Difference between revisions of "O:40"

Jump to navigation Jump to search
1,627 bytes added ,  10:46, 6 June 2017
→‎Detailed Description: let's distinguish between door hardware and electron-powered hardware
(expanded access list)
(→‎Detailed Description: let's distinguish between door hardware and electron-powered hardware)
 
(3 intermediate revisions by one other user not shown)
Line 42: Line 42:
*Jenny
*Jenny
*...
*...
==Troubleshooting==
=== Have you tried turning it off and on again? ===
The quick and easy way to return the system to a working state is to reboot everything (assuming nothing is broken). Find the doorjam computer. It is a laptop hidden under the tiny shelf under the larger shelf on the east wall up agains the big white La Commune counter. On the side of this laptop is the power button. Press it for about a second, then wait for the computer to shut down on its own. If it doesn't shut down after e.g. 20 seconds then press and hold it until it shuts down. After it shuts down, find the big black power brick connected the the door. It's lying on the floor up against the east wall closer to the door. It's a black power brick with one wire going to the arduino mounted on the door and one wire going an extension cord. Unplug where the power brick is plugged into the extension cord, wait a couple of seconds, then plug it back in. Now go to the laptop and press the power button to power it back on. The laptop will take a while to boot. At some point during boot it will speak its IP addresses. A minute or two after it has spoken its IP it should be ready. If it still doesn't work then something more profound is wrong.


==Identification Methods ==
==Identification Methods ==
Line 51: Line 57:


==== How the card data is used ====
==== How the card data is used ====
* A Hash is created from the already present magnetization pattern on the the stripe.
A Hash is created from the already present magnetization pattern on the the stripe. It is hashed using salted SHA1. This means that the information on the cards is not stored anywhere, so if someone steals the computer they will not have access to any private information.
 
Works with most standard magnetic cards without effecting there normal use. Does not work with 100% of the tested local transit tickets (MTA and BART). However, it is not advised to use Cards which could be harmful to you if the information on the stripes gets in wrong hands (like Government issued IDs or Credit cards). We can not exclude the possibility that Hackers could excess the System storing the Data.<ref>As a matter of fact we can guarantee that. </ref>
Works with most standard magnetic cards without effecting there normal use. Does not work with 100% of the tested local transit tickets (MTA and BART). However, it is not advised to use Cards which could be harmful to you if the information on the stripes gets in wrong hands (like Government issued IDs or Credit cards). We can not exclude the possibility that Hackers could excess the System storing the Data.<ref>As a matter of fact we can guarantee that. </ref>


Line 59: Line 66:


==Detailed Description ==
==Detailed Description ==
=== Hardware <ref>Over 90% recycled materials, approximately 50% natural renewable organic material, 10% re-used buzzwords</ref> ===
=== Door Hardware <ref>Over 90% recycled materials, approximately 50% natural renewable organic material, 10% re-used buzzwords</ref> ===
The upper and lower bolts which keep the left door in place are retracted.
The upper and lower bolts which keep the left door in place are retracted.
=== Computer/Electronics Hardware ===
:''This list is obviously incomplete. If you know these details, please fill them in.''
* some kind of tiny computer
* a card reader of some sort
* other things?


=== Software ===
=== Software ===

Navigation menu