phyphox

Smartphone Sensors Unlocked: Turn Your Phone Into A Physics Lab

These days, most of us have a smartphone. They are so commonplace that we rarely stop to consider how amazing they truly are. The open-source project Phyphox has provided easy access to your phone’s sensors for over a decade. We featured it years ago, and the Phyphox team continues to update this versatile application.

Phyphox is designed to use your phone as a sensor for physics experiments, offering a list of prebuilt experiments created by others that you can try yourself. But that’s not all—this app provides access to the many sensors built into your phone. Unlike many applications that access these sensors, Phyphox is open-source, with all its code available on its GitHub page.

The available sensors depend on your smartphone, but you can typically access readings from accelerometers, GPS, gyroscopes, magnetometers, barometers, microphones, cameras, and more. The app includes clever prebuilt experiments, like measuring an elevator’s speed using your phone’s barometer or determining a color’s HSV value with the camera. Beyond phone sensors, the Phyphox team has added support for Arduino BLE devices, enabling you to collect and graph telemetry from your Arduino projects in a centralized hub.

Thanks [Alfius] for sharing this versatile application that unlocks a myriad of uses for your phone’s sensors. You can use a phone for so many things. Really.

Continue reading “Smartphone Sensors Unlocked: Turn Your Phone Into A Physics Lab”

Knowing That It Is Possible

We like to think that we can do almost anything. Give me a broken piece of consumer electronics, and I’ll open it up and kick the capacitors. Give me an embedded Linux machine, and I’ll poke around for a serial port and see if it’s running uboot. But my confidence suddenly pales when you hand me a smartphone.

Now that’s not to say that I’ve never replaced a broken screen or a camera module with OEM parts. The modern smartphone is actually a miracle of modularity, with most sub-assemblies being swappable, at least in principle, and depending on your taste for applying heat to loosen up whatever glue holds the damn things together.

But actually doing hardware hacking on smartphones is still outside of my comfort zone, and that’s a shame. So I was pretty pleased to see [Marcin Plaza] attempt gutting a smartphone, repackaging it into a new form factor, and even adding a new keyboard to it. The best moment in that video for me comes around eight minutes in, when he has completely disassembled all of the modules and is laying them out on his desk to see how little he needs to make the thing work. And the answer is batteries, motherboard, USB-C, power button, and a screen. That starts to seem like a computer build, and that’s familiar turf.

That reminded me of [Scotty Allen]’s forays into cell-phone hackery that culminated in his building one completely from parts, and telling us all about it at Supercon ages ago. He told me that the turning point for him was realizing that if you have access to the tools to put it together and can get some of the impossibly small parts manufactured and/or assembled for you, that it’s just like putting a computer together.

So now I’ve seen two examples. [Scotty] put his together from parts, and [Marcin] actually got a new daughterboard made that interfaces with the USB to add a keyboard. Hardware hacking on a cellphone doesn’t sound entirely impossible. You’d probably want a cheap old used one, but the barrier to entry there isn’t that bad. You’ll probably have to buy some obscure connectors – they are tiny inside smartphones – and get some breakout boards made. But maybe it’s possible?

Anyone have more encouragement?

Turning Old Cellphones Into SBCs

[David] sent us a tip about a company in Belgium, Citronics, that is looking to turn old cellphones into single-board computers for embedded Linux applications. We think it’s a great idea, and have long lamented how many pocket supercomputers simply get tossed in the recycling stream, when they could be put to use in hacker projects. So far, it looks like Citronics only has a prototyping breakout board for the Fairphone 2, but it’s a promising idea.

One of the things that’s stopping us from re-using old phones, of course, is the lack of easy access to the peripherals. On the average phone, you’ve got one USB port and that’s it. The Citronics dev kit provides all sorts of connectivity: 4x USB 2.0, 1x Ethernet 10/100M, and a Raspberry Pi Header (UART, SPI, I2C, GPIO). At the same time, for better or worse, they’ve done away with the screen and its touch interface, and the camera too, but they seem to be keeping all of the RF capabilities.

The whole thing runs Linux, which means that this won’t work with every phone out there, but projects like PostmarketOS and others will certainly broaden the range of usable devices. And stripping off the camera and screen has the secondary advantages of removing the parts that get most easily broken and have the least support from custom Linux distros.

We wish we had more details about the specifics of the break-out boards, but we like the idea. How long before we see an open-source implementation of something similar? There are so many cheap used and broken cellphones out there that it’s certainly a worthwhile project!

A design sketch of a partially disassembled candybar mobile phone. The enclosure is a clamshell of plastic that envelops the functional internals of the device and is illustrated to the right upper corner of the image, slightly overlapping the internals evoking the idea of the internals being inserted into the cover. The words "buttons part of the cover" are written toward the top with an arrow toward the numpad and "plastic shell with various design" is written toward the bottom with an arrow toward the translucent blue shell.

The Nokia Design Archive Is Open For Viewing

During the Cambrian Explosion of cellphone form factors at the turn of the millenium, Nokia reigned supreme. If you’d like to see what they were doing behind the scenes to design these wild phones, you’ll love the Nokia Design Archive from Aalto University.

Featuring images, presentations, videos and a number of other goodies (remember transparencies?), this collection gives us some in-depth insight into how consumer products were dreamed up, designed, and brought to market. Some projects require more reading between the lines than others as the Archive is somewhat fragmented, but we think it could still be an invaluable peek into product design, especially if you’re working on projects that you want to be usable outside of a hacker audience.

The Archive also includes approximately 2000 objects including many unreleased “unknown” models and prototypes of phones that actually did make it into the wild. While we’d love to get our hands on some of these devices IRL, having images with reference colors is probably the next best thing. Having replaced a number of smartphone screens, we hope more hackers take up the buttons and indestructible casing of these elegant devices for a more civilized age.

Thanks to [Michael Fitzmayer] for the tip! Be sure to checkout his work on Nokia N-Gage phones, including an SDK if you too love to taco talk.

Schematics, For A Modern Flagship Phone

The mobile phone is an expensive and often surprisingly fragile device, whose manufacturers are notorious for making them as difficult to repair as possible. Glued-together cases and unreplaceable batteries abound, and technical information is non-existent. But amongst all that there’s one manufacturer with a different approach — Fairphone. Case in point, they’ve released the full service guide including schematics for their flagship Fairphone 5.

Fairphone’s selling point is the repairability and internal accessibility of their products and of course they’ve made hay with this as a marketing opportunity. But aside from that, it’s a fascinating chance to look in-depth at a modern smartphone from the inside out. We see the next-level PCB layout and how everything is so neatly packed into the minimum space, all without resorting to a heat gun.

It’s great to have another hackable phone, and fair play to Fairphone for releasing all this stuff, but perhaps the most interesting part from where we’re sitting is how and where this phone is being sold. There have been hackable phones before, for many the Pinephone will spring to mind, but they have always been sold to an audience who buy to hack. Here in Europe where this is being written, the Fairphone is being sold as a consumer device. It won’t shake Apple or Samsung from their perches, but for a hackable device to be so generally available to those who wish to do things with it can never be a bad thing.

We took a quick look at Fairphone back in 2015, when they launched.

Mobile Phones And The Question Of Declining Sperm Quality

In a world increasingly reliant on technology, a pressing question arises: can our dependence on gadgets, particularly mobile phones, be affecting our health in unexpected ways? A growing body of research is now pointing towards a startling trend – declining sperm quality in the human population – with mobile phones emerging as a potential culprit.

Recent studies have been sounding the alarm over a noticeable decline in sperm counts and quality across the globe. This decline isn’t just about quantity; it’s about the vitality, motility, and overall health of sperm cells. The implications of this trend are profound, affecting fertility rates and possibly even the long-term viability of populations. The situation is murky and complicated, but new studies suggest that cellular phones could have a role to play.

Continue reading “Mobile Phones And The Question Of Declining Sperm Quality”

LTE Sniffer Ferrets Out Cellular Communications

LTE networks have taken over from older technologies like GSM in much of the world. Outfitted with the right hardware, like a software defined radio, and the right software, it’s theoretically possible to sniff some of this data for yourself. The LTESniffer project was built to do just this. 

LTESniffer is able to sniff downlink traffic from base stations using a USRP B210 SDR, outfitted with two antennas. If you want to sniff uplink traffic, though, you’ll need to upgrade to an X310 with two daughterboards fitted. This is due to the timing vagaries of LTE communication. Other solutions can work however, particularly if you just care about downlink traffic.

If you’ve got that hardware though, you’re ready to go. The software will help pull out LTE signals from the air, though it bears noting that it’s only designed to work with unencrypted traffic. It won’t help you capture the encrypted communications of network users, though it can show you various information like IMSI numbers of devices on the network. Local regulations may prevent you legally even doing this, and if so, the project readme recommends setting up your own LTE network to experiment with instead.

Cellular sniffing has always been somewhat obscure and arcane, given the difficulty and encryption involved, to say nothing of the legal implications. Regardless, some hackers will always pursue a greater knowledge of the technology around them. If you’ve been doing just that, let us know what you’re working on via the tipsline.