Microsoft’s KinectFusion research project offers real-time 3D reconstruction, wild AR possibilities

It’s a little shocking to think about the impact that Microsoft’s Kinect camera has had on the gaming industry at large, let alone the 3D modeling industry. Here at SIGGRAPH 2011, we attended a KinectFusion research talk hosted by Microsoft, where a fascinating new look at real-time 3D reconstruction was detailed. To better appreciate what’s happening here, we’d actually encourage you to hop back and have a gander at our hands-on with PrimeSense’s raw motion sensing hardware from GDC 2010 — for those who’ve forgotten, that very hardware was finally outed as the guts behind what consumers simply know as “Kinect.” The breakthrough wasn’t in how it allowed gamers to control common software titles sans a joystick — the breakthrough was the price. The Kinect took 3D sensing to the mainstream, and moreover, allowed researchers to pick up a commodity product and go absolutely nuts. Turns out, that’s precisely what a smattering of highly intelligent blokes in the UK have done, and they’ve built a new method for reconstructing 3D scenes (read: real-life) in real-time by using a simple Xbox 360 peripheral.

The actual technobabble ran deep — not shocking given the academic nature of the conference — but the demos shown were nothing short of jaw-dropping. There’s no question that this methodology could be used to spark the next generation of gaming interaction and augmented reality, taking a user’s surroundings and making it a live part of the experience. Moreover, game design could be significantly impacted, with live scenes able to be acted out and stored in real-time rather than having to build something frame by frame within an application. According to the presenter, the tech that’s been created here can “extract surface geometry in real-time,” right down to the millimeter level. Of course, the Kinect’s camera and abilities are relatively limited when it comes to resolution; you won’t be building 1080p scenes with a $150 camera, but as CPUs and GPUs become more powerful, there’s nothing stopping this from scaling with the future. Have a peek at the links below if you’re interested in diving deeper — don’t be shocked if you can’t find the exit, though.

Microsoft’s KinectFusion research project offers real-time 3D reconstruction, wild AR possibilities originally appeared on Engadget on Tue, 09 Aug 2011 14:48:00 EDT. Please see our terms for use of feeds.

Permalink Developer Fusion  |  sourceMicrosoft Research [PDF]  | Email this | Comments

Ben Heck splits and condenses a pair of Xbox 360 controllers for the disabled

Ben Heck

That crafty Ben Heck is always up to something, like whipping up an Xbox 360 disk changer for the laziest of gamers. But, on the latest episode of his hacking and modding show, Mr. Heck is back to helping those in need and crafting accessible controllers for the disabled. During the 15-minute hackathon, the modder extraordinaire creates two different Xbox 360 remotes — a split model for those with limited arm motion, and a one-handed version for people with use of only one set of digits. If you’ve got a smidgen of soldering experience (and ideally access to a CNC) these projects are probably even simple enough to tackle yourself. Check out the entire episode and full PR after the break.

Continue reading Ben Heck splits and condenses a pair of Xbox 360 controllers for the disabled

Ben Heck splits and condenses a pair of Xbox 360 controllers for the disabled originally appeared on Engadget on Tue, 09 Aug 2011 04:04:00 EDT. Please see our terms for use of feeds.

Permalink   |   | Email this | Comments

Rich Decibels Brainwave Disruptor scrambles your head, not your eggs

Child of the ’80s? Then you’ll most likely remember those notorious PSAs about your brain and eggs, and the dangers of turning yourself into an omelette. Yeah, well turn off your inner Nancy Reagan for a second because we’ve got an Arduino hack that should have you just saying yes. New Zealand artist Rich Decibels created a homebrew brain entrainment device that uses low frequency sound and light to induce different mental states. The mod pieces together an Arduino Uno with two separate interface boards — one for pitch and separation controls, the other for LED and volume — to deliver a combo of binaural beats (two slightly out of sync tones) and flashing headset-mounted lights that’ll slow down those cerebral hertz cycles. If you happen to live in the land made famous by Frodo’s Shire, you can check out the brain-slowing goods at Thistle Hall’s Project Briefcase exhibition. Not a Kiwi? Then be sure to hit the source for an audio taste of this hacked head experience.

Rich Decibels Brainwave Disruptor scrambles your head, not your eggs originally appeared on Engadget on Mon, 08 Aug 2011 20:43:00 EDT. Please see our terms for use of feeds.

Permalink Hack a Day  |  sourcePonoko  | Email this | Comments

Android Network Toolkit lets you exploit local machines at the push of a button

Defcon 2011 is in full hacking swing, and Itzhak Avraham — “Zuk” for short — and his company Zimperium have unveiled the Android Network Toolkit for easy hacking on the go. Need to find vulnerabilities on devices using nearby networks? The app, dubbed “Anti” for short, allows you to simply push a button to do things like search a WiFi network for potential targets, or even take control of a PC trojan-style. To do this, it seeks out weak spots in older software using known exploits, which means you may want to upgrade before hitting up public WiFi. According to Forbes, it’s much like Firesheep, and Zuk refers to Anti as a “penetration tool for the masses.” Apparently, his end-goal is to simplify “advanced” hacking and put it within pocket’s reach, but he also hopes it’ll be used mostly for good. Anti should be available via the Android Market this week for free, alongside a $10 “corporate upgrade.” Consider yourself warned.

Android Network Toolkit lets you exploit local machines at the push of a button originally appeared on Engadget on Mon, 08 Aug 2011 02:18:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceForbes  | Email this | Comments

WhiteHat Security hacks into Chrome OS, exposes extension vulnerability at Black Hat

It’s been a rough Black Hat conference for Google. First, FusionX used the company’s homepage to pry into a host of SCADA systems, and now, a pair of experts have discovered a way to hack into Chrome OS. According to WhiteHat security researchers Matt Johansen and Kyle Osborn, one major issue is Google’s vet-free app approval process, which leaves its Chrome Web Store susceptible to malicious extensions. But there are also vulnerabilities within native extensions, like ScratchPad — a note-taking extension that stores data in Google Docs. Using a cross-site scripting injection, Johansen and Osborn were able to steal a user’s contacts and cookies, which could give hackers access to other accounts, including Gmail. Big G quickly patched the hole after WhiteHat uncovered it earlier this year, but researchers told Black Hat’s attendees that they’ve discovered similar vulnerabilities in other extensions, as well. In a statement, a Google spokesperson said, “This conversation is about the Web, not Chrome OS. Chromebooks raise security protections on computing hardware to new levels.” The company went on to say that its laptops can ward off attacks better than most, thanks to “a carefully designed extensions model and the advanced security available through Chrome that many users and experts have embraced.”

WhiteHat Security hacks into Chrome OS, exposes extension vulnerability at Black Hat originally appeared on Engadget on Sat, 06 Aug 2011 17:07:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceCNET  | Email this | Comments

AT&T ramps up voicemail security, say hello to your new pin code

Have anything sitting in your voicemail that you’d prefer the rest of the world didn’t hear? When’s the last time you went about checking it, anyway? AT&T is now on a mission to save its carefree customers from themselves, and beginning today, all new subscribers will be required to set a voicemail password or affirmatively disable the security measure. Ma Bell’s new policy is a reaction to the current unauthorized intrusion hubbub in the media, combined with the very real threat of caller ID spoofing. Shockingly, its current customers won’t receive similar treatment until early next year, and only when they upgrade their handsets. Of course, you can easily secure your voicemail within the settings, and if you prefer the convenience of retrieving your messages without hassle, you’ll still have that option — much to Rupert Murdoch’s pleasure, that is.

AT&T ramps up voicemail security, say hello to your new pin code originally appeared on Engadget on Sat, 06 Aug 2011 13:06:00 EDT. Please see our terms for use of feeds.

Permalink CNET  |  sourceAT&T Public Policy Blog  | Email this | Comments

Logitech Revue running Honeycomb caught on camera, looks pretty good

Now that eager hackers have actually managed to shoehorn the latest flavor of Android onto Logitech Revue units, the question is what does it actually look like? We got a few screenshots at Google I/O but now there’s pictures and videos popping up all over. One of our tipsters sent a few shots over, while the Channel Android folks on YouTube have posted a video walkthrough (embedded after the break). So far it looks good, with little remaining of the original Google TV UI, now replaced by widgets, box art-style listings of TV content and more. Thinking about dropping a Benjamin on one of these units and upgrading to Honeycomb yourself? Be warned — it’s very raw, so with no Netflix and not much app compatibility to speak of, remaining a voyeur is probably advisable for now.

[Thanks, Michael]

Continue reading Logitech Revue running Honeycomb caught on camera, looks pretty good

Logitech Revue running Honeycomb caught on camera, looks pretty good originally appeared on Engadget on Fri, 05 Aug 2011 23:53:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceYouTube  | Email this | Comments

Microsoft offers ‘mad loot’ Bluehat prize to entice security developers (video)

Mere numbers aren’t enough to describe cash prizes for Microsoft, it seems. The firm’s inaugural Bluehat security competition’s introduction video opted for a clearer term: “mad loot, lots of it.” The big M hopes the hefty first prize of $200,000 will inspire the creation of the next generation of defensive computer security technology. The most innovative “novel runtime mitigation technology designed to prevent the exploitation of memory safety vulnerabilities” (phew!) will take home the aforesaid mad loot, while second and third places will receive $50,000 and an MSDN Universal subscription, respectively. The winner won’t be announced until Blackhat 2012, of course, and applicants have until April to submit their prototypes and technical descriptions. Hit the break for the official announcement video, complete with CG backgrounds and prize euphemisms.

Continue reading Microsoft offers ‘mad loot’ Bluehat prize to entice security developers (video)

Microsoft offers ‘mad loot’ Bluehat prize to entice security developers (video) originally appeared on Engadget on Fri, 05 Aug 2011 09:22:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceMicrosoft  | Email this | Comments

Hackers break into Subaru Outback via text message

We’ve already seen SCADA systems controlled by Google Search, and now the Black Hat Technical Security Conference is offering up yet another slice of cringe-inducing hacker pie. A pair of pros from iSec Partners security firm was able to unlock and start the engine of a Subaru Outback using an Android phone and a process they call war texting. By setting up their own GSM network, they were able to snatch up password authentication messages being sent from server to car, allowing them the option to ride off in a brand new crossover. Apparently, your car isn’t the only thing in danger of a war-texting takeover, however, as the team says there are a slew of devices and systems, accessible over telephone networks, that are vulnerable to similar attacks, including A-GPS tracking devices, 3G security cameras, SCADA sensors — and thus the power grid and water supply — home automation, and urban traffic control systems. Somehow this group of otherwise innocent looking New York texters appears a whole lot more sinister now.

Hackers break into Subaru Outback via text message originally appeared on Engadget on Thu, 04 Aug 2011 17:17:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceTG Daily  | Email this | Comments

Microsoft Research’s .NET Gadgeteer steps out into the light, shoots daggers at Arduino (video)

Arduino, meet .NET Gadgeteer — your newest homebrew hacking rival. Born from Microsoft Research engineers’ desire to build prototypes quickly and easily, the two-and-a-half-years in the making ARM7-powered mainboard packs 4MB Flash, 16MB RAM, Ethernet, WiFi, an SD card interface and USB ports. Novice mods might wanna put the Netduino down because this homespun alternative also runs atop MS’ .NET Micro Framework, and thanks to its IntelliSense feature, makes auto-coding a breeze for first-timers. If you’re interested in what Ballmer & co. are offering, you can head to the project’s site now to pre-order its GHI-made hardware: a $250 Spider Starter Kit and the $120 Spider Mainboard. Both will be available by the end of September, but if you need a preview of what this burgeoning open source community has to offer, peep the stop-motion making mod after the break.

Continue reading Microsoft Research’s .NET Gadgeteer steps out into the light, shoots daggers at Arduino (video)

Microsoft Research’s .NET Gadgeteer steps out into the light, shoots daggers at Arduino (video) originally appeared on Engadget on Wed, 03 Aug 2011 22:04:00 EDT. Please see our terms for use of feeds.

Permalink Slashdot  |  sourceMicrosoft Research, .NET Gadgeteer  | Email this | Comments