====== Using your Rad1o in HackRF mode ====== When in "HackRF mode", rad1o behaves like the HackRF (the very popular SDR by Michael Ossmann). That means that the rad1o has to be connected to a computer or smartphone and then acts as an interface to world of radiowaves. ===== Booting into HackRF mode ===== When in HackRF mode, the rad1o display shows something like "Booting HACKRF.BIN" or "Booting HKRF-OLD.BIN". If not, [[howto:change_default_application|change the mode]]. ===== Connecting to your PC ==== Connect a microUSB cable to port A. ==== Verifying connection ==== Linux: run ''lsusb | grep -i OpenMoko'' if there is a line of output, you're fine ==== Giving your user access to the device ==== Linux: Create a new file in ''/etc/udev/rules.d'' with the .rules suffix, containing SUBSYSTEMS=="usb", ATTRS{idVendor}=="1d50", ATTRS{idProduct}=="6089", MODE:="0666" SUBSYSTEMS=="usb", ATTRS{idVendor}=="1d50", ATTRS{idProduct}=="cc15", MODE:="0666" You can also download the file from [[http://s.hostalia.de/o|here]]. ==== Getting libHackRF ==== You could install your distribution's libhackrf package. Or, you could take the easy route for all relevant dependencies (including GNU Radio and friends) you might meet later on and use [[http://pybombs.info]] (no root necessary for the stuff you build yourself): git clone --recursive https://github.com/pybombs/pybombs.git cd pybombs #prepare to answer a lot of questions with the default answer #if you're not on debian/ubuntu you should change the install preferences away from deb,src ./pybombs install hackrf ./pybombs install gnuradio gr-osmosdr #create and use shell setup script ./pybombs env #bash: echo "source /home//target/setup_env.sh" >> ~/.bashrc #zsh: >> ~/.zshenv ==== Testing stuff ==== ''osmocom_fft''