The White House unveils National Day of Civic Hacking

The White House has announced that this summer it will launch the National Day of Civic Hacking, a nationwide event where individuals can stretch their creative fingers using publicly released data to create “solutions for problems that affect Americans.” The event will take place on June 1 and 2, and will be a collaborative effort amongst anyone who wants to participate.

720px-US-WhiteHouse-Logo

The event is a collective effort between government agencies and companies/organization, which will host various challenges for the participants to undertake. According to the announcement, National Day of Civic Hacking is a take-off of Super Happy Block Party by Innovation Endeavors, and is happening in conjunction with Code for America’s Brigade and Random Hacks of Kindness.

The event is said to take place both online and in person, depending on the event the participants take part in. It is open to anyone, no hacking skills necessary, and will target challenges that range from a local neighborhood to the nation as a whole. Some of the agencies that will be announcing challenges include NASA and the Department of Labor.

Several cities already have events planned, with the list sure to grow over the coming months leading up to the event. Locations that are already set to participate include Seattle, Denver, Detroit, Boston, New York City, San Francisco, Philadelphia, and San Diego, among others. Participants can also plan their own event.

Says the event’s website, “The event will leverage the expertise and entrepreneurial spirit of those outside federal, state and local government to drive meaningful, technology-based solutions for federal, state and local government. It demonstrates what’s possible when we all work together to strengthen our society and our lives.”

Those interested in participating can get more info at the event’s official website, HackforChange.org.

[via White House]


The White House unveils National Day of Civic Hacking is written by Brittany Hillen & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

Forget mobile payments, real-life Mario Kart is the best use ever for RFID

Nintendo’s Reggie Fils-Aime may have straddled a full-sized Mario Kart replica for publicity, but Waterloo Labs‘ DIY version goes several steps better with actual gameplay dragged out from the console to the race track. Taking four regular go-karts, and then strapping on RFID readers, pneumatic launchers, and various servo-controls of the steering and throttle, the real-life drivers can boost their performance by grabbing RFID-tagged boosters hanging over the course, and sabotage rivals by shooting at them.

diy_mario_kart

Just as in the classic SNES racing game, different items around the track have different effects on the go-cart. Get a mushroom, for instance, and the speed of the Mario Kart is boosted for five seconds, having been artificially limited to 75-percent of full throttle.

mario-kart-schematics

However, the RFID-tagged plastic bananas cause the pneumatics to automatically lock up one side of the steering for three seconds, causing the go-cart to swerve uncontrollably. Since all of the carts are hooked up wirelessly, some items can apply a penalty to all the other drivers when collected, for instance automatically slamming on their brakes.

diy_mario_items

A 120psi cannon on the side of each of the carts can be used to blast other drivers, again causing their brakes to lock or their steering to go wonky. Unfortunately, the Mario Kart race track Waterloo Labs set up was only temporary, but the team has released the source code in case you have the space and inclination to build your own.

[via MAKE]


Forget mobile payments, real-life Mario Kart is the best use ever for RFID is written by Chris Davies & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

iPhone Hack Lets You Start Your Car By Sending An SMS

 iPhone Hack Lets You Start Your Car By Sending An SMS

Living in New Jersey, I can tell you we experience every season to the extreme as our winters are freezing and our summers are red-hot. So no matter what time of year it is, if it isn’t spring or fall, then I won’t ever want to leave my apartment. But when I do, the lower the amount of time I’m actually outside of my home, the better it’ll be for myself and the crazy people who actually talk me into going outside. If I was technologically advanced, I could probably set up a jailbroken iPhone to start my car for me without needing to spend my money on a remote ignition, just like this genius did in the following story.

The SMS Remote Starter is a hack Will O’Brien came up with that uses your iPhone, which is hopefully an old model as we can’t imagine having your current iPhone sitting in your car all the time. With a combination of a jailbroken iPhone, an Arduino, an iPhone breakout board and some other components, he was able to get his car started just by sending an SMS.

If you have an old iPhone lying around and want to try this hack out for yourself, then you’re encouraged to visit O’Brien’s website where he breaks down the entire experience to show you how exactly you could do it, too.

By Ubergizmo. Related articles: Hyundai Connectivity Concept Gives NFC-enabled Phones Power Over Your Car, FCC Asks FAA To Allow The Use Of Electronic Devices During Flights,

Eliminate Touchscreen Lag From the Surface With This Tiny Hack

Now that hackers have sunk their teeth well and truly into the Microsoft Surface RT, loads of things are being probed, including lag. Apparently, with a tiny registry edit, you can speed up the Surface RT no end and eliminate touch lag. Here’s how. More »

Anonymous hacks MIT with Aaron Swartz memorial & manifesto

Hack-collective Anonymous broke into MIT’s website over the weekend and subverted it into a tribute to open-access activist Aaron Swartz, the internet hero who committed suicide on Friday last week. Describing the $1m lawsuit Swartz faced for hacking into the JSTOR database as “a grotesque miscarriage of justice,” Anonymous also called for “reform of computer crime laws,” CNET reports, in addition to “a renewed and unwavering commitment to a free and unfettered internet.”

anonymous_mit_swartz_hack

In a lengthy post, including a link to details on Swartz’s funeral on Tuesday this week and a copy of the “Guerilla Open Access Manifesto,” Anonymous describes Swartz as “A hero in the SOPA/PIPA campaign, Reddit cofounder, RSS, Demand Progress, Avaaz, etc.” and sets out a list of “wishes” for legal and ethical change moving forward. “The situation Aaron found himself in highlights the injustice of US computer crime laws,” the hackers wrote, “particularly their punishment regimes, and the highly-questionable justice of pre-trial bargaining.”

Our wishes

We call for this tragedy to be a basis for reform of computer crime laws, and the overzealous prosecutors who use them.

We call for this tragedy to be a basis for reform of copyright and intellectual property law, returning it to the proper principles of common good to the many, rather than private gain to the few.

We call for this tragedy to be a basis for greater recognition of the oppression and injustices heaped daily by certain persons and institutions of authority upon anyone who dares to stand up and be counted for their beliefs, and for greater solidarity and mutual aid in response.

We call for this tragedy to be a basis for a renewed and unwavering commitment to a free and unfettered internet, spared from censorship with equality of access and franchise for all.

However, contrary to some of Anonymous’ more aggressive take-overs, the hacking team included an apology to MIT for co-opting their site. In fact, despite complaints from some that MIT had let Swartz down by not vigorously defending him when the US government decided to prosecute over the JSTOR case, Anonymous claims not to blame the institution:

“We tender apologies to the administrators at MIT for this temporary use of their websites. We understand that it is a time of soul-searching for all those within this great institution as much — perhaps for some involved even more so — than it is for the greater internet community. We do not consign blame or responsibility upon MIT for what has happened, but call for all those feel heavy-hearted in their proximity to this awful loss to acknowledge instead the responsibility they have — that we all have — to build and safeguard a future that would make Aaron proud, and honour the ideals and dedication that burnt so brightly within him by embodying them in thought and word and action” Anonymous

Swartz had a history of butting heads with the law as he pushed for freedom of data. Back in 2008, he wrote a custom app to take advantage of free Pacer digital judicial library accounts to gather around 20m documents in a more easily-accessed place, while the similar hack which led to the JSTOR indictment saw him pull almost the entire database using a secretly-installed laptop.


Anonymous hacks MIT with Aaron Swartz memorial & manifesto is written by Chris Davies & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

Security Flaw Allows Hackers to Take over Cisco IP Phones

If you work in an office that uses the popular CiscoUnified IP Phone 7900 Series, prepare to feel violated. A couple of security researchers have published details on a security vulnerability that allows a nefarious hacker to turn the phones into eavesdropping devices. The hack allows people to listen in on private phone calls as well as to nearby conversations.

ipphone

The hack is executed with a small piece of hardware plugged into the local serial port of the Cisco phone. Once the device is connected to the phone, the hacker is able to execute code allowing them to remotely monitor phone calls and turn on the phone’s speaker allowing them listen in on conversations. Cisco has confirmed this vulnerability and has promised a fix.

Cisco has already offered a temporary software patch that blocks the hack from being executed over a network. Cisco also promises a patch to plug the hole when the hacking device is connected directly to the phone. Ultimately, Cisco promises to completely rewrite the base firmware eliminating the possibility of his hack being used. But in the mean time, if your company uses these phones, you might want to watch what you say in front of your phone – or just unplug it from the phone jack.

[via Ars Technica]

Hack turns Cisco desk phones into remote listening devices

If you work in an office that uses one of the various Cisco branded IP phones, word has surface about a hack that might make you uncomfortable. Reports have indicated that Internet phones sold by Cisco Systems are vulnerable to hacks that can turn them into remote bugging devices allowing nefarious sorts to eavesdrop on calls and conversations close to the phone. Cisco warned about the flaw this week.

cisco-phone

Cisco’s warning came after security experts demonstrated how people that have physical access to the phone could execute malicious code allowing eavesdropping. Cisco plans to release a software patch later this month to plug the security hole. The vulnerability has been confirmed to affect several models of desk phones in the CiscoUnified IP Phone 7900 series.

Cisco has also confirmed that the security vulnerability can be exploited remotely over a corporate network. However, Cisco has already issued workarounds that makes those attacks more difficult to execute. The security researchers who discovered the vulnerability are Ang Cui and Salvatore Solfo from Columbia University’s engineering department.

Details of the vulnerability were presented at the 29th Chaos Communications Congress. The hack was demonstrated using a device that connects to the local serial port of the Cisco phone. Once the device was attached to the phone it was able to inject attack code giving the attacker control over the device. The attack allows the hacker to monitor phone calls and turn on the phone’s microphone unbeknownst to people nearby. Cisco has promised to rewrite the underlying firmware to eliminate this vulnerability. Check out the video below to see the researchers outlining the hack.

[via ArsTechnica]


Hack turns Cisco desk phones into remote listening devices is written by Shane McGlaun & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

Windows RT jailbreak tool opens the door for Surface homebrew

So far, Microsoft hasn’t been supremely successful with its Surface RT tablet. The Windows RT running ARM-powered tablet has sold slowly with Microsoft blaming much of the poor sales on the fact that it doesn’t have a wide distribution platform. Reports have surfaced this week that the Windows RT operating system has now been jailbroken.

surface

A jailbroken Windows RT operating system would mean that unsigned ARM applications could be run on the Microsoft tablet. An unlocked tablet capable of running unsigned applications could usher in an entire Windows RT homebrew community and make the tablet more popular with hackers and developers. The new tool comes from XDA Developers user netham45.

The tool is a batch file that automates the jailbreak process that was originally discovered by a hacker going by the name clrokr. That particular user was able to change settings in the Windows RT kernel after discovering the correct values to open the types of apps that the operating system was allowed to run. This jailbreak tool is far from perfect though.

The main limiting factor for this tool is that the setting needs to be changed each time the computer is booted up. Apparently, the setting can’t be permanently altered on devices that are enabled with Secure Boot. The original hack from clrokr was reportedly highly technical limiting its usefulness to those with the expertise to execute it. However, the automated jailbreak tool from netham45 makes the process into something that the average user with a Surface RT tablet that feels like running unsigned software can take advantage of. It’s worth noting that there’s a high probability that Microsoft will patch the “flaw” that this tool takes advantage of.

[via TheNextWeb]


Windows RT jailbreak tool opens the door for Surface homebrew is written by Shane McGlaun & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

Game Boy repurposed as an Android gamepad, adds retro flair to your mobile gaming

Game Boy repurposed as an Android gamepad, adds retro flair to your mobile gaming

Many of us whiled away untold hours of our youth mashing the D-pad, A and B buttons of the original Game Boy, which is why we’ve seen many hacks using its iconic hardware. Gaming on mobile touchscreens isn’t nearly so tactilely pleasing as that portable, however, so nostalgic modder Chad Boughton decided to swap out his GB’s dot-matrix display for the Super AMOLED of a Galaxy Nexus.

He first removed the screen and trimmed the chassis so that a GNex case could be bolted flush with the rest of the body. The more involved part of the mod, however, was getting the buttons to work wirelessly with the phone. To accomplish the trick, he trimmed the Game Boy’s circuit board to make room for the guts of a Wiimote, which he then connected to the buttons. From there, he installed the Wii Controller IME app to get the GB talking with the phone, and presto! One of the coolest Android gamepads we’ve seen was born. You can see how it works in the video after the break, and there’s a slew of shots showing the mod in progress at the source below.

Continue reading Game Boy repurposed as an Android gamepad, adds retro flair to your mobile gaming

Filed under: ,

Comments

Via: The Next Web

Source: Instructables

DIY Google Glass puts iOS in front of your eyes

Google may be beavering away on the last stages of Project Glass before the Explorer version arrives with developers, but meanwhile DIY wearable computers are springing up, some with Apple’s iOS at their core. A straightforward combination of an iPod touch, off-the-shelf wearable display, Bluetooth camera and a set of safety goggles was enough for AI researcher Rod Furlan to get a glimpse at the benefits of augmented reality, he writes at IEEE Spectrum, though the headset raised as many questions as it provided answers.

Print

Furlan’s hardware falls roughly in line with what we’ve seen other projects piece together in earlier AR attempts. He opted for a MyVu eyepiece – a 0.44-inch microdisplay culled from a cheap Crystal headset, such as used in this UMPC-based wearable back in 2009, and this Beagleboard version in 2010 – hooked up to the composite video output of a 4th-gen iPod touch; that way, he can see a mirror of the iPod’s UI floating in his line of sight.

Meanwhile, a Looxie Bluetooth Video Camera – stripped of its casing and attached to the goggles – streams video to the iPod touch wirelessly. Furlan says he’s cooking up a second-gen version running off a Raspberry Pi, again another approach we’ve seen other wearables experimenters take. That, Furlan says, will allow for more flexibility with the Looxie’s input, as well as greater support for other sensors such as accelerometers.

The interesting part is how Furlan’s experience of the wearable evolved, from initial discomfort and a sense of information overload – the feeling of needing to keep up with every notification, server status, stock price, and message that pops up – to a less conscious consumption of the data flow:

“When I wear my prototype, I am connected to the world in a way that is quintessentially different from how I’m connected with my smartphone and computer. Our brains are eager to incorporate new streams of information into our mental model of the world. Once the initial period of adaptation is over, those augmented streams of information slowly fade into the background of our minds as conscious effort is replaced with subconscious monitoring” Rod Furlan

That fits in line with what we’ve heard from Google itself; Glass project chief Babak Parviz said recently that part of the company’s work on software has been to deliver a pared-back version of the usual gush of information that hits our smartphone and tablet displays. Developers, for instance, will be able to use a set of special cloud APIs to prioritize specific content that gets delivered to the Android-based wearable.

Furlan concludes that the biggest advantage of wearables won’t be overlaying data on top of the real world – what we know as augmented or mediated reality – but being able to persistently record (and recall) all of our experiences. That does differ from Google’s perception, where capturing photos and videos is only seen as a subset of Glass, and the headset is gradually being positioned as a way to access a curated feed of the digital world, whether that be from Google Now prompts or something else.

[via] 9to5Mac]


DIY Google Glass puts iOS in front of your eyes is written by Chris Davies & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.