[Maurizio] was having some reception issues with his wireless internet and set out to add an external antenna to the USB dongle (translated). He had previously poked around inside of the Nokia internet key to find that the internal antenna was a flexible circuit substrate wrapped around a plastic box that made contact with main circuit board via a spring connector. This plastic frame is just right for mounting an SMA connector in just the right place for it to stick out the end of the case as seen in the picture above. It gives him better range, but since speed depends on how much traffic the wireless node is under, it’s not a guarantee that you’ll get a snappier connection after this hack.
Cellphone Hacks531 Articles
Cell Phone Endurance Tests
Gone are the days when a phone would last you a lifetime and enter the days of glass covered mobile phones built to be sexy and sophisticated. With these new phones come new testing methods. Companies like Nokia are still dedicated to making the best phones possible and making them durable through vigorous testing. The example shown in the article, is simulating a phone dropping from a shirt pocket onto the floor. Nokia claims to use 200 endurance tests encompassing temperature, extreme usage (use this button pusher for you own test), physical drops, and exposure to humidity on each new model in their product line. Makes one wonder what other companies are using for their endurance tests. There’s video of the Nokia N8 Drop Test is after the break, and don’t forget to leave a comment if you know about other interesting test methods.
GSM Hacking With Prepaid Phones
Want to listen in on cellphone calls or intercept test messages? Well that’s a violation of someone else’s privacy so shame on you! But there are black-hats who want to do just that and it may not be quite as difficult as you think. This article sums up a method of using prepaid cellphones and some decryption technology to quickly gain access to all the communications on a cellular handset. Slides for the talk given at the Chaos Communications Congress by [Karsten Nohl] and [Sylvain Munaut] are available now, but here’s the gist. They reflashed some cheap phones with custom firmware to gain access to all of the data coming over the network. By sending carefully crafted ghost messages the target user doesn’t get notified that a text has been received, but the phone is indeed communicating with the network. That traffic is used to sniff out a general location and eventually to grab the session key. That key can be used to siphon off all network communications and then decrypt them quickly by using a 1 TB rainbow table. Not an easy process, but it’s a much simpler method than we would have suspected.
[Thanks Rob]
Cassette Case Cameraphone Tripod
We see a lot of comments on shaky video asking why that person didn’t use a tripod. [Aatif Sumar] wants to use one when taking pictures and video with his phone but the threaded mounting hole you’d find in most cameras doesn’t come as a feature on smart phones. That didn’t deter him, he used an old cassette case for this phone tripod. The build started with a cheap flexible camera tripod. [Aatif] used a soldering iron to melt a hole in a plastic cassette case. We’re apprehensive about relying on the plastic’s ability to hold threads so we’re recommend epoxy to reinforce the joint. A bit more melting with the iron and he had a cradle on legs with a hole for the camera lens. It’s nothing fancy, but it also cost him next-to-nothing.
Ridiculous Exerciser Becomes Useful As A Charger
[Scott Nietfeld] built a charger from a Dyna-flex wrist exerciser. We hadn’t heard of a these gyroscopic devices before but once we saw the promo video (embedded after the break) we realized that this is the kind of thing that infomercials were made to sell. [Scott] knew the internals spun to fairly high RPM and figured that adding a few magnets on the inside and coils on the outside would turn this thing into a generator. Four rare-earth magnets fit the bill, with two external coils feeding a rectifier and linear regulator. Below you can see his demonstration video where he takes the orb apart, then spins it up, generating 250 mA at about 7.5 volts to drive the regulator and charge a cellphone. Not bad!
Continue reading “Ridiculous Exerciser Becomes Useful As A Charger”
Excuse Me, My Pinky Is Ringing
We get a lot of email challenging us to hack things. Sometimes we ignore them, other times we send some words of encouragement. But this time around we thought [Tait] had really come up with a great hack; to build a Bluetooth handset into his prosthetic finger. He hasn’t done much hacking in the past and was wondering if we could put out a challenge to our readers to make this happen. After a bit of back-and-forth brainstorming he decided to take on the challenge himself and was met with great success.
Like other Bluetooth handset hacks [Tait] started with a simple ear-mounted module. He extended the volume button with a piece of plastic and placed it under the battery. A couple of wooden matchsticks space the battery just enough so that it can be squeezed to adjust the volume level. He then extended the speaker with some wire. Next, he used the Oogoo recipe from our previous post to mold a false-finger and a thumb-ring. The PCB and battery fit in the finger, which places the microphone near a hole in the pad of the plastic pinky. The thumb ring houses the speaker to finish the look. Don’t miss the photos [Tait] sent in after the break.
Permanent Root Exploit Found For G2
The g2 has finally been rooted. Even though a temporary root exploit was found shortly after the phones release, a NAND lock prevented modifying the non-volatile RAM for a permanent root. Some controversy surrounded the g2 when it was erroneously thought to have a rootkit protecting the OS. Supposedly the rootkit would watch for changes to the file system and then reset the phone to default settings when any unauthorized changes were made. On the other hand a NAND lock functions by fooling the operating system into thinking there isn’t any memory available, essentially “locking” the memory in key areas. Once it was discovered to have the NAND lock it was only a matter of time before the g2 was permanently rooted. NAND locks have become a popular (and unsuccessful) deterrent employed by device makers to stop the jailbreaking comunity. While this exploit is nothing groundbreaking it is another notch in the belt for the jailbreaking community and a welcome benefit to g2 users.