×
Networking

New FCC Rules Could Ban WiFi Router Firmware Modification 242

An anonymous reader writes: Hackaday reports that the FCC is introducing new rules which ban firmware modifications for the radio systems in WiFi routers and other wireless devices operating in the 5 GHz range. The vast majority of routers are manufactured as System on Chip devices, with the radio module and CPU integrated in a single package. The new rules have the potential to effectively ban the installation of proven Open Source firmware on any WiFi router.

ThinkPenguin, the EFF, FSF, Software Freedom Law Center, Software Freedom Conservancy, OpenWRT, LibreCMC, Qualcomm, and others have created the SaveWiFi campaign, providing instructions on how to submit a formal complaint to the FCC regarding this proposed rule. The comment period is closing on September 8, 2015. Leave a comment for the FCC.
Hardware Hacking

'Gynepunks' DIY Gynecology For Underserved Women 59

New submitter Alien7 sends an article about a group of bio-hackers who are out to bring DIY gynecological medicine to women who don't have easy access to it. Under the name GynePunks, they're assembling an arsenal of open-source tools for DIY diagnosis and first-aid care—centrifuges made from old hard drive motors; microscopes from deconstructed webcams; homemade incubators; and 3D printable speculums. ... So far the work is largely focused on diagnosis, and members of the collective are quick to note that what they’re creating is far from a comprehensive solution. It’s limited by some obvious factors—access to materials, a place to put them together, and the time to do it. But where the infrastructure does exist, and people are motivated to do so, it is very possible to establish some useful alternatives for self-care. As an example, Klau pointed to a pilot vinegar test program that’s lowered cervical cancer deaths by some 31 percent among poor women in Mumbai’s slums.
Hardware Hacking

You Can Have My TIPs When You Pry Them From My Cold, Dead Hands 170

szczys writes: Should you trash brand new parts developed decades ago and adopt newer models? The argument centers around TIP parts which are a standard type of transistor developed in 1969. This debate started out with a post from Tom Jennings who is known as the creator of Fidonet but works a lot with electronic hardware. Adam Fabio — himself an Electronics Engineer — picked up on the argument for the other side. He attests that if used in the proper application these parts are second to none.
Transportation

Latest Samy Kamkar Hack Unlocks Most Cars 97

msm1267 writes: Samy Kamkar has built a new device called Rolljam that is about the size of a wallet and can intercept the codes used to unlock most cars and many garage doors. The device can be hidden underneath a vehicle and when the owner approaches and hits the unlock button on her key or remote, the device grabs the unique code sent by the remote and stores it for later use. The device takes advantage of an issue with the way that vehicles that use rolling codes for unlocking produce and receive those codes. Kamkar said that the device works on most vehicles and garage doors that use rolling, rather than fixed codes.
Hardware Hacking

Leading the Computer Revolution In a Totalitarian State 75

szczys writes: How do you enter the information age when computers, and the components that go into them, are embargoed by other countries and imports of any value are restricted by your own? This and a myriad of other barriers didn't stop Voja Antonic from building his own computers and teaching others how to do so during the 70s, 80s, 90s, and beyond.

He managed to get a TRS-80 into Yugoslavia by having a friend cut the cables between the two boards and send them separately to avoid getting caught in customs. He bootstrapped his own personal computer and published the plans in the country's first computer magazine. It was built by over 8000 people. Check out these stories and his experience of living in the Eastern Bloc and through the war in '90s, all while continuing to build and promote computers in what is now Serbia.
Transportation

Hacker's Device Can Intercept OnStar's Mobile App and Unlock, Start GM Cars 54

Lucas123 writes: Security researcher Samy Kamkar posted a video today demonstrating a device he created that he calls OwnStar that can intercept communications between GM's RemoteLink mobile app and the OnStar cloud service in order to unlock and start an OnStar equipped car. Kamkar said that after a user opens the OnStar Remote Link app on his or her mobile phone "near the OwnStar device," OwnStar intercepts the communication and sends "data packets to the mobile device to acquire additional credentials. The OwnStar device then notifies the attacker about the new vehicle that the hacker has access to for an indefinite period of time, including its location, make and model. And at that point, the hacker can use the Remote Link app to control the vehicle. Kamkar said GM is aware of the security hole and is working on a fix.
Security

Hacking a 'Smart' Sniper Rifle 73

An anonymous reader writes: It was inevitable: as soon as we heard about computer-aimed rifles, we knew somebody would find a way to compromise their security. At the upcoming Black Hat security conference, researchers Runa Sandvik and Michael Auger will present their techniques for doing just that. "Their tricks can change variables in the scope's calculations that make the rifle inexplicably miss its target, permanently disable the scope's computer, or even prevent the gun from firing." In one demonstration they were able to tweak the rifle's ballistic calculations by making it think a piece of ammunition weighed 72 lbs instead of 0.4 ounces. After changing this value, the gun tried to automatically adjust for the weight, and shot significantly to the left. Fortunately, they couldn't find a way to make the gun fire without physically pulling the trigger.
Security

Hacker Set To Demonstrate 60 Second Brinks Safe Hack At DEFCON 147

darthcamaro writes: Ok so we know that Chrysler cars will be hacked at Black Hat, Android will be hacked at DEFCON with Stagefright, and now word has come out that a pair of security researchers plan on bringing a Brinks safe onstage at DEFCON to demonstrate how it can be digitally hacked. No this isn't some kind of lockpick, but rather a digital hack, abusing the safe's exposed USB port. And oh yeah, it doesn't hurt that the new safe is running Windows XP either.
Hardware Hacking

Video You3dit is Working to Help Crowdsource 3D Design and Printing (Video) 12

The example you3dit (You 3D It) person Chris McCoy uses in this video is a prosthetic hand they wanted to make because one of their people lost fingers in a construction accident. Instead of drawing up plans for a new hand, they searched online -- and found enablingthefuture.org, which is all about making 3-D printed prosthetic hands. Using a predesigned hand was obviously much simpler than starting from scratch, and was totally in line with the Open Source "Why reinvent the wheel?" philosophy.

So you3dit helps make 3-D printed items of one sort or another, and can either print them for you at their place or help you find someone local to help with the printing, assuming you can't do it yourself. As you might expect, they did a Kickstarter project. It was for a product called Raver Rings. Unlike many Kickstarter projects we mention on Slashdot, this one didn't fly. In fact, it only got $2,275 in pledges against a $10,000 goal. No matter. There are many other useful things the you3dit community can make -- or help you make -- without Kickstarter.
Upgrades

"Ludicrous Speed" For Tesla's Model S Means 0-60 MPH In 2.8 Seconds 171

Automobile Magazine, writes reader Eloking, reports that the highest-end of the Tesla line has just gotten a boost upward, thanks to a new "Ludicrous Speed" mode: In combination with a newly optional 90-kWh battery pack, this new mode brings 0-60 mph acceleration down to 2.8 seconds (from a quoted 3.2 seconds for the P85D model). This larger battery pack is offered as an upgrade from the existing 85-kWh model, creating new 90, 90D, and P90D models. It doesn't come cheap, though: this isn't just a firmware update to download. For P90D owners, the upgrade costs $10,000 (including the larger battery); P85Ds can be upgraded for half that price.
Privacy

ProxyGambit Replaces Defunct ProxyHam 26

msm1267 writes: Hardware hacker Samy Kamkar has picked up where anonymity device ProxyHam left off. After a DEF CON talk on ProxyHam was mysteriously called off, Kamkar went to work on developing ProxyGambit, a similar device that allows a user to access the Internet without revealing their physical location.

A description on Kamkar's site says ProxyGambit fractures traffic from the Internet through long distance radio links or reverse-tunneled GSM bridges that connect and exit the Internet through wireless networks far from the user's physical location. ProxyHam did not put as much distance between the user and device as ProxyGambit, and routed its signal over Wi-Fi and radio connections. Kamkar said his approach makes it several times more difficult to determine where the original traffic is coming from.
Hardware Hacking

Video Keyboardio is a Hackable 'Artisanal Keyboard' That's Already Kickstarted (Video) 46

I bumped into Jesse Vincent and his keyboard project called Keyboardio at last year's Solid conference. Then, it was a developing project with a lot of literally rough edges, but since I'm a bit of a keyboard enthusiast, it grabbed my attention. In the time since, his plan to bring a truly hackable keyboard to the world has gained momentum, and the dozens of layouts and material combinations that he and partner in design Kaia Dekker have considered have been boiled down into one nearly-ready final version. The result is a compact split keyboard housed in an "heirloom quality" wooden case. It has some features you might consider overwrought -- like an RGB LED beneath each key, a precision mouse feature via WASD keys, and the ability, theoretically, to put more than a dozen feet between each half of the board. But if you're designing a keyboard from scratch, why not?

Vincent and Dekker put their project onto Kickstarter, then spent weeks on a road trip showing it at hacker and maker spaces around the U.S.; the project updates make a nice travelogue about just how widespread and varied is the world of DIY culture. I caught up with him in Colorado Springs, Colorado, on the road between some of those demo gigs, to talk about the long path from idea to (hopefully) shipping a product to backers. By the time we had this conversation, the project was well past fully funded, andI was impressed enough to order one myself; hopefully, the clicky keys will be worth the cost of a middlin' Chromebook, though Vincent admits they're not going to fool anyone looking for a buckling spring action. On the other hand, at least at the Kickstarter price, it beats some of the Maltron keyboards I've been eyeing for years. Plus, it comes with a screwdriver.
Hardware Hacking

Ask Slashdot: What Is Your Most Unusual Hardware Hack? 210

An anonymous reader writes: Another Slashdotter recently asked what kind of things someone can power with an external USB battery. I have a followup along those lines: what kind of modifications have you made to your gadgets to do things that they were never meant to do? Consider old routers, cell phones, monitors, etc. that have absolutely no use or value anymore in their intended form. What can you do with them? Have you ever done something stupid and damaged your electronics?
Hardware Hacking

Celebrating Workarounds, Kludges, and Hacks 145

itwbennett writes: We all have some favorite workarounds that right a perceived wrong (like getting around the Wall Street Journal paywall) or make something work the way we think it ought to. From turning off annoying features in your Prius to getting around sanctions in Crimea and convincing your Android phone you're somewhere you're not, workarounds are a point of pride, showing off our ingenuity and resourcefulness. And sometimes artful workarounds can even keep businesses operating in times of crisis. Take, for example, the Sony employees, who, in the wake of the Great Hack of 2014 when the company's servers went down, dug out old company BlackBerrys that, while they had been abandoned, had never had their plans deactivated. Because BlackBerrys used RIM's email servers instead of Sony's, they could still communicate with one another, and employees with BlackBerrys became the company's lifeline as it slowly put itself back together. What hacks and workarounds keep your life sane?
Handhelds

UW Researchers Prototype Sonar-Based Contactless Sleep Monitoring 40

n01 writes: Researchers of the University of Washington are testing the prototype of their ApneaApp to diagnose sleep apnea, a health problem that can become life-threatening. To monitor a person's sleep, the app transforms the user's smartphone into an active sonar system that tracks tiny changes in a person's movements. The phone's speaker sends out inaudible sound waves, which bounce off a sleeping person's body and are picked back up by the phone's microphone. "It's similar to the way bats navigate," said Rajalakshmi Nandakumar, lead author and a doctoral candidate in the UW's department of computer science and engineering. "They send out sound signals that hit a target, and when those signals bounce back they know something is there." In technical terms, the app continuously analyzes changes in the acoustic room-transfer-function (sampled at ultrasonic frequencies) to detect motion. This is very similar to what the iPhone app Sleep Cycle Sonalarm Clock does, except that the UW researchers have improved the sensitivity of the method so it can precisely track the person's breathing movements which allows it to not only detect different sleep phases but also sleep apnea events. The advantage in both use cases is that the sleep monitoring is contact-less (there's nothing in the user's bed that could disturb their sleep) and doesn't require any additional hardware besides the user's smart phone.
Hardware Hacking

Pi Stays Sky High In 2015 Hacker SBC Survey 32

DeviceGuru writes: The results from the 2015 Hacker SBC Survey cohosted by LinuxGizmos.com and the Linux Foundation's Linux.com community site have just been announced and, not surprisingly, RPi won two of the top three slots. With 1721 voting in the survey, the ten most popular single board computers turned out to be the Raspberry Pi 2 Model B, Beaglebone Black, Raspberry Pi Model B+, Odroid-C1, DragonBoard 410c, Odroid-XU3, Parallella, Arduino TRE, Edison Kit for Arduino, and Odroid-U3. The report includes scores for all 53 SBCs that were listed in the susrvey, along with data on feature preferences, targeted applications, and the nature of participants' use of [SBCs], and more.
Hardware Hacking

Ask Slashdot: If You Were Building a New Home, What Cool New Tech Would You Put In? 557

An anonymous reader writes: I am starting the process of building a new home, and I would like to make the house as wired (or wireless) as possible. At this stage I can incorporate new tech in the design. What features do you have in your house that you just couldn't live without? What features are nice to have? What features do you want? In-home Fiber? Solar? Audio/Visual? Heating/Cooling?
Hardware Hacking

Ask Slashdot: Your Most Unusual Hardware Hack? 258

An anonymous reader writes: Another Slashdotter recently asked what kind of things someone can power with an external USB battery. I have a followup along those lines: what kind of modifications have you made to your gadgets to do things that they were never meant to do? Consider old routers, cell phones, monitors, etc. that have absolutely no use or value anymore in their intended form. What can you do with them?
Classic Games (Games)

1-Pixel Pac-Man 41

szczys writes: Retro games just aren't the same since the display technology resolution has exploded. I went the opposite direction and chose a display with less resolution than the original. This reinvention of Pac-Man uses a 32x32 RGB LED module which are made for LED billboards. This makes the player just one pixel. Add in an Atari joystick and we have a winner.This is a great programming challenge. If you've never looked at Pac-Man AI before, it's fascinating and worth your time!
Hardware Hacking

Video More About Dan Shapiro and the Glowforge CNC Laser Cutter (Video #2) 25

Yesterday Glowforge Co-Founder and CEO Dan Shapiro told us that the Glowforge machine is a CNC laser cutter and engraver, not a 3-D Printer -- even though the first words on Glowforge's main page are, "The First 3D Laser Printer," a description Dan says is there for people not familiar with things like laser cutters and 3-D printers, who want to call the Glowforge a 3-D printer even though people who know about this stuff know what it is at first glance. He also talks about his previous startup, Robot Turtles; what it is, how it came to be, and why kids like it so much. This interview is worth watching (or reading) for the Robot Turtles section alone, especially if you have children or are thinking about designing board games for kids.

Slashdot Top Deals