[Buttim] loses his car a lot, which might sound a little bit like the plot from an early-00s movie, but he assures us that it’s a common enough thing. In a big city, and after several days of not driving one’s car, it can be possible to at least forget where you parked. There are a lot of ways of solving this problem, but the solution almost fell right into his lap: repurposing a lock from a bike share bicycle. (The build is in three parts: Part 2 and Part 3.)
These locks are loaded with features, like GPS, a cellular modem, accelerometers, and in this case, an ARM processor. It took a huge amount of work for [Buttim] to get anything to work on the device, but after using a vulnerability to dump the firmware and load his own code on the device, spending an enormous amount of time trying to figure out where all the circuit traces went through layers of insulation intended to harden the lock from humidity, and building his own Python-based programmer for it, he has basically free reign over the device.
To that end, once he figured out how it all worked, he put it to use in his car. The device functions as a GPS tracker and reports its location over the cellular network so it can’t become lost again. As a bonus, he was able to use the accelerometers to alert him if his car was moving without him knowing, so it turned into a theft deterrent as well. Besides that, though, his ability to get into the device’s firmware reminded us of a recent attempt to get access to an ARM platform.
Progress and the proliferation of computers in automotive applications have almost made the shade tree mechanic a relic of the past. Few people brave the engine compartment of any car made after 1999 or so, and fewer still dive into the space behind the dashboard. More’s the pity, because someone may be trying to turn back the odometer with one of these nefarious controller area network (CAN bus) dongles.
Sold through the usual outlets and marketed as “CAN bus filters,” [Big Clive] got a hold of one removed from a 2015 Mercedes E-Class sedan, where a mechanic had found it installed between the instrument cluster and the OEM wiring harness. When the dongle was removed, the odometer instantly added 40,000 kilometers to its total, betraying someone’s dishonesty.
[Big Clive]’s subsequent teardown of the unit showed that remarkably little is needed to spoof a CAN bus odometer. The board has little more than an STM32F microcontroller, a pair of CAN bus transceiver chips, and some support circuitry like voltage regulators. Attached to a wiring harness that passes through most of the lines from the instrument cluster unmolested while picking off the CAN bus lines, the device can trick the dashboard display into showing whatever number it wants. The really interesting bit would be the code, into which [Clive] does not delve. That’s a pity, but as he points out, it’s likely the designers set the lock bit on the microcontroller to cover their tracks. There’s no honor among thieves.
We found this plunge into the dark recesses of the automotive world fascinating, and [Big Clive]’s tutelage top-notch as always. If you need to get up to speed on CAN bus basics, check out [Eric Evenchick]’s series on automotive network hacking.
Continue reading “Dashboard Dongle Teardown Reveals Hardware Needed To Bust Miles”
[Andrew Nohawk], has noticed a spike of car break-ins and thefts — even in broad daylight — in his native South Africa. The thieves have been using remote jammers. Commercial detectors are available but run into the hundreds of dollars. He decided to experiment with his own rig, whipping up a remote jamming ‘detector’ for less than the cost of a modest meal.
Operating on the principle that most remote locks work at 433MHz, [Nohawk] describes how criminals ‘jam’ the frequency by holding down the lock button on another device, hoping to distort or outright interrupt the car from receiving the signal to lock the doors. [Nohawk] picked up a cheap 433MHz receiver (bundled with a transceiver), tossed it on a breadboard with an LED connected to the data channel of the chip on a 5V circuit, and voila — whenever the chip detects activity on that frequency, the LED lights up. If you see sustained activity on the band, there’s a chance somebody nearby might be waiting for you to leave your vehicle unattended.
If you want to know more about how these jamming attacks work, check out [Samy Kamkar’s] talk from the Hackaday SuperConference.
Continue reading “Simple And Effective Car Lock Jammer Detector”
I heard a “Year in Review” program the other day on NPR with a BBC World Service panel discussion of what’s ahead for 2017. One prediction was that UAV delivery of packages would be commonplace this year, and as proof the commentator reported that Amazon had already had a successful test in the UK. But he expressed skepticism that it would ever be possible in the USA, where he said that “the first drone that goes over somebody’s property will be shot down and the goods will be taken.”
He seemed quite sincere about his comment, but we’ll give him the benefit of the doubt that he was only joking to make a point, not actually grotesquely ignorant about the limitations of firearms or being snarky about gun owners in the US. Either way, he brings up a good point: when autonomous parcel delivery is commonplace, who will make sure goods get to the intended recipient?
Continue reading “Autonomous Delivery: Your Impulse Buys Will Still Be Safe”
A new attack on automotive keyless entry systems is making headlines and we want to know how you think it’s being done. The Today Show reports that vehicles of different makes and models are being broken into using keyless entry on the passenger’s side of the car. It sounds like thieves steal items found inside rather than the vehicles themselves which makes these crimes distinctly different from the keyless ignition thefts of a year ago.
So how are they doing this? Here are the clues: The thieves have been filmed entering only the passenger side of the car. They hold a small device in their hand to unlock the doors and disable the alarm. And there is evidence that it doesn’t work on 100% of vehicles they try. Could it be some hidden manufacturer code reset? Has an encryption algorithm been hacked to sniff the keyfob identifier at a previous time? Or do you think we’re completely off track? Let us know your opinion by leaving a comment.
It’s very hard to tell from this photo because of the super bright blue LEDs, but this soda machine is being robbed by a robot.
We don’t condone theft, but neither does the creator of the project. [Ioduremetallique] is really just problem solving; doing something because he can. And we’d bet this type of thing will end up landing him a high-paying job some day (we’re assuming he’s currently in school).
The project is shown off in the video after the break. The gist of it is that a compact robot arm is put into the drop area of a vending machine. After the flap is closed the wired remote control is used to raise up the telescoping arm, and grip the soda can with the grippers. It’s brilliant and devious all at the same time. The entire video is in French, but the YouTube captions translator actually worked quite well with this video. To turn it one, use the ‘CC’ icon on the bottom of the video. We had to select the French captions before it would allow us to chose English from the translated captions list. About four minutes in we get a great look at the hardware itself… a super hack!
Continue reading “Robot Steals Soda From The Vending Machine”
Illegal, yet impressive
Want a soda? Just grab a robot, shove it in a vending machine, and grab yourself one. This video is incredibly French, but it looks like we’ve got a custom-built robot made out of old printers and other miscellaneous motors and gears here. It’s actually pretty impressive when you consider 16 ounce cans weigh a pound.
Okay, we got a lot of emails on our tip line for this one. It’s a group buy for a programmable oscillator over on Tindie. Why is this cool? Well, this chip (an SI570) is used in a lot of software defined radio designs. Also, it’s incredibly hard to come by if you’re not ordering thousands of these at a time. Here’s a datasheet, now show us some builds with this oscillator.
Chiptune/keygen music anywhere
[Huan] has a co-loco’d Raspi and wanted a media server that is available anywhere, on any device. What he came up with is a service that streams chiptune music from your favorite keygens. You can access it with Chrome (no, we’re not linking directly to a Raspberry Pi), and it’s extremely efficient – his RAM usage didn’t increase a bit.
Take it on an airplane. Or mail it.
[Alex]’s hackerspace just had a series of lightning talks, where people with 45-minute long presentations try to condense their talk into 10 minutes. Of course the hackerspace needed some way to keep everything on schedule. A simple countdown timer was too boring, so they went with a fake, Hollywood-style bomb. No, it doesn’t explode, but it still looks really, really fake. That’s a good thing.
Printers have speakers now?
[ddrboxman] thought his reprap needed a nice ‘print finished’ notification. After adding a piezo to his electronics board, he whipped up a firmware hack that plays those old Nokia ringtones. The ringtones play over Gcode, so it’s possible to have audible warnings and notifications. Now if it could only play Snake.