[Chris] liked Cartesian RepRap idea so much that he decided to design his master’s diploma project around it. Though it uses most of the same parts as the RepRap (even the PCBs), [Chris] has adapted it so it does milling rather than 3D printing. Most of the parts (such as the stepper motors) were harvested from old inkjet printers and typewriters. The thee-axis CNC machine can already etch and carve styrofoam at an impressively high resolution. To deal with all of the debris that comes with milling, a vacuum attachment (shown attached) was created. [Chris] is considering adapting it so it can work with wood and aluminum as well. Best of all, it uses standard G-code files, just like the RepRap. A publication by [Chris] on the project is also available through his website. No plans to release a kit have been announced yet, but we’ll wait and see. If any commenter knows of an open source CNC milling machine available as a kit, feel free to post a link to it below.
Wired recently posted an article and video detailing our friend [Chris Tarnovsky]’s process for hacking smart cards. In the video, [Chris] shows how he strips away physical components of the chips inside the smartcards using various gadgets and chemicals.
The first step is to remove the chip from its plastic frame. After soaking it in acid for about 10 minutes, the epoxy is removed and the chip is exposed. After that the outer layer is loosened by soaking the chip in two solutions of acetone, the second being the “clean” one. Then the chip is placed on a hotplate where a drop of fuming nitric acid is applied with a dropper; the chip is washed again in an ultrasonic cleaner, removing any residue left.
[Chris] then returns the chip to the card. He will apply nail polish to act as a masking material. He scratches a hole through the polish with a needle held by a micro positioner in the area of interest. The hole is treated with hydrofluoric acid and then etched in short intervals until the desired layer of silicon is exposed. At this point, the card is fully prepped.
Now by powering the chip with the needle resting on the bus, [Chris] can read the code on the chip by sending it various commands and watching how it reacts. To see more of [Chris]’s reverse engineering work, check out Flylogic Engineering’s Analytical Blog. It’s a enjoyable read even if you’re new to silicon hacking.