Various Cantenna Builds

Here is a classic project used to increase wireless signal strength. Cantennas focus using a waveguide very much like a magnifying glass focuses light. [Robert] made a Natural Light beer cantenna, pictured in the upper left. His approach used three beer cans, a paper towel holder, and a shower curtain rod. On the tipline, he noted a signal boost from 11Mbps to 54Mbps. This is certainly something we can hack together if our room lacks adequate signal. Read about parabolic and seeking versions after the break.

Continue reading “Various Cantenna Builds”

Silicon Hacking


Wired recently posted an article and video detailing our friend [Chris Tarnovsky]’s process for hacking smart cards. In the video, [Chris] shows how he strips away physical components of the chips inside the smartcards using various gadgets and chemicals.

The first step is to remove the chip from its plastic frame. After soaking it in acid for about 10 minutes, the epoxy is removed and the chip is exposed. After that the outer layer is loosened by soaking the chip in two solutions of acetone, the second being the “clean” one. Then the chip is placed on a hotplate where a drop of fuming nitric acid is applied with a dropper; the chip is washed again in an ultrasonic cleaner, removing any residue left.

[Chris] then returns the chip to the card. He will apply nail polish to act as a masking material. He scratches a hole through the polish with a needle held by a micro positioner in the area of interest. The hole is treated with hydrofluoric acid and then etched in short intervals until the desired layer of silicon is exposed. At this point, the card is fully prepped.

Now by powering the chip with the needle resting on the bus, [Chris] can read the code on the chip by sending it various commands and watching how it reacts. To see more of [Chris]’s reverse engineering work, check out Flylogic Engineering’s Analytical Blog. It’s a enjoyable read even if you’re new to silicon hacking.

DISH Wins $1050 In Satellite Cracking Case

Who doesn’t love a good corporate espionage story? We certainly don’t mind them, especially when they involve hiring a notable hacker to do the company’s dirty work. It seems this is exactly what happened in the case of Dish Networks vs NDS Group. Last month, Christopher Tarnovsky admitted he was paid $20,000 in cash to crack the security protocols used on DISH Network access cards. NDS Group claimed the reverse engineering was simply for comparative reasons while DISH is said it resulted in $900 million in damages.

The trial came to an end this week with the court finding NDS group guilty of cracking 1 card (a fine of $49.69) and liable for an additional $1000 in damages. Not quite the big payoff DISH was hoping for, but both companies have expressed feelings of vindication about the decision. DISH Networks says that the jury ruled in their favor, proving that they were right all along (just not $900 million dollars right). NDS maintains that Tarnovsky’s work was never publicly shared and that they never intended to flood the black market with cracked cards as DISH has implied.