TADHack Paris ran over the weekend of the 12th and 13th December at NUMA Sentier, just before the WebRTC Conference and Expo. The Hackathon focused on WebRTC and the sponsors’ resources: Apidaze, Circuit by Unify, Telestax, Tropo (CiscoSpark), Truphone, and VoxImplant. The sponsors provide an introduction to themselves and their resources in this TADHack Paris webinar. We had about 60 people on-site, with several remote entries. By 10 minutes past the official start time about 40 people had arrived, by lunchtime we brought in extra chairs. This is part 1 of the TADHack Paris Review, because of the number of hacks the review will run over several weblogs.
Diversity is important for creativity and to TADHack, we had good diversity in developer backgrounds from those with little experience in hacking or telecoms, through those more enterprise/web focused that were building experience in telecom APIs and platforms, to renowned hackers.
Musical entertainment on Saturday evening was provided by the Randy Resnick Trio featuring Ellie Panton; yep, the Panton clan was at TADHack. Below is a clip of “The Woman in White” composed by Randy Resnick from the CD “To Love” available on iTunes and Spotify.
The videos and photos taken during the event are available here:
TADHack Paris YouTube playlist
Google TADHack Paris photo album
We ended up with 14 pitches, taking about 2.5 hours to present. The audience was ready for a drink after that marathon session 🙂 We kicked off the pitches with a remote pitch from Vince Puglia, “just-text.us,” a SMS based CRM app. Below is the pitch video, audience Q&A, and his slides. Vince used Telestax RESTComm to build a simple SMS application, a BOT, which handled most of the customer queries. And when a customer question was out of scope that it could handle, the question was forwarded to a person, likely the small business owner.
We’re increasingly seeing SMS becoming a default UI, as people are fatigued by too many apps, especially from businesses or services that are used infrequently. Even my local garden center has an app, I just want to know when they are open, not download yet another app to find that out. No opening times on their door, just an advert for their app, grrrr!
Next was the hack “SpeakBack” by Erik Beijer, Ryan Bril, Maikel Vreugde, Michael Jepson, Bas Peters, and Dion Segijn from CMTelecom. They used the resources of VoxImplant to provide video calling / conferencing. The hack was a presentation overlay enabling the audience to connect with the speaker and ask questions by mobile phone. The audience could be on-site or remote watching a live stream, this is a great way to include the complete audience. We’ll be trying this out at the next TADSummit. And it also captures all the questions, as often the audience asks a question and the recording does not capture the audio only the speakers response, starting with “Great question…”.
Next was the hack “Call ME” by Federico Cabiddu, Giacomo Vacca, Marco Barre, and Karel Bourgois. All members of the Orange Libon team, and all non-coders in their work-life. They created the hack in javascript. Telcos take note, many more of your people should be involved in TADHack. Its a shame on your sector of the telecoms industry we have so few telco people taking part. They used resources from Telestax, Apidaze, and Truphone. In 24 hours they created a service that received calls on multiple numbers including the web, and created a video-voicemail service with transcription. Telecoms is now programmable, its becoming quite easy to create new services that scale. As Sebastian Schumann showed at TADHack London in April and TADSummit in November. Telcos need to break out of their silo and see what is possible today.
Next we had an important hack / demonstration from Steven of DesignTotal.nl and Rianne Goijarts (WebRTC-Multimedia hacker / developer). The hack was called “Whatshack,” a reverse look-up of phone numbers to Whatspy Public to WebRTC.
WhatsSpy Public (not to confuse with WhatsSpy) is an web-oriented application that tracks every move on WhatsApp of whoever you like to follow (by only knowing their phone number). This application is setup as an Proof of Concept that WhatsApp is broken in terms of privacy. It keeps track of the following activities:
- Online/Offline status (even with privacy options set to “nobody”)
- Profile pictures*
- Status messages*
- Privacy settings
* only if privacy option is set to “everyone” (set by default)
This hack creates a script to access the 900 million active accounts (likely >1B accounts in total) using telephone numbers. The above data could be sold onto spammers and on the black market of app developers.
As long as you have a phone number you can find out the details of the Whatsapp account associated with that number. So you can search through Whatsapp quite quickly and easily. The aim of the hack was to create awareness about security holes and privacy problems when there is no opt-out for the collection of personal data. We only show the first half of the presentation where no personal data was presented. The rest of the presentation can not be shown as surprisingly sensitive personal data of Whatsapp users was presented.
To wrap-up part 1 of the TADHack Paris Review we finish with a hack of a prototype speaker recognition platform using WebRTC audio capture by MD Ibrahim from GreenKey Technologies. Its a great example of using WebRTC for authentication using voice data. This generated much discussion in the audience and is clearly an emerging hot topic.
TADHack Paris generated many impressive hacks, telecom app development is a powerful emerging topic.
Is just-text.us supposed to be a working URL?…
I don’t think so, it was just a hack.