The Background We talked earlier about how certain ISPs block websites by using DNS hijack methods and I had recommended using DNSCrypt to bypass it. Well, as part of my home network overhaul, I moved over from the consumer grade (but still decent enough) Asus router over to Ubiquiti stack which, among other things, lead me to use their “Unify Security Gateway (USG)” as the router. Now, this router is pretty decent and is running Ubiquiti’s EdgeOS (derived from Vyatta OS, which in turn is based on linux/debian).
ISPs in India have been blocking websites since many years. It’s often done without much sense to it. The goveernment/telecom bodies and courts sometimes tell the ISPs to block content instead of telling the same to the websites that host the content. Sometimes, the orders are to block certain urls and ISPs are over-enthusiastic in implementing the orders and block complete websites. It’s all frustrating but it becomes enraging when you find out that the ISPs are messing with your traffic in a less than ethical way to implement this.
TLDR; Indian ISP ACT Fibernet (aka Beam Telecom) hijacks its users’ DNS requests (even when using public DNS servers like Google or OpenDNS) and blocks websites through this method. This has huge implications beyond website blocking and you can’t rely on anything that you are browsing anymore though there are ways available to make yourself safe. Aside: Indian ISPs are blocking benign/collateral damage sites now like bit.
While trying to make some graphs for one of my side projects recently, I came across an issue that both matplotlib and ggplot did not show up the graphs. I was able to save the graphs to an image file just fine, but if I tried to show them directly on screen while running the script, it just printed a number and exited. After tearing apart my hair for some time, I checked the backend being used by matplot lib:
I’m building a smartwatch project based around the new IoT posterkid on the block, ESP8266. Apart from the usual “smart” stuff, it does still need to display correct time :) and hence, the need for an ntp driver/client. I couldn’t find anyone working on that yet, so wrote up a quick and dirty implementation here: NTP Implementation for ESP8266 ESP8266 Smartwatch NTP Demo It still has a lot of stuff left to be done to make it good enough for the smartwatch project but it works.
So I got bored of listening to same old songs on my phone over and over and Rdio announced a streaming plan for India. With a sigh of relief I subscribed immediately and it was stellar at home with its wonderful 32 million song collection and chromecast support to boot. The experience during the commute daily was underwhelming. Couple the spotty airtel data connection with no one station covering all songs I would love and it makes for a frustrating commute with long gaps all over.
Spent this weekend building a remote controlled car with a live camera feed with a Raspberry Pi doing the communication and brains duty. Pretty nice real time movement control and camera pan/tilt control through websockets with a live stream feeding back to any browser directly from the car through mjpg-streamer (PS: Video is at the bottom of the post. Browser/video on TV courtesy ChromeCast. Casted my Nexus 5 screen to the TV simultaneously while controlling the car :) )
Dangerous is a mind which is left grounded at home for days. Being stuck at home and having a few pieces of joy around made me do this over the weekend. Ingredients: An old Toy RC car broken out of shape by my 4 year old DAGU Mini Driver Screw Driver/Batteries/Tape/Glue/Rubber bands/Old gift cards Half an hour of coding Output: A car that runs automatically making 8 shape on the floor (More like random fractals due to the wheels having no grip)
My brother, Amit Goel, has founded a startup “Patterbuzz” which is aiming to disrupt the digital publishing marketplace. Read on for details about it in his words. I can assure you that you don’t want to miss out on this whether you are a publisher or a consumer :) Welcome Offer: Download the app and register your account before 15th December and get 100 Credits FREE!! to download the content of your choice.
Exchange Security Bypass Xposed Mode for Nexus 4/5/7 and other AOSP based devices (Android 4.3 / 4.4) Update: This has now been tested to work successfully on all stock or nearly stock JellyBean (4.3) and KitKat (4.4) ROMs on Nexus 4 / Nexus 5 / Nexus 7. Other AOSP ROMs like CM11 should work as well. This mod should be used along with Xposed ( http://forum.xda-developers.com/showthread.php?t=1574401 ). Xposed is this awesome framework developed by rovo89 which allows you to carry out mods to your device without changing any files (well except one “app_process” as part of the xposed installer).