Hacker news

  • Top
  • New
  • Past
  • Ask
  • Show
  • Jobs

Drone Hacking Part 1: Dumping Firmware and Bruteforcing ECC (https://neodyme.io)

125 points by tripdout about 19 hours ago | 24 comments | View on ycombinator

Neywiny about 7 hours ago |

Great work.

Seems like a typo when covering inversion. They claim parity(0) = 0 but still use the equation with != from before.

It's nice to see that they, like me, subscribe to "an hour of experimenting can save 5 minutes of reading the documentation." Of course what people often fail to realize is that until you've found the answer, you often don't realize what the documentation was saying, such as the 16-bit thing. Management may ask "was that not in the manual?" But it's more nebulous than that.

dextrous about 7 hours ago |

Thanks very much for this awesome write up! It’s detailed labor-of-love work like this that helps others (like me!) make great jumps in learning. So appreciated.

purplehat_ about 13 hours ago |

For anyone else who got a little too excited at the title, ECC here is error correction codes, not elliptic curve crypto.

Very cool writeup, thanks for digging into all those data sheets and sharing it with us! I feel like the hands-on electronics stuff has always been a little bit inaccessible to me, but posts like these always make me a little more excited to start doing little projects myself. So thanks for posting.

aenis about 13 hours ago |

Fantastic and inspiring write up, big thanks!

Here is to hoping someone will do something similar for DRM'ed BOSCH ebike motors.

syntaxing about 6 hours ago |

Fun read! How long does the script take to run? I’m curious if you would have noticed any performance increase if you wrote it in C++.

nerdsniper about 14 hours ago |

What a beautiful write-up! This is such a lovely resource for anyone who ever has the curiosity of "I'm interested in getting a firmware dump".

MPSimmons about 10 hours ago |

Damn, I really enjoyed reading this. Great writeup!

eimrine about 13 hours ago |

Drane Hacking next: bypassing Radio Electronic Warfare.

mschuster91 about 13 hours ago |

And as usual... something that looks like it uses Linux, but has absolutely zero Google search results on how to obtain the GPL sources.

We desperately need some large ass legal fund that takes the GPL violators to court.

undefined about 2 hours ago |

undefined

vachina about 10 hours ago |

Now do DJI next

duttybear about 3 hours ago |

Bruteforcing ecc is the Services may subject to the contrary. My vision of brutforcing is droning below sea levels, .