Hacker Public Radio Hacker Public Radio
-
- Technology
Hacker Public Radio is an podcast that releases shows every weekday Monday through Friday. Our shows are produced by the community (you) and can be on any topic that are of interest to hackers and hobbyists.
-
HPR4122: The Conference for Creative Use of the Radio Spectrum in Open Systems
Ken Talks to Marc Balmer and Kristoff Bonne about spectrum24, The
Conference for Creative Use of the Radio Spectrum in Open Systems.
Following the success of the Software-Defined Radio and Amateur Radio
devroom at FOSDEM, spectrum24 plans to bring users of the radio spectrum
together.
For over a century, technology has made it possible to transfer more
data, faster, further. Today, wireless technology is everywhere and
commonplace. However, it remains a playground and a ground for
innovation for many communities.
This conference is an opportunity to publicize your projects and
allow the different communities that use the spectrum to meet over a
weekend.
If you have an interesting talk you would like to give please see https://spectrum-conference.org/24/cfp for more
information
spectrum24 will take place September 14./15. at SmartCity Campus (1
rue de Clairefontaine, 78120 Rambouillet.) at an old radio factory in
Rambouillet near Paris, a short 15 minute walk from the train
station.
Conference Website: https://spectrum-conference.org/
Conference Mastodon: https://mastodon.radio/@spectrumconf
Conference Location: https://smartcitycampus.fr/
FOSDEM Dev Track: https://fosdem.org/2024/schedule/event/fosdem-2024-1662-trx-control-modern-software-to-control-amateur-radio-transceivers-and-other-hamradio-hardware/
Marc Balmer: https://trx-control.msys.ch/, https://msys.ch/, https://marcbalmer.ch, https://www.linkedin.com/in/mbalmer/
Kristoff Bonne: https://mastodon.radio/@on1arf -
HPR4121: RODE wireless microphones
All right. Well, good evening, hackers. My name is Clinton. And this
is a very off the cuff episode for me just to announce that I've got a
new microphone. So I just wanted to run through a couple of details of
that. Make a show, say a little about the microphone while I got it.
What I hope to do with it. So this is a roadie wireless go to setup. It
comes with three little boxes. Roughly, roughly, you can fit each one of
the little boxes inside a matchbox. So there are three of these that
come with the set that I bought. Two of them are microphones that you
clip onto your lapel. The third is a transceiver. So at the moment, I've
got the transceiver on and I've got one of the microphones on. I bought
this because I'm going to be going to a conference soon. And one of the
things that I do try to do at conferences is to interviews with people.
And this is kind of nice in that I can switch these two microphones on.
Give one to myself. Give one to the person I'm interviewing. And I don't
have to use a single microphone and shove it underneath their faces. And
I don't have to swap the microphone between the two of us. The other
feature, like the particular reason I've got this model is that each of
the two microphone units actually has built in RAM. So it will actually
record, like if you've got it set up in the mode, which I do, you can
get each microphone to do a backup recording of your presentation. The
regular mode for this set of microphones is to actually treat the
transceiver as a source and plug it into computer or plug it into your
camera as a external microphone. But it has this lovely mode, which I'm
recording this particular episode to. We can just turn it on. It's not
the transceiver is not plugged into a computer. It's not plugged into
anything. And it'll record something like 40 hours of voice. And later
on, I can hook it up to my computer as a standard mass storage device
and just download the waveform I believe. So it does have some Windows
firmware or Mac firmware. I didn't have too much fun getting that to
work under Linux. I tried under a couple of different VM products and
wasn't having any luck. So try it under wine. I tried under open box.
Eventually I did end up installing like a full Windows 10 install onto a
qemu image. And that had enough stuff working such that I could install
the Rode firmware on it. That let me do an upgrade of the firmware on
the two microphones and the transceiver because the first thing you do
when you buy something these days is out of the box you have to upgrade
the firmware because why would they do that at the factory before they
send it out when they can just make the users do that. And there is a
phone app but it does not let you update the firmware on these
particular hardware models. If I remember the error message correctly it
does look like the Android app lets you update the firmware on other
Rode microphone devices but not this particular model. So I had to go
down the track of setting up a qemu. I did find a good blog post on how
to set up a Windows box on qemu. It had a few things that seem outdated
so maybe it's a job for future me to write an updated blog post on how
to do this. If for nothing else instructions on how to do this in future
when I need to rerun the firmware update. The other thing that I really
needed to use the software for though is to switch on the recording
option. So out of the box these things do not record to the memory
that's built into the microphones. So I had to get, I had to update the
firmware and then I had to run the software on both of the microphones
to switch on the recording option. But now that that switched on I can
just hook it up as a USB master device as I've mentioned before and
presumably I can just copy the files and delete the files and I won't
actually have to run that software. So yeah there's a number of options
going forward so I can write that blog post with the updated details.
There were a number of hoops that I fo -
HPR4120: South Carolina to Home
We finish our South Carolina visit touring a plantation, and then go
to see a magnificent live oak tree. After that, it is time for us to
head back home.
Links
https://flic.kr/s/aHBqjAvW57
https://flic.kr/s/aHBqjAvWaN
https://www.palain.com/travel/rv-trip-2022-2023-southeast-us/south-carolina-to-home/ -
HPR4119: Cov's Jams 003
Welcome to the third episode of Cov's jams.
We'll start with a couple electronica pieces from Arkadii Kaplan:
Corporate Success and Chasing the Shadow. I also featured Kaplan in the
second episode of Cov's Jams, way back in 2016. I'm glad to be back.
Next up are two dubstep selections: Time to Army by Muciojad and
Sweet Nothing by K4MMERER.
Daniel Bautista's Symphony Number 5 will close out the episode.
Daniel Bautista wins at Free, Libre, and Open Source. Not only is he
playing public domain Beethoven, but he recorded and mixed the album (in
May and June of 2008) on a Gentoo
Linux box. Gentoo is how I really learned Linux. He's still
releasing libre licensed albums and his newer releases have video
recordings which he edits in kdenlive.
The first four tracks are under the Creative Commons
Attribution-Share Alike license: Corporate Success and Chasing the
Shadow by Arkadii Kaplan, Time to Army by Muciojad, and Sweet Nothing by
K4MMERER. Daniel Bautista's Symphony Number 5 is licensed Creative
Commons Attribution.
Thank you for listening to this third episode of Cov's Jams. I hope
we can enjoy some new tunes together soon!
Links:
Arkadii
Kaplan - Corporate Success
Arkadii
Kaplan - Chasing the Shadow
Muciojad -
Time to Army
K4MMERER -
Sweet Nothing
Daniel
Bautista - Symphony Number 5 -
HPR4118: Toil versus Livelihood
This is sort of a response to hpr4097 :: Will they take our jobs? Of course they will. by dodddummy, and also the latest community news show, and other shows about the topic.
References:
Economic Possibilities for our Grandchildren, John Maynard Keynes
Domenico de Masi, O Ócio Criativo, book was never released in English, I think.
In Praise of Idleness, Bertrand Russell -
HPR4117: JAMBOREE !
https://github.com/freeload101/Java-Android-Magisk-Burp-Objection-Root-Emulator-Easy
Java Android Magisk Burp Objection Root Emulator Easy
(JAMBOREE)
Get a working portable Python/Git/Java environment on Windows in SECONDS
without having local administrator, regardless of your broken Python or
other environment variables. Our open-source script downloads directly
from proper sources without any binaries. While the code may not be
perfect, it includes many useful PowerShell tricks.
Run Android apps and pentest without the adware and malware of
BlueStacks or NOX.
Features / Request
Core Status
RMS:Runtime Mobile Security ✔️
Brida, Burp to Frida bridge ❌
SaftyNet+ Bypass ❌
Burp Suite Pro / CloudFlare UserAgent Workaround-ish ✔️
ZAP Using Burp ✔️
Google Play ✔️
Java ✔️
Android 11 API 30 ✔️
Magisk ✔️
Burp ✔️
Objection ✔️
Root ✔️
Python ✔️
Frida ✔️
Certs ✔️
AUTOMATIC1111 ✔️
AutoGPT ✔️
Bloodhound ✔️
PyCharm ✔️
OracleLinux WSL ✔️
Ubuntu/Olamma WSL ✔️
Postgres No admin ✔️
SillyTavern ✔️
Volatility 3 ✔️
Arduino IDE / Duck2Spark ✔️
Youtube Downloader Yt-dlp ✔️
How it works:
Temporarily resets your windows $PATH environment variable to fix any
issues with existing python/java installation
Build a working Python environment in seconds using a tiny 16 meg
nuget.org Python binary and portable PortableGit. Our solution doesn't
require a package manager like Anaconda. I would like to make it even
easier to use but I don't want to spend more time developing it if
nobody is going to use it! Please let me know if you like it and open
bugs/suggestions/feature request etc! You can contact me at https://rmccurdy.com !
Installation/Requirements ( For Android AVD Emulator) :
Local admin just to install Android AVD Driver:
HAXM Intel driver ( https://github.com/intel/haxm )
OR
AMD ( https://github.com/google/android-emulator-hypervisor-driver-for-amd-processors
)
Usage:
Put ps1 file in a folder
Rightclick Run with PowerShell
OR
From command prompt
powershell -ExecutionPolicy Bypass -Command
"[scriptblock]::Create((Invoke-WebRequest "https://raw.githubusercontent.com/freeload101/Java-Android-Magisk-Burp-Objection-Root-Emulator-Easy/main/JAMBOREE.ps1").Content).Invoke();"
More infomation on bypass Root Detection and SafeNet https://www.droidwin.com/how-to-hide-root-from-apps-via-magisk-denylist/
( Watch the Video Tutorial below it's a 3-5 min process. You only
have to setup once. After that it's start burp then start AVD )
Burp/Android Emulator (Video Tutorial )
Update Video with 7minsec Podcast!
https://youtu.be/XdXleap0BiM
name
(Video Tutorial)
https://youtu.be/pYv4UwP3BaU
name
USB Rubber Ducky Scripts & Payloads Python 3 Arduino
DigiSpark
http