>
How America's Paper-Money System and the Federal Reserve Plunder American Taxpayers
Bootleggers and Bureaucrats Agree on Global Health
Peter Nygard Will Stay In Prison
3D Printed Aluminum Alloy Sets Strength Record on Path to Lighter Aircraft Systems
Big Brother just got an upgrade.
SEMI-NEWS/SEMI-SATIRE: October 12, 2025 Edition
Stem Cell Breakthrough for People with Parkinson's
Linux Will Work For You. Time to Dump Windows 10. And Don't Bother with Windows 11
XAI Using $18 Billion to Get 300,000 More Nvidia B200 Chips
Immortal Monkeys? Not Quite, But Scientists Just Reversed Aging With 'Super' Stem Cells
ICE To Buy Tool That Tracks Locations Of Hundreds Of Millions Of Phones Every Day
Yixiang 16kWh Battery For $1,920!? New Design!
Find a COMPATIBLE Linux Computer for $200+: Roadmap to Linux. Part 1
With the commoditization of IoT surveillance technology, private and public entities alike have been rushing to put every facet of our lives under surveillance. Unfortunately, schools are no exception in the ongoing privacy race to the bottom. In this talk, we present our analysis of a popular line of IoT vape detectors marketed primarily to schools. Rey first learned of the existence of this device while he was a student in high school, scanning the local network during his lunch break. He became obsessed with the idea of reverse-engineering it, and a couple of years later he got an opportunity when a specimen appeared on eBay.
This talk will cover our journey of acquiring the device and doing a hardware teardown. Then, we'll talk about dumping the firmware, examining its behavior, and doing some light reverse-engineering to uncover some fun appsec vulnerabilities. We'll discuss implications of our findings on this particular series of devices, as well as on the ed-tech surveillance industry as a whole. We will release a copy of the device filesystem, as well as our scripts for decrypting OEM firmware and packing custom firmware updates.