Warning: mkdir(): No space left on device in /var/www/group-telegram/post.php on line 37

Warning: file_put_contents(aCache/aDaily/post/tech_b0lt_Genona/-4900-4901-4902-4903-4904-4905-): Failed to open stream: No such file or directory in /var/www/group-telegram/post.php on line 50
Технологический Болт Генона | Telegram Webview: tech_b0lt_Genona/4900 -
Telegram Group & Telegram Channel
Ресёрчи, которые мы заслужили

Был куплен китайский тепловизор (Xtherm II T2S+), который подключался к смартфону. С ним в целом было всё нормально, но иногда он глючил

it works okay, but the app is sometimes buggy, crashes when changing settings, and phones home for some reason


И тут понеслось

Сначала автор расковырял приложение на Android, потом добрался до so-шки и начал разбираться с ней в Гидре (https://github.com/NationalSecurityAgency/ghidra), а так же смотреть что ещё есть в этом направлении.

Результатом всех страданий было решено допиливать своё
TL;DR I gave up on trying to patch that Android app since I am not experienced with either Android nor Java. Mainly because I found ht301_hacklib where someone ported the findings of netman in InfiCam to get the v1 of the T2S+ working in a very minimal Python script. My v2 also worked but showed a very distorted image. So I got to work figuring out how to get this to a usable state, to hopefully later make a C/C++ library/application that would allow me to make a standalone thermal camera out of a Raspberry Pi or something like that. 


Была доработана изначально взятая библиотека ht301_hacklib (патч так и не приняли, поэтому все фиксы так и живут его форке)

Далее была разобрана железка и составлено описание "кишок": курсирующие по форумам слухи, что в новых версиях изымался FPGA, не подтвердились.

В конце всего это процесса автор ещё наваял фичу, что бы можно было напрямую брать "сырые" данные с сенсора, осуществлять калибровку данных и получать вменяемую картинку, а так же добавил возможностей для отладки железа

To demonstrate this technique, I decapped an AD9042 ADC that I had in a ceramic DIP package. A Raspberry Pi Pico and a MOSFET were used to modulate the power to the chip, with the control software issuing ON/OFF commands over serial. This produced very nice results, even with a very low integration time. 

It's not only useful for silicon die debugging; it can also highlight even minute heat sources on PCBs and anything else that can be modulated, including people.


This feature allows you to use the camera in a lock-in mode. This allows for very precise measurements of hotspots on anything that can be modulated in some way. Examples include silicon dies, circuit boards, people (lock in based on heart rate) and potentially many others.


Пост полностью и с подробностями
Hacking the T2S+ Out of Fear: Get Lock-In Thermography for Free link
https://dmytroengineering.com/content/projects/t2s-plus-thermal-camera-hacking
+
GitHub
https://github.com/diminDDL/IR-Py-Thermal



group-telegram.com/tech_b0lt_Genona/4900
Create:
Last Update:

Ресёрчи, которые мы заслужили

Был куплен китайский тепловизор (Xtherm II T2S+), который подключался к смартфону. С ним в целом было всё нормально, но иногда он глючил

it works okay, but the app is sometimes buggy, crashes when changing settings, and phones home for some reason


И тут понеслось

Сначала автор расковырял приложение на Android, потом добрался до so-шки и начал разбираться с ней в Гидре (https://github.com/NationalSecurityAgency/ghidra), а так же смотреть что ещё есть в этом направлении.

Результатом всех страданий было решено допиливать своё
TL;DR I gave up on trying to patch that Android app since I am not experienced with either Android nor Java. Mainly because I found ht301_hacklib where someone ported the findings of netman in InfiCam to get the v1 of the T2S+ working in a very minimal Python script. My v2 also worked but showed a very distorted image. So I got to work figuring out how to get this to a usable state, to hopefully later make a C/C++ library/application that would allow me to make a standalone thermal camera out of a Raspberry Pi or something like that. 


Была доработана изначально взятая библиотека ht301_hacklib (патч так и не приняли, поэтому все фиксы так и живут его форке)

Далее была разобрана железка и составлено описание "кишок": курсирующие по форумам слухи, что в новых версиях изымался FPGA, не подтвердились.

В конце всего это процесса автор ещё наваял фичу, что бы можно было напрямую брать "сырые" данные с сенсора, осуществлять калибровку данных и получать вменяемую картинку, а так же добавил возможностей для отладки железа

To demonstrate this technique, I decapped an AD9042 ADC that I had in a ceramic DIP package. A Raspberry Pi Pico and a MOSFET were used to modulate the power to the chip, with the control software issuing ON/OFF commands over serial. This produced very nice results, even with a very low integration time. 

It's not only useful for silicon die debugging; it can also highlight even minute heat sources on PCBs and anything else that can be modulated, including people.


This feature allows you to use the camera in a lock-in mode. This allows for very precise measurements of hotspots on anything that can be modulated in some way. Examples include silicon dies, circuit boards, people (lock in based on heart rate) and potentially many others.


Пост полностью и с подробностями
Hacking the T2S+ Out of Fear: Get Lock-In Thermography for Free link
https://dmytroengineering.com/content/projects/t2s-plus-thermal-camera-hacking
+
GitHub
https://github.com/diminDDL/IR-Py-Thermal

BY Технологический Болт Генона









Share with your friend now:
group-telegram.com/tech_b0lt_Genona/4900

View MORE
Open in Telegram


Telegram | DID YOU KNOW?

Date: |

Since its launch in 2013, Telegram has grown from a simple messaging app to a broadcast network. Its user base isn’t as vast as WhatsApp’s, and its broadcast platform is a fraction the size of Twitter, but it’s nonetheless showing its use. While Telegram has been embroiled in controversy for much of its life, it has become a vital source of communication during the invasion of Ukraine. But, if all of this is new to you, let us explain, dear friends, what on Earth a Telegram is meant to be, and why you should, or should not, need to care. Messages are not fully encrypted by default. That means the company could, in theory, access the content of the messages, or be forced to hand over the data at the request of a government. On December 23rd, 2020, Pavel Durov posted to his channel that the company would need to start generating revenue. In early 2021, he added that any advertising on the platform would not use user data for targeting, and that it would be focused on “large one-to-many channels.” He pledged that ads would be “non-intrusive” and that most users would simply not notice any change. For Oleksandra Tsekhanovska, head of the Hybrid Warfare Analytical Group at the Kyiv-based Ukraine Crisis Media Center, the effects are both near- and far-reaching. "We as Ukrainians believe that the truth is on our side, whether it's truth that you're proclaiming about the war and everything else, why would you want to hide it?," he said.
from sa


Telegram Технологический Болт Генона
FROM American