Those fearless Ukrainians are at it again! This time around they’re giving wall outlets some high voltage stun gun shocks and observing the results, as [Kreosan] decided to see what would happen when you use a stun gun on mains electrical sockets. Surprisingly, they are still alive and well, and creating more videos. .
Shocking a light switch blew up some light bulbs, while shocking an extension cord with a TV plugged in blew the TV up. It seems these guys never run out of appliances to fry, or totally insane experiments to try out that no one else would really have the stomach for.
Although their experiments are on the extreme side of things they do know what they are doing, as they are electrical professionals, So maybe sit this one out unless you too really know what you are doing and understand the risks. The video is below the break for your enjoyment.
We have featured some of their equally scary hacks in the past, like mains voltage EL wire and wirelessly charging your phone from high voltage overhead power lines.
Continue reading “Stun Gun vs 220v Mains Electricity”
As with many tasks, robots may soon be ironing our clothes for us before we leave for work. Built by a team from the University Carlos III de Madrid’s robotics lab in Getafe, Spain, TEO is a highly articulated robot, that can climb stairs, open doors, and has recently added ironing to its skill set.
Data from a depth-sensing camera in TEO’s head is combed over by an algorithm, breaking it down into thousands of points — 0 being smooth and 1 a defined line in the clothing. Comparing those point values to those of its neighbours allows TEO to identify wrinkles without any preexisting notion of what a freshly-pressed garment looks like.
Continue reading “Fresh-Pressed Clothes Courtesy of TEO, the Iron Man”
So, you buy an Internet of Things light bulb, it’s a fun toy that allows you to bathe your environment in pretty colours at the touch of an app, but eventually you want more. You start to wonder how you might do more with it, and begin to investigate its inner workings. Then to your horror you discover that far from having bought a device with a convenient API for you to use, it has an impenetrable closed protocol that defies easy access.
This was the problem facing [Ayan Pahwa] when he bought a Syska Smartlight Rainbow LED bulb, and discovered that its Bluetooth Low Energy interface used a closed protocol. But instead of giving up, he proceeded to reverse engineer the communication between bulb and app, and his write-up makes for an interesting read that provides a basic primer on some of BLE’s workings for the uninitiated.
BLE allows a device manufacturer to define their own device service specific to their functionality alongside standard ones for common device types. Using a handy Android app from Nordic Semiconductor he was able to identify the services defined for the light bulb, but sadly they lacked any human-readable information to help him as to their purpose. He thus had to sniff BLE packets directly, and lacking dedicated hardware for this task he relied on a developer feature built into Android versions since KitKat, allowing packets to be captured and logged. By analysing the resulting packet files he was able to identify the Texas Instruments chip inside the bulb, and to deduce the sequences required to control its colours. Then he was able to use the Bluez utilities to talk directly to it, and as if by magic, his colours appeared! Take a look at the video we’ve placed below the break.
Many of us may never need to reverse engineer a BLE device. But if we are BLE novices, after reading [Ayan]’s piece we will at least have some idea of its inner workings. And that can only be a positive thing.
Continue reading “Reverse Engineering A BLE Service To Control A Light Bulb”
Those with small garages might be familiar with the method of hanging a tennis ball from a ceiling to make sure they don’t hit the back wall with their car. If the car isn’t in the garage, though, the tennis ball dangling from a string tends to get in the way. To alleviate this problem, [asaucet] created a distance sensor that can tell him when his car is the perfect distance from the garage wall.
At the heart of the distance sensor is an HC-SR04 ultrasonic rangefinder and a PIC16F88 microcontroller. [asaucet] uses a set of four LEDs to alert the driver how close they are to the garage wall. [asaucet] also goes into great detail about how to use an LCD with this microcontroller for setting up the project, and the amount of detail should be enough to get anyone started on a similar project.
While this isn’t a new idea, the details that [asaucet] goes into in setting up the microcontroller, using the distance sensor, and using an LCD are definitely worth looking into. Even without this exact application in mind, you’re sure to find some helpful information on the project page.
Continue reading “Garage Distance Sensor Kicks Tennis Ball To Curb”
It is an inevitability that following swiftly on the heels of the release of a new device there will be an announcement of its rooting, reverse engineering, or other revealing of its hackability. Now the device in question is the Amazon Echo, as MWR Labs announce their work in persuading an Echo to yield the live audio from the microphone and turn the voice assistant device into a covert listening device.
The work hinges on a previous discovery and reverse engineering (PDF) of Amazon’s debug connector on the base of the Echo, which exposes both an SD card interface and a serial terminal. Following that work, they were able to gain root access to the device, analyze the structure of the audio buffers and how the different Echo processes use them, and run Amazon’s own “shmbuf_tool” application to pipe raw audio data to a network stream. Astoundingly this could be done without compromising the normal operation of the device.
It should be stressed, that this is an exploit that requires physical access to the device and a bit of knowledge to perform. But it’s not inconceivable that it could be made into a near-automated process requiring only a device with a set of pogo pins to be mated with an Echo that has had its cover quickly removed.
That said, inevitably there will be enough unused Echos floating around before too long that their rootability will make them useful to people in our community. We look forward to what interesting projects people come up with using rooted Echos.
This isn’t the first time we’ve covered the use of an Echo as a listening device.
Via Hacker News.
Amazon Echo image: FASTILY [CC BY-SA 4.0].
Some people just won’t wake up. Alarm clocks don’t cut it, flashing lights won’t work, loud music just becomes the soundtrack of an impenetrable dream. Maybe an alarm clock that rudely yanks the covers off the bed will do the trick.
Or not, but [1up Living] decided to give it a go. His mechanism is brutally simple — a large barrel under the foot of the bed around which the warm, cozy bedclothes can wind. An alarm clock is rigged with a switch on the bell to tell an Arduino to wind the drum and expose your sleeping form to the harsh, cold world. To be honest, the fact that this is powered by a 2000-lb winch that would have little trouble dismembering anyone who got caught up in the works is a bit scary. But we understand that the project is not meant to be a practical solution to oversleeping; if it were, [1up Living] might be better off using the winch to pull the bottom sheet to disgorge the sleeper from the bed entirely.
Something gentler to suit your oversleeping needs might be this Neopixel sunrise clock to coax you out of bed naturally.
Continue reading ““The Alarm Clock Ate My Duvet Cover, That’s Why I’m Late!””
Q: What do you call 8000 dead mosquitoes in a Mason jar?
A: A good start. And [Dan Rojas]’s low-tech mosquito trap accomplished the feat in two nights with nothing fancier than a fan and a bottle of seltzer.
We know what you’re thinking: Where’s the hack? Why not at least use a laser sentry gun to zap skeeters on the fly? We agree that [Dan]’s mosquito trap, consisting of a powerful fan to create suction and a piece of window screen to catch the hapless bloodsuckers, is decidedly low-tech. But you can’t argue with results. Unless he’s fudging the numbers, a half-full Mason jar of parasite cadavers is pretty impressive. And you have to love the simplicity of the attractant he’s using. Mosquitoes are attracted to the CO2 exhaled by tasty mammals, but rather than do something elaborate with a paintball gun cartridge or the like, [Dan] simply cracks a bottle of seltzer and lets it outgas. Dead simple, and wickedly effective. The trapped bugs quickly desiccate in the strong air stream, aided by a few spritzes of isopropyl alcohol before cleaning the screen, which leaves them safely edible to frogs and insects.
Simple, cheap, and effective. Sounds like a great hack to us. And it’s really just a brute-force implementation of this mosquito-killing billboard for areas prone to Zika.
Continue reading “Eradicating Mosquitoes from Your Backyard — with Seltzer?”