Homemade Bokode

[vimeo http://vimeo.com/6803291%5D

We’ve recently been getting a lot of new comments on our Bokode post from a while back, and with good reason.  [M@] has managed to find a way to replicate Bokode at home, using $0 worth of equipment (before the price of microprint). To accomplish Bokode at home, it seems all you need is and old webcam lens assembly and an LED.  Of course the his version is not as thin as a regular barcode so it probably wont be replacing anything in the near future, but the concept of from MIT to home within such a short period of time is amazing.

Batcave-style Entrance (on A Budget)

buttonhead

Want to enter your hidden lair in style? Well [Jimmy] simply wanted to create a cool prop for his school’s homecoming dance. This project includes some obvious inspiration from Wayne Manor. [Jimmy] wired up the automated entrance with a 12VDC motor. In order for it to be able to push the door , the motor had to be attached to a gearbox, which directly powered a wheel. Current consumption issues were solved by using a wall-wart. Because a real bookshelf would still be too heavy, [Jimmy] dressed up a regular door with some patterned wallpaper to give it the right look. Coupled with a Shakespearean bust concealing the button, and some other cosmetic touches, this project was sure to impress any student who knew its secret.

Unhackable Netbooks Given To Students

nb

Where would be the best place to test out an unhackable netbook? The NSW department of education in Australia thinks that college is perfect . They plan on distributing netbooks, preloaded with Windows 7,and iTunes. They also have bios level tracking and security, allowing them to be remotely shut down on command. With 20,000 of these in circulation, we would think that we’ll see someone proving the “unhackable” statement wrong. We can only hope.

[via slashdot]

Steal The Administrator Password From An EEPROM

locating_atmel

Did you forget your hardware-based password and now you’re locked out? If it’s an IBM ThinkPad you may be in luck but it involves a bit more than just removing the backup battery. SoDoItYourself has an article detailing the retrieval of password data from an EEPROM.

The process is a fun one. Disassemble your laptop. Build a serial interface and solder it to the EEPROM chip where the password is stored. Connect this interface to a second computer and use it to dump the data into a file. Download a special program to decipher the dump file and dig through the hex code looking for something that resembles the password. Reassemble your laptop and hope that it worked.

We know that most people won’t be in a position to need a ThinkPad administrator password, but there must be other situations in which reading data off of an EEPROM comes in handy. What have you used this method for?

Universal Credit Card In The Palm Of Your Hand

universal_credit_card

Do you remember the magnetic card spoofer in Terminator 2? It was a bit farfetched because apparently the device could be swiped through a reader and magically come up with working account numbers and pin numbers. We’re getting close to that kind of magic with [Jaroslaw’s] card spoofer that is button-programmable.

Building off of a project that allows spoofing via an iPod and electromagnet, [Jaroslaw] wanted something that doesn’t require a computer to put together the card code. He accomplished this by interfacing a 16-button keyboard and a character LCD with an AVR ATmega168 microcontroller. Card codes can be entered with the buttons and verified on the LCD. Of course this is still dependent on you knowing the code in the first place.

As you know, credit cards use this technology. We don’t think Walmart is going to be OK with you pulling this out in the checkout line, not to mention local five-oh. This technology is also used for building access in Universities, businesses, and hotels. If used in conjunction with some other spy technology you’ll be on your way to becoming a secret-agent-man.

Photographic Key Duplication

[Ben] and his associates over at the University of California at San Diego came up with a way to duplicate keys using a picture of them. They developed an algorithm that uses measurements from known key blanks to extrapolate the bitting code. Because the software is measuring multiple points it can correct the perspective of the photo when the key is not photographed on a flat surface, but from an angle.

They went so far as to test with cell phone cameras and using a telephoto lens from 195 feet away. In most cases, correct keys were produced within four guesses. Don’t miss their wonderful writeup (PDF) detailing how key bitting works, traditional covert duplication methods, and all the details of their process. The lack of available code prevents us all from playing secret agent (or felon) with this idea but [Ben] did mention that if there is sufficient interest he might release it.

Lock bumping showed us how weak our security is, but this is a bit scary.

[Thanks Mike]

TI Lashes Out At Their Biggest Fans

ti

Texas Instruments has issued a DMCA notice to United TI, a group of enthusiasts. They had been cracking the keys that sign the operating system binaries in an attempt to gain access and possibly expand on the features. This seems, at least a little counter productive to us. Texas Instruments doesn’t sell the operating system separately do they? These people were buying their product and expanding on it. There is no difference in their income, except possibly a gain as people flock to the one they can modify. Maybe they are charging more for an expanded feature set that is crippled in the OS.

[via slashdot]