The Espressif ESP8266 chipset makes three-dollar ‘Internet of Things’ development boards an economic reality. According to the popular automatic firmware-building site nodeMCU-builds, in the last 60 days there have been 13,341 custom firmware builds for that platform. Of those, only 19% have SSL support, and 10% include the cryptography module.
We’re often critical of the lack of security in the IoT sector, and frequently cover botnets and other attacks, but will we hold our projects to the same standards we demand? Will we stop at identifying the problem, or can we be part of the solution?
This article will focus on applying AES encryption and hash authorization functions to the MQTT protocol using the popular ESP8266 chip running NodeMCU firmware. Our purpose is not to provide a copy/paste panacea, but to go through the process step by step, identifying challenges and solutions along the way. The result is a system that’s end-to-end encrypted and authenticated, preventing eavesdropping along the way, and spoofing of valid data, without relying on SSL.
We’re aware that there are also more powerful platforms that can easily support SSL (e.g. Raspberry Pi, Orange Pi, FriendlyARM), but let’s start with the cheapest hardware most of us have lying around, and a protocol suitable for many of our projects. AES is something you could implement on an AVR if you needed to.
Continue reading “Practical IoT Cryptography On The Espressif ESP8266”
[Stephen Cognetta] is trying to get the total number of things he owns down below 115, and he’s always looking for ways to streamline his life.
Toward this goal he dissolved his SF Transit Clipper Card in acetone to get at the NFC tag embedded inside. The tag consists of a tiny chip attached to an antenna the size of the card itself. It took about three days (video below the break) for the layers to separate and [Stephen] was able to extricate the tag.
He ended up trying a few different ways of storing the delicate chip and antenna, including a lump of Sugru as well as a waterproof aspirin band, pictured to the right.
One supposes the transit pass idea might save you a little time, but what would really simplify your life would be having a single wearable tag that unlocked a bunch of things. Also it should be noted that, un-coolly, damaging a card violates SF Transit’s terms of service…
HaD has covered NFC wearables before, including the phone-unlocking NFC ring as well as the NFC ring box. This NFC-controlled infinity mirror makes great use of the technology.
Continue reading “Making A Wearable NFC Bus Pass”
Anyone who’s into retro aviation gear falls in love with those mysterious displays, dials, keypads, banks of knife switches. There’s a lot of sexy in those devices, built with high standards in a time when a lot of it was assembled by hand.
[Jeremy Gilbert] bought a 747-200’s Control Display Unit (CDU)– the interface with the late ’70s in-flight computer–and is bringing it back to life in a Hackaday.io project. His goal is to get it to light up and operate just as if it were installed in a 747.
Of particular interest is the display, which turned out to consist of a series of 5×7 matrices (seen on the right) controlled by chips no one uses any more. However, [Jeremy] found a blog post where someone had hacked out Arduino code for a cousin of the chip, saving him a lot of time. However, he’s got a lot more sleuthing yet to do.
If you’re into retro displays, we’ve mentioned a number of good ones, including the legendary Apollo DSKY and an awesome retrocomputer.