Requires 'beep', 'arp-scan', 'aircrack-ng' and a GNU/Linux host. Put on a BeagleBone black or Raspberry Pi. Plug in a good USB wireless NIC (like the TL-WN722N) and wear it, hide it in your workplace or your exhibition.
glasshole.sh
Find and kick Google Glass devices from your local wireless network.
10 Responses:
Coming soon to...DNA Lounge?
Interesting that someone at a school that's dedicated to exploring "imaginative use of communications technologies" is annoyed that someone is wearing a piece of communication technology at their presentation.
On the other hand, it's a pretty clever use of another communication technology to thwart it.
Just because it's technology doesn't mean it's imaginative.
And on the gripping hand, well, I don't have to add much here.
Hope the Glass is well-hardened.
If you could futz with the content going to the glasses the obvious choice would be goastse.
Instead, take any images, and rotate them by a couple of degrees to one side, and watch as the wearer starts tilting their head to compensate.
I would think upsidedownternet would be the more logical choice
When did de-authing people you don't like become "pretty clever" ? It's literally a one-liner in a shell script. Note that "your local wireless network" here doesn't mean "the one you own" but simply "the one you've decided you're going to trash", that's why the script is piddling about sending de-auth packets rather than just blacklisting the MACs it doesn't like and refusing them.
It's similar to being in China with any other Google device, except with MAC instead of IPv4. Do you think they'll add address failover for the bulk of their products in China first, or to defeat this?
It's the 2014 version of "Butt Trumpet"!
In the 19A0s decent cameras were still expensive and bulky enough that we had a decade to adapt to glass with Glass without the "risk of Indoor Street View" aspect.