— Updated on 2018.02.28 with pictures – see at the end of the post — You want to set-up some home automation at your place, come on Tuesday the 27th of February 2018 at Dim Sum Labs. See how you can perform individual human presence detection and have the house react to it, create lighting …
Read More “Simple Home Automation Explained”
The Chaos Computer Club also know as CCC is the largest association of hackers in Europe. For over 30 years they provide information about technical and societal issues, such as surveillance, privacy, freedom of information, hacktivism, data security and many other interesting things around technology and hacking issues. Every year they organize an event in …
Read More “Let’s discussed the past event of the CCC in Germany”
A serious weakness has been found on CPU and the way they manage information, allowing software to steal information processed by the computer. It does not matter whether you are running Linux, MacOS, windows and any other platform. Your CPU is the problem. Want to know more and how to prevent, secure yourself if possible? …
Read More “Spectre & Meltdown Explained”
This week during our HackJam, we will have a presentation by David Wexler from Gripbeats on the product that he and his team is developing here in Hong Kong. The product was inspired by body percussion. A method of creating drum sounds using only your own fingers, hands and body. When properly mastered, a player …
Read More “Maker: Gripbeats – Body Percussion”
On our next HackJam, open & social night, Tuesday the 14th of November 2017, we will have the visit of the team from Origamil Labs. They will be presenting their current product: ORII which is a smart ring that allow you to have phone calls, listen to you messages in total privacy. It will give …
Read More “Presentation from a HK Kickstarter – Origamil Labs”
At our next social night – on Tuesday the 31th of October 2017 – we will have a short talk looking at how CPUs work – inside the case and showing some of the key microarchitecture changes over the last 45 years. Come along also to meet people and socialise – we have chilled beverages …
Read More “CPU Architecture overview”
A serious weakness has been found in WPA2, the protocol that most everybody use to protect their Wi-Fi networks at home or at the office. A person in range of your network can exploit these weaknesses to read information on your network traffic that you assumed safely encrypted. The weaknesses can allow that person in …
Read More “Krackattacks explained”
During HackJam this week, we had the visit of Ben from Toronto Mesh. He introduced us the simple and easy way to construct a mesh network based on a network of a few Raspberry Pi2 or Raspberry Pi3. They use the model 2 or 3 from Raspberry Pi because the encryption of the data transfer …
Read More “Mesh Network introduction – CJDNS”