Category: Cellphone Hacks

These days, if you’re walking around with a cellphone, you’ve basically fitted an always-on tracking device to your person. That’s even more the case if there happens to be an eavesdropping device in your vicinity. To combat this, the Electronic Frontier Foundation has created Rayhunter as a warning device. Rayhunter is built to detect IMSI […]
[David] sent us a tip about a company in Belgium, Citronics, that is looking to turn old cellphones into single-board computers for embedded Linux applications. We think it’s a great idea, and have long lamented how many pocket supercomputers simply get tossed in the recycling stream, when they could be put to use in hacker […]
During the Cambrian Explosion of cellphone form factors at the turn of the millenium, Nokia reigned supreme. If you’d like to see what they were doing behind the scenes to design these wild phones, you’ll love the Nokia Design Archive from Aalto University. Featuring images, presentations, videos and a number of other goodies (remember transparencies?), […]
The moment everyone has been talking about for years has finally arrived, the European Union’s mandating of USB charging on all portable electronic devices is now in force. While it does not extend beyond Europe, it means that there is a de facto abandonment of proprietary chargers in other territories too. It applies to all […]
Ever hear of Microsoft Soundscape? We hadn’t, either. But apparently it and similar apps like Blindsquare provide people with vision problems context about their surroundings. The app is made to run in the background of the user’s mobile device and respond to media controls, but if you are navigating around with a cane, getting to […]
A few weeks ago we featured a project from [Dan], a work-in-progress in which he was attaching an EMF 2018 electronic conference badge to a rotary phone. At the time we looked forward to his progress, expecting maybe to see it in our travels round the field at EMF 2021. We have to say we […]
In one of the cooler hacks we’ve seen recently, a bunch of hacking academics at the University of Michigan researched the ability to flicker a laser at audible sound frequencies to see if they could remotely operate microphones simply by shining a light on them. The results are outstanding. While most Hackers will have heard […]
If you’re reading this, chances are good that you’re the family IT department. We do what we can to help them, but there’s just no changing the fact that smartphones are difficult to operate with aging eyes and hands. When [sideburn’s] dad started complaining, he took a different approach. Instead of helping his dad adapt, […]
We have covered the astonishing diversity of conference badges to a great extent over the years, and we are always pleased and surprised at the creativity and ingenuity that goes into their creation. But the saddest thing about so many badges is that after the event they go into the drawer and are never touched […]
Leading edge computer security is veiled in secrecy — a world where novel attacks are sprung on those who do not yet know what they need to protect against. Once certain tactics have played out within cool kids’ circles, they are introduced to the rest of the world. An IBM red team presented what they’re […]