Using H2O Wireless with OVMS
Updated December 30, 2019
You can order an H20 SIM directly from H2O Wireless for $10, plus $10 for the first chunk of service. It looks like the shipping will be free until after you put in your credit card, then it's crazy ($26 for the default shipping method and $15 for the cheapest/slowest, as I recall). You can also buy them locally, at Target, etc., and save the shipping charge. I was all ready to do that, when Cathy found you can order H20 SIMs from Amazon for $0.01 with free shipping. Update December, 2019: the penny deal is no longer valid. Now it's $1.00.
I got it yesterday. It works. Here are the step-by-step instructions:
That's it! It was a little wonky right after I configured it until it did a self-reboot. Perhaps it had problems switching from the old AT&T configuration to the H2O setup. So, I'd recommend a power cycle after setting the network configuration. It seems very responsive, although I am seeing a fair number of broken pipe messages on the server, although I'd occasionally see clumps of those messages when on the AT&T plan.
Their web site security is horrifying. When I set up my account, I generated a cryptographically random 20-character password. It worked great until I tried to log in later. I couldn't understand why the password I recorded wasn't working, so I went through the "I forgot my password" process. They sent me a crazy-looking password in plain text email, and didn't force me to reset it (security problem #1, force good security). I couldn't see how to reset my password (security problem #2, don't make good security hard). To change your password, go to "update information," then look for the "change password" button next to the submit button. When I went to record the random password they sent me, I noticed it was the first 10 characters of the password I gave them. So, they just silently truncate super secure passwords to weak passwords (security problem #3, don't force poor security and terrible UI on your users). All of that is bad, but the implied security problem #4 is far worse: they store user passwords in plain text. That mistake is what gets you into the headlines when someone hacks your site and steals all of your users' passwords.
Warning Do not give these idiots a password you use anywhere else. I'm also a little nervous about letting them store my credit card info.
We've been using it since May, 2014, and it's working very well. The service has been reliable and it's costing just $10 every 90 days, so just over $40/year. Each time I have renewed it at the 90-day mark, I've had a balance remaining which means I've had plenty of bandwidth left over for more data and text messages. As an experiment, I recharged it early and was pleased to see the new expiration date (2/19/2015) is 90 days after the old expiration date (11/21/2014), not 90 days after the recharge. It's good to know I don't have to wait until the last minute to recharge.
Send any feedback to [software].
|©2000-2020 Idle Loop Software Design, LLC. You may not copy or reproduce any content from this site without our consent.|