A Tidy Clamshell Keyboard For The Pinephone

Something a lot of people don’t realise about modern smartphones is that many of them have fully-featured USB interfaces. Perhaps the best of all is the Pinephone, which is a fully open-source smartphone that gives end users total control over their phone experience. [silver] has such a phone, and set about building himself a neat keyboard setup for the platform.

The build is based around an RCA RKT773P tablet keyboard case, which uses USB to interface with a tablet via pogo pins. [silver] modified this by soldering on a USB cable to the pins, paired with a USB-C host adapter on the Pinephone. Paired with a few 3D printed parts to hold everything in place, it almost turns the assembly into a cute little Pinephone laptop.

It’s a neat build that would likely save a lot of frustration when hacking away at a terminal window on the Pinephone. Parts are available on Thingiverse for those interested in replicating the hack. Those eager to dive into the Pinephone platform may relish the new Pro model that has just dropped, too. Video after the break.

Continue reading “A Tidy Clamshell Keyboard For The Pinephone”

Build Yourself A Nifty Cable Smartphone Mount

Smartphones have supplanted cameras in day to day use for the vast majority of purposes. However, unlike cameras, they don’t come with tripod mounts or any real good way of holding them in a set position. [Mrballeng] has built an excellent mount, however, that uses cable to hold a smartphone in all manner of positions, for photography or other purposes.

The mount relies on vinyl-coated steel cable. Upon this cable are slotted four blocks that are 3D printed out of resin. The blocks are also fitted with strong magnets. This allows them to be positioned along the vinyl cable while sticking themselves in place thanks to the magnetic attraction to the steel core. The blocks can also be used to attach the cable to magnetic objects like drywall screws or light fittings.

Using the mount is simple. The cable is wrapped around the phone and the blocks cinched up to hold it in place. Then, the magnets in the blocks can be used to hold the phone to walls or other surfaces.

It’s a tidy build, and one we can imagine using regularly if we had one. Of course, there’s no reason you couldn’t produce the parts on a more common filament-based printer, either. We’ve seen some other great smartphone photography hacks too, like this mod that lets you use your phone as a microscope for under $10. Video after the break.

Continue reading “Build Yourself A Nifty Cable Smartphone Mount”

Old Phone Becomes MIDI Controller

MIDI controllers come in all shapes and sizes. Commercial products based on keyboards or matrixes of buttons are popular, but there’s nothing stopping you from whipping up your own creations out of whatever strikes your fancy. [Kevin] has done just that, turning an old telephone into a working MIDI device.

The phone in question is a Doro X20 wired landline phone. Being surplus to [Kevin’s] requirements left it ripe for the hacking. A Raspberry Pi Pico was wired in to the phone’s keypad, slimmed down with a hacksaw in order to allow it to neatly fit inside the original enclosure. Then it was a simple matter of whipping up some code to read the buttons and output MIDI data via the Pico’s serial output.

Later, [Kevin] brought the design into the modern world, setting it up to talk USB MIDI using the Pico’s onboard USB hardware. This makes using it with a computer a cinch, and lets [Kevin] control a DAW using the handset controller.

It’s a fun build, and one that shows how you can easily build your own MIDI hardware using nothing but a soldering iron, some buttons, and a modern microcontroller. From there, the sky really is the limit. Whether you like big knobs, easy playing, or have your own personal tastes, you can build what you like to suit your own style. When you do, drop us a line! Video after the break.

Continue reading “Old Phone Becomes MIDI Controller”

The 70s Are Calling To Shed Some Light

Remember when phones didn’t all look the same? We had a good thing going in the early cell phone days, which seemed like a brief holdover from the Western Electric (et. al) era where you could get a phone that suited your inner minimalist or princess, and choose the color to boot.

[Dubchinsky] found a beautiful phone from this bygone era and saved it from one of two likely fates — the landfill, or else a life languishing as a piece of vintage technology that’s just sitting around for looks. Instead, this phone found a second calling as a lovely desk lamp with secret goose neck flexibility. The lamp itself is an inexpensive LED module from ebay that’s wired up to mains power through a push button switch in the phone’s base.

We absolutely love that [Dubchinsky] wrapped the curly cord around the goose neck, but were a bit disappointed that he didn’t use the hook switch to turn the lamp on and off. In the comments, he says that the plastic felt like it was too brittle to stand up to repeated actuation of such a heavy switch. That’s understandable. [Dubchinsky] also thought about using the rotary dial as a dimmer, and we think that’s a bright idea.

Between the guide, the pictures, and the build process video after the break, this is pretty much a complete how-to. We think that is commendable given that [Dubchinsky] is selling these lamps on etsy.

Do ya miss spinning the rotary dial and long for somewhat simpler days? Hook your finger into this rotary cell phone.

Continue reading “The 70s Are Calling To Shed Some Light”

Teleconferencing Like It’s 1988: Connecting Vintage Hardware To Zoom

Hang up your car phone and toss that fax machine in the garbage. Even back in the late 80s it was possible to do away with these primitive technologies in favor of video conferencing, even though this technology didn’t catch on en masse until recently. In fact, Mitsubishi released a piece of video conferencing equipment called the VisiTel that can be put to use today, provided you can do a bit of work to get it to play along nicely with modern technology.

[Alex] was lucky enough to have one of these on hand, as soon as it was powered up he was able to get to work deciphering the messaging protocol of the device. To do this he showed the camera certain pictures with known properties and measured the output waveforms coming from the device, which were AM modulated over an RJ9 connection which he had changed to a 3.5 mm headphone jack.

It communicates in a series of pictures instead of sending an actual video signal, so [Alex] had a lot of work to do to properly encode and decode the stream. He goes into incredible detail on his project page about this process and is worth a read for anyone interested in signal processing. Ultimately, [Alex] was able to patch this classic piece of technology into a Zoom call and the picture quality is excellent when viewed through the lens of $399 80s technology.

We have been seeing a lot of other hacks around video conferencing in the past six months as well, such as physical mute buttons and a mirror that improves eye contact through the webcam.

Schlieren On A Stick

Schlieren imaging is a technique for viewing the density of transparent fluids using a camera and some clever optical setups. Density of a fluid like air might change based on the composition of the air itself with various gasses, or it may vary as a result of a sound or pressure wave. It might sound like you would need a complicated and/or expensive setup in order to view such things, but with a few common things you can have your own Schlieren setup as [elad] demonstrates.

His setup relies on a cell phone, attached to a selfie stick, with a spherical mirror at the other end. The selfie stick makes adjusting the distance from the camera to the mirror easy, as a specific distance from the camera is required as a function of focal length. For cell phone cameras, it’s best to find this distance through experimentation using a small LED as the point source. Once it’s calibrated and working, a circular field of view is displayed on the phone which allows the viewer to see any change in density in front of the mirror.

The only downside of this build that [elad] notes is that the selfie stick isn’t stiff enough to prevent the image from shaking around a little bit, but all things considered this is an excellent project that shows a neat and useful trick in the photography/instrumentation world that could be useful for a lot of other projects. We’ve only seen Schlieren imaging once before and it used a slightly different method of viewing the changing densities.

Continue reading “Schlieren On A Stick”

This Week In Security: Bluetooth Hacking, NEC Phones, And Malicious Tor Nodes

One of the fun things about vulnerability research is that there are so many places for bugs to hide. Modern devices have multiple processors, bits of radio hardware, and millions of lines of code. When [Veronica Kovah] of Dark Mentor LLC decided to start vulnerability research on the Bluetooth Low Energy protocol, she opted to target the link layer itself, rather than the code stack running as part of the main OS. What’s interesting is that the link layer has to process data before any authentication is performed, so if a vulnerability is found here, it’s guaranteed to be pre-authentication. Also of interest, many different devices are likely to share the same BLE chipset, meaning these vulnerabilities will show up on many different devices. [Veronica] shares some great info on how to get started, as well as the details on the vulnerabilities she found, in the PDF whitepaper. (Just a quick note, this link isn’t to the raw PDF, but pulls up a GitHub PDF viewer.) There is also a video presentation of the findings, if that’s more your speed.

The first vuln we’ll look at is CVE-2019-15948, which affects a handful of Texas Instruments BT/BLE chips. The problem is in how BLE advertisement packets are handled. An advertisement packet should always contain a data length of at least six bytes, which is reserved for the sending device address. Part of the packet parsing process is to subtract six from the packet length and do a memcpy using that value as the length. A malicious packet can have a length of less than six, and the result is that the copy length integer underflows, becoming a large value, and overwriting the current stack. To actually turn this into an exploit, a pair of data packets are sent repeatedly, to put malicious code in the place where program execution will jump to.

The second vulnerability of note, CVE-2020-15531 targets a Silicon Labs BLE chip, and uses malformed extended advertisement packets to trigger a buffer overflow. Specifically, the sent message is longer than the specification says it should be. Rather than drop this malformed message, the chip’s firmware processes it, which triggers a buffer overflow. Going a step further, this chip has non-volatile firmware, and it’s possible to modify that firmware permanently. [Veronica] points out that even embedded chips like these should have some sort of secure boot implementation, to prevent these sort of persistent attacks.
Continue reading “This Week In Security: Bluetooth Hacking, NEC Phones, And Malicious Tor Nodes”