Hands On: The Hacker Pager

It should come as no surprise that the hacker community has embraced the Meshtastic project. It’s got a little bit of everything we hold dear: high quality open source software, fantastic documentation, a roll-your-own hardware ethos, and just a dash of counterculture. An off-grid communications network cobbled together from cheap parts, some of which being strategically hidden within the urban sprawl by rogue operators, certainly sounds like the sort of thing you’d read about it in a William Gibson novel.

But while the DIY nature of Meshtastic is one of its most endearing features for folks like us, it can also be seen as one of its weak spots. Right now, the guidance for those looking to get started is to pick a compatible microcontroller development board, 3D print a case for it, screw on an antenna from AliExpress, flash your creation with the latest firmware, and then spend some quality time with the documentation and configuration tools to actually get it on the air. No great challenge for the average Hackaday reader, but a big ask for the weekend adventurer that’s just looking for a way to keep in touch with their friends while camping.

Quality hardware that offers a turn-key experience will be critical to elevating Meshtastic from a hobbyist’s pastime to something that could actually be fielded for applications such as search and rescue. Plus, let’s be honest, even those of us who like to put together our own gadgets can appreciate a more consumer-oriented piece of hardware from time to time. Especially if that hardware happens to be open source and designed to empower the user rather than hold them back.

Enter the Hacker Pager from exploitee.rs. As the name implies, it’s still very much a device intended for hackers — a piece of hardware designed for the halls of DEF CON rather than trekking through the wilderness. But it’s also an important step towards a new generation of Meshtastic hardware that meets the high standard of quality set by the software itself.

Continue reading “Hands On: The Hacker Pager”

Legally Distinct Space Invaders Display WiFi Info

In the early 00s there was a tiny moment before the widespread adoption of mobile broadband, after the adoption of home WiFi, and yet before the widespread use of encryption. For this brief time a unique practice arose called wardriving — where people would drive around, document, and use these open wireless networks.

Although the pursuit has diminished with the rise of mobile broadband and WPA encryption, there are still a few use cases for the types of hardware a wardriver would have used. [arduinocelentano] recently built a Wi-Fi strength monitor in this style but with a unique theme.

Continue reading “Legally Distinct Space Invaders Display WiFi Info”

The DEW Line Remembered

The DEW line was one of three radar early warning systems of the time.

If you grew up in the middle of the Cold War, you probably remember hearing about the Distant Early Warning line between duck-and-cover drills. The United States and Canada built the DEW line radar stations throughout the Arctic to detect potential attacks from the other side of the globe.

MIT’s Lincoln Lab proposed the DEW Line in 1952, and the plan was ambitious. In order to spot bombers crossing over the Arctic circle in time, it required radar twice as powerful as the best radar of the day. It also needed communications systems that were 99 percent reliable, even in the face of terrestrial and solar weather.

In the end, there were 33 stations built from Alaska to Greenland in an astonishing 32 months. Keep in mind that these stations were located in a very inhospitable environment, where temperatures reached down to -60 °F (-51 °C). Operators kept the stations running 24/7 for 36 years, from 1957 to 1993.

System of Systems

The DEW line wasn’t the only radar early-warning system that the US and Canada had in place, only the most ambitious. The Pinetree Line was first activated in 1951. However, its simple radar was prone to jamming and couldn’t pick up things close to the ground. It was also too close to main cities along the border to offer them much protection. Even so, the 33 major stations, along with six smaller stations, did better than expected. Continue reading “The DEW Line Remembered”

Wireless Power Makes For Cable-Free Desk

Some people hate cables with a passion; others are agnostic and prefer cabled peripherals to having to stop and charge their mouse. [Matt] from DIYPerks has the best of both worlds with this wireless-powered, no-cable desk setup.

The secret is embedded within the plywood desk: an evaluation kit from Etherdyne Technologies, Inc consisting of a 100 W RF power supply and its associated power antenna looping around the desktop edge. The mechanism is similar to the inductive charging often seen on phones nowadays, but at higher frequency and larger scale, enabling power to be transmitted several feet (at least a meter) above the desktop.

The range is impressive (this isn’t the maximum), but the efficiency is not advertised.

The kit from ETI contained several PCB-coil receivers, which [Matt] built into a number of devices, including a lamp, heated cup, microphone, speakers, his mouse, keyboard, and even a custom base to run his monitor, which really shows the power these things can pull.

The microphone is a non-Bluetooth RF unit lovingly modified to studio quality, at least as far as we can tell on laptop speakers through YouTube’s compression. The speakers use a pair of Bluetooth modules to negotiate stereo sound while staying in sync. And before you ask “what about signal for the monitor?”– we have to inform you that was taken care of too, via a wireless HDMI dongle. Check it out in the video below.

Of course the elephant in the room here is power usage — there’s a 10 W base draw, and probably a big hit to efficiency vs cabled-everything– but we figure he gets partway to a pass on that by using a Frameworks mainboard instead desktop hardware. Indeed, a full analysis might show that the transmission efficiency of this system is no worse than the power to charge/discharge inefficiencies in a more conventional battery powered wireless setup.

While no wires is pretty clean, we’re not sure this beats the totally-hidden-in-the-desk PC [Matt] built last year in terms of minimalist aesthetic.  That Frameworks mainboard also likely lacks the power of his triple-screen luggable, but this was still an entertaining build.

Continue reading “Wireless Power Makes For Cable-Free Desk”

High-Stakes Fox Hunting: The FCC’s Radio Intelligence Division In World War II

With few exceptions, amateur radio is a notably sedentary pursuit. Yes, some hams will set up in a national or state park for a “Parks on the Air” activation, and particularly energetic operators may climb a mountain for “Summits on the Air,” but most hams spend a lot of time firmly planted in a comfortable chair, spinning the dials in search of distant signals or familiar callsigns to add to their logbook.

There’s another exception to the band-surfing tendencies of hams: fox hunting. Generally undertaken at a field day event, fox hunts pit hams against each other in a search for a small hidden transmitter, using directional antennas and portable receivers to zero in on often faint signals. It’s all in good fun, but fox hunts serve a more serious purpose: they train hams in the finer points of radio direction finding, a skill that can be used to track down everything from manmade noise sources to unlicensed operators. Or, as was done in the 1940s, to ferret out foreign agents using shortwave radio to transmit intelligence overseas.

That was the primary mission of the Radio Intelligence Division, a rapidly assembled organization tasked with protecting the United States by monitoring the airwaves and searching for spies. The RID proved to be remarkably effective during the war years, in part because it drew heavily from the amateur radio community to populate its many field stations, but also because it brought an engineering mindset to the problem of finding needles in a radio haystack.

Continue reading “High-Stakes Fox Hunting: The FCC’s Radio Intelligence Division In World War II”

Supercon 2024: How To Track Down Radio Transmissions

You turn the dial on your radio, and hear a powerful source of interference crackle in over the baseline noise. You’re interested as to where it might be coming from. You’re receiving it well, and the signal strength is strong, but is that because it’s close or just particularly powerful? What could it be? How would you even go about tracking it down?

When it comes to hunting down radio transmissions, Justin McAllister and Nick Foster have a great deal of experience in this regard. They came down to the 2024 Hackaday Superconference to show us how it’s done.

Continue reading “Supercon 2024: How To Track Down Radio Transmissions”

Intercepting And Decoding Bluetooth Low Energy Data For Victron Devices

[ChrisJ7903] has created two Ardiuno programs for reading Victron solar controller telemetry data advertised via BLE. If you’re interested in what it takes to use an ESP32 to sniff Bluetooth Low Energy (BLE) transmissions, this is a master class.

The code is split into two main programs. One program is for the Victron battery monitor and the other is for any Victron solar controller. The software will receive, dissect, decrypt, decode, and report the data periodically broadcast from the devices over BLE.

The BLE data is transmitted in Link-Layer Protocol Data Units (PDUs) which are colloquially called “packets”. In this particular case the BLE functionality for advertising, also known as broadcasting, is used which means the overhead of establishing connections can be avoided thereby saving power.

Continue reading “Intercepting And Decoding Bluetooth Low Energy Data For Victron Devices”