Security News
New Python Packaging Proposal Aims to Solve Phantom Dependency Problem with SBOMs
PEP 770 proposes adding SBOM support to Python packages to improve transparency and catch hidden non-Python dependencies that security tools often miss.
thing-it-device-ibeacon
Advanced tools
[thing-it-node] Device Plugin for iBeacon
This allows you to configure distributed iBeacons together with other devices by means of thing-it-node and thing-it.com.
You may react to low battery levels and initiate workflows to exchange those.
You can also use the BLE functionality of the Gateway Computer hosting the iBeacon Device to run a "built-in", virtual beacon (without additional hardware) on that Gateway Computer for which you can specify UUID, Major, Minor and Measured Power.
Additionally, a Beacon Scanner Device is provided, which allows you to report arbitrary scanning events for beacons. Combining the rssi values for those and the position of - possibly multiple - of the Beacon Scanner Devices configured for distributed Gateways with a well-defined position will allow you to perform "tracking of everything".
In addition to using the gateway computer as a beacon scanner, you can also use scanners from BlueUp. To distinguish between gateway and BlueUp, use the scannerType Property: 0 stands for built-in, 1 for BlueUp. Other properties that are needed for BlueUp Scanners:
First, install nodejs on your computer (e.g. your PC or your Raspberry Pi).
Then install [thing-it-node] via
npm install -g thing-it-node
The [thing-it-device-ibeacon] Plugin is installed with [thing-it-node], hence there is no need to install it separately.
The Plugin supports Autodiscovery, hence you only have to create a directory in which you intend to run the configuration, e.g.
mkdir ~/ibeacon
cd ~/ibeacon
and invoke
tin init
and then start [thing-it-node] via
tin run
Install the thing-it Mobile App from the Apple Appstore or Google Play and set it up to connect to [thing-it-node] locally as described here or just connect your browser under http://localhost:3001.
You may measure the RSSI in 1, 3 and 5 meters distance (e.g. via your Beacon App) and provide the measured values via Measured Power (1m), Measured Power (3m) and Measured Power (5m).
This will allow for more accuracy in indoor positioning algorithms.
If you are running a virtual beacon on your Gateway, Measured Power (1m) has to be set. Default is -50dB.
With Surpress Threshold you can define a value for the RSSI below which no beacon events will be published.
Setting state variable ignoreRangingThrottling allows to ignore the settings for eventInterval and rssiThreshold.
The UI for iBeacon Devices shows as follows.
The proximity values are those for the Gateway computer running [thing-it-node] and the Bluetooth Adapter connecting to the iBeacon.
Using the Beacon Scanner on a Gateway Computer as well as real or virtual beacons you can use thing-it.com to perform tracking of users with smart phones (if they are allow you to do so) and equipment (with a beacon attached to it).
After completing the above, you may be interested in
FAQs
[thing-it-node] Device Plugin for iBeacon Devices.
The npm package thing-it-device-ibeacon receives a total of 44 weekly downloads. As such, thing-it-device-ibeacon popularity was classified as not popular.
We found that thing-it-device-ibeacon demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 3 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
PEP 770 proposes adding SBOM support to Python packages to improve transparency and catch hidden non-Python dependencies that security tools often miss.
Security News
Socket CEO Feross Aboukhadijeh discusses open source security challenges, including zero-day attacks and supply chain risks, on the Cyber Security Council podcast.
Security News
Research
Socket researchers uncover how threat actors weaponize Out-of-Band Application Security Testing (OAST) techniques across the npm, PyPI, and RubyGems ecosystems to exfiltrate sensitive data.