Old Radio + Old Phone = Android Media Station

[Bjørn] combined some aging electronics he had around the house to create this Android media center. The enclosure is an FM-radio, but since he only listens to online media it wasn’t of much use to him. After sizing it up he realized it was a perfect candidate to receive his old HTC Hero Android phone.

The upper portion of the stock radio used to host controls for tuning the FM dial, adjusting volume, and switching the unit on and off. He cracked open the case, ditching the radio receiver and patching in to the amplifier. The volume knob was moved to the right side of the case, and a hole cut to receive the phone. Audio is pulled from the phone with the jack sticking out the left side. We’d love to see a future improvement using a right-angle jack (kind of like this charging hack) or patched directly into the phone’s circuit board. This way everything would fit inside the box.

Now he can listen to Internet radio, or stream some video like in the clip after the break.

Continue reading “Old Radio + Old Phone = Android Media Station”

Data Broacasting “Transparency Grenade” Ads Whimsy To Your Meetings

If you’re tired of underhanded deals going down behind closed doors maybe you need to start carrying around this transparency grenade. The enclosure is modeled after a Soviet-era F1 Hand Grenade. But it’s not filled with explosives and won’t send deadly shrapnel around the room. Instead, when the pin is pulled it starts recording audio and sniffing network packets, then broadcasts both to a remote server. Perhaps you could consider this to be data shrapnel sent around the world.

The exploded parts image above shows what hardware is at use. There’s a Gumstix board at the heart of the device which uses a WiFi module for sniffing and broadcasting data. The LED bar graph which you see in the fully assembled unit shows the wireless signal strength.

It sounds like the enclosure itself was 3D printed from Tusk2700T translucent resin but we’re a little confused by this part of the hardware description. We don’t have much of a need to transmit recordings of our meetings, but we’d love to use this case design for that MP3 enclosure.

[via Reddit]

WiFi Experiments With ATtiny Microcontrollers

[Quinn Dunki] got some free stuff from Element14 to evaluate, including this Mircrochip WiFi module. It’s been used as the centerpiece of an Arduino shield in the past, and she grabbed a copy of that library to see if it would play nicely with an ATtiny chip. What follows is a struggle to de-Arduino the code so that it’s portable for all AVR controllers.

This module is one of the least expensive ways to add WiFi to a project, coming in at around $23. But it’s not really an all-in-one solution as there’s still a huge software hurdle to cross. The hardware provides access to to radio functions needed to communicate with the network, but you need to supply the TCP/IP stack and everything that supports it. Hence the re-use of the Arduino library.

Battling adversity [Quinn] fought the good fight with this one. Switching from an ATtiny to the ATmega168, compiling more code, and troubleshooting the process. She used a single LED as feedback, and can get some connectivity with her hotspot. But to this point she hasn’t gotten everything up and running.

We’re hot for an AVR WiFi solution that is cheap and easy to use. But as we see here, the software is complex and perhaps best left up to beefier hardware like the ARM controllers. What do you think?

A Chink In The Armor Of WPA/WPA2 WiFi Security

Looks like your WiFi might not be quite as secure as you thought it was. A paper recently published by [Stefan Viehböck] details a security flaw in the supposedly robust WPA/WPA2 WiFi security protocol. It’s not actually that protocol which is the culprit, but an in-built feature called Wi-Fi Protected Setup. This is an additional security protocol that allows you to easily setup network devices like printers without the need to give them the WPA passphrase. [Stephan’s] proof-of-concept allows him to get the WPS pin in 4-10 hours using brute force. Once an attacker has that pin, they can immediately get the WPA passphrase with it. This works even if the passphrase is frequently changed.

Apparently, most WiFi access points not only offer WPS, but have it enabled by default. To further muck up the situation, some hardware settings dashboards offer a disable switch that doesn’t actually do anything!

It looks like [Stephan] wasn’t the only one working on this exploit. [Craig] wrote in to let us know he’s already released software to exploit the hole.

This Dongle Makes Any Screen An Android Device

Want that 70″ LCD television in your living room to be an Android device? This little guy can make it happen. With an HDMI port on one end, and a USB plug on the other for power, just plug in FXI Technologies’ Cotton Candy dongle to create a 1080p Android television.

The price isn’t set for the device, but it’s expected to be available at less than $200. Considering what’s inside that’s pretty reasonable. There’s a dual-core 1.2 GHz ARM processor, 1 gig of RAM, 64 gigs of storage, Bluetooth, WiFi, and a microSD card slot. Wow!

So is it hackable? Absolutely. Well, kind of? The company doesn’t intend to bring Cotton Candy to the retail market. Instead, they will sell the device to developers who may do what they wish. From there, said developers have the option to license the technology for their own products. This begs the question, will the development kit come in under $200? Hard to say.

Check out the video after the break to hear an interview with the company’s CEO. It certainly sounds fascinating, and like the Chumby NeTV, we can’t wait to see what comes of this. Continue reading “This Dongle Makes Any Screen An Android Device”

Using WebSocket With PIC Microcontrollers

[Blaise Jarrett] has been grinding away to get the WebSocket protocol to play nicely with PIC microcontrollers. Here he’s using the PIC 18F4620 along with a Roving Networks RN-XV WiFi module to get the device on the network. He had started with a smaller processor but ran into some RAM restrictions so keep that in mind when choosing your hardware.

This project was spawned after seeing the mBed feature a few days back which combined that board along with a WebSocket library and HTML5 to pull off some pretty amazing stuff. [Blaise] doesn’t have quite as much polish on the web client yet, but he has recreated the data transfer method and improved on that project by moving to the newer version 13 of WebSockets. The protocol is kind of a moving target as it is still in the process of standardization.

The backend is a server called AutoBahn which is written in python. It comes along with client-side web server examples which gave him a chance to get up and running quickly. From there he got down to work with the WebSocket communications. They’re a set of strings that look very much like HTML headers. He outlines each command and some of the hangups one might run into with implementation. After reading what it takes to get this going it seems less complicated than we thought, but it’s obvious why you’ll need a healthy chunk of RAM to pull it off.

Halloween Hacks: A Radioactive Display With More Trick Than Treat

Halloween Hacks Banner

radioactive_barrel_display

[Shawn] was looking for a way to shake up his decorations this Halloween and decided to build a new prop for his front yard. He had a pair of old oil barrels in his garage and thought they would look great with a little bit of work.

He bolted the pair of barrels together, then slapped a fresh coat of black paint on them before adding a bright yellow radiation trefoil to each one. One barrel contains a pneumatic piston that opens the lid, revealing a light up pumpkin, a fog machine, and a set of water nozzles that spray the area. The second drum houses an air compressor, a wireless router, and an IP camera for recording the action. A web-enabled Arduino triggers the lid and sprayer, both of which can be controlled from the comfort of his house.

We think it’s a creative use of some old scrap barrels, but we’re hoping he doesn’t plan on wetting trick-or-treaters that pass through, as it seems  like a good way to get your house egged or otherwise vandalized on Halloween. If the water sprayer were perhaps swapped out with some other cool effects, [Shawn] is far less likely to be the target of some angry, wet teenagers.

Be sure to check out the video below to see the display in action.

Continue reading “Halloween Hacks: A Radioactive Display With More Trick Than Treat”