- Segstick: Build Your Own Self-Balancing Vehicle in Just 2 Days with ArduinoPosted 2 weeks ago
- ZSWatch: An Open-Source Smartwatch Project Based on the Zephyr Operating SystemPosted 1 month ago
- What is IoT and which devices to usePosted 1 month ago
- Maker Faire Rome Unveils Thrilling “Padel Smash Future” Pavilion for Sports EnthusiastsPosted 2 months ago
- Make your curtains smartPosted 2 months ago
- Configuring an ESP8266 for Battery PowerPosted 2 months ago
- Creating a Telegram Bot for ESP32Posted 2 months ago
- Mini Course on BlynkPosted 2 months ago
- Creating a Unique Electronic Musical Instrument: The Sound WallPosted 2 months ago
- Building a Laser MicroscopePosted 2 months ago
Anyone can steal 3D-printed products by just listening to the sounds the printer makes
New industries, new intelligence… a worrying security leak could damage the just-in-time production companies!
A new discovery has revealed a fundamental security flaw in today’s 3D printers. Researchers at the University of California, Irvine (UCI) say that by simply recording the noises a 3D printer makes while it’s printing, it’s possible to reverse-engineer the design of the object being produced.The process works by listening to the noises a 3D printer makes to detect and track the movements of the printer’s nozzle. You can then use this to work backwards and figure out the design it’s following.
In other words, you could hypothetically steal the intellectual property of any product being 3D-printed, just by placing something like a smartphone beside the 3D printer as it operates. For lots of open-source toys, figurines, and trinkets that are publicly shared on the internet, that’s not a problem, as many designs aren’t intended to be kept secret.
“According to the fundamental laws of physics, energy is not consumed; it’s converted from one form to another – electromagnetic to kinetic, for example,” said Al Faruque. “Some forms of energy are translated in meaningful and useful ways; others become emissions, which may unintentionally disclose secret information.”
In the case of 3D printers, the source code that instructs the machine – called G-code – can be encrypted, so you can physically 3D-print an object without getting access to its design information. But the loophole Al Faruque and his team discovered means there’s no 3D-object source that can’t be revealed by audio capture – at least to a significant degree.