Popping The Hood On The Flux Beamo Laser Cutter

While the K40 has brought affordable laser cutting to the masses, there’s no question that it took a lot of sacrifices to hit that sub-$400 price point. There’s a reason that we’ve seen so many upgrades and improvements made to the base model machine, but for the price it’s hard to complain. That being said, for users who don’t mind spending a bit more money for a more complete out-of-the-box experience, there are other options out there.

One of them is the beamo, from FLUX. [Frank Zhao] recently picked up one of these $1,900 USD laser cutters because he wasn’t thrilled with the compromises made on the K40. Specifically, he really liked the idea of the internal water cooling system. Oddly enough, something about using a garden hose and buckets of water to cool the laser seemed off-putting. Luckily for us, he’s got a technical eye and the free time necessary to do a teardown and objective analysis of his new toy.

The short version of the story is that [Frank] is not only happy with the results he’s getting, but finds the machine to be well designed and built. So if you’re looking for a rant, sorry. But what you will find is a methodical look at each subsystem of the beamo, complete with annotated pictures and the kind of technical details that Hackaday readers crave.

We especially like his attempts to identify parts which might be difficult to source in the future; it looks like the CO2 laser tube might be proprietary, but everything else looks fairly jellybean. That includes the Raspberry Pi 3B that’s running the show, and the off-the-shelf touch screen HDMI display used for the interface. [Frank] did note that FLUX was unwilling to give him the credentials to log into the Pi and poke around, but with direct access to the SD card, it’s not like that will stop anyone who wants to get in.

In a way, laser cutters are in a similar situation today to that desktop 3D printers were in a few years ago. The cheap ones cut so many corners that upgrades and fixes are almost a necessity, and building your own machine is often less expensive than buying a commercial offering with similar specs. While the beamo is still a bit too expensive for the average hobbyist, it’s good to see machines of this caliber are at least coming down out of the 5 figure range.

Just How Do Aircraft Transponders Work Anyway?

Most of us will have a hazy idea of how radar works to detect aircraft by listening for reflected radio waves. And we’ll probably also know that while radar can detect aircraft, it’s not the most efficient or useful tool in the hands of an air traffic controller. Aircraft carry transponders so that those on the ground can have a clearer picture of the skies, as each one reports its identity, altitude, and position. [Yeo Kheng Meng] was lucky enough to secure a non-functioning aircraft transponder and do a teardown, and his write-up makes for interesting reading as he explains their operation before diving into the hardware.

The 1978 and 1979 date codes on the various integrated circuits and transistors identify it as having been made in 1979, so not having a CPU is not entirely unsurprising given its age. Instead this is a straightforward device that responds to pulse lengths of different timings with sequential bursts of data.

[Yeo Kheng] is mystified by the RF strip and associated components, which look to us like a typical crystal oscillator and frequency multiplier strip from that era, along with some screened boxes that probably contain cavity filters and given that there is also a high voltage power supply present, a tube RF power amplifier. GHz-capable semiconductors were quite exotic in the 1970s, while high-frequency tubes had by then a long history.

It’s evident that the tech behind aircraft transponders has moved on since this unit was built, but one thing’s certain. Hackers in 1978 would have had to go to a lot of work to listen to them and interpret the results, while here in the 21st century it’s something we do routinely.

Teardown: Nabaztag

In 2020 there is nothing novel or exciting about an online device. Even the most capable models are designed to be unobrusive pucks and smart speakers; their function lies in what they do rather than in how they look. In 2005, an Internet connected device was a rare curiosity, a daring symbol of a new age: the “Internet of Things”!

Our fridges were going to suggest recipes based upon their contents, and very few people had yet thought of the implications of an always-on connected appliance harvesting your data on behalf of a global corporation. Into this arena stepped the Nabaztag (from the Armenian for “rabbit”), an information appliance in the form of a stylised French plastic rabbit that could deliver voice alerts, and indicate status alerts by flashing lights and moving its ears.

Continue reading “Teardown: Nabaztag”

Hacking Apollo Hack Chat

Join us on Wednesday, April 22 at noon Pacific for the Hacking Apollo Hack Chat with “CuriousMarc” VerdiellKen ShirriffMike Stewart, and Carl Claunch!

When President Kennedy laid down the gauntlet to a generation of scientists and engineers to land a man on the Moon before the close of the 1960s, he likely had little idea what he was putting in motion. The mission was dauntingly complex, the science was untested, and the engineering was largely untried. Almost everything had to be built from scratch, and entire industries were born just from the technologies that had to be invented to make the dream come true.

Chief among these new fields was computer science, which was barely in its infancy when the 1960s started. By the end of the decade and the close of the Space Race, computers had gone from room-filling, power-guzzling machines to something compact and capable enough to fly men to the Moon and back. The computers that followed all built on the innovations that came about as a result of Apollo, and investigating the computers of the era and finding out what made them tick is an important part of our technological culture.

That’s where this retrocomputing dream team came into play. Together, they’ve poked and prodded at every bit of hardware from the Space Race era they could find, including a genuine Apollo Guidance Computer (AGC) that was rescued from the trash. What’s more, they actually managed to restore it to working condition with a series of epic hacks and sheer force of will.

Marc, Ken, Mike, and Carl will stop by the Hack Chat to talk about everything that went into getting the AGC working again, along with anything else that pops up. Come ready to have your Apollo-era hardware itches scratched by the people who’ve been inside a lot of it, and who have seen first-hand what it took to make it to the Moon and back.

join-hack-chatOur Hack Chats are live community events in the Hackaday.io Hack Chat group messaging. This week we’ll be sitting down on Wednesday, April 22 at 12:00 PM Pacific time. If time zones have got you down, we have a handy time zone converter.

Click that speech bubble to the right, and you’ll be taken directly to the Hack Chat group on Hackaday.io. You don’t have to wait until Wednesday; join whenever you want and you can see what the community is talking about.

Continue reading “Hacking Apollo Hack Chat”

Teardown Of Oddball Night Vision Shows Off Retro-futuristic Vibe

Night vision aficionado [Nicholas C] shared an interesting teardown of a Norwegian SIMRAD GN1 night vision device, and posted plenty of pictures, along with all kinds of background information about their construction, use, and mounting. [Nicholas] had been looking for a night vision device of this design for some time, and his delight in finding one is matched only by the number of pictures and detail he goes into when opening it up.

The GN1 rocks an irresistible retro-futuristic look.

What makes the SIMRAD GN1 an oddball is the fact that it doesn’t look very much like other, better known American night vision devices. Those tend to have more in common with binoculars than with the GN1’s “handheld camera” form factor. The GN1 has two eyepieces in the back and a single objective lens on the front, which is off-center and high up. The result is a seriously retrofuturistic look, which [Nicholas] can’t help but play to when showing off some photos.

[Nicholas] talks a lot about the build and tears it completely down to show off the internal optical layout necessary to pipe incoming light through the image intensifier and bend it around to both eyes. As is typical for military hardware like this, it has rugged design and every part has its function. (A tip: [Nicholas] sometimes refers to “blems”. A blem is short for blemish and refers to minor spots on optics that lead to visual imperfections without affecting function. Blemished optics and intensifier tubes are cheaper to obtain and more common on the secondary market.)

In wrapping up, [Nicholas] talks a bit about how a device like this is compatible with using sights on a firearm. In short, it’s difficult at best because there’s a clunky thing in between one’s eyeballs and the firearm’s sights, but it’s made somewhat easier by the fact that the GN1 can be mounted upside down without affecting how it works.

Night vision in general is pretty cool stuff and of course DIY projects abound, like the OpenScope project which leverages digital cameras and 3D printing, as well as doing it the high-voltage image intensifier tube way.

Teardown Of Costco Ceiling Light Reveals Microwave Motion Sensor And Hackable Design

[hclxing] eagerly picked up an LED ceiling light for its ability to be turned on and off remotely, but it turns out that the lamp has quite a few other features. These include adjustable brightness, color temperature, automatic turnoff, light sensing, motion sensing, and more. Before installing, [hclxing] decided to tear it down to see what was involved in bringing all those features to bear, but after opening the lamp there wasn’t much to see. Surprisingly, besides a PCB laden with LEDs, there were exactly two components inside the unit: an AC power adapter and a small white controller unit. That’s it.

Microwave-based motion sensor board on top, controller board for LED ceiling light underneath.

The power adapter is straightforward in that it accepts 100-240 Volts AC and turns it into 30-40 Volts DC for the LEDs, and it appears to provide 5 V for the controller as well. But [hclxing] noticed that the small white controller unit — the only other component besides the LEDs — had an FCC ID on it. A quick bit of online sleuthing revealed that ID is attached to a microwave sensor module. Most of us would probably expect to see a PIR sensor, but this light is motion sensing with microwaves. We have seen such units tested in the past, which links to a video [hclxing] also references.

The microwave motion sensor board is shown here, and underneath it is a dense PCB that controls all other functions. Once [hclxing] identified the wires and their signals, it was off to Costco to buy more because the device looks eminently hackable. We’re sure [hclxing] can do it, given their past history with reverse-engineering WyzeSense hardware.

Inside A CAN Bus Mileage Manipulator

In the days of carburetors and leaf spring suspensions, odometer fraud was pretty simple to do just by disconnecting the cable or even winding the odometer backwards. With the OBD standard and the prevalence of electronics in cars, promises were made by marketing teams that this risk had all but been eliminated. In reality, however, the manipulation of CAN bus makes odometer fraud just as easy, and [Andras] is here to show us exactly how easy with a teardown of a few cheap CAN bus adapters.

We featured another project that was a hardware teardown of one of these devices, but [Andras] takes this a step further by probing into the code running on the microcontroller. One would imagine that basic measures would have been taken by the attackers to obscure code or at least disable debugging modes, but on this one no such effort was made. [Andras] was able to dump the firmware from both of his test devices and start analyzing them.

Analyzing the codes showed identical firmware running on both devices, which made his job half as hard. It looked like the code was executing a type of man-in-the-middle attack on the CAN bus which allowed it to insert the bogus mileage reading. There’s a lot of interesting information in [Andras]’s writeup though, so if you’re interested in CAN bus or attacks like this, it’s definitely worth a read.