Bus Pirate Firmware Update V0g

buspiratefirmwarev0g

Firmware v0g for all Bus Pirate revisions is now available. Updates in this release include a bootloader, frequency generator/pulse-width modulator, SPI bus sniffer, MIDI library, configuration reports, improved user interface, and bug fixes. v0g is also the first firmware to fully support the v2 hardware branch.

We’re really proud of this release as it brings a much more consistent structure to the internal operation of the Bus Pirate. It lays the foundation for future CAN, LIN, and OBDII libraries, and it supports localization and translations.  Install and upgrade instructions are included with the firmware. Report bugs on the project issue tracker.

We document the new features after the break.

Continue reading “Bus Pirate Firmware Update V0g”

High School Students Hacking Electronic Tests


[Alex Papadimoulis] wrote about ingenuity and hacking in high school. Immediately after the teacher’s installed a new electronic note taking and test giving software, the students began hacking. They managed to find several ways to ace their tests, none of which involved studying hard the night before. Ultimately, the teachers went back to the old system to prevent such shenanigans.

[photo: COCOEN]

Neo FreeRunner Software Review


A first look from Ars Technica at the newly released Neo FreeRunner phone by OpenMoko reveals some interesting information. There are three different software stacks available to use; the Neo FreeRunner will ship with the GTK-based stack, referred to as om2007.2. It offers conventional smartphone applications, but most importantly, it includes “full root access to a Busybox shell with all of the standard scripting tools like sed and awk”. The ASU stack is what OpenMoko developers are currently working on; there are promises of a more user-friendly experience. The FSO stack, also currently in development, aims to resolve the issues brought up by having different software stacks for the same phone. Since none of the stacks are considered “fully functional”, OpenMoko may have a difficult time attracting a mainstream audience. Hackers may be hampered by the lack of available documentation, although there are resources for OpenMoko enthusiasts, if you just search hard enough. The final conclusion? While OpenMoko may be difficult to use, it compares favorably to competitors such as Google’s Android platform, which is less flexible.

Investigating The Leopard Firewall


Our friend [Rich Mogull] has been flipping the switches on Leopard’s new firewall and scanning it to see what’s actually going on. There is some good and some bad. The new application signing is a mixed bag. It breaks Skype and a commenter pointed out that automatically trusting Apple installed apps like NetCat isn’t a good idea either. You can roll your own firewall using user friendly tools like WaterRoof since ipfw is still included.

USB Driver Hacking


[qDot] sent in his efforts to hack the oddest USB interface I’ve seen. The game is played by relaxing, so the controller senses biometrics. His notes on his adventure in hacking a driver are a bit entertaining, and definitely interesting if you’ve considered doing a little USB driver hacking of your own. If there’s enough interest, maybe he’ll post some more code to get things rolling.