OK, sit down, everyone — we don’t want you falling over and hurting yourself when you learn the news that actually yes, your phone has been listening to your conversations all along. Shocking, we know, but that certainly seems to be what an outfit called Cox Media Group (CMG) does with its “Active Listening” software, according to a leaked slide deck that was used to pitch potential investors. The gist is that the software uses a smartphone’s microphone to listen to conversations and pick out keywords that it feeds to its partners, namely Google, Facebook, and Amazon so that they can target you with directed advertisements. Ever have an IRL conversation about something totally random only to start seeing references to that subject pop up where they never did before? We sure have, and while “relationship mining” seemed like a more parsimonious explanation back in 2017, the state of tech makes eavesdropping far more plausible today. Then there’s the whole thing of basically being caught red-handed. The Big Three all huffed and puffed about how they were shocked, SHOCKED to learn that this was going on, with reactions ranging from outright denial of ever partnering with CMG to quietly severing their relationship with the company. So much for years of gaslighting on this.
Self Driving Cars Learn From Our Eyes
[Michelle Hampson] reports in IEEE Spectrum that Chinese researchers may improve self-driving cars by mimicking how the human eye works. In some autonomous cars, two cameras use polarizing filters to help understand details about what the car sees. However, these filters can penalize the car’s vision in low light conditions.
Humans, however, have excellent vision in low-lighting conditions. The Retinex theory (based on the Land Effect discovered by [Edwin Land]) attributes this to the fact that our eyes sense both the reflectance and the illumination of light. The new approach processes polarized light from the car’s cameras in the same way.
Reverse Engineering The Web API Of An Akaso EK7000 Action Camera
Recently, [Richard Audette] bought an Akaso EK7000 action camera for his daughter’s no-smartphones-allowed summer camp, which meant that after his daughter returned from said camp, he was free to tinker with this new toy. Although he was not interested in peeling open the camera to ogle its innards, [Richard] was very much into using the WiFi-based remote control without being forced into using the ‘Akaso Go’ smartphone app. To do this, he had to figure out the details of what the Android app does so that it could be replicated. He provided a fake camera WiFi hotspot for the app in order to learn its secrets.
Normally, the camera creates a WiFi hotspot with a specific SSID (iCam-AKASO_C_1e96
) and password (1234567890
) which the Android app connects to before contacting the camera’s IP address at 192.72.1.1
. The app then shows a live view and allows you to copy over snapshots and videos. Initially, [Richard] tried to decompile the Android app using JADX, but the decompiled code contained so many URLs that it was hard to make heads or tails of it. In addition, the app supports many different Akaso camera models, making it harder to focus on the part for this particular camera.
Continue reading “Reverse Engineering The Web API Of An Akaso EK7000 Action Camera”
2024 Tiny Games Contest: An Epic Minimalist Entertainment System, Indeed
One way to keep things tiny is to make a system with cartridges where the brain lives on each cartridge instead of the platform itself. [Michael]’s Epic Minimalist Entertainment System (EMES) is one of those, and boy, is it tiny. EMES makes use of the ATtiny10, and they don’t get much AT-tinier than that.
This nearly microscopic console uses an equally Lilliputian display — a Plessey GPD340 vintage LED display, in fact. (Check out [Michael]’s reverse engineering project if you want to play around with these.) There are four ultra-small buttons for control and a buzzer for sound.
Now, the ATtiny10 is an 8Mhz microcontroller with 1KB of flash and 32 bytes of RAM. It has an 8-bit ADC and a somewhat surprisingly high four GPIO pins. But of course, that’s not enough. Not with the display, the four buttons, and the buzzer, so [Michael] had to come up with a way to multiplex everything to four GPIOs.
PB0 is shared between the buttons and the display’s serial data input. PB1 cleverly outputs the same PWM for both the brightness control and the buzzer. When the buzzer is needed, [Michael]’s code switches to a lower frequency and adjusts the duty cycle of the display to keep it readable. PB2 and 3 are serial clock inputs for the two display halves. Be sure to check it out the heated PONG action in the video after the break!
There’s still a little bit of time to enter the 2024 Tiny Games Contest! You have until Tuesday, September 10th, so head on over to Hackaday.IO and get started!
Continue reading “2024 Tiny Games Contest: An Epic Minimalist Entertainment System, Indeed”
Repairing A Hallicrafters S-120
[MIKROWAVE1] claims he’s not a radio repair guy, but he agreed to look at a malfunctioning Hallicrafters S-120 shortwave receiver. He lets us watch as he tries to get it in shape in the video below. You’ll see that one of his subscribers had done a great job restoring the radio, but it just didn’t work well.
Everything looked great including the restored parts, so it was a mystery why things wouldn’t work. However, every voltage measured was about 20V too low. Turns out that the series fuse resistor had changed value and was dropping too much voltage.
The Hidden Crystal Method
Ever been working on a project and get stuck on one of those last little details? That’s what happened to [Empire of Scrap]. He’s building an Ohio Scientific (OSI) superboard II replica. He wants it to be accurate down to the dates on the chips. It is quite an impressive build. The problem is the crystal. OSI used large crystals, even by early 1980s standards. The crystal is in a large can with thick pins, like something you’d expect to find in old radio equipment. The problem is that this crystal package isn’t made anymore.
The crystal had to be exactly 3.932160 MHz, and while [Empire] has a huge collection of vintage crystals, he didn’t have the right one from the 70s. He did, however, have that value in a modern crystal.
The solution? Hide the new crystal in the can of an older one. The only problem is that crystals are sealed. The bottom appeared to be some sort of plastic or resin. Gong after it with a side cutter, [Empire] realized it was glass! Thankfully, none of it got in his eyes, though his hands may have taken a bit of a beating.
With the old crystal’s shell hollowed out, [Empire] installed the modern device and potted everything in resin. The transplant worked. Now, all that’s left is to fire up the OSI and start hacking.
Want to build a replica computer but don’t want to hunt down the parts? Check out [Taylor] and [Amy’s] build of this minipet. Regardless of the size of the case, crystals all work in the same way.
How Hot Is That Soldering Iron?
It is common these days to have a soldering iron where you can set the temperature using some sort of digital control. But how accurate is it? Probably pretty accurate, but [TheHWCave] picked up a vintage instrument on eBay that was made to read soldering iron temperature. You can see the video below, which includes an underwhelming teardown.
The device is a J thermocouple and a decidedly vintage analog meter. What’s inside? Nearly nothing. So why did the meter not read correctly? And where is the cold junction compensation?