Hacks

Nook filesystem found on microSD card

nookinternals-1

Hackers working on the Barnes & Noble Nook have gotten a huge gimmee. nookDevs member poutine took the back off of his and discovered that the device’s filesystem is stored on a 2GB microSD card instead of onboard flash. Mounting the card revealed three ext3 partitions. You can find a listing of the files here. It’s mostly a stock Cupcake build with a few additions like ./system/app/instorewifi-release.apk. The debug interface, adb, is included so its a matter of adding it to the startup script to begin talking to the device over USB.

When the nook was announced, I was interested because it’s an Android device but worried that it would be too locked down to be fun. This is an amazing discovery and being able to modify the filesystem directly will surely make hack development much easier. The back is just screwed on so it isn’t that difficult to remove and since it’s under an external cover I can imagine people keyholing it to get easy access to the card. Veteran Android hackers like JesusFreke have already jumped in to help out. You can find them actively working in #nookdevs on Freenode.

Standard
Hacks

AT&T 3G MicroCell hacking?

microcell

Update: Great post on the software side of AT&T’s MicroCells

US wireless carriers have started selling femtocells to their customers. A femtocell is a device that essentially acts as a mini cellphone tower. It connects to the user’s broadband connection and their cellphone connects wirelessly just like it would to a regular tower. The call is trunked over the broadband connection and the customer gets a much better signal than they normally would. If the caller leaves range of the femtocell, it will be handed off seamlessly to a normal tower.

I was reading about AT&T’s MicroCell, which they’re testing in a couple markets, and saw this interesting note:

Continue reading

Standard