ePaper displays are easy on the eyes because there’s no flickering backlight to put strain on them. This is great until you’re trying to read in a dim environment. Of course Amazon will sell you a backlight that’s powered from the reader itself if you’re willing to pay. [Txoof] thought the price was a bit too high so he built his own version.
There are two pockets in the top of the Kindle reader for hooks to grab onto. Each has an electrical contact in it and together they provide about 4V of power. To patch into that source [Txoof] cut his own hooks from brass stock and mounted them onto a piece of basswood. He then cut and bent a hood from more of the brass stock to house the LEDs. A series of three of the white diodes draw their power from the hooks and shine onto to the display. As you can see this works just fine, but could benefit from just the right diffuser.
In the constant battle of manufacturers vs. jailbreakers, the turnaround time between a new software release and a new jailbreak seems to be getting shorter and shorter. [Yifan] noticed that a recent Kindle update broke a previous method of running unsigned code and started the search for a new workaround.
He eventually found a way to force the Kindle to run unsigned code based upon how the software update checked for digitally signed files. With that knowledge in hand, he discovered that he could trick the updater to run any file he wanted by exploiting the standard functionality found in the Unix ‘cat’ command.
On his site, [Yifan] provides more details, source code, and a compiled update file that performs the jailbreak for you. Much like the previous jailbreaks we have featured, it is perfectly legal to do, but you do risk voiding your warranty during the process.
[Picture via Amazon.com]
[Luigi Rizzo] has been working on some hacks for his 3rd generation Kindle. There is already a Python based terminal emulator called AjaxTerm but he wanted a lightweight standalone so he reimplemented the program in C. The 100k binary monitors the keyboard, launching the terminal emulator when it detects a Shift-T sequence. It also uses alternative key mapping to fill in for some of the keys the Kindle’s keyboard is missing.
We haven’t seen a whole lot of Kindle hacking since it was hacked to run Ubuntu. Seems like this terminal emulator is a useful and unobtrusive hack to try out on the beloved reader.
[Dave] over at the EEVblog did a review of the kindle 3 recently, but never got to the good stuff, the guts. He is now rectifying this with a full video dissection of the eReader. Full of details on how to open it up as well as specifics on the internals, this is a fun video to watch. One thing that caught our attention was the RFID tag on the inside of the case. It is probably for inventory tracking, but we can’t help but have a few tinfoil hat type thoughts. You can watch the video after the break.
Continue reading “EEVblog dissects a kindle 3”
This is an Amazon Kindle DX with a Sparkfun Bluetooth Mate stuck in it. [Darron] hacked the two together in order to have a wireless serial terminal on the device. There are three big pads in the middle of the Kindle PCB labelled GND, RX and TX, making it easy to figure out those connections. Getting voltage was a bit more difficult. He managed to find 4V coming off of one side of the Kindle’s wakeup switch which works well because the Bluetooth Mate has a voltage regulator on board. To protect the Bluetooth module he modified it to pull-up the TX from the on-board regulated 3.3V rather than the 4V coming in from the Kindle.
He’s also been doing some software work on the device now that he has easy access to it. Along the lines of the Ubuntu-on-Kindle hack from September, he’s compiled QT for the Kindle and written a couple of programs such as Sudoku to show that it works.
Ding-dong, the DRM is gone. But not in the way we really want. The copy protection scheme that is used for most Kindle books has been cracked. We’d much prefer it hadn’t been there in the first place but then there’d be no challenge for security hackers.
Giving credit for the advancement gets a little messy. Apparently two folks figured this out at approximately the same time. [Labba] posted about his discoveries while [I (heart) Cabbages] wrote about his exploits in a blog entry. Either way, you can now strip the protection and use your legally-purchased books on any device you choose by using this Python script.
This means that both Kindle and Nook have had their DRM broken. Are these companies really trying to prevent copying (fair use) or do they just want to be able to tell the publishers that there are copy protections while turning a blind eye to what happens in the privacy of your personal computer?
[Thanks Sanchoooo via Slashdot]
Having read books on a Palm device for years we were excited when Amazon came up with the Kindle. Our problem is that if you’re going to carry around a portable device it should do a whole lot more than just display text from a few books. [Jesse Vincent] managed to get Ubuntu 9.04 Jaunty Jackalope running on the Kindle 2. This opens up endless possibilities to run whatever you want on this hardware.
The new functionality was presented in a talk at OSCON 2009. Be warned, [Jesse] has a very high geeky-hacker level. Make sure you have a tech dictionary and Google at the ready when you watch the video embedded after the break. His talk starts at about two minutes in and runs for five minutes total. Continue reading “Ubuntu 9.04 on Kindle 2”