Raspberry Pi Spies On Your Front Door

doorbell pictures

One of [Sander]’s first projects with a Raspberry Pi was to get it to send messages to his iPhone. From there he decided to take it a step further and wire the tiny computer up to his doorbell, creating a system that can send push messages to his phone whenever someone is at the front door.

[Sander]’s doorbell is wireless, and he decided to keep all of its original functionality. All it took to signal the Pi was a simple circuit tied to the doorbell’s status LED which turns off whenever the doorbell is pushed.

The Raspberry Pi runs a python program that handles the GPIO pin which is wired to the doorbell. When the doorbell is pushed, the program processes and sends the push notification while taking pictures of the visitor with an attached webcam. The pictures are included in the message so [Sander] can see who is at the front door. The code for the project is included on his project page.

This project rang a bell for us since we’ve seen projects using a Raspberry Pi and push notifications. None of them so far have included a webcam or utilized an existing wireless doorbell though, and this is a great step forward!

Sniffing NRF24L01+ Traffic With Wireshark

Wireshark trace

We’re sure that some of our readers are familiar with the difficult task that debugging/sniffing nRF24L01+ communications can be. Well, [Ivo] developed a sniffing platform based on an Arduino Uno, a single nRF24L01+ module and a computer running the popular network protocol analyzer Wireshark (part1, part2, part3 of his write-up).

As these very cheap modules don’t include a promiscuous mode to listen to all frames being sent on a particular channel, [Ivo] uses for his application a variation of [Travis Goodspeed]’s technique to sniff Enhance Shockburst messages. In short, it consists in setting a shorter than usual address, setting a fix payload length and deactivating the CRC feature. The Arduino Uno connected to the nRF24L01+ is therefore in charge of forwarding the sniffed frames to the computer. An application that [Ivo] wrote parses the received data and forwards it to wireshark, on which can be set various filters to only display the information you’re interested in.

The Arduino Yun Shield

YUN

A few years ago, the most common method to put an Arduino project on the web was to add a small router loaded up with OpenWrt, wire up a serial connection, and use this router as a bridge to the Internet. This odd arrangement was possibly because the existing Arduino Ethernet and WiFi shields were too expensive or not capable enough, but either way the Arduino crew took notice and released the Arduino Yun: an Arduino with an SoC running Linux with an Ethernet port. It’s pretty much the same thing as an Arduino wired up to a router, with the added bonus of having tons of libraries available.

Since the Yun is basically a SoC grafted onto an Arduino, we’re surprised we haven’t seen something like this before. It’s an Arduino shield that adds a Linux SoC, WiFi, Ethernet, and USB Host to any Arduino board from the Uno, to the Duemilanove and Mega. It is basically identical to the Arduino Yun, and like the Yun it’s completely open for anyone to remix, share, and reuse.

The Yun shield found on the Dragino website features a small SoC running OpenWrt, separated from the rest of the Arduino board with a serial connection. The Linux side of the stack features a 400MHz AR9331 (the same processor as the Yun), 16 MB of Flash, and 64 MB of RAM for running a built-in web server and sending all the sensor data an Arduino can gather up to the cloud (Yun, by the way, means cloud).

All the hardware files are available on the Yun shield repo, with the Dragino HE module being the most difficult part to source.

Hardware “Security” And A DMCA Takedown Notice

tektronix-autoLast week we published a post about how it was discovered through trial and error that Tektronix application modules are designed with laughable security. We’ll get to that part of it in a minute. We received a DMCA Takedown Notice from Tektronix (which you can read after the break) demanding that we remove the post. We have altered the original post, but we believe our coverage of this story is valid and we don’t agree that the post should be completely removed.

First off, Tektronix sells the modules to unlock the features already present on the Oscilloscope in questions. We’re operating on the moral assumption that using these features without paying their asking price is wrong. If you want the features they’ve developed you should pay for them.

The real story here is that Tektronix designed a woefully weak system for unlocking these modules. Learn from this. If you’re ever designing a hardware key, don’t do it like this!

An EEPROM, a connector, and a plain text string of characters which is already published publicly on their website is all that is necessary to unlock these “crippled” features. Let’s just say that again: apparently every hardware key is the same and just uses a plain-text string found on their website which is not encrypted or obfuscated. If you were selling these keys for $2.99 perhaps this would be adequate, but Tek values these modules at $500 apiece.

If you were designing this system wouldn’t it be worth using an encryption key pair based on the serial number or some other piece of unique information? How do you think this should have been done? Leave your comment below.

Continue reading “Hardware “Security” And A DMCA Takedown Notice”

Unlocking A Door With A Phone – Easy As Pi!

doorman2

[Ian] has created a way for his office colleagues to get inside the door, even if they have forgotten their keys. This office automation, Raspberry Pi set up is appropriately named the ‘Doorman’ and provided an alternative method of unlocking the entry system.

His solution tapped into the existing security circuit, which is closed by a simple relay, which is connected to the main piece of hardware; a Raspberry Pi. On one side of the Pi is the GPIO pins that allow control access while the other side links to the internet. The company’s internal system is responsible for authenticating users, issuing keys and processing access requests. A mobile client, aka a smartphone, can request a set of keys from the Doorman.

[Ian] used the Golgi SDK to speed up the development of the in-house app. With the wires in place, the Doorman has become a great success, and now forgotten keys are a thing of the past. And even though staff members no longer need to buzz into the office interrupting their co-workers, the development team has plans to beef up their office automation system. Already other innovations are being created to be integrated in with the Doorman.

Now all that’s left is to show a video demonstration of the Doorman, which can be seen after the break:

Continue reading “Unlocking A Door With A Phone – Easy As Pi!”

Retrotechtacular: We Heard You Like Tubes, So Here’s A Film About Tube Tubes From The Webtubes

EF80

This lovely little number is the EF80 pentode thermionic valve, or vacuum tube, made by Mullard beginning in 1950. They were used in radio and radar applications, but most of them wound up in VHF television sets. This week’s Retrotechtacular takes a close look at the assembly of and on-site materials production for the EF80 in particular.

The film begins with slow and careful hand assembly of an EF80. The cathode is inserted into a mica disc, and a series of three grids are placed over the cathode. The semicircular anode sits around the outermost grid. Another mica disc is placed on top which does triple duty as a spacer, a base for the getter/plate assembly, and a firewall against the getter flash.The dark lining of the upper part of the tube is the residue of the vaporized getter, which is heated after the first stage of air removal.

Before the vacuuming begins, the inner assembly is mounted on a glass base with nine pins that have been pre-bent to meet the inner assembly wires. The heater, dissipating shield, and a meshy cylinder are added, and then the getter on its plate. A tube is slipped over the assembly and fused to the base in a jig, forming an airtight seal. Continue reading “Retrotechtacular: We Heard You Like Tubes, So Here’s A Film About Tube Tubes From The Webtubes”

Your 15 Days To Be Excellent

15-days-to-be-excellent

This is it. It’s time to step up and be a hardware hacker.

If you haven’t submitted your entry for The Hackaday Prize, get out that graph paper and mechanical pencil and start scribbling. The coming fortnight is your time to shine.

As of right now you have exactly fifteen days to tell us about your concept for an Open, Connected device. This doesn’t mean you have to finish the build, there’s time for that after the August 20th deadline. What you do need to do is describe your idea and explain how you plan to build a working prototype for the final deadline in early November.

I’ve appealed to your vanity — it’s hard to call yourself a hacker if you sit on the sidelines for this one! Now I’ll appeal to your want of recognition and the prizes that dreams are made of. Right now we haven’t quite crossed the 500 entry mark. When was the last time you had a chance as good as 1 in 500 for such a huge bag of booty?