Skip to main content

This homemade 8-bit computer could finally pose a challenge to Intel's 8008 CPU


By today’s standards, an 8-bit CPU isn’t all that impressive considering all of our devices use 64-bit architectures. What is impressive, however, is when someone builds their own 8-bit computer using a plethora of wires and what is known in the do-it-yourself hardware programming community as a breadboard.

That is exactly what YouTube user Paulo Constantino did from the comfort of his own home in a video that was uploaded last June and is only now beginning to garner the attention it deserves. Resembling an Intel 8008 processor of the 1970s, Constantino’s project might seem rudimentary to us now, but it’s a much more arduous feat to pull off than, say, building a gaming PC with today’s components.

Recommended Videos

Because all of its data traffic is bused in eight sets of ones and zeroes, this breadboard-based CPU is a lot slower than our computers, which is why it is so intriguing that Constantino was able to get his to play even an off-key rendition of the Super Mario Bros. theme song.

Breadboards are typically used for circuitry prototypes, which is what makes this story so bizarre to begin with. Pair that with the fact that the song itself was programmed by flipping a bunch of DIP switches rather than being wired to any inputs, such as a keyboard, and it becomes considerably more of a head-scratcher.

So, of course, the 8-bit breadboard CPU that Constantino devised here isn’t perfect, but it’s safe to assume this is only the beginning. After being designed over the course of two days using the old-school pen-and-paper method, the computer itself was assembled in a matter of a week.

In addition to being able to play a classic gaming melody, the hardware also supports a program that can be used to count from one all the way up to the number 255. It’s curious where Constantino plans to take this experiment now. For the time being, however, he assures us that a keyboard will soon be added for the sake of more straightforward programming techniques.

In the meantime, you can build your own computer (albeit the 64-bit kind) using our handy how-to guide.

Gabe Carey
Former Digital Trends Contributor
A freelancer for Digital Trends, Gabe Carey has been covering the intersection of video games and technology since he was 16…
This gorgeous Mac mini hub exacerbates the power button placement problem
M4 Mac mini with Satechi hub on a desk.

Satechi, known for its high-quality tech accessories, is updating its Mac mini hub for the new M4 model. Like previous hubs, it allows Mac mini owners to expand their storage and ports while preserving airflow, wireless signal, and performance. It looks awesome, but this time, the design highlights the problematic nature of the new Mac mini's placement of its power button.

With previous Mac mini models, the power button was at the back, making it easily accessible even when it was in a Satechi hub. The new button placement on the bottom of the PC, however, may prove even more annoying for anyone who wants to buy this accessory.

Read more
Proton VPN vs. Mullvad: Which is the best open-source VPN?
Proton VPN Plus and Mullvad websites appear in a split-screen on a PC monitor.

Open-source software is exploding in popularity and even virtual private networks (VPNs) share code for transparency. With over 100 million open-source developers contributing to the community, there’s an improved chance to find bugs and patch vulnerabilities.

Proton VPN and Mullvad are among the best VPNs available, and both are open-source solutions. You can browse the code used in Proton VPN and Mullvad on GitHub to check that there isn’t any secret logging or undisclosed data collection.

Read more
Some older D-Link routers are vulnerable to attack
D-Link Omna 180 Cam HD

A few legacy D-Link routers can be vulnerable to Remote Code Execution (RCE) attacks since the company refuses to send any updates to patch them up, claiming they have reached end-of-life, as recently posted on its announcement page.

The vulnerability is a serious issue since it allows hackers to take control from anywhere in the world and use a stack buffer overflow. This attack sends more data than the buffer size can handle, potentially corrupting critical information like the return address. Thus, hackers can take control of your PC. However, the company did not detail how the threat works, possibly not informing the hackers too much about the issue.

Read more