aims to make possible. While his Z1 dual differential amplifier chip was a huge success, the photolithography process he used to create the chip had its limitations. The chemical etching process he used is a bit fussy, and prone to undercutting of the mask if the etchant seeps underneath it. As its name implies, RIE uses a plasma of highly reactive ions to do the etching instead, resulting in finer details and opening the door to using more advanced materials.

[Sam]’s RIE rig looks like a plumber’s stainless steel nightmare, in the middle of which sits a vacuum chamber for the wafer to be etched. After evacuating the air, a small amount of fluorinated gas — either carbon tetrafluoride or the always entertaining sulfur hexafluoride — is added to the chamber. A high-voltage feedthrough provides the RF energy needed to create a plasma, which knocks fluorine ions out of the process gas. The negatively charged and extremely reactive fluorine ions are attracted to the wafer, where they attack and etch away the surfaces that aren’t protected by a photoresist layer.

It all sounds simple enough, but the video below reveals the complexity. There are a lot of details, like correctly measuring vacuum, avoiding electrocution, keeping the vacuum pump oil from exploding, and dealing with toxic waste products. Hats off to [Sam’s dad] for pitching in to safely pipe the exhaust gases through the garage door. This ties with [Huygens Optics]’s latest endeavor for the “coolest things to do with fluorine” award.

Continue reading “Garage Semiconductor Fab Gets Reactive-Ion Etching Upgrade”

Is That An EMP Generator In Your Pocket Or Is My Calculator Just Broken?

Ah, what fond memories we have of our misspent youth, walking around with a 9,000-volt electromagnetic pulse generator in our Levi’s 501s and zapping all the electronic devices nobody yet carried with them everywhere they went. Crazy days indeed.

We’re sure that’s not at all what [Rostislav Persion] had in mind when designing his portable EMP generator; given the different topologies and the careful measurement of results, we suspect his interest is strictly academic. There are three different designs presented, all centering around a battery-powered high-voltage power module, the Amazon listing of which optimistically lists as capable of a 400,000- to 700,000-volt output. Sadly, [Rostislav]’s unit was capable of a mere 9,000 volts, which luckily was enough to get some results.

Coupled to a spark gap, one of seven different coils — from one to 40 turns — and plus or minus some high-voltage capacitors in series or parallel, he tested each configuration’s ability to interfere with a simple pocket calculator. The best range for a reset and scramble of the calculator was only about 3″ (7.6 cm), although an LED hooked to a second coil could detect the EMP up to 16″ (41 cm) away. [Rostislav]’s finished EMP generators were housed in a number of different enclosures, one of which totally doesn’t resemble a pipe bomb and whose “RF Hazard” labels are sure not to arouse suspicions when brandished in public.

We suppose these experiments lay to rest the Hollywood hype about EMP generators, but then again, their range is pretty limited. You might want to rethink your bank heist plans if they center around one of these designs.

Continue reading “Is That An EMP Generator In Your Pocket Or Is My Calculator Just Broken?”

Hacking A Solar Inverter RF Interface

One of the main advantages of cheap wireless modules is that they get used in consumer electronics, so if you know what’s being used you can build your own compatible hardware. While investigating the RF interface used in a series of cheap “smart” solar inverters [Aaron Christophel], created an Arduino library to receive inverter telemetry using a $2 RF module. See the demonstration after the break.

[Aaron] bought the inverter and ~40 euro USB “Data Box” that allows the user to wirelessly monitor the status of the inverter. Upon opening the two units, he found that they used LC12S 2.4Ghz modules, which create a wireless UART link. With a bit of reverse engineering, he was able to figure out the settings for the RF modules and the serial commands required to request the status of the inverter. He doesn’t delve into the possible security implications, but there doesn’t appear to be any form of encryption in the link. It should be possible for anyone with a module to sniff the messages, extract the ID of the inverter, and hijack the link. Just knowing the status of the inverter shouldn’t be all that dangerous, but he doesn’t mention what other commands can be sent to the module. Any others could have more severe implications.

Sniffing the wireless signal flashing through the air around us is a regular topic here on Hackaday. From testing the security of WiFi networks with an ESP32 to monitoring SpaceX launches with an SDR, the possibilities are infinite.

Continue reading “Hacking A Solar Inverter RF Interface”

Teaching A Machine To Be Worse At A Video Game Than You Are

Is it really cheating if the aimbot you’ve built plays the game worse than you do?

We vote no, and while we take a dim view on cheating in general, there are still some interesting hacks in this AI-powered bot for Valorant. This is a first-person shooter, team-based game that has a lot of action and a Counter-Strike vibe. As [River] points out, most cheat-bots have direct access to the memory of the computer which is playing the game, which gives it an unfair advantage over human players, who have to visually process the game field and make their moves in meatspace. To make the Valorant-bot more of a challenge, he decided to feed video of the game from one computer to another over an HDMI-to-USB capture device.

The second machine has a YOLOv5 model which was trained against two hours of gameplay, enough to identify friend from foe — most of the time. Navigation around the map was done by analyzing the game’s on-screen minimap with OpenCV and doing some rudimentary path-finding. Actually controlling the player on the game machine was particularly hacky; rather than rely on an API to send keyboard sequences, [River] used a wireless mouse dongle on the game machine and a USB transmitter on the second machine.

The results are — iffy, to say the least. The system tends to get the player stuck in corners, and doesn’t recognize enemies that pop up at close range. The former is a function of the low-res minimap, while the latter has to do with the training data set — most human players engage enemies at distance, so there’s a dearth of “bad breath range” encounters to train to. Still, we’re impressed that it’s possible to train a machine to play a complex FPS game at all, let alone this well.

Reverse Engineering Self-Powered Wireless Switches

The plethora of wireless communications technologies have cut the comms wire for many applications, but these devices still require power. For home automation, this might mean a battery or mains power, but there is also an alternative that we don’t see often: Kinetic power. [Bigclivecom] bought some kinetic switches from eBay and gave it his usual reverse engineering treatment.

True to the marketing, these switches do not require external power or a battery to send a wireless signal. Instead, it harvests energy from the magnetic latching action of the switch itself. When the switch is actuated, a small current is induced in a coil as the polarity of the magnetic field through its core changes rapidly. Through a series of diodes and resisters, the energy is stored in a capacitor, which is then used to power a small transmitter chip. The antenna coil is wrapped around the switch housing.

The receiver side is powered by mains and includes a relay output for lights. It would be really nice to have a hacker-friendly module for projects. We would be curious to see the range that these devices are capable of.

The same technology is used inside the Philips Hue Tap switch, of which Adafruit did a teardown a few years ago. If you want to learn more about RF modulation, check out the crash course article we put out a while back. Of course, the RTL SDR is an indispensable and affordable tool if you want to do some experimentation.

Continue reading “Reverse Engineering Self-Powered Wireless Switches”

Getting On The Air With A 10-Minute-ish Ham Transmitter

Artificially constrained designs can be among the most challenging projects to build, and the most interesting to consider. The amateur radio world is no stranger to this, with homebrew radio designs that set some sort of line in the sand. Such designs usually end up being delightfully minimalist and deeply instructive of first principles, which is one reason we like them so much.

For a perfect example of this design philosophy, take a look at [VK3YE]’s twist on the classic “10-Minute Transmitter”. (Video, embedded below.)

The design dates back to at least the 1980s, when [G4RAW] laid down the challenge to whip up a working transmitter from junk bin parts and make a contact within 15 minutes — ten for the build and five for working the bands. [VK3YE] used the “oner” — one-transistor — design for his 10-minute transmitter, but invested some additional time into adding a low-pass filter to keep his signal clean, and a power amplifier to boost the output a bit.

Even with the elaborations, the design is very simple and easy to understand. Construction is the standard “ugly style” that hams favor for quick builds like this. There are no parts that would be terribly hard to find, and everything fits into a small metal box. The video below shows the design and build, along with some experiments with WebSDR receivers to check out range both with and without the power amplifier.

Seeing these kinds of builds really puts us in the mood for some low-power action. Could something like this pop up in “The $50 Ham” series? Quite possibly yes.

Continue reading “Getting On The Air With A 10-Minute-ish Ham Transmitter”

Fixing NRF24L01+ Modules Without Going (Too) Insane

Good old nRF24L01+ wireless modules are inexpensive and effective. Well, they are as long as they work correctly, anyway. The devices themselves are mature and well-understood, but that doesn’t mean bad batches from suppliers can’t cause hair-pulling problems straight from the factory.

[nekromant] recently got a whole batch of units that simply refused to perform as they should, but not because they were counterfeits. The problem was that the antenna and PCB design had been “optimized” by the supplier to the point where the devices simply couldn’t work properly. Fortunately, [nekromant] leveraged an understanding of the problem into a way to fix them without going insane in the process. The test setup is shown in the image above, and the process is explained below. Continue reading “Fixing NRF24L01+ Modules Without Going (Too) Insane”