Garbage Can RC Car Engine Powers Ridiculous Pencil Sharpener

Christmas has come and gone, and no doubt garbage cans are filling with toys that got but a single use before giving up the ghost. If you scrounge around, you might get lucky and score a busted RC car so you can be like [Mike] and build a completely unnecessary nitro-powered pencil sharpener.

This is one from the [Tim The Tool Man Taylor] “more power” files. To be fair, [Mike] acknowledges as much right up front, and as a learning tool for these super-powerful internal combustion engines, we think it’s a pretty cool project. After dealing with a seized cylinder on what looks to be a VX .18 engine rated at about 1.1 horsepower, [Mike] learns the basics of starting and controlling the engine. Once coupled to a pencil sharpener that clearly isn’t engineered to work at a bazillion RPM and jury-rigging a damper for the clutch, [Mike] fires up the engine and races through a pack of 10 pencils in record time.

As silly as this hack seems, it could come in handy if you decide to go into the colored pencil jewelry market at production levels.

Continue reading “Garbage Can RC Car Engine Powers Ridiculous Pencil Sharpener”

32C3: Shopshifting — Breaking Credit Card Payment Systems

Credit card payment systems touch all of our lives, and because of this there’s a lot riding on the security of that technology. The best security research looks into a widely deployed system and finds the problems before the bad guys do. The most entertaining security presentations end up finding face-palmingly bad practices and having a good laugh along the way. The only way to top that off is with live demos. [Karsten Nohl], [Fabian Bräunlein], and [dexter] gave a talk on the security of credit-card payment systems at the 32nd annual Chaos Communications Congress (32C3) that covers all the bases.

While credit card systems themselves have been quite well-scrutinized, the many vendor payment networks that connect the individual terminals haven’t. The end result of this research is that it is possible to steal credit card PINs and remotely refund credits to different cards — even for purchases that have never been made. Of course, the researchers demonstrate stealing money from themselves, but the proof of concept is solid. How they broke two separate payment systems is part hardware hacking, part looking-stuff-up-on-the-Internet, and part just being plain inquisitive.

Continue reading “32C3: Shopshifting — Breaking Credit Card Payment Systems”