Teenage Engineering just pushed an acoustic modem into their PO-32 Tonic drum synthesizer. This $59 pocket device now transmits drum patterns to another PO-32 using frequency-shift keying (FSK) tones blasted through its speaker and captured by the receiving unit’s mic. No cables. No Bluetooth. Just sound waves carrying data at a retro 300 baud rate.
The PO-32, released in 2018 as part of Teenage Engineering’s Pocket Operator line, packs 16 drum sounds, a 16-step sequencer, and parameter locks into a calculator-sized body powered by two AAA batteries. It syncs with other POs via 3.5mm jacks, but this new firmware hack—demoed in a YouTube video from the company—ditches wires entirely. Sender plays a chirpy FSK melody (think dial-up modem meets chiptune), receiver decodes it into a savable pattern. Transfer takes about 20 seconds per pattern.
How the Modem Works
Under the hood, the PO-32 generates two tones: one for binary 0 (say, 1200 Hz), another for 1 (2200 Hz), standard Bell 103 modem spec from the 1960s. It encodes 8-bit bytes with start/stop bits, adds error correction via simple checksums, and retries on failures. The mic samples at 8 kHz, filters noise, and demodulates back to bits.
TE open-sourced the modem code on GitHub under a permissive license. Hackers already fork it: one user boosted baud to 1200 for twice the speed, another ported it to the PO-33 K.O. Firmware flashes via USB from a web app—no soldering required. Reliability holds up in quiet rooms but drops in noisy environments; wind noise or chatter garbles packets, forcing retransmits.
This isn’t TE’s first sound-data trick. Their OP-1 field recorder has tape emulation that embeds metadata in audio hiss. But PO-32’s modem targets the air-gapped crowd: transfer patterns at a festival, in a Faraday cage, or across a glass wall without RF leakage.
Why This Actually Matters
In 2023, wireless rules—WiFi, BLE, NFC everywhere. Yet acoustic modems persist in niche security ops. The CIA used them in the 1970s for embassy data exfil. Today, tools like minimodem (300-9600 baud over sound) ship with Kali Linux for covert channels. PO-32 turns a toy synth into a $59 hardware demodulator, democratizing offline data links.
Practical speed caps at 37.5 bytes/second—fine for 128-byte drum patterns, useless for files. But implications ripple: hackers mod POs into mesh networks via sound. Pair with a Raspberry Pi Zero ($5) running a soundcard driver, and you bridge analog-digital gaps. Security pros test air-gapped exploits; synth nerds swap loops at parties.
Skeptical take: novelty trumps utility. Bluetooth Low Energy hits 1 Mbps; even IR LEDs outpace this. Battery drain spikes during transfers (10% per minute), and pattern-only limits kill versatility. Still, TE nails execution—reliable enough for real use, fun enough to hook tinkerers. Hacker News lit up with ports to Arduino and web audio APIs, proving it sparks real innovation.
Broader context: TE’s Pocket Operators sold over 500,000 units since 2015, blending music gear with hacker bait. PO-32 at $59 undercuts a decade of “DIY synth” kits. This modem cements their rep: cheap hardware with deep hacks. If you’re into procedural audio or covert comms, flash it. Everyone else? Cute demo, move on.
Grab firmware from teenage.engineering/downloads. Test two POs side-by-side—works first try in silence. Why matters: proves sound still sneaks data where radio fears to tread, and cheap synths double as spy gear.
