HandHolo: A Homebrew ARG

Taking a dive into VR or augmented reality — once, dreamed-of science fiction — is not only possible for the average consumer, but crafting those experiences is as well! Hackaday.io user [kvtoet]’s HandHolo is a homebrew method to cut your teeth on peeking into a virtual world.

This project requires a smartphone running Android Oreo as its backbone, a Bluetooth mouse, a piece of cardboard and a small mirror or highly reflective surface. The phone is slotted into the cardboard housing — prototype with what you have! — above the mouse, and the mirror angled opposite the screen reflects the …read more http://pje.fyi/QDf3Gb

Paul Jacob Evans

Advertisements

Cell Phone Surveillance Car

There are many viable options for home security systems, but where is the fun in watching a static camera feed from inside your place? The freedom to really look around might have been what compelled [Varun Kumar] to build a security car robot to drive around his place and make sure all is in order.

Aimed at cost-effectiveness and WiFi or internet accessibility, an Android smartphone provides the foundation of this build — skipping the need for a separate Bluetooth or WiFi module — and backed up by an Arduino Uno, an L298 motor controller, and two geared DC motors …read more http://pje.fyi/QDMzt8

Paul Jacob Evans

Retrotechtacular: Olivetti Net3

If you sign up for a European hacker camp such as CCC Camp in Germany or SHA Camp in the Netherlands, you’ll see among the items recommended to take with you, a DECT handset. DECT, or Digital Enhanced Cordless Telecommunications, refers to the set of standards that lie behind the digital cordless telephones that are ubiquitous across Europe and some countries elsewhere in the world. These standards cover more than just the simple two-way telephone calls through a base station that most Europeans use them for though, they define a fully functional multi-cell 3G phone and data networking system. This …read more http://pje.fyi/Pgsp5v

Paul Jacob Evans

Automatic Phone Dialer Illuminates Inner Workings

The invention of the transistor ushered in a lot of technologies that we now take for granted, and one of the less-thought-about areas that it improved living conditions worldwide was by making the touch-tone phone possible. No longer would the world have to fuss with dials to make phone calls, they could simply push some buttons. This technology is still in use today, and it is possible to build external phone dialers that use these tones to make phone calls, as [SunFounder] demonstrates with his latest project.

The tones that a phone makes when a button is pressed correlate with …read more http://pje.fyi/PYmGhw

Paul Jacob Evans

Detecting Mobile Phone Transmissions With a Sound Card

Anyone who had a cheap set of computer speakers in the early 2000s has heard it – the rhythmic dit-da-dit-dit of a GSM phone pinging a cell tower once an hour or so. [153armstrong] has a write up on how to capture this on your computer. 

It’s incredibly simple to do – simply plug in a set of headphone to the sound card’s microphone jack, leave a mobile phone nearby, hit record, and wait. The headphone wire acts as an antenna, and when the phone transmits, it induces a current in the wire, which is picked up by the soundcard. …read more http://pje.fyi/PPPV4W

Paul Jacob Evans

Fix-A-Brick 2: Nexus 5X Rises From the Ashes

It was but two weeks ago when I told my story of woe —  the tale of an LG Nexus 5X that fell ill, seemingly due to a manufacturing fault at birth. I managed to disassemble it and made my way through a semi-successful attempt at repair, relying on a freezer and hairdryer to coax it back to life long enough to backup my data. Try as I might, however, I simply couldn’t get the phone running for more than ten minutes at a time.

All was not in vain, however! I was rewarded for documenting my struggles with the …read more http://pje.fyi/Nv0Wfs

Paul Jacob Evans

This WAV File Can Confuse Your Fitbit

As the devices with which we surround ourselves become ever more connected to the rest of the world, a lot more thought is being given to their security with respect to the internet. It’s important to remember though that this is not the only possible attack vector through which they could be compromised. All devices that incorporate sensors or indicators have the potential to be exploited in some way, whether that is as simple as sniffing the data stream expressed through a flashing LED, or a more complex attack.

Researchers at the University of Michigan and the University of South …read more http://pje.fyi/Nfk3lt

Paul Jacob Evans