Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I actually reverse engineered most of the code for the drivers for LeapMotion for my undergraduate project. Turns out it was illegal as per their TOS so my professor had me quit that project and take it offline.

The biggest problem I had encountered back then is that there was a packet transmitted with a certain signature in order to turn on the cameras that I could not reverse for the life of me (had something to do with the app version).

Other than that: basically two IR cameras that stream in an interleaved pixel format (2 x 640) x 480 iirc. It was a fun device to use and hack, but the first time I had ran into the brick-wall that is an enclosed format.



Head of the Leap tracking team here - we actually unlocked the UVC drivers for our cameras a while back! https://github.com/leapmotion/leapuvc

> LeapUVC gives you access to the Leap Motion Controller image data through the industry standard UVC (Universal Video Class) interface. This gives you low level controls such as LED brightness, gamma, exposure, gain, resolution, and more.


Oh wow! That is great news! Great job, will dig out my leap motion once I get back and try it out!




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: