• 3 Posts
  • 115 Comments
Joined 3 years ago
cake
Cake day: June 22nd, 2023

help-circle
  • I had a similar situation with a cabin with terrible switch placement and maybe a single switched outlet for a lamp that just wasn’t positioned very well.

    I used the wall switch to turn on the switched outlet and that triggered three other lamps to turn on. I also configured it to dim them all from that same switch, a Tapo S505D. It worked well until someone else plugged a space heater into the outlet and killed the dimmer.

    I also put a ZBT-2 to add ZigBee to the system, as I had a bunch of IKEA smart, wireless remotes that just didn’t work well through their hub and matter integration. With the ZBT-2, I added the remotes directly and had full control over the triggers, so I created an automation to act as a light switch that could be mounted anywhere and control anything.

    When said person killed the dimmer, they just grabbed a wireless switch and stuck it on the wall above the switch and now the lights can be controlled while I order a replacement. I’ve got a bunch more remotes coming this week to add switches to every entrance to the room that previously had nothing.











  • I did a similar project with a raspberry pi pico w and a glitter lamp. I ended up destroying the surface mount LEDs trying to solder them in to the board and instead replaced them with my own. The stirring motor was good, and a button to control it from the outside was a nice addition. Put the whole thing together with ESP Home and it’s fantastic. Also allowed me to switch from disposable batteries to a standard USB cable for power.











  • Godnroc@lemmy.worldtoTechnology@lemmy.world*Permanently Deleted*
    link
    fedilink
    English
    arrow-up
    4
    arrow-down
    1
    ·
    5 months ago

    I’m speculating, but it wouldn’t change a thing. You would still need to request domain addresses from a server somewhere, but traffic between your device and server would be encrypted in transit. The DNS server would also be verifiable to prevent imitators.

    So, the request would go to the PiHole and if it was not being filtered the PiHole would make the request of whatever upstream server is configured same as before.