Scotty from Strange Parts famously built a fully-functioning iPhone from replacement parts sourced in Chinese electronic wholesale markets. Now he's gone a step further, and upgraded one to have a headphone jack: "Is it possible? I'm headed to Shenzhen to find out!"
I’m pretty proud of the final implementation. I took apart an Apple lightning to headphone adapter, put that inside the phone, and hooked it up by man in the middling the lightning jack with a flexible PCB. The PCB has a switching chip that switches between connecting the headphone adapter to the phone by default, and then disconnecting it and connecting the lightning jack when something is plugged into it. I have a couple other timer chips that briefly disconnect everything from the phone when something is connected/disconnected to improve the reliability of the phone detecting when something is plugged/unplugged (otherwise it sometimes gets confused).
You won't be doing this work with the soldering iron grandpa left ya.
Joe Menn at Reuters reports that Facebook is pitching in an initial $500,000 in seed funding to launch a nonprofit that will work to protect American political parties, voting systems and information providers from malicious attacks by hackers and foreign nation-states.
For the third time in the past three years, hotel guests at 14 Trump properties including Washington, New York and Vancouver, had their personal credit card info exposed to hackers.
The WiFi232 is a traditional old-timey old-schooley Hayes-compatible 300-115200 baud modem, no wider than its own
parallel DB25 port.
Automatically responds with a customizable busy message when already in a call.
The killer app seems to be using it to get internet onto ancient retro portables like the TRS-80 Model 102, but it's been put through its paces on various 16-bit Commodores, Ataris and Apples too. Here's Blake Patterson:
The purpose of the device is to act as a bridge between your serial port and your local WiFi router. It has a 25-pin RS-232 data interface and a Mini-USB connector for power — it should work with any computer sporting a standard serial port.
The WiFi232 is configured by connecting to the device’s built-in web server and loading the configuration page or by issuing extended AT configuration commands. For example,
points the device to your WiFi hotspot. Once things are configured (it supports 300 to 115,200 baud), just load up your favorite terminal program, type:
and the WiFi232 “dials” into that telnet BBS. Your vintage computer thinks its talking on the phone.
It's $33 as a pile o' parts or $49 assembled, but there's a waiting list. Read the rest
Most tech-media takes on the iPhone's 10th anniversary are bland and self-congratulatory, but I like Tom Warren's at The Verge. He laments how Apple's pocket computer killed his inner nerd. As a youngster, he'd be constantly tearing down and building computers, even in the sweltering heat of summer. But now...
...All of that tinkering and hacking things ended for me shortly after the iPhone arrived ... When I look at modern PCs, tablets, and phones now I’m surprised at the simplicity of them. Not all of them are perfect, but technology is rapidly turning into something in the background that’s accessible to everyone and doesn’t require hours of configuration. I miss the thrill of hacking away and tinkering, but as I shout to Alexa to turn off my lights at night I can’t help but appreciate just how easy everything is now.
If anything I've had the opposite experience. I hate having to fiddle with technology because I have to if I want it to do something interesting, or simply to work in the first place. But now tinkering is all creation. Experimentation, hacking--all of it is freed from whatever technical needs I have.
Perhaps what people miss is the feeling that tinkering with tech will put them on the cutting edge of performance, will move them into the unequally-distributed future. But the same thing is now diversion, mere art, and that's not what they care about.
It's true, though, that the iPhone made gadgets boring. It's striking, when you look at the products released around that time and for years thereafter, just how astronomically ahead of the game Apple was in 2007. Read the rest
Putin got your tongue? President Donald Trump's history of remarks on U.S. election hacking makes his current silence on the France election cyberattacks very strange. Russia is suspected of being behind those recent hacking attacks, which appeared to be directed at helping the fascist, hardcore right-wing candidate Marine Le Pen win. Despite open support from Donald Trump and others aligned with the U.S. President, Le Pen lost to the more moderate candidate, Emmanuel Macron.
Before today's anticipated announcement by the Justice Department, more details are already leaking out about who they're after: “two Russian spies, and two criminal hackers.”
In his Lifehacker essay looking back on his five years of tinkering with the Raspberry Pi, Thorin Klosowski says one of the desirable features of the Pi is the fact that it's not easy to use right out of the box.
Read the rest
The joy I get from finding a solution to some dumb problem is one of the main things that drew me to the Raspberry Pi to begin with. Thankfully, Raspberry Pi projects have gotten easier over the years. Where it was once a complicated process to build an SD card, it’s now pretty much automatic. Still, the Raspberry Pi is far, far away from being as user friendly as a PC or Mac. That’s a feature, not a bug. The Raspberry Pi is built to force you to learn troubleshooting, and that’s still one of my favorite things about it.
Before hobbyists latched onto the Raspberry Pi, it was a computer for learning how to code targeted mainly at kids. Since then, the appeal has broadened, but it’s still impossible for a project to “just work” out of the box. You will have to tweak something, dig into the command line, or spend a few hours buried in an obscure internet forum to find solutions to problems that only you seem to be having. You will slam your head against the wall, yell a little, and throw your Raspberry Pi at least once for every project you attempt to make.
For every project you complete, for every bug you squash, and for every typo you correct, comes a small, glowing feeling inside your stomach that is well worth the trouble of it all.
'President' Donald Trump is expected to sign an executive order addressing cybersecurity today, Reuters reports in an item that cites "two sources familiar with the situation.” The EO is expected to be Trump's first action to address what he called a top priority of his administration during the Presidential campaign.
Federal Bureau of Investigations chief James B. Comey and Director of National Intelligence James Clapper today indicated the FBI and ODNI support a recent CIA assessment that Russia committed internet attacks targeted at America's elections, with the intent in part being to help Donald Trump win.
Huge New York Times investigation on Russia's role in the elections, and Trump's upset victory: "The Perfect Weapon: How Russian Cyberpower Invaded the US.” It's a riveting tic-tock narrative, and no doubt those in the intel/security biz will debate the contents.
Read the rest
An examination by The Times of the Russian operation — based on interviews with dozens of players targeted in the attack, intelligence officials who investigated it and Obama administration officials who deliberated over the best response — reveals a series of missed signals, slow responses and a continuing underestimation of the seriousness of the cyberattack.
The D.N.C.’s fumbling encounter with the F.B.I. meant the best chance to halt the Russian intrusion was lost. The failure to grasp the scope of the attacks undercut efforts to minimize their impact. And the White House’s reluctance to respond forcefully meant the Russians have not paid a heavy price for their actions, a decision that could prove critical in deterring future cyberattacks.
The low-key approach of the F.B.I. meant that Russian hackers could roam freely through the committee’s network for nearly seven months before top D.N.C. officials were alerted to the attack and hired cyberexperts to protect their systems. In the meantime, the hackers moved on to targets outside the D.N.C., including Mrs. Clinton’s campaign chairman, John D. Podesta, whose private email account was hacked months later.
Even Mr. Podesta, a savvy Washington insider who had written a 2014 report on cyberprivacy for President Obama, did not truly understand the gravity of the hacking.
Jess shows the host of Real Future what a vishing call is by taking over his mobile phone account in 30 seconds. It involves a recording of a crying baby. Read the rest
A China-based maker of surveillance cameras said Monday it will recall some products sold in the United States after a massive "Internet of Things" malware attack took down a major DNS provider in a massive DDOS attack. The stunningly broad attack brought much internet activity to a halt last Friday.
A former Booz Allen Hamilton contractor who worked with the National Security Agency will face charges of espionage in a case involving 50 terabytes or more of highly sensitive NSA data the government says were stolen.