If you are not within ear-shot of your Alexa Echo, Dot or Tap device and need to command it from anywhere in the world, you’d most likely use the handy mobile app or web interface to control it. For some strange reason, if you’d rather use voice commands from anywhere in the world, you can still do it using apps such as Alexa Listens or Reverb, among many others. We’d be the first ones to call these out and say “It’s not a hack”. But [pat dhens] approach is above reproach! He has posted details on how to Remote Control the Alexa Echo from Anywhere in the World. Short version of the hack — he’s using a Raspberry Pi with a speaker attached to it which commands his Alexa Tap using a text-to-speech converter program.
The long version is short as well. The user uses a VPN, such as OpenVPN, to log in to their home network where the Alexa device is located. Then, use VNC to connect to the Raspberry Pi to access its shell. Finally, the user issues a text command which is converted to speech by the ‘festival‘ program on the Raspberry Pi. The output goes to an external speaker via the Raspberry Pi’s 3.5 mm audio out jack. And that’s all there is to it. You’ve just issued a voice command to your Alexa from across the world.
Maybe it will save your vocal chords from damage due to excessive hollering, we guess. He’s even made a short video to prove that it works. Now all it needs is a microphone to listen to Alexa, convert speech-to-text, and then transmit it back to you across the world to complete the cycle.
We’re not sure, but he thinks this hack will lead him to world domination. Good Luck with that.
Continue reading “Control Alexa Echo from anywhere in the World”
This is the Kyosho Blizzard, a tracked remote control vehicle that’s a blast to take out in the rapidly retreating snowpack. [Antibore] was interested in performance testing the range of the thing. It includes a camera that streams video back to a tablet or smartphone. Both the video and the controls use WiFi for communications. As he expected, the rover loses control signal at about fifty meters, with the video has a disappointing twenty meter limit. His workaround is to saddle the crawler with a 3G bridge. Not a bad idea that may be feasibly completed with hardware you have on hand.
In this case he grabbed a Beagleboard-XM. It runs embedded Linux and has USB ports which is perfect for the other two parts of the added hardware: a Huawei E230 3G dongle and a WiFi dongle. This means no alterations to the rover were necessary. He set up OpenVPN and performed a few other tweaks. The WiFi signal is constant, as the transmitter and receiver are both attached to the rover. We just wonder about the latency of the 3G traffic. Let’s hear your thoughts on that in the comments below.
We would be remiss if we didn’t tie-in the potential of this hack. Previously this winter we saw a Kyosho with a 3D printed snow thrower attached to the front. More snow removal power, arguably unlimited range… you can do your entire block from the comfort of the couch. To the Future!
The Janus team have published a preview of their new Privacy Adapter. It’s a small two port router. You just plug it in-line between your computer/switch and your internet connection. It will then anonymize all of you traffic via the Tor network. You can also use it with OpenVPN. The hardware appears to be a Gumstix computer mounted to a daughtercard with two ethernet ports. It will have a web configuration just like a standard router. This looks like a great plug-n-play privacy device. The only improvement we would suggest is adding auto-detect so a crossover cable isn’t required.
Janus is responsible for JanusVM, a virtual machine designed to protect your privacy with technologies like Tor and OpenVPN.