- Energy Meter GSM with Arduino (part 2)Posted 4 days ago
- Energy Meter GSM with Arduino (part 1)Posted 1 week ago
- ARDULOCK: a keyboard with RFID modulePosted 1 month ago
- Autofocus Glasses/Phoropter Using Variable Focus Liquid LensPosted 3 months ago
- Home Automation & Lights controlling SystemPosted 3 months ago
- Solar TrackerPosted 3 months ago
- LTspice inverter simulation with thermal effectsPosted 3 months ago
- AI in LEGO EV3 Maze-Driving RobotPosted 3 months ago
- Temperature predicting using boltiotPosted 3 months ago
- Sparkly Air SensorPosted 3 months ago
Anyone can steal 3D-printed products by just listening to the sounds the printer makes
New industries, new intelligence… a worrying security leak could damage the just-in-time production companies!
A new discovery has revealed a fundamental security flaw in today’s 3D printers. Researchers at the University of California, Irvine (UCI) say that by simply recording the noises a 3D printer makes while it’s printing, it’s possible to reverse-engineer the design of the object being produced.The process works by listening to the noises a 3D printer makes to detect and track the movements of the printer’s nozzle. You can then use this to work backwards and figure out the design it’s following.
In other words, you could hypothetically steal the intellectual property of any product being 3D-printed, just by placing something like a smartphone beside the 3D printer as it operates. For lots of open-source toys, figurines, and trinkets that are publicly shared on the internet, that’s not a problem, as many designs aren’t intended to be kept secret.
“According to the fundamental laws of physics, energy is not consumed; it’s converted from one form to another – electromagnetic to kinetic, for example,” said Al Faruque. “Some forms of energy are translated in meaningful and useful ways; others become emissions, which may unintentionally disclose secret information.”
In the case of 3D printers, the source code that instructs the machine – called G-code – can be encrypted, so you can physically 3D-print an object without getting access to its design information. But the loophole Al Faruque and his team discovered means there’s no 3D-object source that can’t be revealed by audio capture – at least to a significant degree.