Commandeering Public Video Screens: Real Or Fake?

It’s time for everyone’s favorite comment thread game: Real or Fake? This week’s edition comes in from a tip that [Phil] sent about a way to take over video screens in Times Square. Watch the video after the break to see the hackers using a two-part solution to rebroadcast video from an iPhone onto a screen in the busy urban setting. The first part is a transmitter that plugs into the iPhone, the second is a signal repeater that, when held close to a video screen, overrides the clip currently being displayed with the video from the handheld. The image above shows the repeater being floated up to the big screen using a giant red balloon which you can make out in the black bar to the left of the replayed video.

Our first thought is that someone just watched Tron: Legacy and wanted to have a little Sci-Fi fun with the Internets. We can’t imagine a hardware solution that would actually make this work, but please do share your thoughts about that in the comments. We’d suspect this is more of a video hack that uses After Effects, similar to how the stopped motion candle video of the eyelid shutter glasses videos were faked. But apparently there is a follow-up video on the way that will show how the prototype was made so we could be wrong.

update: [Phil Burgess] points out that the “repeater” looks awfully familiar.

Fake for a variety of already-stated reasons (e.g. video out the headphone jack?). But the smoking gun, watching the 720P video on YouTube, is that I plainly recognize the hardware they’re using as the “repeater”: it’s simply the internals from a Digipower JS1-V3 cell phone USB boost charger (having torn apart a few myself):

Continue reading “Commandeering Public Video Screens: Real Or Fake?”

iphone_universal_ir_dongle

IPhone-based Universal IR Remote

If you have a reasonable home theater setup in your living room, odds are you have up to half a dozen remotes sitting around. Short of trying to get your cable receiver’s remote to control everything or laying down some cash for a Harmony remote, what’s a hacker to do?

[Andrey] decided he wanted to use his iPhone as a universal IR remote, but he didn’t want to pay very much to do so. Instead of buying a dongle at the store, he soldered some IR LEDs to an old headphone plug, creating a mini IR dongle to control his equipment. After studying IR signaling a bit, he got to work encoding IR remote commands into wav files using Python. The files are then played on his iPhone, allowing him to submit certain commands to his TV set.

Unfortunately, the process of manually converting IR codes to audio files doesn’t quite seem like the most efficient way of doing things. There are other IR dongles currently on the market that utilize the headphone jack, most of which provide pretty robust software for free. These might make a good alternative to manually creating audio files for each IR command. We honestly haven’t seen any teardowns of these retail IR dongles posted online, but it would be interesting to see how they compare to what [Andrey] has put together.

ITalkman Refrigerated Franken-phone

italkman_frankenphone

[Jani] over at MetkuMods was commissioned to build a prize for an on-air contest held by MTV3 in Finland. Well known for some of his previous work, he was a natural choice for this project. The only stipulation for the build was that it contain three specific items: a Mobira mobile phone, an Apple iPhone, and a refrigerator. For those of you who don’t know, a Mobira Talkman is an old-school “mobile” phone built by Nokia in the 80’s that weighed in at 11 pounds, and was far from convenient to use. In this case however, the size of the phone is an advantage since he was able to gut it and use the frame to make up the body of the refrigerated compartment. He sacrificed a soft-side portable heater/cooler bag, removing the built-in peltier cooler and associated components, later grafting them onto his Talkman case.

The next task was to add the iPhone to the Talkman. Rather than have the old handset sit there uselessly, [Jani] decided to mount a small Bluetooth hands-free module inside the handset, allowing it to answer calls, adjust the volume, and change music tracks on the iPhone. The iPhone was put in a hard plastic case, then mounted to the Talkman handset where the keypad and display used to reside.

All in all, the iTalkman is a pretty cool looking device, though we wouldn’t want to be tasked with lugging that thing around all day!

CES: Where Are They Now? CES Of Course!

CES is a time for showcasing the latest and greatest innovative products. While the crowd milled around the iLounge there was one company who stood out amongst the rest. [Mike] from CableJive is making his debut on the biggest stage for innovation this year. Many of you will remember [Mike] from a post back in 2006, where he was fed up of with all of the good docks being for the apple products exclusively. He set out to fix this and, when talking with him, attributes his success to the coverage Hack a Day did on his project. CableJive has become so popular that he has hired staff that help him produce his products. All detailed information for their products can be found at their website.  The finished product is displayed after the break.

Continue reading “CES: Where Are They Now? CES Of Course!”

Android On IPhone: New Treats

It seems that the iPhone 2g and 3g are the newest phones to get Android 2.2, codenamed Froyo. The process for installing Froyo if you have a jailbroken device seems to get even easier every time, with this revision being as simple as adding a repository, downloading Froyo, and pressing go. Follow the link for a wonderful step by step guide, complete with screenshots to take out all of the guess work. Android on iPhone sure has come a long way since the first time we covered it.

[via reddit]

Security Flaw Bypasses IPhone Lock Screen

It looks like the iPhone lock screen provides just a marginal level of protection. [Jordand321] discovered a key combination that opens the contact app on a locked iPhone. Just tap the emergency call button, enter the pound sign three times (###), then tap call and immediately tap the lock key on the top of the phone. If this is confusing just look at the video after the break to see how it’s done.

You don’t get access to everything on the device. But this does give an attacker access to all of your contact data and allows that person to make any calls they desire.

Continue reading “Security Flaw Bypasses IPhone Lock Screen”

New A4 Jailbreak Debacle Puts The Brakes On For IPad

If you’ve been waiting in the wings for the next Jailbreak to be release you should know there’s been a bit of a speed bump. [ChronicDevTeam], which has been working on an exploit for A4-based iOS devices called SHAtter, tweeted last Thursday that the fully tested, untethered, and unpatchable package knows as greenpois0n would be released today. But on Friday [Geohot], who you may remember from the PlayStation 3 Hypervisor exploit, rolled out his own mostly untested and admittedly beta jailbreak called limera1n.

So where does that leave the situation? Because [geohot] used a different exploit, the [ChronicDevTeam] decided not to release greenp0ison. If they did, it would give Apple a chance to block two different exploits. Instead they are working feverishly to incorporate, test, and repackage using the same exploit as limera1n.

If you don’t want to wait, jailbreak now, but you risk problems with an unstable exploit method that is only available for Windows.

[via @ChronicDevTeam]