Bluetooth Headset Garage Door Opener Update

bluetooth-headset-garagedoor-opener-update

[Lou Prado] sent in a link to his new video on using a Bluetooth headset as a garage door opener for your Android device. This isn’t a new hack, and we’ve actually seen him pull it off once before back in 2011. But we’re running this as an update for a couple of reasons. First off, we had forgotten about the hack and it’s worth revisiting. Secondly, the headset which he used with the initial hack has gone out of production. He chose a new model, and the assembly video (embedded after the break) which he made is a treasure trove of best practices to use when hacking consumer electronics.

Here’s how the hardware part of the hack goes. He removes the speaker from the headset and solders the base of a transistor in-line with a resistor to the red wire. The emitter connects to the grounded frame of the USB charging cable which is plugged into an outlet next to your garage door opener. The collector of the transistor is then connected to the garage door opener, along with a common ground connection, allowing audio from the headset to trigger the transistor to open the door.

The systems is secure based on Bluetooth pairing, which was done with his phone before starting the hardware hack.

Continue reading “Bluetooth Headset Garage Door Opener Update”

Putting The Brains Of A Reverse Geocache On The Outside

ioio

A reverse geocache – a box that only opens in a specific geographical area – is a perennial favorite here at Hackaday. We see a ton of different implementations, but most of the time, the builds are reasonably similar. Of course dedicating a GPS receiver solely to a reverse geocache isn’t an inexpensive prospect, so [Eric] came up with a better solution. He’s using a smart phone as the brains of his geocache, allowing him to keep the GPS and display outside the locked box.

The build began by finding an old box and modifying it so it can be locked with a servo. The only other bits of electronics inside the box are an IOIO board, a battery pack, and an I2C EEPROM for storing a few settings. On the phone side of things, [Eric] wrote an Android app to serve as both the programming interface, UI, and GPS hardware for his reverse geocache. It’s exactly like all the other reverse geocaches we’ve seen, only this time the controls are wireless.

[Eric] put up a video demoing his reverse geocache. You can check that out after the break.

Continue reading “Putting The Brains Of A Reverse Geocache On The Outside”

Carry A Git Server In Your Pocket

android-git-server

We love using Git for its superior version control. We often host our more advanced projects in a public Github repository. But the bulk of our little experiments are simply local repos. This is fine if you’re always at home, but if we are away from home we find ourselves having to SSH into our server to copy over the Git files. [Andrew] found a way around this slightly awkward process. He used an old Android phone as a Git server.

This actually makes a lot of sense when you start to think about it. Most Android phone have a microSD card slot to provide a huge storage bin (the lack of this on the Nexus 4 is baffling) so you don’t need to worry about running out of space. All of these devices have WiFi, making it easy to use them as an AP when there isn’t any other WiFi around. And the web-connected nature of the device will make syncing your repo over the Internet a snap.

Most of the behind the scenes work is done using Debian packages. This provides a few issues which [Andrew] walks through one by one. We also like his pointers like using ‘noatime’ on your EXTx file systems to avoid wear on the SD card.

Wireless Pinball Controller For Tablet Gaming

wireless-pinball-controller

This wooden box is a wireless pinball controller and tablet stand. The idea is to set it on a workbench to give you some of the thrill of standing and playing the real thing. [Jeff] has been rather addicted to playing a pinball app on Android lately, and started the journey because he needed a way to give his thumbs some relief.

An Arduino monitors buttons on either side of this wooden controller. [Jeff] is new to working with hardware (he’s a Linux Kernel developer by trade) and was immediately struck with button debouncing issues. Rather than handle this in software (we’ve got a super-messy thread on that issue with our favorite at the bottom) he chose a hardware solution by building an SR latch out of two NAND gates.

With the inputs sorted out he added a BlueSMiRF board to the project which allowed him to connect a Nexus 7 tablet via Bluetooth. At this point he ran into some problems getting the device to respond to his control as if it were an external keyboard. His stop-gap solution was to switch to a Galaxy Tab 10.1 which wasn’t throwing cryptic errors. Hopefully he’ll fix this in the next iteration which will also include adding a plunger to launch the pinball, a part which just arrived in the mail as he was writing up this success.

We’ve embedded his quick demo video after the break.

Continue reading “Wireless Pinball Controller For Tablet Gaming”

DRM Chair Only Works 8 Times

chair

Download a song from iTunes, and you can only add that song to the music library of five other computers. Grab a copy of the latest Microsoft Office, and you’d better hope you won’t be upgrading your computer any time soon. Obviously DRM is a great tool for companies to make sure we only use software and data as intended, but outside planned obsolescence, there isn’t much in the way of DRM for physical objects.

This is where a team from the University of Art and Design in Lausanne, Switzerland comes in. They designed a chair that can only be sat upon eight times. After that, the chair falls apart necessitating the purchase of a new chair. Somewhere in the flat-pack furniture industry, someone is kicking themselves for not thinking of this sooner while another is wondering how they made a chair last so long.

The design of the chair is fairly simple; all the joints of the chair are cast in wax with a piece of nichrome wire embedded in the wax. An Arduino with a small switch keeps track of how many times the chair has been used, while a solenoid taps out how many uses are left in the chair every time the user gets up. When the internal counter reaches zero, a relay sends power through the nichrome wire, melting the wax, and returning the chair to its native dowel rod and wooden board form.

Melting wax wasn’t the team’s first choice to rapidly disassemble a chair; their first experiments used gunpowder. This idea nearly worked, but it was soon realized no one on the team wanted to sit on a primed and loaded chair. You can see the videos of the wax model failing after the break.

Continue reading “DRM Chair Only Works 8 Times”

NFC Tags Control Your Home’s Lighting

nfc-controlled-home-lighting

Here’s a home lighting hack that doesn’t require you to think about it after the initial setup. Instead of requiring the user to launch an app and select a lighting state, it uses NFC tags to select a lighting configuration. The tags can be placed in different parts of the house so that setting your phone on the table beside the door while putting your coat on will turn everything in the house off. Of course you need to crawl before you can walk so right now this proof-of-concept only switches the Phillips HUE bulb in the desk lamp.

That bulb is compatible with the Ninja Blocks system — but a Ninja Block or an Arduino with an Ethernet shield could be used to switch whatever you wish. The Ninja client code is an integral part of the system which is why the hardware side needs to relate to the platform. Also used is the On{X} service which bridges the gap between your Android phone and the home automation hardware. Once that is in place it’s only a matter of programming the NFC tags to do as you wish. Don’t miss a demo of this in the clip after the jump.

Continue reading “NFC Tags Control Your Home’s Lighting”

Freezing Android To Crack The Encryption

frozen-phone-encryption-hacking

Build a better lock and someone will make a tool to open it without the key. Or in this case they’ve made a tool to discover the key using a trip to through the deep freeze. The Forensic Recovery of Scrambled Telephones — or FROST — uses cold temperatures and a custom recovery image to crack Android encryption keys.

Cold boot hacks go way back. They leverage use of low temperatures to slow down the RAM in a device. In this case, the target phone must already be powered on. Booting a phone that uses the encryption offered by Android 4.0 and newer requires the owner’s pass code to decrypt the user partition. But it then remains usable until the next power cycle. By freezing the phone, then very quickly disconnecting and reconnecting the battery, researchers were able to flash their own recovery image without having the encryption key cleared from RAM. As you can see above, that recovery package can snoop for the key in several different ways.

[Thanks Rob]