HN.zip

Edit store price tags using Flipper Zero

62 points by trueduke - 42 comments
Aboutplants [3 hidden]5 mins ago
I was in college when self checkout became a thing and it took us all of about 45 seconds to realize that you could just check everything out as bananas. Steak was weighed and priced at 4011 (banana code) as the stoned teenager cashier paid no attention. Everything on the receipt was literally Bananas
kvuj [3 hidden]5 mins ago
People like you are why we are living in an increasingly lower trust society, with for example having items behind locked door in shops.
DangerousPie [3 hidden]5 mins ago
Congratulations, you have discovered the concept of shoplifting!
miki123211 [3 hidden]5 mins ago
IANAL and this depends on the jurisdiction, but in many places, the penalties for shenanigans like these are far steeper than for outright theft, as it's considered to be financial fraud.
stavros [3 hidden]5 mins ago
Couldn't you also not just check stuff in? These are all obvious drawbacks, it's not really a high-scrutiny environment.
manarth [3 hidden]5 mins ago
Most self-checkouts I've come across have weight validation – "Unexpected item in the bagging area".

Categorising things as "bananas" tricks the checkout into accepting the weight of an item, and you pay the appropriate price per bananagram.

comrade1234 [3 hidden]5 mins ago
Since its IR is it line of site? How would you go about changing every tag in the store to say 'Palestine $0.00', for example?
weli [3 hidden]5 mins ago
This is pretty dangerous. At least in my country the displayed price must be honored and they cannot refuse the sale.
rickdeckard [3 hidden]5 mins ago
Usually the advertised price must be honored, because it may have brought the customer to your store.

For prices displayed on the shelf-label inside the store the law is usually not that strict (YMMV), as a shop-owner can refuse sale on check-out (otherwise I could put a pricetag on e.g. a shopping-basket and the shop-owner would be legally required to sell me the basket...).

Besides, most shops I've seen (in Europe) already moved from Infrared communication to RF (NFC or proprietary), for centralized shelf-label management without handheld devices. So all this study (and the underlying reverse engineering of the IR-protocol) might do is probably accelerate the transition from IR to RF-based ESL...

rimunroe [3 hidden]5 mins ago
> Usually the advertised price must be honored, because it may have brought the customer to your store.

This is not the case for groceries in Massachusetts at least. If there’s a discrepancy between the tag’s price and the scanned price the store must charge the customer the lowest of the two: https://www.mass.gov/price-accuracy-information

master-lincoln [3 hidden]5 mins ago
How is the transport medium changing anything?

To me this is about having protocols that are suitable so not anybody can write to these labels without knowing a store secret or using replay attacks.

mschuster91 [3 hidden]5 mins ago
> How is the transport medium changing anything?

it's mostly about efficiency. IR based, an employee needs to physically walk around. RF based, place a transmitter or two in the building and the system now works fully automated.

wyldfire [3 hidden]5 mins ago
In your country merchants are not obligated to honor fraudulently altered price displays.
dewey [3 hidden]5 mins ago
Probably mostly dangerous for the user, or are people routinely writing their own price signs in the store and then "buying" it for less? Walking up to the lot at the car store and crossing out some zeros? Don't see how this would be any different.
xingped [3 hidden]5 mins ago
Back in the day people used to swap/edit price tags a lot. Also making fake coupons with the same knowledge. It was a pretty common and easy form of shoplifting since all barcodes used to do was just encode the pricing/discount information.
ModernMech [3 hidden]5 mins ago
What they do is swap bar codes, or they code organic fruit as regular, or they "forget" to scan in the self checkout, but yes.
dewey [3 hidden]5 mins ago
So it's just stealing with extra steps.
walrus01 [3 hidden]5 mins ago
This is a big reason why retail product barcode stickers (not barcodes printed directly on a package as it comes from the manufacturer) are now commonly printed on frangible stock with built in slices in it which breaks apart in 3, 4 or more pieces if you try to peel it off.
rithdmc [3 hidden]5 mins ago
Hardly matters when one may print their own barcode on labels and cover the frangible one.
gruez [3 hidden]5 mins ago
printing your own sticker requires way more prep than ripping one off a pack of ground beef and sticking it on a pack ribeye steak.
gus_massa [3 hidden]5 mins ago
I guess they can use the cameras to show you were tampering with the labels and call the police. Somewhat related xkcd https://xkcd.com/1494/
stavros [3 hidden]5 mins ago
I am overjoyed to see this story here, we haven't gotten a lot of these hacks lately. Well done!
encom [3 hidden]5 mins ago
Hacks? In my Hacker News? The nerve!
_joel [3 hidden]5 mins ago
Are these hacks or cracks. I'd say the latter.
IshKebab [3 hidden]5 mins ago
I wouldn't. It doesn't appear that anything was cracked. Rather they just reverse engineered the protocol.
voidUpdate [3 hidden]5 mins ago
I still don't think I've seen an actually useful application for a Flipper Zero. It's all just "use this to change store price tags" or "here's how to disconnect all bluetooth devices", but also "don't actually use this, because it would be illegal, this is just for educational purposes"
rickdeckard [3 hidden]5 mins ago
Beside of how the media often tries to present it, the value of Flipper Zero is not for everyone to "become a hacker with this simple app".

Its value is to provide a standardized hardware platform for (white hat) hackers for probing, prototyping, refining and sharing of security research in the fields its hardware supports (Sub-GHz RF, NFC, IR, and custom external boards via simple Input/Output pins).

Prior to that, everyone who wanted to research e.g. RF security had to either build/assemble something custom or buy much more expensive equipment. This created a barrier to collaborate on research, as everyone had to buy/build the same setup.

On top of that, Person A researching some RF topic selected an RF-transceiver from Company X, Person B used a component and a proprietary SDK of Company Y, so consolidating both work streams for a better foundation for all RF-related research required alot of time and effort from someone, breaking workflows of at least one group of researchers, etc.

In contrast, security research which utilizes Flipper Zero can be reproduced and built upon by everyone. All the work is harmonized on the same Hardware architecture, so it's easy for someone familiar with the platform to dive straight into a new idea without having to build a new breadboard, select a chipset, buy additional probing equipment etc.

kotaKat [3 hidden]5 mins ago
I'm tired of the "security research" angle when it's all just kids playing with ESP32 deauther attacks presented to them on a silver platter.

I should not have to put up with children going "JUST SECURE YOUR NETWORKS BRO" because they spent $30 on some eBay "maurauder" dongle to be a pissant.

lan321 [3 hidden]5 mins ago
It's probably good to have kids with no big plans messing with your security now and then. Keeps you on your toes, and you can't really pass it off as an act of god if a teenager pwns you.
rft [3 hidden]5 mins ago
And a minority of those kids will get curious about the How and Why. Those are the security nerds of the future securing the networks against both the kids they were themselves and actual malicious actors.

Source: Early interest in wifi security, including in other people's networks, lead me down an education and career in security

gausswho [3 hidden]5 mins ago
Hacker News. Where you either die a pissant or become the villain with a fistful of RSUs.
kotaKat [3 hidden]5 mins ago
I sure wish I was wealthy and had a fistful of RSUs. You wanna send me some? I make 5% over my area's 80% median income and I can't even get housing because I "make too much money" despite being $3000 too rich.

I'm pretty tired of being the network guy in the field playing remote hands having to be on the front lines of all of this bullshit having to explain to decision makers that a bunch of shitty kids are running around and there's no real solution that we can just "fix" this with.

I'm tired. If they're not deauthing our networks they're breaking into rooms with the goddamn card copying and fuzzing functionality and stealing shit.

master-lincoln [3 hidden]5 mins ago
the alternative is to put up with crackers abusing your insecure network for their own benefit
StingyJelly [3 hidden]5 mins ago
just secure your networks bro
OuterVale [3 hidden]5 mins ago
I use mine for all sorts. I volunteer at a second-hand shop so use it to set up remotes for donated media devices, I've used it to run scripts to apply the same changes to many computers that aren't on a group policy via BadUSB, I've used it for toys-to-life games, and very much more. There are plenty of genuine uses if you're cluey.
vbezhenar [3 hidden]5 mins ago
Yeah, I bought it and it collects a dust since then. Fun device but I have no idea how to use it in my life.
rjh29 [3 hidden]5 mins ago
Turns out it's what they said it was all along, an educational device.
avian [3 hidden]5 mins ago
This one provides the source and asks you to build it yourself so at least it has some credibility for the "education use only" claim.

I've seen similar things posted on here before that had a binary build only and zero technical documentation. It was really hard to see any kind of research or education value in those.

cucumber3732842 [3 hidden]5 mins ago
It's useful for dealing with the industrial equivalent of IOT garbage
imp0cat [3 hidden]5 mins ago
[flagged]
master-lincoln [3 hidden]5 mins ago
As if devices created in Russia would all be "useless" or only for illegal purposes.

I smell prejudice

estimator7292 [3 hidden]5 mins ago
Cool racism bro