This is Sony’s smart watch, which has been around for a while now. It’s designed for use with your Android phone, and has always included an SDK that allows app developers to interact with it. But now Sony is taking it one big step further. They’ve published everything you need to know to hack your own firmware for the SmartWatch.
The navigation scheme for that articles includes five menu items at the bottom which you’ll want to dig through. The most interesting to us was the one labeled “SmartWatch hacker guide”. It lays bare the hardware used in the watch and how it’s peripheral component connect to each other. This starts with the STM32 (ARM) microcontroller that drives the watch. It goes on to document how the screen is addressed (SPI1) including the pin to turn it on and off. The same goes for the Bluetooth, accelerometer, buzzer, and touch sensors.
Firmware is updated via USB using Device Firmware Upgrade (DFU) mode. We don’t don’t see any way to connect an on-chip debugger. We searched to see if there is a JTAG port on the circuit board and it sounds like getting the watch apart without breaking it is pretty tough.
Now that you don’t need to stick to what Sony had planned for the device, what do you want to do with your strapless wristwatch?
It looks like the security of the PlayStation 3 has been cracked wide open. But then again we’ve thought the same thing in the past and Sony managed to patch those exploits. The latest in the cat and mouse game is the release of the LV0 encryption codes for the PS3 console. The guys who discovered the magic strings of characters supposedly intended to keep them a secret, but have gone public after there was a leak and some black-hats now intend to use them for profit.
The keys are the bottom layer of security when pushing firmware updates to the PS3. With keys in hand, current and future upgrades can be unencrypted, altered, and repackaged without the gaming rig putting up a fuss. Our only real beef with the tight security came when Sony removed the ability to install Linux on systems marketed with this option. The availability of these keys should let you install just about whatever you want on your hardware.
[Thanks Kris via Phys]
We’d bet you didn’t know there was a Nyan Cat game for the original PlayStation. Well, there wasn’t one until very recently. This isn’t a title that has been licensed by Sony, and we bet you won’t spend hours playing such a thing. But the concept has let [Haunted] hone his development skills.
We’re not certain how he’s getting around the copy protection for PSX games, but we know there are a few different exploits out there. If you happen to have your own method playing homebrew games you can even download the bin/cue files to try this out for yourself.
After the break you can watch a demo clip of the game. It boots like normal until you hit a black screen with white text which displays a loading percentage. This is followed closely by the rainbow spewing feline pastry. The sound takes a minute to play but you can be sure it’s there. Currently there’s no scoring system but that’s in the works for a future revision.
Continue reading “Nyan Cat: the PlayStation game”
[Tynan] loves his Sony NEX-5 camera but he’s fed up with not being able to choose any external microphone when recording video. Recently he set out to remedy that, and managed to add an audio in jack without modify the camera itself.
The real trick here is to modify how a microphone accessory connects to the camera. In [Tynan’s] tutorial video (embedded after the break) he uses the enclosure from a flash module as a connector. After removing the electronics he’s left with plenty of room for the guts of a Sony microphone accessory. Those include the PCB and wiring, but not the microphone element itself. A 3.5mm audio jack is added to the flash case, and soldered to the microphone cable. Now he has a modular audio-in jack. The only problem is that his tinkering resulted in mono only. If you don’t mind spending a bit more time reverse engineering the scrapped microphone we bet you can parlay that into a true stereo option.
Continue reading “How to add audio in to the Sony NEX-5 line of DSLR cameras”
We need to find the kind of friends that [Dino] has. They seem to drop off all of their older, yet totally awesome, electronics with him once they’re through with the devices. One example of this is the Sony Handycam that came into his possession. He decided to crack it open and repurpose the 20x optical zoom lens for use with a webcam.
We always like [Dino’s] style. You can tell that he has no idea if he’s going to be able to pull off his goal, but at the same time he has an intuitive sense that he’ll make it happen. In the video after the break he starts off investigating what components are in the camera. At first the lens is passing no light at all, but he just strips down parts until he can see through it.
There are a couple of servo motors which control zoom and focus. He removes those before attaching the CCD from a Logitech webcam. At the end of his video he shows a demo of the functionality, which is pretty finicky when focusing by hand. But we think this hack would make a fantastic camera for soldering projects, it just needs a custom controller so the motors can be once again used to adjust focus.
Continue reading “A zoom lens for your webcam”
The proud cry of “I am root” rings true once again, this time on Sony Google TV devices. Although a low-level exploit was found on previous firmware versions, a downgrade process lets you run unsigned kernels on updated TV or Bluray models of the Internet streaming devices.
These systems are Android-based, which currently run version 3.1 Honeycomb. This version patches the previous exploit, but with three different USB sticks you can downgrade, exploit, and upgrade to an altered and unsigned hack of the most recent kernel. This gives you the root access you may have been longing for, but other than the features discussed in the forum thread there’s not a whole lot of changes rolled into the exploit yet.
We’re always looking out for open source projects running on living-room devices and hope that someday we’ll see a branch of XBMC for the GTV. Until then we’ll just have to keep our fingers crossed for the viability of a RaspberryPI XBMC.
[Michael Chen] felt the sound his PSP was putting out needed more dimension. Some would have grabbed themselves a nice set of headphones, but he grabbed his soldering iron instead and found some space where he could add a bigger speaker.
Mobile devices tend to cram as much into the small form factor as possible so we’re surprised he managed make room. But apparently if you cut away a bit from the inside of the case there is space beneath the memory card. [Michael] cautions that you need to choose a speaker rated for 8 ohms or greater in order to use it as a drop-in replacement for one of the two original speakers. But he also touches on a method to use both stock speakers as well as the new one. He suggests grabbing an LM386 op-amp and a capacitor and hooking them up. Yep, there’s room for that too if you mount it dead-bug-style. We wonder how the battery life will be affected by this hack?