[Trax] sent in his writeup on this RF modem with built in 250mW amplifier. The original power of the RF transceiver was around 10mW, his final results after testing were nearly 250mW. He was able to to easily transmit data over 1000 meters using his test setup. He states that he was actually able to achieve this without an antenna on the receiving side. That’s pretty impressive performance. It’s also worth noting that he soldered all of the components in place using a home clothing iron and some soldering paste. That must have been fairly tedious.
Wireless Hacks1078 Articles
Zigbee AES Key Sniffing
[Travis Goodspeed] posted a preview of what he’s working on for this Summer’s conferences. Last weekend he gave a quick demo of sniffing AES128 keys on Zigbee hardware at SOURCE Boston. The CC2420 radio module is used in many Zigbee/802.15.4 sensor networks and the keys have to be transferred over an SPI bus to the module. [Travis] used two syringe probes to monitor the clock line and the data on a TelosB mote, which uses the CC2420. Now that he has the capture, he’s planning on creating a script to automate finding the key.
Standalone Eye-Fi Upload
Former Hack a Day contributor [Will] has been using a Eye-Fi SD card to automate his photo transfers. Unfortunately this requires using Eye-Fi’s software and talking to their servers. He used [Jeff Tchang]’s replacement server written in Python to recieve the images from the card. [Will] manages his own online photo gallery using Gallery 2. To get the images uploaded, he added a call to GUP. Now all of his photos are transfered just as easily as with the standard Eye-Fi but without all of the middleman.
[photo: Eye-Fi teardown]
Hackit: Consumer RFID
RFID seems to have invaded every part of our lives. Sure, the technology has been primarily used in government and industry, but that doesn’t mean that it doesn’t have consumer applications. Recently, we posted about [max’s] RFID dorm room lock, that he built to provide a safe, convenient way to access his room. A while back, we talked about an RFID spatially aware address book that used a combination of rfid tags and post-it notes to control the NFC enabled Nokia 3220 cell phone. Both of these projects highlight unique applications where RFID is used. We bash on RFID from time to time, mostly due to its security (or lack there of). That said, there is an interesting consumer solution out there for people who want to voluntarily use RFID called Touchatag (formerly known as Tikitag). The cool thing about Touchatag is that it uses a combination of RFID and QR (2-D barcode) tags to trigger applications on the Touchatag website. The starter kit, which includes 10 tags and a USB RFID reader, goes for about $40; a decent price considering the hacking potential for the RFID reader. In addition to using the reader, you can also use any NFC enabled phone to read the tags. While NFC enabled phones are currently few and far between, the technology will likely be implemented in many of the new phones released in the coming year.
We’re curious, what do you think is next for consumer RFID? What kind of innovative project ideas do you have?
Tweet-a-Watt Wins Greener Gadgets Design Competition
The team behind the the Tweet-a-Watt/Wattcher just won first prize at the Greener Gadgets design competition. The device is a hacked Kill A Watt that transmits power consumption using an XBee. After checking out DVICE’s preview of the competitors yesterday, we’re happy to see a prototype win instead of just a concept sketch.
QRSS: Radio Amateurs’ Slow-speed Narrowband
Host of the Soldersmoke podcast, [Bill Meara], contributed this guest post.
While the rest of the world is moving toward high speed broadband, some hams—including one Nobel Prize winner—are going in exactly the opposite direction. Our ‘QRSS’ mode makes use of an unusual mixture of modern digital signal processing (DSP), ancient Morse code, and simple homebrewed transmitters. Very narrow bandwidth is desirable because this reduces the noise in the radio communication channel, greatly improving the S/N ratio. But Shannon’s communication theory tells us that narrow bandwidth comes with a cost: slow data rates. In QRSS, beacon transmitters using only milliwatts churn out slow speed Morse ID signals on 10.140 MHz that are routinely picked up by DSP-based receivers on the other side of the globe. Many of the receivers, ‘grabbers’, have visual outputs that are available online in real time. QRSS has been getting a lot of attention on the Soldersmoke podcast and on the Soldersmoke Blog. For more information check out this overview and the hardware involved. Here’s a gallery of received signals.
ShmooCon 2009: Chris Paget’s RFID Cloning Talk
[googlevideo=http://video.google.com/videoplay?docid=-282861825889939203]
When we first saw [Chris Paget]’s cloning video, our reaction was pretty ‘meh’. We’d seen RFID cloning before and the Mifare crack was probably the last time RFID was actually interesting. His ShmooCon presentation, embedded above, caught us completely off-guard. It’s very informative; we highly recommend it.
The hardest part about selling this talk is that it has to use two overloaded words: ‘RFID’ and ‘passport’. The Passport Card, which is part the the Western Hemisphere Travel Initiative (WHTI), is not like the passport book that you’re familiar with. It has the form factor of a driver’s license and can only be used for land and sea travel between the USA, Canada, the Caribbean region, Bermuda, and Mexico. They’ve only started issuing them this year.
Continue reading “ShmooCon 2009: Chris Paget’s RFID Cloning Talk”