Six months of design iterations, sourcing headaches, and a broken oscilloscope later — I am pleased to share a hardware module I designed to extend the Flipper ecosystem for RF security research. This write-up covers the motivation, engineering challenges, capabilities, and responsible-disclosure principles behind the project — and a frank look at a vulnerability that is very much alive in the Maldives today. Left: 3D render of final PCB · Right: Altium Designer PCB layout view Why I Built It The trigger was reading the original MouseJack disclosure by Bastille Networks. It made me realize that a class of peripherals most people assume to be harmless — the cheap wireless mouse on your desk — can be weaponized from a car park. I wanted a research platform small enough to carry in a jacket pocket, native to the Flipper Zero ecosystem, and capable of passive scanning, protocol analysis, and controlled lab tests. What I...
Temperature Monitoring added Now temperature sensor data is view-able from the web interface, LM35 attached to arduino senses the temperature. Once the status update request send from the router to arduino in a given interval, Arduino replies with the pin status and sensor data. That data can be stored in a Lite DB for further use or to draw the graph on the web GUI. Currently it is displayed on the GUI for testing purposes.