{"id":13818,"date":"2015-12-03T07:47:22","date_gmt":"2015-12-03T06:47:22","guid":{"rendered":"http:\/\/www.recantha.co.uk\/blog\/?p=13818"},"modified":"2015-12-03T07:47:22","modified_gmt":"2015-12-03T06:47:22","slug":"hardware-hacker-uses-raspberry-pi-zero-as-a-selfie-stopper","status":"publish","type":"post","link":"https:\/\/www.recantha.co.uk\/blog\/?p=13818","title":{"rendered":"Hardware hacker uses Raspberry Pi Zero as a selfie-stopper"},"content":{"rendered":"<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignnone\" src=\"https:\/\/i0.wp.com\/regmedia.co.uk\/2015\/12\/02\/selfie_876464r6.jpg?resize=560%2C301&#038;ssl=1\" alt=\"\" width=\"560\" height=\"301\" \/><\/p>\n<p>British security expect <a href=\"https:\/\/twitter.com\/stevelord\" target=\"_blank\">Steve Lord<\/a>\u00a0has come up with a unique use for the Raspberry Pi Zero. Powered by batteries, the Zero seeks out open wifi networks and then scans network traffic for calls to Instagram, which is what most people use for selfies. The Pi then sends &#8216;deauth&#8217; packets back to the user&#8217;s computer, thus potentially throwing them off the network. It&#8217;s all slightly illegal, of course, though Lord does describe the hack as pretty shitty in terms of quality, but it does go to show the danger of using open networks. <a href=\"http:\/\/www.theregister.co.uk\/2015\/12\/02\/british_hacker_turns_raspberry_pi_zeros_into_selfie_slayers\/\" target=\"_blank\">Read more at The Register<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>British security expect Steve Lord\u00a0has come up with a unique use for the Raspberry Pi Zero. Powered by batteries, the Zero seeks out open wifi networks and then scans network traffic for calls to Instagram, which is what most people&hellip;<\/p>\n<p class=\"more-link-p\"><a class=\"more-link\" href=\"https:\/\/www.recantha.co.uk\/blog\/?p=13818\">Read more &rarr;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[36,46,48],"tags":[],"class_list":["post-13818","post","type-post","status-publish","format-standard","hentry","category-photography","category-security","category-silliness"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hardware hacker uses Raspberry Pi Zero as a selfie-stopper - Raspberry Pi Pod<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.recantha.co.uk\/blog\/?p=13818\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hardware hacker uses Raspberry Pi Zero as a selfie-stopper - Raspberry Pi Pod\" \/>\n<meta property=\"og:description\" content=\"British security expect Steve Lord\u00a0has come up with a unique use for the Raspberry Pi Zero. Powered by batteries, the Zero seeks out open wifi networks and then scans network traffic for calls to Instagram, which is what most people&hellip;Read more &rarr;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.recantha.co.uk\/blog\/?p=13818\" \/>\n<meta property=\"og:site_name\" content=\"Raspberry Pi Pod\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/recantha\/\" \/>\n<meta property=\"article:published_time\" content=\"2015-12-03T06:47:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/regmedia.co.uk\/2015\/12\/02\/selfie_876464r6.jpg?x=648&amp;y=348&amp;crop=1\" \/>\n<meta name=\"author\" content=\"Michael Horne\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@recantha\" \/>\n<meta name=\"twitter:site\" content=\"@recantha\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Michael Horne\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.recantha.co.uk\/blog\/?p=13818#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.recantha.co.uk\/blog\/?p=13818\"},\"author\":{\"name\":\"Michael Horne\",\"@id\":\"https:\/\/www.recantha.co.uk\/blog\/#\/schema\/person\/c27c4ef2ee1c18b130f1fcd5dcdbb263\"},\"headline\":\"Hardware hacker uses Raspberry Pi Zero as a selfie-stopper\",\"datePublished\":\"2015-12-03T06:47:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.recantha.co.uk\/blog\/?p=13818\"},\"wordCount\":109,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.recantha.co.uk\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.recantha.co.uk\/blog\/?p=13818#primaryimage\"},\"thumbnailUrl\":\"https:\/\/regmedia.co.uk\/2015\/12\/02\/selfie_876464r6.jpg?x=648&amp;y=348&amp;crop=1\",\"articleSection\":[\"Photography\",\"Security\",\"Silliness\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.recantha.co.uk\/blog\/?p=13818#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.recantha.co.uk\/blog\/?p=13818\",\"url\":\"https:\/\/www.recantha.co.uk\/blog\/?p=13818\",\"name\":\"Hardware hacker uses Raspberry Pi Zero as a selfie-stopper - Raspberry Pi Pod\",\"isPartOf\":{\"@id\":\"https:\/\/www.recantha.co.uk\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.recantha.co.uk\/blog\/?p=13818#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.recantha.co.uk\/blog\/?p=13818#primaryimage\"},\"thumbnailUrl\":\"https:\/\/regmedia.co.uk\/2015\/12\/02\/selfie_876464r6.jpg?x=648&amp;y=348&amp;crop=1\",\"datePublished\":\"2015-12-03T06:47:22+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.recantha.co.uk\/blog\/?p=13818#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.recantha.co.uk\/blog\/?p=13818\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.recantha.co.uk\/blog\/?p=13818#primaryimage\",\"url\":\"https:\/\/regmedia.co.uk\/2015\/12\/02\/selfie_876464r6.jpg?x=648&amp;y=348&amp;crop=1\",\"contentUrl\":\"https:\/\/regmedia.co.uk\/2015\/12\/02\/selfie_876464r6.jpg?x=648&amp;y=348&amp;crop=1\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.recantha.co.uk\/blog\/?p=13818#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.recantha.co.uk\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hardware hacker uses Raspberry Pi Zero as a selfie-stopper\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.recantha.co.uk\/blog\/#website\",\"url\":\"https:\/\/www.recantha.co.uk\/blog\/\",\"name\":\"Raspberry Pi Pod\",\"description\":\"Experiences with the Raspberry Pi micro computer and microcontroller\",\"publisher\":{\"@id\":\"https:\/\/www.recantha.co.uk\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.recantha.co.uk\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.recantha.co.uk\/blog\/#organization\",\"name\":\"Raspberry Pi Pod\",\"url\":\"https:\/\/www.recantha.co.uk\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.recantha.co.uk\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/i0.wp.com\/www.recantha.co.uk\/blog\/wp-content\/uploads\/2016\/03\/cropped-PiPod-Logo-v3.png?fit=800%2C337&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/www.recantha.co.uk\/blog\/wp-content\/uploads\/2016\/03\/cropped-PiPod-Logo-v3.png?fit=800%2C337&ssl=1\",\"width\":800,\"height\":337,\"caption\":\"Raspberry Pi Pod\"},\"image\":{\"@id\":\"https:\/\/www.recantha.co.uk\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/recantha\/\",\"https:\/\/x.com\/recantha\",\"https:\/\/www.linkedin.com\/in\/recantha\/\",\"https:\/\/www.youtube.com\/channel\/UCK4F9blabxzmk8Inzhs8tpg\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.recantha.co.uk\/blog\/#\/schema\/person\/c27c4ef2ee1c18b130f1fcd5dcdbb263\",\"name\":\"Michael Horne\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.recantha.co.uk\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/479778b0677caadde0ceb54c4129804ef674914607e3ed0998808148357d10d8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/479778b0677caadde0ceb54c4129804ef674914607e3ed0998808148357d10d8?s=96&d=mm&r=g\",\"caption\":\"Michael Horne\"},\"url\":\"https:\/\/www.recantha.co.uk\/blog\/?author=1\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hardware hacker uses Raspberry Pi Zero as a selfie-stopper - Raspberry Pi Pod","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.recantha.co.uk\/blog\/?p=13818","og_locale":"en_US","og_type":"article","og_title":"Hardware hacker uses Raspberry Pi Zero as a selfie-stopper - Raspberry Pi Pod","og_description":"British security expect Steve Lord\u00a0has come up with a unique use for the Raspberry Pi Zero. Powered by batteries, the Zero seeks out open wifi networks and then scans network traffic for calls to Instagram, which is what most people&hellip;Read more &rarr;","og_url":"https:\/\/www.recantha.co.uk\/blog\/?p=13818","og_site_name":"Raspberry Pi Pod","article_publisher":"https:\/\/www.facebook.com\/recantha\/","article_published_time":"2015-12-03T06:47:22+00:00","og_image":[{"url":"https:\/\/regmedia.co.uk\/2015\/12\/02\/selfie_876464r6.jpg?x=648&amp;y=348&amp;crop=1","type":"","width":"","height":""}],"author":"Michael Horne","twitter_card":"summary_large_image","twitter_creator":"@recantha","twitter_site":"@recantha","twitter_misc":{"Written by":"Michael Horne"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.recantha.co.uk\/blog\/?p=13818#article","isPartOf":{"@id":"https:\/\/www.recantha.co.uk\/blog\/?p=13818"},"author":{"name":"Michael Horne","@id":"https:\/\/www.recantha.co.uk\/blog\/#\/schema\/person\/c27c4ef2ee1c18b130f1fcd5dcdbb263"},"headline":"Hardware hacker uses Raspberry Pi Zero as a selfie-stopper","datePublished":"2015-12-03T06:47:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.recantha.co.uk\/blog\/?p=13818"},"wordCount":109,"commentCount":0,"publisher":{"@id":"https:\/\/www.recantha.co.uk\/blog\/#organization"},"image":{"@id":"https:\/\/www.recantha.co.uk\/blog\/?p=13818#primaryimage"},"thumbnailUrl":"https:\/\/regmedia.co.uk\/2015\/12\/02\/selfie_876464r6.jpg?x=648&amp;y=348&amp;crop=1","articleSection":["Photography","Security","Silliness"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.recantha.co.uk\/blog\/?p=13818#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.recantha.co.uk\/blog\/?p=13818","url":"https:\/\/www.recantha.co.uk\/blog\/?p=13818","name":"Hardware hacker uses Raspberry Pi Zero as a selfie-stopper - Raspberry Pi Pod","isPartOf":{"@id":"https:\/\/www.recantha.co.uk\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.recantha.co.uk\/blog\/?p=13818#primaryimage"},"image":{"@id":"https:\/\/www.recantha.co.uk\/blog\/?p=13818#primaryimage"},"thumbnailUrl":"https:\/\/regmedia.co.uk\/2015\/12\/02\/selfie_876464r6.jpg?x=648&amp;y=348&amp;crop=1","datePublished":"2015-12-03T06:47:22+00:00","breadcrumb":{"@id":"https:\/\/www.recantha.co.uk\/blog\/?p=13818#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.recantha.co.uk\/blog\/?p=13818"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.recantha.co.uk\/blog\/?p=13818#primaryimage","url":"https:\/\/regmedia.co.uk\/2015\/12\/02\/selfie_876464r6.jpg?x=648&amp;y=348&amp;crop=1","contentUrl":"https:\/\/regmedia.co.uk\/2015\/12\/02\/selfie_876464r6.jpg?x=648&amp;y=348&amp;crop=1"},{"@type":"BreadcrumbList","@id":"https:\/\/www.recantha.co.uk\/blog\/?p=13818#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.recantha.co.uk\/blog"},{"@type":"ListItem","position":2,"name":"Hardware hacker uses Raspberry Pi Zero as a selfie-stopper"}]},{"@type":"WebSite","@id":"https:\/\/www.recantha.co.uk\/blog\/#website","url":"https:\/\/www.recantha.co.uk\/blog\/","name":"Raspberry Pi Pod","description":"Experiences with the Raspberry Pi micro computer and microcontroller","publisher":{"@id":"https:\/\/www.recantha.co.uk\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.recantha.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.recantha.co.uk\/blog\/#organization","name":"Raspberry Pi Pod","url":"https:\/\/www.recantha.co.uk\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.recantha.co.uk\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/www.recantha.co.uk\/blog\/wp-content\/uploads\/2016\/03\/cropped-PiPod-Logo-v3.png?fit=800%2C337&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.recantha.co.uk\/blog\/wp-content\/uploads\/2016\/03\/cropped-PiPod-Logo-v3.png?fit=800%2C337&ssl=1","width":800,"height":337,"caption":"Raspberry Pi Pod"},"image":{"@id":"https:\/\/www.recantha.co.uk\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/recantha\/","https:\/\/x.com\/recantha","https:\/\/www.linkedin.com\/in\/recantha\/","https:\/\/www.youtube.com\/channel\/UCK4F9blabxzmk8Inzhs8tpg"]},{"@type":"Person","@id":"https:\/\/www.recantha.co.uk\/blog\/#\/schema\/person\/c27c4ef2ee1c18b130f1fcd5dcdbb263","name":"Michael Horne","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.recantha.co.uk\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/479778b0677caadde0ceb54c4129804ef674914607e3ed0998808148357d10d8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/479778b0677caadde0ceb54c4129804ef674914607e3ed0998808148357d10d8?s=96&d=mm&r=g","caption":"Michael Horne"},"url":"https:\/\/www.recantha.co.uk\/blog\/?author=1"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p2RsaV-3AS","jetpack-related-posts":[{"id":15867,"url":"https:\/\/www.recantha.co.uk\/blog\/?p=15867","url_meta":{"origin":13818,"position":0},"title":"PoisonTap is a Raspberry Pi Zero security threat worth taking note of","author":"Michael Horne","date":"17 November 2016","format":false,"excerpt":"I wasn't going to blog this as it's a pretty horrid use of the Pi, but I wanted to highlight the security concern! PoisonTap is a Raspberry Pi Zero\/Node.js hacking machine. According to the maker's website, it: siphons cookies, exposes internal router & installs web backdoor on locked computers It\u2026","rel":"","context":"In &quot;Networking&quot;","block_context":{"text":"Networking","link":"https:\/\/www.recantha.co.uk\/blog\/?cat=33"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.recantha.co.uk\/blog\/wp-content\/uploads\/2016\/11\/poisontap.jpeg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.recantha.co.uk\/blog\/wp-content\/uploads\/2016\/11\/poisontap.jpeg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.recantha.co.uk\/blog\/wp-content\/uploads\/2016\/11\/poisontap.jpeg?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":17877,"url":"https:\/\/www.recantha.co.uk\/blog\/?p=17877","url_meta":{"origin":13818,"position":1},"title":"Physical computing from a PC or Mac using a Raspberry Pi Zero","author":"Michael Horne","date":"4 December 2017","format":false,"excerpt":"Gordon Hollingworth, over at Raspberry Pi, has just blogged an exciting new development that means you can now use a Raspberry Pi Zero's GPIO pins from your PC or Mac. You'll need to install Raspbian x86 Stretch\u00a0on the non-Zero machine first. Now it\u00a0looks like you don't need an SD card\u2026","rel":"","context":"In &quot;Networking&quot;","block_context":{"text":"Networking","link":"https:\/\/www.recantha.co.uk\/blog\/?cat=33"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.recantha.co.uk\/blog\/wp-content\/uploads\/2017\/12\/IMG_20171127_164539-500x375.jpg?fit=500%2C375&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":15230,"url":"https:\/\/www.recantha.co.uk\/blog\/?p=15230","url_meta":{"origin":13818,"position":2},"title":"Turn your Raspberry Pi (Zero) into a dedicated VPN server","author":"Michael Horne","date":"8 August 2016","format":false,"excerpt":"Transposed Messenger has written a great tutorial in which he explains how to turn your Raspberry Pi into a dedicated VPN. This will work with all Raspberry Pis, not just the Zero but he's used the Zero because it's cheap and cheerful. Great if you want to access your home\u2026","rel":"","context":"In &quot;Networking&quot;","block_context":{"text":"Networking","link":"https:\/\/www.recantha.co.uk\/blog\/?cat=33"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/adamantine.me\/wp-content\/uploads\/2016\/08\/2pis-768x401.jpg?resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/adamantine.me\/wp-content\/uploads\/2016\/08\/2pis-768x401.jpg?resize=350%2C200 1x, https:\/\/i0.wp.com\/adamantine.me\/wp-content\/uploads\/2016\/08\/2pis-768x401.jpg?resize=525%2C300 1.5x, https:\/\/i0.wp.com\/adamantine.me\/wp-content\/uploads\/2016\/08\/2pis-768x401.jpg?resize=700%2C400 2x"},"classes":[]},{"id":16193,"url":"https:\/\/www.recantha.co.uk\/blog\/?p=16193","url_meta":{"origin":13818,"position":3},"title":"Build a motion-activated security camera with the Raspberry Pi Zero","author":"Michael Horne","date":"6 January 2017","format":false,"excerpt":"Mark West, a Brit now living in Norway, was convinced that he had some unwanted visitors in his garden. So, he decided to press into action a Raspberry Pi Zero as a security camera solution. He shopped at The Pi Hut\u00a0and got hold of the Zero, the Pi NoIR Camera\u2026","rel":"","context":"In &quot;Accessories&quot;","block_context":{"text":"Accessories","link":"https:\/\/www.recantha.co.uk\/blog\/?cat=54"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/utbrudd.bouvet.no\/wp-content\/uploads\/2017\/01\/bollocks-e1483637804853-1024x768.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/utbrudd.bouvet.no\/wp-content\/uploads\/2017\/01\/bollocks-e1483637804853-1024x768.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/utbrudd.bouvet.no\/wp-content\/uploads\/2017\/01\/bollocks-e1483637804853-1024x768.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/utbrudd.bouvet.no\/wp-content\/uploads\/2017\/01\/bollocks-e1483637804853-1024x768.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":16473,"url":"https:\/\/www.recantha.co.uk\/blog\/?p=16473","url_meta":{"origin":13818,"position":4},"title":"Raspberry Pi Zero gets a Wifi and Bluetooth update &#038; a new case &#8211; say hello to the Raspberry Pi Zero W","author":"Michael Horne","date":"28 February 2017","format":false,"excerpt":"Everyone, it seems, loves the Raspberry Pi Zero. With its low price-point and slimline looks, it's a great choice for embedded projects. Today, it gets even better: Raspberry Pi has launched the Raspberry Pi Zero W. The W stands for wireless or wifi because the Zero W sports the same\u2026","rel":"","context":"In &quot;Accessories&quot;","block_context":{"text":"Accessories","link":"https:\/\/www.recantha.co.uk\/blog\/?cat=54"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.recantha.co.uk\/blog\/wp-content\/uploads\/2017\/02\/Zero-W-reverse_sm-1.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.recantha.co.uk\/blog\/wp-content\/uploads\/2017\/02\/Zero-W-reverse_sm-1.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.recantha.co.uk\/blog\/wp-content\/uploads\/2017\/02\/Zero-W-reverse_sm-1.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.recantha.co.uk\/blog\/wp-content\/uploads\/2017\/02\/Zero-W-reverse_sm-1.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":17415,"url":"https:\/\/www.recantha.co.uk\/blog\/?p=17415","url_meta":{"origin":13818,"position":5},"title":"Touchscreen home alarm control panel for Home Assistant and the Raspberry Pi","author":"Michael Horne","date":"2 August 2017","format":false,"excerpt":"Colin O'Dell\u00a0has taken a Raspberry Pi Zero W, an Adafruit 3.5\" touchscreen, a PIR motion sensor and a 3D-printed enclosure and created a home alarm control panel. The system uses Z-Wave door sensors which send MQTT messages to the Pi via the Home Assistant\u00a0open-source home automation platform. The PIR sensor\u2026","rel":"","context":"In &quot;Accessories&quot;","block_context":{"text":"Accessories","link":"https:\/\/www.recantha.co.uk\/blog\/?cat=54"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.recantha.co.uk\/blog\/wp-content\/uploads\/2017\/08\/alarm.jpg?fit=900%2C675&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.recantha.co.uk\/blog\/wp-content\/uploads\/2017\/08\/alarm.jpg?fit=900%2C675&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.recantha.co.uk\/blog\/wp-content\/uploads\/2017\/08\/alarm.jpg?fit=900%2C675&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.recantha.co.uk\/blog\/wp-content\/uploads\/2017\/08\/alarm.jpg?fit=900%2C675&ssl=1&resize=700%2C400 2x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.recantha.co.uk\/blog\/index.php?rest_route=\/wp\/v2\/posts\/13818","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.recantha.co.uk\/blog\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.recantha.co.uk\/blog\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.recantha.co.uk\/blog\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.recantha.co.uk\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=13818"}],"version-history":[{"count":1,"href":"https:\/\/www.recantha.co.uk\/blog\/index.php?rest_route=\/wp\/v2\/posts\/13818\/revisions"}],"predecessor-version":[{"id":13819,"href":"https:\/\/www.recantha.co.uk\/blog\/index.php?rest_route=\/wp\/v2\/posts\/13818\/revisions\/13819"}],"wp:attachment":[{"href":"https:\/\/www.recantha.co.uk\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=13818"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.recantha.co.uk\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=13818"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.recantha.co.uk\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=13818"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}