Wrapping up a multi-year project to provide free WiFi on all public transportation, South Korea’s Ministry of Science and Information and Communications Technology (MSIT) announced that a total of 35,006 buses had been equipped nationwide.
Previously, subscriber-based WiFi had been installed on subways and in subway stations. It was provided privately by two phone carriers and free only for their subscribers. The coverage was spotty and slow, and in 2017 the government took over and implemented a better system. With this announcement, the whole public transportation system is now covered with stable and free WiFi.
We also noticed that the government has released the details of the 220,000 WiFi access points to the public. This includes the location, IP address, and RSSI data for use by people and companies wanting to develop location-based services. What is the state of free WiFi access points in your region, and does it extend to public transportation? Do you find it reliable, or do you use your data plan when out and about?
Do you remember the early days of consumer wireless networking, a time of open access points with default SSIDs, manufacturer default passwords, Pringle can antennas, and wardriving? Fortunately out-of-the-box device security has moved on in the last couple of decades, but there was a time when most WiFi networks were an open book to any passer-by with a WiFi-equipped laptop or PDA.
The more sophisticated wardrivers used directional antennas, the simplest of which was the abovementioned Pringle can, in which the snack container was repurposed as a resonant horn antenna with a single radiator mounted on an N socket poking through its side. If you were more sophisticated you might have used a Yagi array (a higher-frequency version of the antenna you would use to receive TV signals). But these were high-precision items that were expensive, or rather tricky to build if you made one yourself.
In recent years the price of commercial WiFi Yagi arrays has dropped, and they have become a common sight used for stretching WiFi range. [TacticalNinja] has other ideas, and has used a particularly long one paired with a high-power WiFi card and amplifier as a wardriver’s kit par excellence, complete with a sniper’s ‘scope for aiming.
The antenna was a cheap Chinese item, which arrived with very poor performance indeed. It turned out that its driven element was misaligned and shorted by a too-long screw, and its cable was rather long with a suspect balun. Modifying it for element alignment and a balun-less short feeder improved its performance no end. He quotes the figures for his set-up as 4000mW of RF output power into a 25dBi Yagi, or 61dBm effective radiated power. This equates to the definitely-illegal equivalent of an over 1250W point source, which sounds very impressive but somehow we doubt that the quoted figures will be achieved in reality. Claimed manufacturer antenna gain figures are rarely trustworthy.
This is something of an exercise in how much you can push into a WiFi antenna, and his comparison with a rifle is very apt. Imagine it as the equivalent of an AR-15 modified with every bell and whistle the gun store can sell its owner, it may look impressively tricked-out but does it shoot any better than the stock rifle in the hands of an expert? As any radio amateur will tell you: a contact can only be made if communication can be heard in both directions, and we’re left wondering whether some of that extra power is wasted as even with the Yagi the WiFi receiver will be unlikely to hear the reply from a network responding at great distance using the stock legal antenna and power. Still, it does have an air of wardriver chic about it, and we’re certain it has the potential for a lot of long-distance WiFi fun within its receiving range.
This isn’t the first wardriving rifle we’ve featured, but unlike this one you could probably carry it past a policeman without attracting attention.
Our conscience almost prevented us from posting this one. Almost.
What do people all around the world want most? Free WiFi. And what inevitable force do they want to avoid most, just after death and taxes? Rick Astley. As a getting-started project with the ESP8266, Hackaday.io user [jaime] built a “free WiFi portal” that takes advantage of people’s deepest desires. Instead of delivering sweet, high-bandwidth connectivity, once you click through the onerous terms and conditions, it delivers you a looped GIF with background music.
And all of this on $4 worth of hardware, with firmware assembled in the cloud and easily available to anyone. We live in a truly
frivolous glorious age.
Digging through our archives, we found a number of Rickroll posts that we’d rather forget, but this steam-powered record player bears a second look.
File this project under “Getting Stuff Done” rather than “Shiniest Things”. [filid] works with a local free-WiFi access group, and wanted to map out the signal strength (RSSI) and coverage of their installations. This is a trivial task for an ESP8266, and it was even easier for [filid] because he had already written some WiFi scanner code for the same hardware.
Basically, the device is a Neopixel ring connected to an ESP8266. If it detects a router that’s part of the Freifunk München network, it displays the RSSI on the ring in an attractive circular “bargraph”. When it doesn’t detect a Freifunk node, it displays the number of WiFi routers that it finds. It dumps a lot more detail over the serial port.
The code is short and sweet. Take a look if you’re just getting started with networking using the Arduino firmware on an ESP. Even if you don’t live in Munich, you’ll be able to tweak it to your own situation in a few seconds.
We want to see a GPS and an SD card added to this one, for a standalone wardriving-with-purpose setup. And while we admit that the small form-factor is probably appropriate for this project, how much cooler would it be if it glowed blue like Bilbo’s “Sting”?
With the miniaturization of technology, we’re now able to do some pretty crazy things with computers the size of credit cards. [Dennis] has been working on a rather unique project — he calls it the Cat Exploit — we call it the Internet of Cats.
By making pet-wearable tech (is that a new term?), it’s possible to create a mini war-driving server that stray cats (or other small animals) could wear. As they roam the streets, their feline-augmentation searches and taps into open or badly secured WiFi networks, repeating and spreading the signal to other Server Entities (other network-enabled cats), opening up the networks for all to use. Continue reading “The Internet Of Cats”