Screenshot of the Insteon's new blog post, showing the Insteon logo in the header, the "A New Day for Insteon!" title, and some of the intro paragraph of the blog post

Insteon Gets Another Chance

It would appear that, sometimes, miracles happen. A few days ago, an update graced the website of Insteon, a company whose abrupt shuttering we covered in detail two months ago. An entity described as “small group of passionate Insteon users” has bought what was left of the company, and is working on getting the infrastructure back up. Previously, there was no sign of life from the company’s APIs. Now, Insteon hubs are coming back to life — or perhaps, they’re Inste-online again.

We’ve explained that revival of these devices without acquiring the company IP would’ve been tricky because of stuff like certificate pinning, and of course, a pile of proprietary code. Buying a company that’s undergoing a liquidation is not exactly end-user-friendly, but it would seem that someone sufficiently business-savvy got it done. The new CEO, as reported by [CNX Software], is a member of an investment committee — it’s fair to assert that this would help. A more sustainable funding source rather than ‘sell hardware and then somehow provide indefinite services’ is promised; they are moving to a subscription model, but only for Insteon Hub users. Recurring payments don’t sound as bad when it comes to paying developers and covering operational costs, and we hope that this revival succeeds.

Nothing is mentioned about moving towards openness in software and hardware — something that protects users from such failures in the first place. The new company is ultimately vulnerable to the same failure mode, and may leave the users in the dark just as abruptly as a result. However, we have our fingers crossed that the updated business model holds, purely for users’ sake. At least, unlike with the Wink hub, Insteon’s transition to a subscription model is better than the Inste-off alternative.

We thank [Itay] for sharing this with us! Via [CNX Software].

the dongle developed by Marcel, with a USB-A plug on one end and an SMD antenna on the other

Hackaday Prize 2022: House Ventilation Reverse-Engineered And Automated

[Marcel] thought – what if he had more control over his house ventilation system? You could add some nifty features, such as automatically ventilating your house in the mornings when everyone’s away, only creating noise when nobody’s around to hear it. Sadly, most ventilation systems are not automation-friendly at all – he was lucky, however, as his system came with a wireless remote. [Marcel] reverse-engineered this remote, created a USB dongle speaking the same protocol, and tied it into his Home Assistant setup!

The remote in question is Orcon R15, with an Atmel MCU talking to a CC1101 chip through SPI. He sniffed the SPI communications when pressing different buttons, figured out the protocol by comparing the recordings, and built a test setup with a spare Arduino and CC1101 module. It worked, and he set out to design a separate dongle, using an ATMega32U4. The dongle looks pretty neat, and fits a Hammond enclosure – what’s not to like?

Then he set out to develop the firmware, and didn’t disappoint on that front either. His code doesn’t just imitate the original remote perfectly in terms of control, it also has user-friendly pairing flow, keeps track of the system’s current state, and still lets the original remote be used in parallel. Eagle files for the PCB are available on the project page, with the code and a PDF schematic available in the GitHub repo. This entire journey is described in the Hackaday.io page, and we would recommend you check it out for all the insights it provides!

Ventilation systems don’t tend to be designed for automation, and it’s endearing to see hackers working on conquering this frontier. Last time we’ve seen a ventilation system hack, it had the additional challenge of being landlord-friendly, and we think the hacker nailed it!

Insteon Abruptly Shuts Down, Users Left Smart-Home-Less

In today’s “predictable things that happened before and definitely will happen again”, Insteon, a smart home company boasting the Insteon ecosystem of devices built around their proprietary communication standards, has shut down their servers without a warning. For almost two decades, Insteon used to offer products like smart light switches, dimmers, relays, various sensors, thermostats – the usual home automation offerings, all linked into a cozy system. Looking through the Insteon subreddit’s history, there were signs of the company’s decline for good half a year now, but things were mostly stable – until about a week ago, when users woke up and noticed that parts of their smart home network stopped working, the mobile app would no longer respond, and the company’s resources and infrastructure went down. What’s more – the C-rank management has scrubbed their LinkedIn profiles from mentioning Insteon and SmartLabs (Insteon’s parent company).

Screenshot of Insteon's 'service status' page, saying "All Services Online: There's currently no known issues affecting Insteon services"Instantly, the Insteon subreddit has livened up. People, rightfully angry about being literally left in the dark, were looking for answers – as if mocking them, Insteon’s homepage claimed that all services were operational. Others, having expected the shutdown to eventually happen, started collecting and rehosting rapidly disappearing documentation, helping each other keep their tech up in the meantime, and looking into alternative platforms. It turned out to be imperative that users don’t factory reset their Insteon hubs, since those have to communicate with the currently Inste-Gone servers as part of initial configuration, diligently verifying the SSL certificates. Sadly, quite a few users, unaware and going through the usual solutions to make their network function again, are now left with hubs that are essentially bricked, save for a few lucky ones.
Continue reading “Insteon Abruptly Shuts Down, Users Left Smart-Home-Less”

Reversible Ventilation Hack Keeps The Landlord Happy

When a person owns the home they live in, often the only approval they need for modifications is from their significant other or roommate. In the worst case, maybe a permit is required. But those who rent their dwellings are far more constrained in almost every case, and when it comes to environmental controls, they are most decidedly off limits. Unless you’re a resourceful hacker like [Nik], that is, who has seamlessly integrated his apartment’s ventilation system into his smart home controller — all without any permanent modifications!

The controller itself only gives three settings to vent the apartment: Low, Medium, High, and then High for 30 minutes, with all modes having to be actuated with a manual button press. [Nik] wanted automation and integration with his smart home.

A clean 3D printed enclosure wraps things nicely

Thankfully, the engineers who designed the controller used in [Nik]’s apartment made it very convenient to reverse engineer it. A flat ribbon cable conveniently breaks out all of the buttons and 12 VDC, and he can interface directly using its connector. First hack: done.

Next, [Nik] needed a longer cable to run between the controller and his ESP8266 based control module. Finding the connector on AliExpress was easy, but finding a compatible cable of length required some more resourcefulness. The cable was eventually sourced from the airbag controller of a Renault Megane! Second hack, using a car part in a controller: well done!

Integration into his smart home wasn’t just electronic. The module looks right at home above the original controller, and if you didn’t know better you’d never think it wasn’t original equipment. Final hack: Done!

Be sure to check out his build log over at Hackaday.io, and if home automation hacks are your cup of tea, check out this automatic tea maker.

Remote control PCB next to its shell, with a breadboarded analog switch connected to the remote's onboard microcontroller, soldered to the pins responsible for button reading

Reusing Proprietary Wireless Sockets Without Wireless Hacking

Bending various proprietary devices to our will is a hacker’s rite of passage. When it comes to proprietary wall sockets, we’d often reverse-engineer and emulate their protocol – but you can absolutely take a shortcut and, like [oaox], spoof the button presses on the original remote! Buttons on such remotes tend to be multiplexed and read as a key matrix (provided there’s more than four of them), so you can’t just pull one of the pads to ground and expect to not confuse the microcontroller inside the remote. While reading a key matrix, the controller will typically drive rows one-by-one and read column states, and a row or column driven externally will result in the code perceiving an entire group of keys as “pressed” – however, a digitally-driven “switch” doesn’t have this issue!

One way to achieve this would be to use a transistor, but [oaox] played it safe and went for a 4066 analog multiplexer, which has a higher chance of working with any remote no matter the button configuration, for instance, even when the buttons are wired as part of a resistor network. As a bonus, the remote will still work, and you will still be able to use its buttons for the original purpose – as long as you keep your wiring job neat! When compared to reverse-engineering the protocol and using a wireless transmitter, this also has the benefit of being able to consistently work with even non-realtime devices like Raspberry Pi, and other devices that run an OS and aren’t able to guarantee consistent operation when driving a cheap GPIO-operated RF transmitter.

In the past, we’ve seen people trying to tackle this exact issue, resorting to RF protocol hacking in the end. We’ve talked about analog multiplexers and switches in the past, if you’d like figure out more ways to apply them to solve your hacking problems! Taking projects like these as your starting point, it’s not too far until you’re able to replace the drift-y joysticks on your Nintendo Switch with touchpads!

ESP32 Brings Air Purifier Online With Home Assistant

A lot of hackers are rightfully concerned about the privacy issues that surround many of today’s “smart” gadgets, but it’s hard to argue that the ability to remotely control devices around your home isn’t convenient. Enter self-hosted, open source projects like Home Assistant. This provides the framework for building out a home automation system without having your soul information sold, but as you might expect, you’re going to have to put some effort in to get the most of it.

For example, take a look at this Phillips AC4014 air purifier that [Anton] connected to Home Assistant by way of an ESP32. Rather than getting too bogged down in reverse engineering the purifier’s surprisingly complex internal electronics, he took the easy way out and wired a couple of relays across the power and fan speed buttons; this allows the device to be easily controlled by the microcontroller, without impacting the functionality of the original controls.

But since those front panel controls still work, that meant [Anton] needed a way for the ESP32 to detect the device’s status and report that to Home Assistant so everything stayed in sync. So he looked around on the PCB for a trace that got powered up when the air purifier was up and running, which he connected to a pin of the microcontroller through a transistor. This let’s the firmware determine if the machine is running or not just by checking if the appropriate pin has gone high.

Speaking of the firmware, [Anton] decided to use ESPHome rather than trying to write his own code from scratch. This project allows you to rapidly add new devices to Home Assistant by providing the firmware with a relatively simple YAML configuration file, which he’s provided as an example. In fact, he’s provided quite a lot of examples with this project, down to an annotated image of the PCB that shows where to tap your wires into. He’s done quite a service for anyone who’s got this same model of air purifier.

This unit doesn’t appear to have any capability of actually checking the quality of the air in the room, but we’ve recently seen a low-cost IKEA product that can do exactly that. Even better, it can be easily modified to report its findings over the network using the ESP8266.

Samsung tablet with custom side loaded hack software

Smart Home Hack Breaks Down Walls Figuratively And Literally

Are you ready for a tale of poorly supported hardware, clueless contractors, and bad coding? Look no further than [Neighborino]’s excellent write-up where he details his pursuit of smart home pwnership.

[Neighborino]’s smart home system controls the windows, blinds, outlets, and HVAC. But by the time the high-rise apartment was ready for occupancy in 2015, the smart home controllers were already showing their age. You see, the contractor had installed an app to run the home’s programmable logic controllers (PLCs) on stock Galaxy Tab 3 hardware. Yes, that’s a tablet originally released in 2013. They then built the tablets into the wall of each apartment, dooming the homeowner to rely on the vendor forevermore.

It was not long before [Neighborino] and their fellow residents were dealing with stability problems. Bloatware from both Samsung and Google was causing major slowdowns, and the PLC system’s unpublished WiFi password prevented replacement of the controllers.

Being an Android developer by trade, [Neighborino] set siege to the walled garden before him. The writeup details the quest to execute what would be a straightforward hack on anything but the x86 hardware that was being targeted.

de-bloating app strips all non-essential software.
A debloating app strips all non-essential software.

The first fruit of [Neighborino]’s efforts was a hack for the aged tablets that would display the WiFi password, allowing owners to connect their own controllers to their smart homes. Of course, this is Hackaday, so you know that [Neighborino] didn’t stop there.

Despite having to deal with two different versions of Android and tablets that were built into the wall of the apartments of non-hacker neighbors, [Neighborino] succeeded in sideloading an APK. This freed them from the shackles of the company that installed the original system and gets longer life out of their Snowden-era Samsungs. A de-bloating tool frees up memory and restores the systems to a nearly performant status. A reboot scheduler keeps the x86 tablets running without user intervention, and of course the WiFi password revealer makes yard waste out of the previously walled garden.

If Smart Home hacks are your thing, we recently covered a Voice Controlled Smart Home setup, and less recently another that combined a Smart Home with a Dumb Terminal. Be sure to share your own smart home hacks with us via the Tip Line!