Skip to content
Logo

Hackaday

  • Home
  • Blog
  • Hackaday.io
  • Tindie
  • Contests
  • Submit
  • About

shred everything

1 Articles

Check Washing Vulnerabilities

June 19, 2008 by Will O'Brien 9 Comments


[vector] sent in some of his other work, but I found his posts(part 1, part 2, part 3 and final thoughts) on check washing experiments pretty interesting. His results should be enough to make you think twice about writing checks. He tested a few different pens and tested them on real check using Acetone and Alcohol as solvents.

Posted in classic hacks, Misc HacksTagged banking, security, shred everything, ShredEverything

Search

Never miss a hack

Follow on facebook Follow on twitter Follow on youtube Follow on rss Contact us

Subscribe

If you missed it

  • Is The Atomic Outboard An Idea Whose Time Has Come?

    37 Comments
  • Feline Genetics And Why Orange Cats Are The Most Special

    40 Comments
  • Screens Of Death: From Diagnostic Aids To A Sad Emoji

    57 Comments
  • High-Stakes Fox Hunting: The FCC’s Radio Intelligence Division In World War II

    30 Comments
  • My Winter Of ’99: The Year Of The Linux Desktop Is Always Next Year

    211 Comments
More from this category

Our Columns

  • Hackaday Links: June 8, 2025

    20 Comments
  • Hackaday Podcast Episode 324: Ribbon Microphone From A Gumstick, Texture From A Virtual Log, And A Robot Arm From PVC

    5 Comments
  • This Week In Security: Roundcube, Unified Threat Naming, And AI Chat Logs

    4 Comments
  • Supercon 2024: From Consultant To Prototyper On A Shoestring Budget

    10 Comments
  • FLOSS Weekly Episode 835: Board Member B

    2 Comments
More from this category

Search

Never miss a hack

Follow on facebook Follow on twitter Follow on youtube Follow on rss Contact us

Subscribe

If you missed it

  • Is The Atomic Outboard An Idea Whose Time Has Come?

    37 Comments
  • Feline Genetics And Why Orange Cats Are The Most Special

    40 Comments
  • Screens Of Death: From Diagnostic Aids To A Sad Emoji

    57 Comments
  • High-Stakes Fox Hunting: The FCC’s Radio Intelligence Division In World War II

    30 Comments
  • My Winter Of ’99: The Year Of The Linux Desktop Is Always Next Year

    211 Comments
More from this category

Categories

Our Columns

  • Hackaday Links: June 8, 2025

    20 Comments
  • Hackaday Podcast Episode 324: Ribbon Microphone From A Gumstick, Texture From A Virtual Log, And A Robot Arm From PVC

    5 Comments
  • This Week In Security: Roundcube, Unified Threat Naming, And AI Chat Logs

    4 Comments
  • Supercon 2024: From Consultant To Prototyper On A Shoestring Budget

    10 Comments
  • FLOSS Weekly Episode 835: Board Member B

    2 Comments
More from this category

Recent comments

  • mordae on Two Bits, Four Bits, A Twelve-bit Oscilloscope
  • rc on Saving Green Books From Poison Paranoia
  • Mordae on Two Bits, Four Bits, A Twelve-bit Oscilloscope
  • Joshua on SkyRoof, A New Satellite Tracker For Hams
  • Stephen on What Marie Curie Left Behind
  • Stephen on Is The Atomic Outboard An Idea Whose Time Has Come?
  • 2dom on A Modern Take On Iconic Industrial Design
  • Johnu on A Modern Take On Iconic Industrial Design
  • McNugget on ChatGPT Patched A BIOS Binary, And It Worked
  • John Russell on SkyRoof, A New Satellite Tracker For Hams
Logo
  • Home
  • Blog
  • Hackaday.io
  • Tindie
  • Video
  • Submit A Tip
  • About
  • Contact Us

Never miss a hack

Follow on facebook Follow on twitter Follow on youtube Follow on rss Contact us

Subscribe to Newsletter

Copyright © 2025 | Hackaday, Hack A Day, and the Skull and Wrenches Logo are Trademarks of Hackaday.com | Privacy Policy | Terms of Service | Digital Services Act
Powered by WordPress VIP

By using our website and services, you expressly agree to the placement of our performance, functionality and advertising cookies. Learn more