I’ll admit it. I can be a little cheap. I also find it hard to pass up a bargain. So when I saw a robot kit at the local store that had been originally $125 marked down to $20, I had to bite. There was only one problem. After I got the thing home, I found they expected you to supply your own radio control transmitter and receiver.
Normally, that wouldn’t be a problem but lately… let’s just say a lot of my stuff is in storage and I didn’t have anything handy. I certainly didn’t want to go buy something that would double the cost of this robot that I really didn’t need to begin with.
However, I did have a few ESP8266 modules handy. Good ones, too, from Adafruit with selected 5 V I/O compatibility and an onboard regulator. I started thinking about writing something for the ESP8266 to pick up data from, say, a UDP packet and converting it into RC servo commands.
Seemed like a fair amount of work and then I remembered that I wanted to try Blynk. If you haven’t heard of Blynk, it is a user interface for Android and Apple phones that can send commands to an embedded system over the Internet. You usually think of using Blynk with an Arduino, but you can also program the embedded part directly on an ESP8266. I quickly threw together a little prototype joystick.
Continue reading “The Joy of the ESP8266 and Blynk”
Ever so slowly, the main storage in our computers has been moving from spinning disks, to SSDs over SATA, to Flash drives connected to a PCI something or other. The lastest technology is NVMe — Non-Volitile Memory Express — a horribly named technology that puts a memory controller right on the chip. Intel has a PCI-based NVMe drive out, Samsung recently released an M.2 NVMe drive, and the iPhone 6S and 6S Plus are built around this storage technology.
New chips demand a reverse engineering session, and that’s exactly what [Ramtin Amin] did. He took a few of these chips out of an iPhone, created a board that will read them, and managed to analize the firmware.
Any reverse engineering will begin with desoldering the chip. This is easy enough, with the real trick being getting it working again outside whatever system it was removed from. For this, [Ramtin] built his own PCIe card with a ZIF socket. This socket was custom-made, but the good news is you can buy one from ITEAD. Yes, it is expensive — that’s what you get with a custom-made ZIF socket.
With the chip extracted, a custom PCIe card, and a bit of work with the NVMe implementation for Linux, [Ramtin] had just about everything working. Eventually, he was able to dump the entire file system on the chip, allowing anyone to theoretically back up the data on their iPhone or MacBook Air. Of course, and especially for the iPhone, this data is encrypted. It’s not possible to clone an iPhone using this method, but it is a remarkably deep dive into the hardware that makes our storage tick.”
Once again, [Rulof]’s putting his considerable hacking abilities to good use, his good use that is. By modding a few simple parts he’s put together something that he can carry around on his keychain that’ll allow him to steal power from his friend’s phones to charge his own phone.
He starts by cutting away the motor from an iPhone fan to isolate the Micro USB connector. He then removes the charging circuit board from a cheap Chinese USB power bank, and solders wires from the Micro USB connector to one side of the board. Lastly, he cuts away the Lightning connector from a Lightning-to-USB cable and solders that connector to the other side of the circuit board. For longevity and cosmetics, he puts it all in a small wood block and connects a key ring. The result is a small, neat looking box with a Micro USB connector on one side and a Lightning connector on the other. You can see him make it, and then use it to steal power from his friends in the video after the break.
Continue reading “Phone-To-Phone Power Thievery”
We’ve featured the work of [Modpurist] before, but his latest hack is wonderful in its simplicity. He wanted to create a more authentic Game Boy feel on his iPhone, so he printed out and stuck a skin on the front that makes it look like a Game Boy. Or rather, a Phone Boy, as the form factor is a bit different.
By measuring out the on-screen buttons and using light photo paper, he was able to have buttons on the skin as well: the touch screen still works through it. You can download his printable templates… and the finishing touch is a similar print for the back of the phone to gives that genuine Game Boy feel. Okay, feel is not the right term since the classic d-pad and red buttons are still just capacitive and have no throw. But this is a clever step in a fun direction.
Check out his other hacks while you are at it, including the Game Boy Fridge.
Continue reading “Simple Game Boy iPhone Mod Is Simple”
As you may have heard, the iPhone 7 is ditching the 3.5 mm headphone jack in the name of progress and courage. Whatever your take on that, it leaves the end user out in the cold if — for instance — their preferred headphones still use the old format. Here to save you from an untimely upgrade is YouTuber [Kedar Nimbalkar], who has modified a Bluetooth Smartwatch to incorporate a 3.5 mm jack to allow continued use your current headphones.
After opening up the smartwatch [Nimbalkar] removes the speaker, solders in a 3.5 mm headphone jack and clips out an opening in the watch’s case that maintains the watch’s sleek exterior.
Continue reading “Smart Watch Hack Lets You Use Your 3.5mm Headphones With An iPhone 7”
[Chris Gunawardena] is still holding his breath on Valve and Facebook surprising everyone by open sourcing their top secret VR prototypes. They have some really clever ways to track the exact location and orientation of the big black box they want people to strap to their faces. Until then, though, he decided to take his own stab at the 3D tracking problems they had to solve.
While they used light to perform the localization, he wanted to experiment with using electromagnetic fields to perform the same function. Every phone these days has a magnetometer built in. It’s used to figure out which way is up, but it can also measure the local strength of magnetic fields.
Unfortunately to get really good range on a magnetic field there’s a pesky problem involving inverse square laws. Some 9V batteries in series solved the high current DC voltage source problem and left him with magnetic field powerful enough to be detected almost ten centimeters away by his iPhone’s magnetometer.
As small as this range seems, it ended up being enough for his purposes. Using the existing math and a small iOS app he was able to perform rudimentary localization using EM fields. Pretty cool. He’s not done yet and hopes that a more sensitive magnetometer and a higher voltage power supply with let him achieve greater distances and accuracy in a future iteration.
Good grief, this smartphone-to-TV remote really drives home how simple hardware projects have become in the last decade. We’re talking about a voltage regulator, IR LED, and ESP8266 to add TV control on your home network. The hardware part of the hack is a homemade two sided board that mates an ESP with a micro-USB port, a voltage regulator to step down fom 5 to 3.3 v, and an IR LED for transmitting TV codes.
Let’s sit back and recount our good fortunes that make this possible. USB is a standard and now is found on the back of most televisions — power source solved. Cheap WiFi-enabled microcontroller — check. Ubiquitous smartphones and established protocols to communicate with other devices on the network — absolutely. It’s an incredible time to be a hacker.
Television infrared remote codes are fairly well documented and easy to sniff using tools like Arduino — in fact the ESP IR firmware for this is built on [Ken Shirriff’s] Arduino IR library. The rest of the sketch makes it a barebones device on the LAN, waiting for a connection that sends “tvon” or “tvoff”. In this case it’s a Raspberry Pi acting as the Homekit server, but any number of protocols could be used for the same (MQTT anyone?).
Continue reading “Smartphone TV Remote Courtesy of Homekit and ESP8266”