It may seem like an odd concept to younger readers, but there was once a time when people rented their phones rather than buying them outright. Accordingly, these phones were built like tanks, and seeing one of these sturdy classics of midcentury modern design can be a trip down memory lane for some of us. So retrofitting a retro phone with a Raspberry Pi and Google’s AIY seems like a natural project to tackle for nostalgia’s sake.
The phone that [Alasdair Allan] decided to hack was the iconic British desk telephone, the GPO-746, or at least a modern interpretation of the default rental phone from the late 60s through the 70s. But the phone’s looks were more important than its guts, which were stripped away to make room for the Raspberry Pi and Google AIY hat. [Alasdair] originally thought he’d interface the Pi to the rotary dial through DIOs, until he discovered the odd optical interface of the dialer — a mask rotates over a ring of photoresistors, one for each digit, exposing only one to light from an LED illuminated by a microswitch on the finger stop. The digital interface brings up the Google voice assistant, along with some realistic retro phone line sounds. It’s a work in progress, but you can see where [Alasdair] is in the video below.
If stuffing a Google Pi into a retro appliance sounds familiar, it might be this vintage intercom rebuild you have in mind, which [Alasdair] cites as inspiration for his build.
They say the eyes are the windows to the soul. But with a new smartphone app, the eyes may be a diagnostic window into the body that might be used to prevent a horrible disease — pancreatic cancer. A research team at the University of Washington led by [Alex Mariakakis] recently described what they call “BiliScreen,” a smartphone app to detect pancreatic disease by imaging a patient’s eyes.
Pancreatic cancer is particularly deadly because it remains asymptomatic until it’s too late. One early symptom is jaundice, a yellow-green discoloration of the skin and the whites of the eyes as the blood pigment bilirubin accumulates in the body. By the time enough bilirubin accumulates to be visible to the naked eye, things have generally progressed to the inoperable stage. BiliScreen captures images of the eyes and uses image analysis techniques to detect jaundice long before anyone would notice. To control lighting conditions, a 3D-printed mask similar to Google’s Cardboard can be used; there’s also a pair of glasses that look like something from [Sir Elton John]’s collection that can be used to correct for ambient lighting. Results look promising so far, with BiliScreen correctly identifying elevated bilirubin levels 90% of the time, as compared to later blood tests. Their research paper has all the details (PDF link).
Tools like BiliScreen could really make a difference in the early diagnosis and prevention of diseases. For an even less intrusive way to intervene in disease processes early, we might also be able to use WiFi to passively detect Parkinson’s.
If you sign up for a European hacker camp such as CCC Camp in Germany or SHA Camp in the Netherlands, you’ll see among the items recommended to take with you, a DECT handset. DECT, or Digital Enhanced Cordless Telecommunications, refers to the set of standards that lie behind the digital cordless telephones that are ubiquitous across Europe and some countries elsewhere in the world. These standards cover more than just the simple two-way telephone calls through a base station that most Europeans use them for though, they define a fully functional multi-cell 3G phone and data networking system. This means that an event like SHA Camp can run its own digital phone network without having to implement cell towers.
Reading the history of DECT, there is the interesting snippet that the first DECT product on the market in 1993 was not a telephone but a networking device, and incidentally the first wireless LAN product on the European market. Olivetti’s Net3 provided 512kB/s wireless networking to a base station with Ethernet or Token Ring interfaces for connection to a LAN. In its original form it was an internal card for a desktop PC coupled to a bulky external box containing radio circuitry and antenna, but its later incarnations included a PCMCIA card with a much smaller antenna box. The half-megabit speed seems tiny by today’s standards, but in the pre-multimedia world of 1993 would have been perfectly adequate for a Novell Netware fileserver and an HP Laserjet 4.
So DECT is an interesting technology that can do more than just a simple cordless phone, and its first product was unexpectedly somewhat groundbreaking. It then becomes even more interesting to find that Net3 has left very little evidence of itself to find that can be found on the Web, and learning more about it requires a little detective work.
It’s obvious that Net3 and DECT networking as a high-end wireless LAN before a need for wireless LANs existed never made it, but what is perhaps more interesting is that it seems to have left no legacy for other more mundane applications. We are in the midst of an explosion of hype around the Internet of Things and it seems new short-range wireless networking technologies appear almost daily, yet the world seems to have overlooked this robust, low power, and mature wireless network with its own dedicated frequency allocation that many of us already have in our homes. It seems particularly surprising that among the many DECT base stations on sale at your local consumer electronics store there are none with an Internet connection, and there is no market for IoT devices that use DECT as their backhaul.
In the open-source community there has been some work on DECT. The OsmocomDECT project for example provides a DECT software stack, and deDECTed.org states an aim to “better understand DECT and its security and to create an Open Source implementation of the DECT standard”. But there seems to have been very little hardware work in our community on the standard, for example there are no DECT-specific projects on Hackaday.io.
Net3 then was a product before its time, a herald of what was to come, from that twilight period when the Web was definitely a thing but had yet to become the world’s universal information repository. Public wireless networking was still several years in the future, so there was no imperative for road warriors to equip themselves with a Net3 card or for computer manufacturers — not even Olivetti themselves! — to incorporate the technology. It thus didn’t take the world by storm, and unusually for such a ground-breaking computer product there remains little legacy for it beyond a rarely-used feature of the protocol Europeans use for their cordless phones.
Did you have a Net3 card? Do you still have one? Let us know in the comments.
The invention of the transistor ushered in a lot of technologies that we now take for granted, and one of the less-thought-about areas that it improved living conditions worldwide was by making the touch-tone phone possible. No longer would the world have to fuss with dials to make phone calls, they could simply push some buttons. This technology is still in use today, and it is possible to build external phone dialers that use these tones to make phone calls, as [SunFounder] demonstrates with his latest project.
The tones that a phone makes when a button is pressed correlate with specific frequencies for each number. Automatic dialers like this one help when there are multiple carriers (like different long-distance carriers, for example) where different prefixes can be used to make calls cheaper depending on the destination of the call. A preprogrammed dialer can take all of this complication out of making phone calls. [SunFounder] is able to make a simple dialer from scratch, using an Arduino, its “tone” library, and a speaker that is simply held up to the phone that the call will be placed on.
[SunFounder] points out that he built this more because he’s interested in the inner workings of phones, and not because he needed a purpose-built dialer. It’s a good demonstration of how phones continue to use DTMF though, and how easy it is to interface with such a system. It might also suit a beginner as an introduction to the world of phreaking.
It’s incredibly simple to do – simply plug in a set of headphone to the sound card’s microphone jack, leave a mobile phone nearby, hit record, and wait. The headphone wire acts as an antenna, and when the phone transmits, it induces a current in the wire, which is picked up by the soundcard.
[153armstrong] notes that their setup only seems to pick up signals from 2G phones, likely using GSM. It doesn’t seem to pick up anything from 3G or 4G phones. We’d wager this is due to the difference in the way different cellular technologies transmit – let us know what you think in the comments.
This system is useful as a way to detect a transmitting phone at close range, however due to the limited bandwidth of a computer soundcard, it is in no way capable of actually decoding the transmissions. As far as other experiments go, why not use your soundcard to detect lightning?
It was but two weeks ago when I told my story of woe — the tale of an LG Nexus 5X that fell ill, seemingly due to a manufacturing fault at birth. I managed to disassemble it and made my way through a semi-successful attempt at repair, relying on a freezer and hairdryer to coax it back to life long enough to backup my data. Try as I might, however, I simply couldn’t get the phone running for more than ten minutes at a time.
All was not in vain, however! I was rewarded for documenting my struggles with the vast experience and knowledge of the wider Internet: “Hairdryers don’t get as hot as heatguns!”
It turned out I had just assumed that two similar devices, both relying on a hot bit of metal and a fan as their primary components, must be virtually identical if rated at a similar power draw. I was wrong! Apparently the average hairdryer stays well cooler than 150 degrees Celsius to avoid melting one’s silky locks or burning the skin. I even learned that apparently, wet hair melts at a lower temperature than dry hair. Who knew?
Armed with this knowledge, I rushed out and bought the cheapest heat gun I could find — around $50. Rated up to 600 degrees C, this was definitely going to be hotter than the hairdryer. With the prevailing opinion being that I had not applied enough heat in general, I decided to also increase the heating period to 90 seconds, up from a quick 30 second pass originally.
As the devices with which we surround ourselves become ever more connected to the rest of the world, a lot more thought is being given to their security with respect to the internet. It’s important to remember though that this is not the only possible attack vector through which they could be compromised. All devices that incorporate sensors or indicators have the potential to be exploited in some way, whether that is as simple as sniffing the data stream expressed through a flashing LED, or a more complex attack.
Researchers at the University of Michigan and the University of South Carolina have demonstrated a successful attack against MEMS accelerometers such as you might find in a smartphone. They are using carefully crafted sound waves, and can replicate at will any output the device should be capable of returning.
MEMS accelerometers have a microscopic sprung weight with protruding plates that form part of a set of capacitors. The displacement of the weight due to acceleration is measured by looking at the difference between the capacitance on either side of the plates.
The team describe their work in the video we’ve put below the break, though frustratingly they don’t go into quite enough detail other than mentioning anti-aliasing. We suspect that they vibrate the weight such that it matches the sampling frequency of the sensor, and constantly registers a reading at a point on its travel they can dial in through the phase of their applied sound. They demonstrate interference with a model car controlled by a smartphone, and spurious steps added to a Fitbit. The whole thing is enough for the New York Times to worry about hacking a phone with sound waves, which is rather a predictable overreaction that is not shared by the researchers themselves.