You can write with a fifty cent disposable pen. Or you can write with a $350 Montblanc. The words are the same, but many people will tell you there is something different about the Montblanc. Maybe that’s how [armin] feels about meat thermometers. His version uses a Raspberry Pi and has a lengthy feature list:
- 8 Channel data logging
- Webcam (USB or Raspicam)
- Alarms via a local beeper, Web, WhatsApp, or e-mail
- Temperature and fan control using a PID
- LCD display
You can even use a Pi Zero for a light version. There’s plenty of information on Hackaday.io, although the full details are only in German for the moment. As you can see in the video below, this isn’t your dollar store meat thermometer.
Even though a disposable pen does the same job as a Montblanc, most of us would rather have a Montblanc (although Hackday would have to hand out some pretty steep raises before we start using the Meisterstück Solitaire Blue Hour Skeleton 149).
We might have done more with an ESP8266 and then done more work on the client, but we have to admit, this is one feature-packed thermometer. We’ve seen simpler ones that use Bluetooth before, along with some hacks of commercial units.
Continue reading “BBQ Thermometers Get Serious”
There’s a bunch of simple WiFi-enabled outlets on the market today, and all of these blister-pack goodies seem to have something in common – crappy software. At least from the hacker’s point of view; there always seems to be something that you want to do that the app just doesn’t support. Stuck in this position, [scootermcgoober] did the smart thing and reflashed his cheap IoT outlets.
Although [scooter]’s video is very recent, and he says he got his plugs at Home Depot, we were unable to find them listed for sale at any store near us. Walmart lists the same device for a paltry $15, though, so the price is right for repeating his experiment. The video after the break shows his teardown, which locates all the major components, including a mystery module that was revealed to be an ESP8266 upon decapping. Pins were traced, leads were tacked to his serial-to-USB adapter, and soon new firmware was flashing. [scooter]’s new app is simple, but there’s plenty of room for improvement once you’ve got the keys. All the code is up on GitHub.
WiFi outlets like this and the WeMo have proved to be fertile ground for hacking. Of course, if you’re not into the whole blister-pack thing, you could always roll your own WiFi outlet.
Continue reading “Cheap WiFi Outlets Reflashed; Found to Use ESP8266”
We’ve seen rumors floating around the Twittersphere about a new integrated microprocessor and WiFi SOC: the NL6621 from Nufront. Details are still scarce, but that doesn’t seem to be because the chip is vaporware: you could buy modules on Taobao.com and eBay right now for between two-and-a-half and three bucks, and Nufront’s website says they’ve produced a million modules since 2013.
The NL6621 WiFi SOC is powered by a 160 MHz ARM Cortex-M3 with 448 KB of RAM, and everything else is integrated in the SOC. The module has 32 GPIOs, SPI, I2C, I2S digital audio, and most of the peripherals that you’d expect. They say they have a completely open source SDK, but we can’t find a link to it anywhere. An English-language forum has sprung up in anticipation of the next new thing, and they say that they’ve contacted Nufront about the SDK, so that’s probably as good a place as any to lurk around if you’re interested. With an ARM core, it shouldn’t be long before someone gets GCC working on these things anyway.
It’s also worth noting that we’ve announced ESP8266 killers before, and it hasn’t come to pass. The mixture of community and official support that (eventually) came out of Espressif seems to be the main factor determining the ESP8266’s success, and we don’t see that yet with the NL6621. So take the question mark in the title seriously, but if this turns out to be the next big thing, remember where you heard it first, ok?
Thanks [David Hunt] for the tip!
Cheap consumer WiFi devices are great for at least three reasons. First, they almost all run an embedded Linux distribution. Second, they’re cheap. If you’re going to break a couple devices in the process of breaking into the things, it’s nice to be able to do so without financial fears. And third, they’re often produced on such low margins that security is an expense that the manufacturers just can’t stomach — meaning they’re often trivially easy to get into.
Case in point: [q3k] sent in this hack of a tiny WiFi-enabled SD card reader device that he and his compatriots [emeryth] and [informatic] worked out with the help of some early work by [Benjamin Henrion]. The device in question is USB bus-powered, and sports an SD card reader and an AR9331 WiFi SOC inside. It’s intended to supply wireless SD card support to a cell phone that doesn’t have enough on-board storage.
The hack begins with [Benajmin] finding a telnet prompt on port 11880 and simply logging in as root, with the same password that’s used across all Zsun devices:
zsun1188. It’s like they want to you get in. (If you speak Chinese, you’ll recognize the numbers as being a sound-alike for “want to get rich”. So we’ve got the company name and a cliché pun. This is basically the Chinese equivalent of “password1234”.) Along the way, [Benjamin] also notes that the device executes arbitrary code typed into its web interface. Configure it to use the ESSID “reboot”, for instance, and the device reboots. Oh my!
From here [q3k] and co. took over and ported OpenWRT to the device and documented where its serial port and GPIOs are broken out on the physical board. But that’s not all. They’ve also documented how and where to attach a wired Ethernet adapter, should you want to put this thing on a non-wireless network, or use it as a bridge, or whatever. In short, it’s a tiny WiFi router and Linux box in a package that’s about the size of a (Euro coin | US quarter) and costs less than a good dinner out. Just add USB power and you’re good to go.
Sometimes hacks don’t have to be innovative to be satisfying. We thought that [daffy]’s instructions and video (embedded below the break) for turning an old WRT54G router into an Internet radio were worth a look even if he’s following a well-traveled path and one that we’ve reported on way back when.
The hack itself is simple. [daffy] locates unused USB data lines, adds in a 5V voltage regulator to supply USB bus power, and then connects it all to a USB sound card. Hardware side, done! And while he doesn’t cover the software side of things in this first video, we know where he’s headed.
The WRT54G router was the first commodity Linux-based router to be extensively hacked, and have open-source firmware written for it. If you’re using OpenWRT or dd-wrt on any of your devices, you owe a debt to the early rootability of the WRT54G. Anyway, it’s a good bet that [daffy] is going to find software support for his USB sound card, but we remain in suspense to see just exactly how the details pan out.
Our favorite WRT54G hack is still an oldie: turning a WRT54G into the brains for a robot. But that was eight years ago now, so surely there’s something newer and shinier. What’s the coolest device that you’ve seen a WRT router hacked into?
Continue reading “Hacking a USB Port Onto an Old Router”
The game of cricket boggles most Americans in the same way our football perplexes the rest of the world. We won’t even pretend to understand what a “wicket” or an “over” is, but apparently it’s important enough to keep track of that so an English cricket club decided to build their own electronic scoreboard for their – pitch? Field? Help us out here.
This scoreboard build was undertaken by what team member [Ian] refers to as some “middle-aged blokes from Gloucestershire” with no previous electronics experience. That’s tough enough to deal with, but add to it virtually no budget, a huge physical size for the board, exposure to the elements, and a publicly visible project where failure would be embarrassingly obvious, and this was indeed an intimidating project to even consider. Yet despite the handicaps, they came up with a great rig, with a laser-cut acrylic cover for a professional look. A Raspberry Pi runs the LED segments and allows WiFi connections from a laptop or phone in the stands. They’ve even recently upgraded to solar power for the system.
And we’ll toot our own horn here, since this build was inspired at least in part by a Hackaday post. The builders have a long list of other links that inspired or instructed them, and we think that says something powerful about the hacker community that we’ve all been building – a group with no previous experience manages a major build with the guidance of seasoned hackers. That’s something to feel good about.
[spillsman] is working on a IoT startup and wanted to work and play while he tested their hardware. His company, WifiThing, is bundling the Texas Instruments toolchain and mesh networking with a sort of plug-and-play web interface. The board uses a MSP430 and two other TI Networking chips to make setting up, logging data, and controlling outputs simpler. The web interface looks interesting, but in our experience this sort of approach only saves time up to a point. Then it’s time to pull out the chip’s various bibles, ‘nomicons, spell manuals, and supporting religious documents to get the thing to work.
Though, there are some projects where you would like a simple way to log data from multiple sensors, if this can do that easily (and more importantly, cheaply) it might be very cool. We are interested to see if the open source software is easy to integrate without buying their hardware. Either way, after setting up a simple circuit to heat the coil in the breathalyzer, and translate the data into a signal usable for the chip, [spillsman] was able to record alcohol levels and even keep a, perhaps unwise to record, high-score from his phone.
Continue reading “Web Connected Breathalyser with Phone Display”