Ask Hackaday: Why Aren’t We Hacking Cellphones?

When a project has outgrown using a small microcontroller, almost everyone reaches for a single-board computer — with the Raspberry Pi being the poster child. But doing so leaves you stuck with essentially a headless Linux server: a brain in a jar when what you want is a Swiss Army knife.

It would be a lot more fun if it had a screen attached, and of course the market is filled with options on that front. Then there’s the issue of designing a human interface: touch screens are all the rage these days, so why not buy a screen with a touch interface too? Audio in and out would be great, as would other random peripherals like accelerometers, WiFi, and maybe even a cellular radio when out of WiFi range. Maybe Bluetooth? Oh heck, let’s throw in a video camera and high-powered LED just for fun. Sounds like a Raspberry Pi killer!

And this development platform should be cheap, or better yet, free. Free like any one of the old cell phones that sit piled up in my “hack me” box in the closet, instead of getting put to work in projects. While I cobble together projects out of Pi Zeros and lame TFT LCD screens, the advanced functionality of these phones sits gathering dust. And I’m not alone.

Why is this? Why don’t we see a lot more projects based around the use of old cellphones? They’re abundant, cheap, feature-rich, and powerful. For me, there’s two giant hurdles to overcome: the hardware and the software. I’m going to run down what I see as the problems with using cell phones as hacker tools, but I’d love to be proven wrong. Hence the “Ask Hackaday”: why don’t we see more projects that re-use smartphones?

Continue reading “Ask Hackaday: Why Aren’t We Hacking Cellphones?”

Hackaday Dictionary: Near Field Communications (NFC)

You are at the corner store, buying gum. The cashier rings up the purchase, showing you the amount. You casually pull out your cell phone and wave it near the credit card machine, which beeps appreciatively. The cashier nods, and you walk out, stuffing gum into your face. What just happened? You used Near Field Communications (NFC) to send data between your phone and the credit card terminal.

NFC is a standard that allows two devices to exchange information over a short distance without being in physical contact. The two devices communicate using a weak magnetic field that, in theory, only has a range of a few centimeters, so both devices have to be physically close, and someone standing nearby can’t intercept or alter the signal.

Continue reading “Hackaday Dictionary: Near Field Communications (NFC)”

Simplest Of SL4A Microbridge Examples

We’re familiar with the daunting task of sifting through mountains of code in hopes you can learn how something works. So when a simple example like this SL4A LED toggle comes along we’re thankful for the trimmed fat. If you’re looking to use an Android device to control your Arduino hardware this will be huge shove in the right direction.

The microbridge is used to get the Arduino talking with the Android phone. It involves a USB host shield that lets you connect the two devices via a USB cable. With the USB debugging enabled on the phone, you can use Scripting Layer for Android as a user interface. In this case, a set of Python scripts builds the button and readout seen on the screen above. They also handle sending and receiving commands based on user input. This means you don’t really need to know anything about Android development. We think it would be a great way to get your project through the development stages, and you could learn to write a traditional App later on.

Continue reading “Simplest Of SL4A Microbridge Examples”

BAMF2011: Google’s SKPR Bot, Not For Arachnophobes

Google’s Maker Faire exhibit space is swarmed with robots…er, androids. Amidst some cool bipeds and Segway-balancers, our inner sci-fi nerd was most smitten with this hexapod design, which they’ve dubbed SKPR Bot. The “Skipper” is on hand to showcase the ease of various Google technologies: SketchUp, Android OS and the Android Open Accessory Development Kit. The whole project came together in less than six weeks.

18 servos are mounted to a framework designed in SketchUp and laser-cut by Ponoko. The low-level servo PWM control is handled by the Dev Kit (essentially a rebadged Arduino Mega, as we’ve seen), while an Android OS phone provides a slick GUI and handles all the inverse kinematics calculations required as the robot takes each step. The coolest bit is that it’s all up for grabs. At this moment you’ll have to scrounge around the ’net a bit to find the plans and code, but some time post-Faire they plan to bring everything together at the SKPR Bot site.

Firesheep: Promoting Privacy In A Scary Way

Often, software hackers are the activists that push software giants towards updating vulnerable applications. In todays example, [Eric Butler] is pushing Facebook, Twitter, Flickr, and more all at the same time. By creating a user script-kiddie friendly extension for Firefox, he has allowed just about anyone to sniff unsecured connections on public Wi-Fi access points and log into these unprotected accounts.

Right now the extension is available for Windows and Mac, with a Linux port coming soon. Temporarily, the best way for a user to avoid getting taken advantage of would be to not use these social networking sites on a public connection, or to implement a secure proxy for these connections that would keep your data safe. Hopefully these websites will have a quick rebuttal that allows for security without workarounds. With all of the bad press they are recieving, they certainly have incentive to.

Are there any software or security buffs out there? We would love to see someone port this to an iPhone or Android app that could check and log open Wi-Fi points. We’ll leave the foot work to the experts out there, but do be sure to give us a heads up if anyone manages to make it happen, okay?

Hack-A-Day Extra

production

ShmooCon starts in two days and? uh? I’m sure I’ll be caught up with work by then. (UPDATE: [Tom] has an interview with Bruce and Beetle from the ShmooGroup) On a more important note: Yehoshua’s borg seems to have gotten lost on its way home from a New Year’s party and our Folding team has taken a hit. We’ve got sitemeter stats now in case you’ve ever wondered. It has only been active for two days, so the math is a little off.

More links after the jump (you should grab a beverage).

Continue reading “Hack-A-Day Extra”