×
Hardware Hacking

Coming Soon: an Open Source eBook Reader (gizmodo.com.au) 46

Electronic component distributor Digi-Key will be producing a small manufacturing run of the "open hardware" ereader from the Open Book Project, reports Gizmodo: The raw hardware isn't as sleek or pretty as devices like the Kindle, but at the same time there's a certain appeal to the exposed circuit board which features brief descriptions of various components, ports, and connections etched right onto the board itself for those looking to tinker or upgrade the hardware. Users are encouraged to design their own enclosures for the Open Book if they prefer, either through 3D-printed cases made of plastic, or rustic wooden enclosures created using laser cutting machines. With a resolution of just 400x300 pixels on its monochromatic E Ink display, text on the Open Book won't look as pretty as it does on the Amazon Kindle Oasis which boasts a resolution of 1,680x1,264 pixels, but it should barely sip power from its built-in lithium-polymer rechargeable battery -- a key benefit of using electronic paper.

The open source ereader -- powered by an ARM Cortex M4 processor -- will also include a headphone jack for listening to audio books, a dedicated flash chip for storing language files with specific character sets, and even a microphone that leverages a TensorFlow-trained AI model to intelligently process voice commands so you can quietly mutter "next!" to turn the page instead of reaching for one of the ereader's physical buttons like a neanderthal. It can also be upgraded with additional functionality such as Bluetooth or wifi using Adafruit Feather expansion boards, but the most important feature is simply a microSD card slot allowing users to load whatever electronic text and ebook files they want. They won't have to be limited by what a giant corporation approves for its online book store, or be subject to price-fixing schemes which, for some reason, have still resulted in electronic files costing more than printed books.

Transportation

How Much Are Cars Spying On Their Owners? (seattletimes.com) 101

"We're at a turning point for driving surveillance," reports the Washington Post (in an article shared by long-time Slashdot reader davidwr ). "In the 2020 model year, most new cars sold in the United States will come with built-in Internet connections, including 100 percent of Fords, GMs and BMWs and all but one model Toyota and Volkswagen."

Often included for free (or sold as an add-on), these connections mean "Cars are becoming smartphones on wheels," collecting and sending data "pretty much wherever their makers want. Some brands even reserve the right to use the data to track you down if you don't pay your bills...." On a recent drive, a 2017 Chevrolet collected my precise location. It stored my phone's ID and the people I called. It judged my acceleration and braking style, beaming back reports to its maker General Motors over an always-on Internet connection... Modern vehicles don't just have one computer. There are multiple, interconnected brains that can generate up to 25 gigabytes of data per hour from sensors all over the car... Most hide what they're collecting and sharing behind privacy policies written in the kind of language only a lawyer's mother could love...

The Tesla Model 3 can collect video snippets from the car's many cameras. Coming next: face data, used to personalize the vehicle and track driver attention... Coming 5G cellular networks promise to link cars to the Internet with ultra-fast, ultra-high-capacity connections. As wireless connections get cheaper and data becomes more valuable, anything the car knows about you is fair game. GM's view, echoed by many other automakers, is that we gave them permission for all of this...

Five years ago, 20 automakers signed on to volunteer privacy standards, pledging to "provide customers with clear, meaningful information about the types of information collected and how it is used," as well as "ways for customers to manage their data." But when I called eight of the largest automakers, not even one offered a dashboard for customers to look at, download and control their data.... GM's privacy policy, which the company says it will update before the end of 2019, says it may "use anonymized information or share it with third parties for any legitimate business purpose." Such as whom? "The details of those third-party relationships are confidential," said GM spokesman David Caldwell.

There are more questions. GM's privacy policy says it will comply with legal data demands. How often does it share our data with the government? GM doesn't offer a transparency report like tech companies do....

GM said "much" of their data can't be linked to a specific person, though the Post adds that "there were clues to what more GM knows on its website and app. It offers a Smart Driver score -- a measure of good driving -- based on how hard you brake and turn, and how often you drive late at night."

Meanwhile, the Post also reports that OnStar's privacy policy lets them keep the data they collect "pretty much forever... At least smartphone apps like Google Maps let you turn off and delete location history."

Car and Driver noted that the Post's reporter even found photos of his phone's contacts, concluding "Your car is collecting and transmitting a lot more data than you think." In 2017, the U.S. Government Accountability Office looked at automakers and their data privacy policies and found that the 13 car companies it looked at are not exactly using best practices. For example, while the automakers say they obtain "explicit consumer consent before collecting data," the GAO says they "offered few options besides opting out of all connected vehicle services to consumers who did not want to share their data."
Hardware Hacking

'How I Compiled My Own SPARC CPU In a Cheap FPGA Board' (www.thanassis.space) 83

Long-time Slashdot reader ttsiod works for the European Space Agency as an embedded software engineer. He writes: After reading an interesting article from an NVIDIA engineer about how he used a dirt-cheap field-programmable gate array board to code a real-time ray-tracer, I got my hands on the same board -- and "compiled" a dual-core SPARC-compatible CPU inside it... Basically, the same kind of design we fly in the European Space Agency's satellites.

I decided to document the process, since there's not much material of that kind available. I hope it will be an interesting read for my fellow Slashdotters -- showcasing the trials and tribulations faced by those who prefer the Open-Source ways of doing things... Just read it and you'll see what I mean.

This is the same Slashdot reader who in 2016 reverse engineered his Android tablet so he could run a Debian chroot inside it. "Please remember that I am a software developer, not a HW one," his new essay warns.

"I simply enjoy fooling around with technology like this."
Biotech

Biohackers Use a Raspberry Pi to Implant a Networked Hard Drive (the-parallax.com) 118

"Biohackers took one small but important step toward the science fiction dystopia depicted in William Gibson's Johnny Mnemonic," reports The Parallax, in an article shared by a Slashdot reader: The Four Thieves Vinegar biohacking collective has not figured out how to precisely mimic the memory data transfer scenario Gibson conjured, but it has built a device to enable people to store and transfer data wirelessly in their bodies. Using off-the-shelf parts and focused efforts, the biohacking group has designed and built a networked hard drive, coated in a biosafe resin, to be subcutaneously implanted in the human body. It's powered by an external battery that connects to the device via an induction coil, and its storage capacity is limited only by the size of the microSD card it contains. Michael Laufer, who founded Four Thieves Vinegar, calls it the Pegleg.

In the small hours of August 8, in an operating room within the small house, two patients received the second version of the Pegleg implant, which Laufer says is the world's first subcutaneous networked drive... To make Pegleg v2, Laufer and his team removed from the Raspberry Pi both Micro USB connectors (one for power, one for data), the Mini HDMI connector, and the camera connector. They then soldered on a second Wi-Fi chip to enable it to transfer data to another Pegleg and allow other devices to connect to it, as well as an induction coil to enable it to be powered by a wireless battery resting in a contiguous sports armband or pants pocket. They enabled Bluetooth for future functionality, inserted a 512GB microSD card for storage, and updated the firmware. Finally, they coated the hacked device in a biocompatible acrylic resin to prevent it from interacting with the recipient's body and to diffuse the heat it emanates.

At 11:44 a.m. on the same day, Laufer -- an implant newbie who has three small tattoos but no piercings -- took a seat in the surgical room... During the procedure, Laufer passed out for a few seconds and vomited a little bit. But 32 minutes later, he had a functional "Pegleg" implant.

Bitcoin

'Mining Bitcoin On a 1983 Apple II: a Highly Impractical Guide' (retroconnector.com) 42

option8 ((Slashdot reader #16,509) writes: TL;DR: Mining Bitcoin on a 1MHz 8-bit processor will cost you more than the world's combined economies, and take roughly 256 trillion years.
"But it could happen tomorrow. It's a lottery, after all," explains the blog post (describing this mad scientist as a hardware hacker and "self-taught maker", determined to mine bitcoin "in what must be the slowest possible way. I call it 8BITCOIN....")

There's also a Twitch.TV stream, with some appropriate 8-bit music, and the blog post ends by including his own bitcoin address, "If you feel like you absolutely must throw some money at me and this project."

"Upon doing some research, I found that, not only were other 8-bit platforms being put to the task, but other, even more obscure and outdated hardware. An IBM 1401 from the 1960s, a rebuilt Apollo Guidance Computer, and even one deranged individual who demonstrated the hashing algorithm by hand. It turns out, those examples all come from the same deranged individual, Ken Shirriff."
Digital

Rebuilding the PDP-11/70 with a Raspberry Pi (wixsite.com) 96

"You could look at this as a smallish PDP-11/70, built with modern parts," Oscar Vermeulen writes on his site. "Or alternatively, and equally valid, as a fancy front panel case for a Raspberry Pi."

Long-time Slashdot reader cptnapalm writes: Oscar Vermeulen's PiDP-11 front panel, modeling a PDP-11/70 in all its colorful glory, has been released to beta testers. This is Mr. Vermeulen's second DEC front panel; his PiDP-8 was released a few years ago. The PiDP-11 panel is designed to work with a Raspberry Pi running simh or, possibly, a FPGA implementation of the Digital Equipment Corporation PDP-11... In addition to the front panel with its switches and blinkenlights, also included is a prototyping area for the possibility of adding new hardware...

UNIX and later BSD were developed on the PDP-11, including both the creation of the C language, the pipe concept and the text editor vi.

Hardware Hacking

ESR's Newest Project: An Open Hardware/Open Source UPS (ibiblio.org) 232

An anonymous reader writes: Last month Eric S. Raymond complained about his choices for a UPS (Uninterruptible Power Supply), adding that "This whole category begs to be disrupted by an open-hardware [and open-source] design that could be assembled cheaply in a makerspace from off-the-shelf components, an Arduino-class microcontroller, and a PROM...because it's possible, and otherwise the incentives on the vendors won't change." It could be designed to work with longer-lasting and more environmentally friendly batteries, using "EV-style intelligent battery-current sensors to enable accurate projection of battery performance" (along with a text-based alert system and a USB monitoring port).

Calling the response "astonishing," Raymond noted the emergence within a week of "the outlines of a coherent design," and in an update on GitLab reported that "The response on my blog and G+ was intense, almost overwhelming. It seems many UPS users are unhappy with what the vendors are pushing" -- and thus, the UPSide project was launched. "We welcome contributors: people with interest in UPSes who have expertise in battery technology, power-switching electronics, writing device-control firmware, relevant standards such as USB and the DMTF battery-management profile. We also welcome participation from established UPS and electronics vendors. We know that consumer electronics is a cutthroat low-margin business in which it's tough to support a real R&D team or make possibly-risky product bets. Help us, and then let us help you!"

There's already a Wiki with design documents -- plus a process document -- and Raymond says the project now even has a hardware lead with 30 years experience as a power and signals engineer, plus "a really sharp dev group. Half a dozen experts have shown up to help spec this thing, critique the design docs, and explain EE things to ignorant me." And he's already touting "industry participation! We have a friendly observer who's the lead software architect for one of the major UPS vendors." Earlier Raymond identified his role as "basically, product manager -- keeper of the requirements list and recruiter of talent" -- though he admits on his blog that he's already used a "cute hack" to create a state/action diagram for the system, "by writing a DSL to generate code in another DSL and provably correct equivalent C application logic."

He adds to readers of the blog that if that seems weird to you, "you must be new here."

Printer

MakerBot Launches New 'MakerBot Labs' Platform (hackaday.com) 42

"MakerBot just announced a new Open Source initiative called 'MakerBot Labs'," writes Slashdot reader szczys. "It is a small move, centering around some new APIs and a new extruder which is listed as experimental and not covered by their normal warranty. Largely they missed the mark on making a meaningful move toward openness, but with a new CEO at the helm as of January this could be the first change of the rudder in a larger effort to turn the ship around."

Makerbot's history is "an example of how you absolutely should not operate an open source company," argues Hackaday, saying it's left them skeptical of Makerbot's latest move: It reads like a company making a last ditch effort to win back the users they were so sure they didn't need just a few years ago... The wheels of progress turn slowly in any large organization, and perhaps doubly so in one that has gone through so much turmoil in a relatively short amount of time. It could be that it's taken Goshen these last nine months to start crafting a plan to get MakerBot back into the community's good graces.
From MakerBot's press release: "After setting high industry standards for what makes a quality and reliable 3D printing experience, we're introducing this new, more open platform as a direct response to our advanced users calling for greater freedom with materials and software."
Iphone

Hobbyist Gives iPhone 7 the Headphone Jack We've Always Wanted (engadget.com) 194

intellitech shares a report from Engadget: For those of you who miss the iPhone headphone jack, you're definitely not alone. But Strange Parts creator Scotty Allen missed it so much that he decided to add one to his iPhone 7. He just posted a video of the project's entire saga, with all of its many ups and downs, and in the end he holds what he set out to create -- a current generation iPhone with a fully functional headphone jack. It turns out, real courage is adding the headphone jack back to the iPhone. The project took around 17 weeks to complete and throughout it Allen spent thousands of dollars on parts including multiple iPhones and screens and handfuls of lightning to headphone adaptors. Along the way, Allen bought a printer, a nice microscope and fancy tweezers. He had to design his own circuit boards, have a company manufacture multiple iterations of flexible circuit boards and at one point early on had to consult with a chip dealer that a friend hooked him up with.

The final product works by using a lightning to headphone adaptor that's incorporated into the internal structure of the phone. However, because the headphone jack is powered via the phone's lightning jack with a circuit board switching between the two depending on whether headphones or a charger are plugged into the phone, you can't actually listen to music and charge the phone at the same time.

Facebook

Facebook Downranks Video Clickbait and Fake Play Buttons (techcrunch.com) 25

In a blog post, Facebook announced that it has started downranking the News Feed presence of links that display a fake play button in the preview image, as well as videos that are actually just a static image uploaded as a video file. While Facebook won't completely delete these posts unless they violate its other policies, it will be decreasing the distribution of these stories. TechCrunch reports: Facebook has prohibited the use of fake play buttons in advertisements under its policy against depicting non-existent functionality for a few years, News Feed Product Manager Greg Marra tells me. But the scourage has remained in the News Feed. Facebook says that if publishers want to denote there's a video behind a link, they should indicate that through Open Graph meta tags. They could also use words like "Watch" or "Video" in the headline or description. Meanwhile, Facebook's emphasis on video in News Feed has inspired the new menace of publishers uploading a static image as a video to get more eyeballs. These static image videos will be downranked too. Facebook is using a "motion scoring" system that detects movement inside a video to classify and demote these clips.
Government

Indian Election Officials Challenges Critics To Hack Electronic Voting Machine (thehindu.com) 52

Slashdot reader erodep writes: Following the recent elections in India, there have been multiple allegations of electoral fraud by hacking of Electronic Voting Machines... Two weeks ago, a party even "demonstrated" that these machines can be hacked. The Election Commission of India has rubbished these claims and they have thrown an open challenge, starting June 3rd to hack these EVMs using WiFi, Bluetooth or any internet device. This is a plea to the hackers of Slashdot to help secure the future of the largest democracy on the planet.
Each party can nominate three experts -- though India's Aam Aaadmi Party is already complaining that there's too many terms and conditions. And party leader Sanjay Singh has said he also wants paper ballots for all future elections, arguing "All foreign countries like America, Japan, Germany and Britain have gone back to ballot paper."
Hardware Hacking

Open Source Car-Hacking Tool Successfully Crowdfunded (kickstarter.com) 54

An anonymous reader writes: Two geeks are crowdfunding an open source car hacking tool that will allow builders to experiment with diagnostics, telematics, security, and prototyping. "Cars have become complicated and expensive to work with," they explain on a Kickstarter page. "Macchina wants to use open source hardware to help break down these barriers and get people tinkering with their cars again." After years developing a beta prototype, they announced a tiny plug-and-play device/development platform (that can also be hardwired under the hood) on an Arduino Due board with a 32-bit ARM microcontroller. They almost immediately reached their $25,000 funding goal, and with 24 days left to go they've already raised $41,672, and they're now also selling t-shirts to benefit the EFF's "Right to Repair" activism.

Challenging "the closed, unpublished nature of modern-day car computers," their M2 device ships with protocols and libraries "to work with any car that isn't older than Google." With catchy slogans like "root your ride" and "the future is open," they're hoping to build a car-hacking developer community, and they're already touting the involvement of Craig Smith, the author of the Car Hacker's Handbook from No Starch Press.

"The one thing that all car hobbyists can agree on is that playing with cars isn't cheap," argues the campaign page. "Open source hardware is the answer!"
Hardware Hacking

Reporter Pans Open Source Laptop Kit TERES-I (theverge.com) 133

The Verge's Paul Miller has some harsh words for the $242 open source DIY laptop kit TERES-I from Olimex. Instead of buying one hyper-integrated board that has all of the laptop's brains and I/O on it, you buy several little boards and wire them together. Then you put them inside a mostly finished case built by Olimex -- although if you want to go ultra DIY you can 3D print your own case, too. Everything, from the shell's CAD design to the motherboard's wiring, is available on GitHub for perusal or modification, and the modular nature of the internals means you can add a more powerful chipset or modify just about anything you find unsatisfying about the computer if you have the know-how or if Olimex or others offer compatible parts.

But, unfortunately, almost everything about this laptop is unsatisfying right now. It runs a quad-core ARM64 chip, though x86 and MIPS chips might be offered later on. It has a tiny 11.6-inch screen, a huge bezel, a tiny trackpad, a cramped-looking keyboard, and a whole lot of plastic. The OS (Linux, naturally) runs off a microSD card. At least the LCD comes in a 1080p variant, because the default 1366 x 768 resolution is a real throwback. There's even 802.11n Wi-Fi, which has me questioning what decade it is.

But are there any better alternatives? In the comments share your own thoughts about open source laptop kits.
Hardware Hacking

Own An Open Source RISC-V Microcontroller (crowdsupply.com) 101

"Did you ever think it would be great if hardware was open to the transistor level, not just the chip level?" writes hamster_nz, pointing to a new Crowd Supply campaign for the OnChip Open-V microcontroller, "a completely free (as in freedom) and open source 32-bit microcontroller based on the RISC-V architecture." hamster_nz writes: With a completely open instruction-set architecture and no license fees for the CPU design, the RISC-V architecture is well positioned to take the crown as the 'go to' design for anybody needing a 32-bit in their silicon, and Open-V are crowd-sourcing their funding for an initial manufacturing run of 70,000 chips, offering options from a single chip to a seat in the design review process. This project is shaping up to be a milestone for the coming Open Source Silicon revolution, and they are literally offering a seat at the table. Even if you don't end up backing the project, it makes for very interesting reading.
Their crowdfunding page argues "If you love hacking on embedded controllers, breaking down closed-source barriers, having the freedom to learn how things work even down to the transistor level, or have dreamed of spinning your own silicon, then this campaign is for you."
Open Source

Open-Source Hardware Makers Unite To Start Certifying Products (infoworld.com) 57

An anonymous reader quotes InfoWorld on the new certifications from the Open Source Hardware Association: The goal of certification is to clearly identify open-source hardware separate from the mish-mash of other hardware products. The certification allows hardware designs to be replicated. For certification, OSHWA requires hardware creators to publish a bill-of-materials list, software, schematics, design files, and other documents required to make derivative products. Those requirements could apply to circuit boards, 3D printed cases, electronics, processors, and any other hardware that meets OSHWA's definition of open-source hardware...OSHWA will host a directory for all certified products, something that doesn't exist today because the community is so fragmented.
After signing a legally-binding agreement, hardware makers are allowed to use the Open Hardware mark, which one of their board members believes will help foster a stronger sense of community among hardware makers. "People want to be associated with open source."
Hardware Hacking

How I Freed My Android Tablet: A Journey in Reverse Engineering (www.thanassis.space) 79

Slashdot reader ttsiod is an embedded software engineer at the European Space Agency, and shares this story about his quest to "dominate" his new tablet: Just like it's predecessor, I wanted to run a Debian chroot inside it -- that would allow me to apt-get install and run things like Privoxy, SSH SOCKS/VPN tunnels, Flask mini-servers, etc; and in general allow me to stay in control. But there was no open-source way to do this... and I could never trust "one-click roots" that communicate with servers in China... It took me weeks to reverse engineer my tablet -- and finally succeed in becoming root. The journey was quite interesting, and included both hardware and software tinkering. I learned a lot while doing it -- and wanted to share the experience with my fellow Slashdotters...
He writes that "I trust Debian. Far more than I trust the Android ecosystem," and describes everything from how he probed the boot process and created his own boot image to hunting for a way "to tell SELinux to get off my lawn".
Classic Games (Games)

The NES Classic is a $60 Single Board Computer Running Linux 121

"Nintendo's accurate NES emulator apparently needs no less than a quad-core CPU," joked Ars Technica. "The next step, of course, is unscrewing of the nostalgic little box to see how it ticks -- and whether its limited functionality might ever be expanded, either officially or by hackers." Slashdot reader romiz summarizes what's inside Nintendo's new miniature emulator for classic games: With a quad-core ARM Cortex-A7, 256 MB of RAM, and 512 MB of NAND Flash, it is typical of the hardware found in Linux single board computers, like the Raspberry Pi 2. Surprisingly for Nintendo, there does not seem to be any custom components in it, and it looks like it even does run Linux. [YouTube video] The GPL license for the kernel and many other open source components is visible in the legal information screen. The source, however, is not yet available on Nintendo's open source page.

But it is the re-edition a 1980s video console: there is no network access, no hardware expansion port, and the 30 games cannot be changed. Changing the system running on it will probably be difficult.
Security

You Can Legally Hack Your Own Car, Pacemaker, or Smartphone Now (wired.com) 106

Earlier this year, we ran a story about how even possessions as personal as one's car or tractor, or insulin pump could not be legally hacked by the owner, but those constraints are things of the past now. From a report on Wired: Last Friday, a new exemption to the decades-old law known as the Digital Millennium Copyright Act quietly kicked in, carving out protections for Americans to hack their own devices without fear that the DMCA's ban on circumventing protections on copyrighted systems would allow manufacturers to sue themt (Editor's note: the website may block users who use adblocking tools. Here's an alternate source). One exemption, crucially, will allow new forms of security research on those consumer devices. Another allows for the digital repair of vehicles. Together, the security community and DIYers are hoping those protections, which were enacted by the Library of Congress's Copyright Office in October of 2015 but delayed a full year, will spark a new era of benevolent hacking for both research and repair. "This is a tremendously important improvement for consumer protection," says Andrea Matwyshyn, a professor of law and computer science at Northeastern University. "The Copyright Office has demonstrated that it understands our changed technological reality, that in every aspect of consumers' lives, we rely on code," says Matwyshyn, who argued for the exemptions last year. For now, the exemptions are limited to a two-year trial period. And the security research exemption in particular only applies to what the Copyright Office calls "good-faith" testing, "in a controlled environment designed to avoid any harm to individuals or to the public." As Matwyshyn puts it, "We're not talking about testing your neighbor's pacemaker while it's implanted. We're talking about a controlled lab and a device owned by the researcher."
Hardware Hacking

Ask Slashdot: How Do You Build Your Own Vacuum Tubes? 275

Could you beat wireless headphones by creating your own DIY home audio system? Two weeks ago one Slashdot commenter argued, "to have good audio that is truly yours and something to be proud of, you need to make your own vacuum tube amplifier and then use it to power real electrostatic headphones over a wire." And now long-time Slashdot reader mallyn is stepping up to the challenge: I want to try to make my own vacuum tubes. Is there anyone here who has tried DIY vacuum tubes (or valves, to you Europeans)? I need help getting started -- how to put together the vacuum plumbing system; how to make a glass lathe; what metals to use for the elements (grid, plate, etc). If this is not the correct forum, can anyone please gently shove me into the correct direction? It needs to be online as my physical location (Bellingham, Washington) is too far away from the university labs where this type of work is likely to be done.
Slashdot's covered the "tubes vs. transistors" debate before, but has anyone actually tried to homebrew their own? Leave your best answers in the comments. How do you build your own vacuum tubes?
Open Source

The World's Most Secure Home Computer Reaches Crowdfunding Goal (pcworld.com) 126

"If the PC is tampered with, it will trigger an alert and erase the PC's encryption key, making the data totally inaccessible." Last month Design SHIFT began crowdfunding an elaborate "open source, physically secure personal computer" named ORWL (after George Orwell). "Having exceeded its $25,000 funding goal on Crowd Supply, the super-secure PC is in production," reports PC World, in an article shared by Slashdot reader ogcricket about the device which tries to anticipate every possible attack: The encryption key to the drive is stored on a security microcontroller instead of the drive... The ORWL's makers say the wire mesh itself is constantly monitored... Any attempts to trick, bypass, or short the wire mesh will cause the encryption key to be deleted. The unit's security processor also monitors movement, and a user can select a setting that will wipe or lock down the PC's data if it is moved to another location... The RAM is soldered to the motherboard and can't be easily removed to be read elsewhere...

Your ORWL unlocks by using a secure NFC and Bluetooth LE keyfob. Pressing it against the top of the ORWL and entering a password authenticates the user. Once the user has been authenticated, Bluetooth LE is then ensures that the user is always nearby. Walk away, and the ORWL will lock.

Slashdot Top Deals