What has six legs, 25 LEDs, a Microchip CPU, can be sewn into clothing, and even plugged into a Raspberry Pi? The answer, it turns out, is the CodeBug–a low cost computer board aimed at the educational market. These board were crowdfunded and are now available for general purchase. [Mike Redrobe] took one of the boards, connected a few servos and used the CodeBug’s Scratch-like language to create a small robot.
You can see the robot in the video below. Programs download via USB (the board looks like a USB drive). You can also send commands over USB to operate in tether mode, or you can directly plug the board into a Raspberry Pi.
Continue reading “There’s a Bug in My Robot”
We live in a connected world where social media is ubiquitous and many people feel compelled to share every waking moment with anyone who will listen. In this type of world, wearable computers like Google Glass allow us to share experiences like never before. A Glass user can take photos, record video and audio, or potentially even stream video live on the Internet with the greatest of ease. That might be great for the Glass user, but what about the rest of us? As wearable computing becomes more and more mainstream, people are naturally going to become divided on the issue of privacy. Is it a good thing to have “cyborgs” with wearable computers and cameras constantly at the ready, or is it a privacy nightmare? The cyborg war is coming, and [Julian] has already chosen his side.
It would seem that [Julian] lands on the side of the privacy advocates, based on his “glasshole” script. Glasshole is a relatively simple bash script that relies on some other common network security tools to take care of the heavy lifting. The basic premise relies on the fact that every manufacturer of network interface devices is assigned their own MAC prefix. This is a piece of the MAC address that is unique to that manufacturer.
[Julian’s] script uses a utility called arp-scan to obtain a list of all MAC addresses on a given wireless network. It then loops through each address and compares it to the known Google Glass MAC prefix. If it finds a match, it will make an audible beeping noise to alert the script user. The script then launches aireplay-ng in de-authentication mode. This will send spoofed disassociate packets to the client (in this case the Google Glass device), hopefully forcing them to disconnect from the access point. The script runs continuously, ensuring that once the device reconnects to the network it will get booted off once again. The script is designed to be run on a small Linux computer such as a Raspberry Pi or a BeagleBone black. This way, the user can carry it around with them as a sort of portable defense mechanism.
How do you fit into the cyborg war? Will you stand proudly with your computer on your face for all to see? If so, what kind of countermeasures would you deploy to prevent this type of attack from working on you? If not, what other types of interesting attacks can you think of to keep the cyborgs at bay?
[Codeninja] has been sending us some great hacks over the years, and we’ve just learned that his attention has been on building wearable computers lately! He’s currently on his third iteration of a Google Glass-like prototype, which features a motorized element which allows for the retraction of the screen.
There’s not too much info on his blog about them, but we do know he’s using a Raspberry Pi, a few small servos, and a pico LCD screen. Most of the frame is 3D printed, and it also features a hidden camera, accelerometers, and a few environmental sensors.
He’s uploaded an animated gif of the mechanism that moves the display away from his eye, and it looks straight out of some science fiction movie — check it out after break!
Continue reading “Google Glass? How about this Home-brew Solution?”