Picture of front and back of thumb drive enclosure

Jcorp Nomad: ESP32-S3 Offline Media Server In A Thumbdrive

[Jackson Studner] wrote in to let us know about his ESP32-based media server: Jcorp Nomad.

This project uses a ESP32-S3 to create a WiFi hotspot you can connect to from your devices. The hotspot is a captive portal which directs the user to a web-interface comprised of static HTML assets which are in situ with the various media on an attached SD card formatted with a FAT32 file system. The static HTML assets are generated by the media.py Python 3 script when the ESP32 boots.

This project exists because the typical Raspberry Pi media server costs more than an ESP32 does. The ESP32 is smaller too, and demands less power.

According to [Jackson] this ESP32-based solution can support at least four concurrent viewers. The captive portal is implemented with DNS and HTTP services from the ESP32. The firmware is an Arduino project that integrates a bunch of libraries to provide the necessary services. The Jcorp Nomad media template supports Books (in pdf files), Music (in mp3 files), and Movies and Shows (in mp4 files). Also there is a convention for including JPEG files which can represent media in the user-interface.

And the icing on the cake? The project files include STL files so you can 3D print an enclosure. All in all, a very nice hack.

Portable Video Looper Is Easy As Pi

We all have handfuls of thumb drives lying around with only a vague idea of what’s on most of them, right? So why not dust one off, back it up somewhere, and give it a new purpose? That’s exactly what [Cher_Guevara] did to make this portable Raspberry Pi video looper. The hardest part of recreating this one might be coming up with such a good candidate mini CRT TV.

Once powered on, the Pi Zero W stuffed inside this baby Magnavox waits for a thumb drive to be inserted and says as much in nice green text on the screen. Then it displays the number of video files found on the drive and gives a little countdown before looping them all endlessly.

We love how flawlessly [Cher] was able to integrate the USB port and a flush-mounted shutdown button for the Pi into the TV’s control panel on the top. It’s like a portable from another timeline.

[Cher] got lucky because this TV happens to have a video-in jack for connecting up the Pi. If yours doesn’t have one, you might be able to use an RCA to RF converter if the antenna is removable. We’ve got the demo video waiting for you after these messages.

Okay, that’s one thumb drive repurposed. Now find another and experiment with adding USB OtG to it.

Continue reading “Portable Video Looper Is Easy As Pi”

Steampunk USB Cryptex Keeps Your Data Secure

Worried about people snooping around your USB drive? Digital encryption not good enough for you? What you need is a USB Cryptex to secure the drive from even being accessed!

Made completely out of copper and brass, [Scots72] really put a lot of effort into this beautiful piece of metalworking. The USB drive itself is encased in epoxy inside of a copper tube — the rest is built around it. Built almost entirely using hand tools, and we can only imagine how long the process took to complete. But patience is often rewarded with results like these!

Continue reading “Steampunk USB Cryptex Keeps Your Data Secure”

VCF East X: The World’s Largest USB Thumb Drive

The Vintage Computer Festival last weekend featured racks and racks of old minicomputers, enough terminals for an entire lab, and enough ancient storage devices to save a YouTube video. These storage devices – hard disks, tape readers, and 8″ disk drives – were only connected to vintage hardware, with one exception: a DEC RL02 drive connected to a modern laptop via USB.

The DEC RL02 drive is the closest you’re going to get to a modern mechanical hard drive with these old machines. It’s a huge rack unit with removable platters that can hold 10 Megabytes of storage. [Chris] found one of these old drives and because he wanted to get into FPGA development, decided to create a USB adapter for this huge, old drive.

The hardware isn’t too terribly complex, with a microcontroller and an FPGA that exposes the contents of the drive over USB mass storage. For anyone trying to bootstrap a PDP-11 or -8 system, [Chris] could download disk images from the Internet, write them to the disk, and load up the contents of the drive from the minicomputer. Now, he’s using it with SimH to have a physical drive for an emulated system, but the controller really doesn’t care about what format the disk pack is in. If [Chris] formatted a disk pack with a FAT file system, he would have the world’s largest and heaviest USB thumb drive in the world.

Video below.

Update: As promised, [Chris] put all the code in a git

Continue reading “VCF East X: The World’s Largest USB Thumb Drive”

USB Cap

Never Forget Your USB Stick Again

USB sticks are very handy. They are a very portable and relatively inexpensive means of storing data. Possibly the most annoying part about using one of these devices is when you inevitable leave it behind somewhere by accident. This is especially true if it contains sensitive information. [Eurekaguy] feels your pain, and he’s developed a solution to the problem.

[Eurekaguy] designed a custom cap for USB sticks that beeps approximately every minute after the USB stick has been plugged in for five minutes. The cap is 3D printed and then slightly modified with four 1mm holes. Two wires are routed between these holes to make contact points for the VCC and GND pins of the USB stick.

The beep circuit is comprised of a tiny PIC12F629 microcontroller along with a couple of other supporting components. The circuit is wired together dead bug style to conserve space. Three AG5 batteries power the circuit. A small piezo speaker provides the repeating beep to remind you to grab your USB stick before you walk away from the computer.

[Thanks Irish]

Hand Placing Flash Die To Make USB Drives

SONY DSC

It’s a stretch to call this one a hack, but USB thumb drives are around us constantly and we always assumed that the boards inside were machine populated (like with a pick and place machine). [Bunnie] tells us otherwise. He recently had the chance to tour a factory where USB flash drives are made.

The image above shows a worker populating a set of boards with the flash memory dies. The waffle-grid to the right holds the dies. Each is a tiny glint of a component. The worker is not in a clean room, and is using a bamboo tool to pick up the pieces. [Bunnie] explains that he’s seen the tools before but doesn’t fully comprehend how they work. He figures that the hand-cut manipulator has just the right amount of grab to pick up the die, but will also release it when it touches down on the dot of glue applied to the landing zone on the board.

If you’re into this sort of thing you should check out the PCB factory tour we saw a couple of years back. The article link is dead but the embedded tour video still works.

[Thanks pl]

Encrypted Drive Attack Hints At Original Xbox Hacking

[Thice] discovered a vulnerability in encrypted portable storage a few years ago. He’s just pointing about the exploit now. He mentions that he notified manufacturers long ago and we’d guess the wait to publish is to give them a chance to patch the exploit.

He calls it the Plug-Over Attack and for those who were involved with original Xbox hacking, this technique will sound very familiar. The Xbox used hard drive keys to lock the device when not in use. When you booted up the console it checked the hardware signature to make sure it was talking to the right motherboard. But if you booted up the device, then swapped the IDE cable over to a computer without cutting the power you could access the drive without having the password.

This attack is pretty much the same thing. Plug in a drive, unlock it on the victim system the normal way, then replug into the attacking system. In the image above you can see that a USB hub will work for this, but you can also use a hacked USB cable that patches a second jack into the power rail. For some reason the encryption system isn’t able to lock itself when the USB enumerates on the new system, only when power is cycled. Some of them have a timer which watches for drive idle but that still doesn’t protect from this exploit.