Skip to main content

LoRa IoT Network Programming | RYLR896

Hey everyone, so I just got some LoRa modules from REYAX to experiment with long range network applications and these things are so cool! So far I've made a long range security alarm, a button to water plants on the other side of my property, and some bridge code to interact with IP and BLE networks.

Just thought I'd do a quick video update on this stuff:

The module I wrote is part of the Espruino collection now:

I got these LoRa devices from REYAX:

They seem to only sell them on e-bay right now: RYLR896

Popular posts from this blog

Raspberry Pi 4 Complete Guide

I've been a fan of Raspberry Pi since the original Pi 1 so it's always exciting for me to see how these boards evolve with each new model. The newest Raspberry Pi 4 is no exception and it certainly raises the bar for Single Board Computers. While the older models were mostly only useful as educational boards or for DIY/maker projects, the Pi 4 finally packs a real punch in terms of performance. With a 64-bit quad core ARM processor and up to 4GB of ram, I expect these boards to end up in all kinds of applications, ranging from home media centers to actual home desktop use. Whether you're just getting into Pi's or you're looking to upgrade from one of the older models, this guide is for you.   Part 1: Hardware This video goes over the hardware of the Raspberry Pi itself as well as all of the additional peripheral hardware that you'll need to get started. Most of the parts (including the 4GB Pi 4) came from this CanaKit .     Part 2: Operat

DIY Solar Powered LoRa Repeater (with Arduino)

In today's video I be built a solar powered LoRa signal repeater to extend the range of my LoRa network. This can easily be used as the basis for a LoRa mesh network with a bit of extra code and additional repeaters. Even if you're not into LoRa networks all of the solar power hardware in this video can be used for any off-the-grid electronics projects or IoT nodes!  

Always Secure Your localhost Servers

Recently I was surprised to learn that web browsers allow any site you visit to make requests to resources on localhost (and that they will happily allow unreported mixed-content ). If you'd like to test this out, run an HTTP server on port 8080 (for instance with python -m http.server 8080 ) and then visit this page. You should see "Found: HTTP (8080)" listed and that's because the Javascript on that page made an HTTP GET request to your local server to determine that it was running. Chances are it detected other services as well (for instance if you run Tor or Keybase locally). There are two implications from this that follow: Website owners could potentially use this to collect information about what popular services are running on your local network. Malicious actors could use this to exploit vulnerabilities in those services. Requests made this way are limited in certain ways since they're considered opaque , meaning that the web page isn't able