Google Scrubs Brillo, Reveals Android Things

Another week goes by and another new IoT platform surfaces. Google has announced Android Things, a build of the mobile operating system designed for smart devices rather than the latest slab of mobile eye-candy. The idea is that the same Android tools, framework and APIs that will already be familiar to app developers can be used seamlessly on IoT Things as well as in the user’s palm.

Of course, if this is sounding familiar, it’s because you may have heard something of it before. Last year they announced their Project Brillo IoT platform, and this appears to be the fruit of those efforts.

So you may well be asking: what’s in it for us? Is this just another commercial IoT platform with an eye-watering barrier to entry somewhere, or can we join the fun? It turns out the news here is good, because as the project’s web site reveals, there is support for a variety of Intel, NXP, and Raspberry Pi development boards. If you have a Raspberry Pi 3 on your bench somewhere then getting started is as simple as flashing a disk image.

The Things team have produced a set of demonstration software in a GitHub repository for developers to get their teeth into. Never one to miss an opportunity, the British Raspberry Pi hardware developer Pimoroni has released an Android Things HAT laden with sensors and displays for it to run on.

The IoT-platform market feels rather crowded at times, but it is inevitable that Android Things will gain significant traction because of its tight connections with the rest of the Android world, and its backing by Google. From this OS will no doubt come a rash of devices that will become ubiquitous, and because of its low barrier to entry there is every chance that one or two of them could come from one of you. Good luck!

Chris Conlon: Device Security 101

We all wring our hands over the security (or lack thereof!) of our myriad smart devices. If you haven’t had your home network hacked through your toaster, or baby cam, you’re missing out on the zeitgeist. But it doesn’t have to be this way — smart devices can be designed with security in mind, and [Chris Conlon] came to Pasadena to give us a talk on the basics.

He starts off the talk with three broad conceptual realms of data security: data in transit, data at rest on the device, and the firmware and how it’s updated. A common thread underlying all of this is cryptography, and he devotes the last section of his  talk to getting that right. So if you’d like a whirlwind tour of device security, watch on!

Continue reading “Chris Conlon: Device Security 101”

A How-To In Homebrew Design, Fab, And Assembly With Structural Framing Systems

At this point, the internet is crawling with butt-kicking homebrew 3D printers made with extruded profiles, but it’s easy to underestimate the difficulty in getting there. Sure, most vendors sell a suite of interlocking connectors, but how well do these structural framing systems actually fare when put to the task of handling a build with sub-millimeter tolerances?

I’ve been playing around with these parts for about two years. What I’ve found is that, yes, precise and accurate results are possible. Nevertheless, those results came to me after I failed and–dry, rinse, repeat–failed again! Only after I understood the limits of both the materials and assembly processes was I able to deliver square, dimensionally accurate gantries that could carry a laser beam around a half-square-meter workbed. That said, I wrote a quick guide to taming these beasts. Who are they? What flavors do they come in? How do we achieve those precision results? Dear reader, read on.

Continue reading “A How-To In Homebrew Design, Fab, And Assembly With Structural Framing Systems”

Converting Film Camera To Digital The Hard Way

[Robin] is a hobby photographer with some very nice old film camera gear. But who has the money or patience for developing film these days? (Well, lots of people, especially artists, but that’s a different Hackaday article.) So to update his old gear without breaking the bank, he glommed a Sony Nex digital camera onto the back of a nice old Nikon, and documented the process for us.

A friend of mine once said, “never underestimate what a good engineer can do with a file and patience.” [Robin]’s hack essentially consists of grinding the Sony’s CMOS sensor to fit exactly where the film plane would be in the old Nikon. For him, this meant relocating the IR filter glass, because it wouldn’t fit with the shutter, and then slowly and accurately trimming down the edges of the CMOS sensor’s retaining frame until it was just right.

Continue reading “Converting Film Camera To Digital The Hard Way”

Set Your Clocks To Decimal Time

Many stop lights at street intersections display a countdown of the remaining seconds before the light changes. If you’re like me, you count this time in your head and then check how in sync you are. But did you know that if the French had their way back in the 1890s when they tried to introduce decimal time, you’d be counting to a different beat? Did you know the Chinese have used decimal time for millennia? And did you know that you may have unknowingly used it already if you’ve programmed in Linux? Read on to see what decimal time is along with the answers to these questions.

Continue reading “Set Your Clocks To Decimal Time”

TP-Link Debug Protocol Gives Up Keys To Kingdom

If the headline makes today’s hack sound like it was easy, rest assured that it wasn’t. But if you’re interested in embedded device hacking, read on.

[Andres] wanted to install a custom OS firmware on a cheap home router, so he bought a router known to be reflashable only to find that the newer version of the firmware made that difficult. We’ve all been there. But instead of throwing the device in the closet, [Andres] beat it into submission, discovering a bug in the firmware, exploiting it, and writing it up for the manufacturer.  (And just as we’re going to press: posting the code for the downgrade exploit here.)

This is not a weekend hack — this took a professional many hours of serious labor. But it was made a lot easier because TP-Link left a debugging protocol active, listening on the LAN interface, and not requiring authentication. [Andres] found most of the information he needed in patents, and soon had debugging insight into the running device.

Continue reading “TP-Link Debug Protocol Gives Up Keys To Kingdom”

Jumper Cables Block Trains

Standing Rock, North Dakota has been the site of a major protest this year against the Dakota Access Pipeline project. Protesters have sought to delay the pipeline’s progress by a wide variety of means, and both sides in the conflict have been accused of a variety of misdeeds.

An anonymous group supporting the protesters has released a video describing how they stop trains without the use of physical barricades. The video begins with police removing automobiles used to block the tracks and escorting trains through level crossings, showing how these traditional methods have been ineffective.

The video then goes on to outline what is described as a “sneaky” way of halting trains. Most railroads use what is known as a track circuit — a current run through the rails of the track detects when a train passes over it by the axles completing an electrical circuit between the two. By using a standard automotive jumper cable to connect the two rails together instead, the circuit is completed and falsely indicates to the railway signalling system that a train is present on the track in question. Due to the safety-critical nature of the railway, no trains can be run on the track until the short circuit is removed, else there is a great risk of collisions between trains on the network.

Intended as a practical guide, strategies to maximize disruption are outlined, such as hiding the cables under snow and painting them in black to evade detection as long as possible. Instructions on how to best make a solid connection to the rails are also shared.

It goes without saying that interfering with major infrastructure is risky, dangerous, and highly illegal. Protesters have already been arrested for physically blocking trains. Perpetrators of this method will surely be arrested if caught, and circumventing the technology could easily result in harsher charges associated with electronic security and safety systems. This is sabotage (deliberately obstructing) and undermines the validity of peaceful protest.

This shows how ingenuity is often spawned by turmoil and frustration. Reflect on human nature, and catch the video below the break.

Continue reading “Jumper Cables Block Trains”