Obsolete E-Reader Gets New Life

For those who read often, e-readers are a great niche device that can help prevent eye fatigue with their e-ink displays especially when compared to a backlit display like a tablet or smartphone, all while taking up minimal space unlike a stack of real books. But for all their perks, there are still plenty of reasons to maintain a library of bound paper volumes. For those who have turned back to books or whose e-readers aren’t getting the attention they once did, there are plenty of things to do with them like this e-book picture frame.

The device started life as a PocketBook Basic Touch, or PocketBook 624, a fairly basic e-reader from 2014, but at its core is a decent ARM chip that can do many more things than display text. It also shipped running a version of Linux, which made it fairly easy to get a shell and start probing around. Unlike modern smart phones this e-reader seems to be fairly open and able to run some custom software, and as a result there are already some C++ programs available for these devices. Armed with some example programs, [Peter] was able to write a piece of custom software that displays images from an on-board directory and mounted the new picture display using an old book.

There were a number of options for this specific device that [Peter] explored that didn’t pan out well, like downloading images from the internet to display instead of images on the device, but in the end he went with a simpler setup to avoid feature creep and get his project up and running for “#inktober”, a fediverse-oriented drawing challenge that happened last month. While not strictly in line with a daily piece of hand-drawn artwork, the project still follows the spirit of the event. And, for those with more locked-down e-readers there’s some hope of unlocking the full functionality of older models with this FOSS operating system.

JawnCon 0x0: A Strong Start With A Bright Future

Last month, I had the pleasure witnessing a birth. No, not of a child. What I’m talking about is something far rarer, though arguably, just as loud and danger fraught — the birth of a new hacker convention.

The very first JawnCon took place on October 19th and 20th at Arcadia University, just outside of Philadelphia. If you’re in the Northeast US and suddenly find yourself surprised to learn that a hacker con managed to slip under your radar, don’t be. The organizers, who previously helped launch the WOPR Summit back in 2019, wisely decided to keep the scale of this first outing in check. Just a single track of talks, a chill out room, and 130 or like-minded individuals.

Although, even if they’d hatched a more ambitious plan, it’s hard to imagine they’d have had enough time to pull it off. Due to various circumstances, JawnCon had to come together at a breakneck pace, with less than 100 days separating the con’s inception and kickoff. That an event such as this could not only be organized so quickly, but go off without a hitch, is a testament to the incredible folks behind the scenes.

As for what a Jawn is…well, that might take a bit more explaining. It’s regional slang that’s perhaps best described as a universal noun in that it can be used to refer to basically anything or anyone. Think “smurf” or “da kine”. According to organizer Russell Handorf, the all-encompassing nature of the word describes not only his personal ethos but the spirit of the event. Rather than focusing too closely on any one aspect of hacking, JawnCon set out to explore a diverse array of tech topics from both the new and old schools. It would be an event where you could listen to a talk on payphone remote management, try your hand at lock picking, and learn about the latest in anti-drone technology, all under the same roof.

To that end, the team did an incredible job. Everyone I spoke to, young or old, newbie or vet, had a fantastic time. What’s more, as revealed in the Closing Remarks, the con actually managed to stay in the black — no mean feat for a first attempt. With a little luck, it seems like JawnCon is well on its way to becoming one of the Northeast’s can’t-miss hacker events. Continue reading “JawnCon 0x0: A Strong Start With A Bright Future”

Human AI Pin marketing picture. (Credting: Humane)

The AI Pin: A Smart Body Camera That Wants To Compete With Smartphones

Seeking to shake up the smartphone market, Humane introduced its ‘AI Pin’, which at first glance looks like someone put a very stylish body camera on their chest. There’s no display, only the 13 MP camera and some other optics visible above what turns out to be a touch panel, which is its main gesture-based input method, while it’s affixed to one’s clothing using either a magnet on the other side of the fabric, a wireless powerbank or a clip. Inside the unit you find a Qualcomm octa-core processor with 4 GB of RAM and 32 GB of eMMC storage, running a custom Android-based ‘Cosmos’ OS.

The AI Pin home screen, demonstrating why hand palms are poor projection surfaces. (Credit: Humane)
The AI Pin home screen, demonstrating why hand palms are poor projection surfaces. (Credit: Humane)

There is also a monochrome (teal) 720p laser projector built-in that provides something of a screen experience, albeit with the expectation that you use your hand (or presumably any other suitable surface) to render it visible. From the PR video it is quite clear that visibility of the projection is highly variable, with much of the text often not remotely legible, or only after some squinting. The hand-based gestures to control the UI (tilting to indicate a direction, touching thumb & index finger together to confirm) are somewhat of a novelty, though this may get tiresome after a day.

An article by [Ron Amadeo] over at Ars Technica also takes a look at the device, where the lack of an app ecosystem is pointed out, as well as the need for a mandatory internet connection (via T-Mobile). Presumably this always-on ‘feature’ is where the ‘AI’ part comes in, as the device has some voice assistant functionality, which seems to rely heavily on remote servers. As a result, this ends up being a quirky device with no third-party app support for a price tag of $700 + the $25/month for online service. Not to mention that people may look a bit odd at you walking around with a body camera-like thing on your chest that you keep rubbing and holding your hand in front of.

To be fair, it’s not often that we see something more quaint in this space come out than Google Glass, now many years ago.

Wind Tunnel Uses The Last Straw

If you watch the movies, there isn’t much to a wind tunnel. Just a fan and a tunnel, right? The truth is there’s a lot more to it than that, and [ejs13] shows you how you can make a small tunnel with some basic supplies. One of the requirements for a useful tunnel is to have laminar flow — that is, flow in uniform layers with little, if any, mixing. This tunnel achieves laminar flow using an array of soda straws to direct the flow. In fact, there are 150 straws in total. You can see a short clip of the wind tunnel in action below.

The rest of the parts are easy, too. A computer fan provides wind, and there’s a little bit of wood and acrylic. You’ll notice in the video that you can easily see the airflow. That’s thanks to a light source, some water, and a bit of dry ice.

Continue reading “Wind Tunnel Uses The Last Straw”

Hackaday Podcast 243: Supercon, Super Printing, And Super Gyros

With solder fumes from Supercon still in the air, Hackaday’s Elliot Williams and Al Williams met to compare notes about the conference talks, badge hacking, and more. Tom Nardi dropped by, too.

Did you miss Supercon? It isn’t quite the whole experience, but most of the talks are on our YouTube channel, with more coming in the weeks ahead. Check out the live tab for most of the ones up now. You can even watch the badge hacking celebration. We’ll be writing up more in the following weeks.

Al nailed What’s That Sound, as did many others, except Elliot. [Jacx] gets a T-shirt, and you get a chance to play again next week.

The hacks this week range from a pair of posts pertaining to poop — multi-color 3D printer poop, that is. We wondered if you could print rainbow filament instead of a purge tower. The Raspberry Pi 5 draws a lot of excess power when in standby. Turns out, thanks to the Internet, the easy fix for that is already in. Other hacks range from EMI test gear to portable antennas with excursions into AI, biomedical sensors, and retrocomputing.

In the Can’t Miss category, we discussed Maya Posch’s post, which could just as easily be titled: Everything You Ever Wanted to Know about CAT Cable (But Were Afraid to Ask). Last, but not least, you’ll hear about Lewin Day’s round up of exotic gyroscope technology, including some very cool laser pictures.

Check out the links below if you want to follow along, and as always, tell us what you think about this episode in the comments!

Download for listening or for a very long ringtone.

Continue reading “Hackaday Podcast 243: Supercon, Super Printing, And Super Gyros”

This Week In Security: Find My Keylogger, Zephyr, And Active Exploitation

Keyloggers. Such a simple concept — you secretly record all the characters typed on a keyboard, and sort through it later for interesting data. That keyboard sniffer could be done in software, but a really sneaky approach is to implement the keylogger in hardware. Hardware keyloggers present a unique problem. How do you get the data back to whoever’s listening? One creative solution is to use Apple’s “Find My” tracking system. And if that link won’t let you read the story, a creative solution for that issue is to load the page with javascript disabled.

This is based on earlier work from [Fabian Bräunlein], dubbed “Send My”. As an aside, this is the worst naming paradigm, and Apple should feel bad for it. At the heart of this cleverness is the fact that Apple used the standard Bluetooth Low Energy (BLE) radio protocol, and any BLE device can act like an Apple AirTag. Bits can be encoded into the reported public key of the fake AirTag, and the receiving side can do a lookup for the possible keys.

A fake AirTag keylogger manages to transfer 26 characters per second over the “Find My” system, enough to keep up with even the fastest of typists, given that no keyboard is in use all the time. Apple has rolled out anti-tracking protections, and the rolling key used to transmit data also happens to completely defeat those protections. Continue reading “This Week In Security: Find My Keylogger, Zephyr, And Active Exploitation”

An Open-Source Ebike Motor Controller

DIY e-bikes are often easy to spot. If they’re not built out of something insane like an old washing machine motor, the more subtle kits that are generally used still stand out when compared to a non-assisted bike. The motors tend to be hub- or mid-drive systems with visible wires leading to a bulky battery, all of which stand out when you know what to look for. To get a stealthy ebike that looks basically the same as a standard bicycle is only possible with proprietary name-brand solutions that don’t lend themselves to owner repair or modification, but this one has at least been adapted for use with an open source motor controller.

The bike in use here is a model called the Curt from Estonian ebike builder Ampler, which is notable in that it looks indistinguishable from a regular bicycle with the exception of the small 36-volt, 350-watt hub motor somewhat hidden in the rear wheel. [BB8] decided based on no reason in particular to replace the proprietary motor controller with one based on VESC, an open-source electric motor controller for all kinds of motors even beyond ebikes. Installed on a tiny Arduino, it fits inside the bike’s downtube to keep the stealthy look and can get the bike comfortably up to around 35 kph. It’s also been programmed to turn on the bike’s lights if the pedals are spun backwards, and this method is also used to change the pedal assist level, meaning less buttons and other user-interface devices on the handlebars. Continue reading “An Open-Source Ebike Motor Controller”