Video Doorbell Focuses On Quality, Aesthetic

One of the most popular futurist tropes of the 20th century was the video intercom. Once this technology was ready, it would clearly become a mainstay of modern living overnight. Our lived reality is however somewhat different. For [MisterM], that simply wouldn’t do, so he set about producing a retro-themed video doorbell that is sure to be the envy of the neighbourhood.

Not one to settle for second best, [MisterM] wanted to focus on quality in video and sound. A Microsoft LifeCam 3000HD handles video and audio capture, with a Raspberry Pi 3B+ providing plenty of grunt to run the show. The Pimoroni pHAT BEAT add-on provides audio output. It’s all integrated into a 1980s vintage intercom, which is painted a deep shade of maroon for an extra classy look. Further parts are integrated into a classic Sony tape deck, with LEDs shining out from under the cassette door for added visual appeal.

The doorbell works by making calls to Google Duo, which allows the user to answer the door from anywhere in the house, or indeed – anywhere with an Internet connection! [MisterM] reports this has already proved useful for communicating with couriers delivering packages to the house. There’s also a standard wireless doorbell and chime integrated into the unit which alerts those within the house in the usual way.

It’s a project that is both highly functional and looks particularly swish. Integrating new brains into old-school enclosures is a great way to give your project a cool look. These aircraft surplus clocks are a great example. Video after the break.

Continue reading “Video Doorbell Focuses On Quality, Aesthetic”

Building An ESP8266 Doorbell On Hard Mode

It certainly seems as though it should be an easy enough project; all [Miguel De Andrade] wanted was to receive a notification when somebody was pressing his doorbell, and thought it would be a good project to get his feet wet in the wonderful world of ESP8266 hacking. But as fate would have it, not everything went according to plan. In the end he got it sorted out, but it’s an interesting look at how even the “easy” projects can call the gremlins out of hiding.

Arguably, the problems started when [Miguel] picked up an ESP-01 module from a local electronics retailer. While the convenience of buying the hardware in a brick and mortar store can’t be overstated, it did mean he was stuck with a slightly more spartan experience compared to the more common ESP “development boards”. Programming it externally with a Teensy ended up not being much of an obstacle, but it did mean he was stuck with only two GPIO pins.

At any rate, with ESP in hand, the next step was figuring out how the existing bell and intercom system even worked. Unfortunately, after some experimentation [Miguel] found there was a bit more going on there than he’d hoped. According to his multimeter, the one line from the intercom sits at approximately 5 VDC when it’s open, and drops down to 2.5 VDC when pressed. If that wasn’t bad enough, picking up the handset to answer the intercom sent the voltage up to a microcontroller-killing 12 VDC. To complicate maters further, the supply line for the intercom was 23 VAC, so he’d need to rectify that somehow if he wanted to avoid a separate power supply for the ESP.

To turn this jumble of voltages into a nice clean 0 – 3.3 V signal for the ESP8266, he came up with a circuit based around the LM358 comparator that utilizes an LM117 regulator to power itself and the ESP at the same time. A couple of diodes are there to block the AC component from causing trouble, and an A2N2222A transistor is used as a buffer amplifier to boost the output of the comparator so it registers as a digital HIGH on the ESP. The circuit took a bit of fiddling to get sorted out, but in the end [Miguel] says it seems to get the job done.

You might think the problems were solved, but this is where it gets really annoying. The system would work fine for awhile, and then inexplicably go silent. In diagnosing the problem he realized that his circuit connected to GPIO_0 was inadvertently putting the ESP8266 into programming mode, since it was holding the pin LOW unless the intercom button was pressed. He assumed he could just move the circuit to the other GPIO pin, but as that one has the board’s LED on it, that caused its own problems. For now, [Miguel] hasn’t come up with a solution to this issue, and has learned to live with the fact that the system won’t come back up cleanly should it lose power for any reason.

If you’re looking for a slightly classier look than a scrap of perfboard stuck on the wall with what appears to be chewing gum, we’ve also seen the ESP8266 used in some more ornate doorbell setups. Of course if you still haven’t gotten your head wrapped around the whole Internet-connected button thing, you can always start with something a little easier.

Wireless Doorbell Hacked Into Hands-on MQTT Tutorial

The project itself is very simple: getting push notifications via MQTT when a wireless doorbell sounds. But as [Robin Reiter] points out, as the “Hello, world!” program is a time-honored tradition for coders new to a language, so too is his project very much the hardware embodiment of the same tradition. And the accompanying video build log below is a whirlwind tour that will get the first-timer off the ground and on the way to MQTT glory.

The hardware [Robin] chose for this primer is pretty basic – a wireless doorbell consisting of a battery-powered button and a plug-in receiver that tootles melodiously when you’ve got a visitor. [Robin] engages in a teardown of the receiver with attempted reverse engineering, but he wisely chose the path of least resistance and settled on monitoring the LEDs that flash when the button is pushed. An RFduino was selected from [Robin]’s ridiculously well-organized parts bin and wired up for the job. The ‘duino-fied doorbell talks Bluetooth to an MQTT broker on a Raspberry Pi, which also handles push notifications to his phone.

The meat of the build log, though, is the details of setting up MQTT. We’ve posted a lot about MQTT, including [Elliot Williams]’ great series on the subject. But this tutorial is very nuts and bolts, the kind of thing you can just follow along with, pause the video once in a while, and have a working system up and running quickly. There’s a lot here for the beginner, and even the old hands will pick up a tip or two.

Continue reading “Wireless Doorbell Hacked Into Hands-on MQTT Tutorial”

Password Extraction Via Front Doorbell

Not a day goes by without another IoT security hack. If you’re wondering why you don’t want your front doorbell connected to the Internet, this hack should convince you.

The hack is unfathomably stupid. You press the button on the back of the unit that pairs the doorbell with your home WiFi network, and it transmits the password in the clear. Sigh. It’s since been fixed, and we suppose that’s a good thing, but we can’t resist thinking for a moment about an alternative implementation.

Imagine, like all previous non-IoT wireless doorbells, that the doorbell transmitted a not-very coded signal over an open frequency like 433 MHz to a receiver inside your home. Do the same with the video stream. Now the receiver can be connected to the Internet, and can be significantly more secure because it’s behind your locked front door. The attack surface presented to the outside world by the doorbell itself is small, and limited to faking a doorbell press or showing you pictures you don’t want to see. Yawn.

But because the outside doorbell unit could be connected to a network, it was. Now the attack surface extends into your home’s network, and if you’re like most people, the WiFi router was your only real defense.

Now we love the IoT, in principle. There are tons of interesting applications that need the sort of bandwidth or remote availability that the Internet provides. We’re just not convinced yet that a doorbell, or a fridge for that matter, meet the criteria. But it does add a hundred bucks to the price tag, so that’s good, right? What do you think? When does the risk of IoT justify the reward?

Thanks [Dielectric] for the tip!

Hacked Apartment Intercom Barks At You Or Buzzes You In

Forgot your apartment keys? If you’ve got a ritzy building with a doorman, no problem. If your digs are a little more modest, you might only have an intercom panel that calls up to your apartment so someone can buzz you in. But if nobody is home, you’re out of luck. That’s why [Paweł] spent an hour whipping up an intercom connected automation system pack full of goodies.

entryphoneThe design is pretty simple – an ATMega328P to snoop on the analog phone ringer in the apartment when the intercom call button is pushed, and a relay wired in parallel with the door switch to buzz him in. For added security, the microcontroller detects the pattern of button presses and prevents unwanted guests from accessing the lobby. Things got really fun when [Paweł] added a PCM audio module to play random audio clips through the intercom. As you can see in the video below, an incorrect code might result in a barking dog or a verbal put-down. But [Paweł] earns extra points for including the Super Mario Bros sound clip and for the mashup of the “Imperial March” with “The Girl from Ipanema”.

True, we’ve seen a slightly more polished but less [Mario] version of this project before, but the presentation of this particular hack has us grinning from ear to ear.

Continue reading “Hacked Apartment Intercom Barks At You Or Buzzes You In”

RasPi Doorbell

Raspberry Pi Doorbell Is Fully Featured

When you think of a doorbell, you typically don’t think of anything very complicated. It’s a button that rings a bell inside your home. That’s about it. [Ahmad] decided he wanted to turn his doorbell up to eleven (Google Doc) with this build. Using a Raspberry Pi, he was able to cram in loads of features.

When the doorbell button is pressed, many different events can be triggered. In the demo video, [Ahmad] shows how his phone receives a text message, and email, and a tweet. The system can even be configured to place a voice call via Google Hangouts using a USB microphone. [Ahmad] demonstrates this and shows how the voice call is placed almost instantly when the button is pressed. This may be a bit overkill, but it does demonstrate many different options depending on your own needs.

For the hardware side of things, [Ahmad] purchased a wireless doorbell. He opened up the ringer unit and hooked up the speaker wires to a couple of pins on the Raspberry Pi through a resistor. The doorbell unit itself is powered off of the 3.3V supply from the Pi. The Pi also has a small LCD screen which shows helpful information such as if the Internet connection is working. The screen will also display the last time and date the doorbell was pressed, in case you weren’t home to answer the door.

On top of all of that, the system also includes a Raspberry Pi camera module. This allows [Ahmad] to take a photo of the person ringing the doorbell as a security measure. He can even view a live video feed from the front door by streaming directly to YouTube live. [Ahmad] has provided a link to his Pi image in the Google Doc so others can use it and modify it as they see fit. Continue reading “Raspberry Pi Doorbell Is Fully Featured”

Over-engineering Ding Dong Ditch

One day, [Samy]’s best friend [Matt] mentioned he had a wireless doorbell. Astonishing. Even more amazing is the fact that anyone can buy a software defined radio for $20, a small radio module from eBay for $4, and a GSM breakout board for $40. Connect these pieces together, and you have a device that can ring [Matt]’s doorbell from anywhere on the planet. Yes, it’s the ultimate over-engineered ding dong ditch, and a great example of how far you can take practical jokes if you know which end of a soldering iron to pick up.

Simply knowing [Matt] has a wireless doorbell is not enough; [Samy] needed to know the frequency, the modulation scheme, and what the doorbell was sending. Some of this information can be found by looking up the FCC ID, but [Samy] found a better way. When [Matt] was out of his house, [Samy] simply rang the doorbell a bunch of times while looking at the waterfall plot with an RTL-SDR TV tuner. There are a few common frequencies tiny, cheap remote controls will commonly use – 315 MHz, 433 MHz, and 900 MHz. Eventually, [Samy] found the frequency the doorbell was transmitting at – 433.8 MHz.

After capturing the radio signal from the doorbell, [Samy] looked at the audio waveform in Audacity. It looked like this doorbell used On-Off Keying, or just turning the radio on for a binary ‘1’ and off for a binary ‘0’. In Audacity, everything the doorbell transmits becomes crystal clear, and with a $4 434 MHz transmitter from SparkFun, [Samy] can replicate the output of the doorbell.

For the rest of the build, [Samy] is using a mini GSM cellular breakout board from Adafruit. This module listens for any text message containing the word ‘doorbell’ and sends a signal to an Arduino. The Arduino then sends out the doorbell code with the transmitter. It’s evil, and extraordinarily over-engineered.

Right now, the ding dong ditch project is set up somewhere across the street from [Matt]’s house. The device reportedly works great, and hopefully hasn’t been abused too much. Video below.

Continue reading “Over-engineering Ding Dong Ditch”