Today on Kickstarter the campaign started to raise funds for the "hacker tamagotchi" Flipper Zero. It was required to raise 60,000 dollars to start production of the devices, and those who predicted the project a failure were clearly wrong. The fact is that the required amount was collected in a matter of minutes after the start of the campaign, and the $ 99 devices were dismantled instantly.
– Pavel Zhovner (@zhovner) July 30, 2020
At the moment, the project has already raised about $ 450,000. According to the campaign's roadmap, this means the devices will be available in a new color and equipped with Bluetooth. The next target is $ 700,000 to help equip the Flipper Zero with NFC.
Let me remind you that in the spring of this year we have already talked about this hacker multitool, invented by Pavel Zhovner, in all its details. Tamagotchi-like device is intended for pentesters, hackers (in the original sense of the word) and other enthusiasts. The main idea behind this open source device was to combine different hardware solutions for penetration testers together. As a result, Flipper Zero boasts the following features.
In the meantime, there is no need to know about it. ”Radio module based on TI CC1101. It supports transmission and reception of signals in the range 300-928 MHz. This operating range is used by many access control devices and systems, including garage door remotes, barriers, IoT sensors, and so on. As a result, Flipper Zero can emulate a wide variety of remotes and store their memory.
Built-in decoder for popular remote control algorithms such as Keeloq and others. As a result, the user can examine an unknown radio communication system to find out which protocol is “under the hood”.
Infrared transmitter can send signals to any TVs, air conditioners, stereos and so on. Flipper contains a built-in library of common commands such as turn on / off, change volume or adjust temperature. Also, the IR receiver can intercept signals and store them in memory.
Antenna 125 kHz RFID able to read EM-4100 and HID Prox cards, store them in memory and emulate them directly from the menu.
Built-in panel for reading iButton keys (DS1990A), also known as TouchMemory or Dallas. This rather old technology is still widely used all over the world. It is based on the 1-Wire protocol and has no authentication, so Flipper can easily read keys, store their IDs in memory, write IDs to empty keys, and emulate the key itself.
Flipper can work as a fully functional key U2F which is compatible with any U2F-enabled service including Google, Twitter, Facebook, Dropbox, LastPass, Amazon AWS, and more.
GPIO pins with which you can turn Flipper into USB -> UART / I2C / SPI converter. Or connect peripherals to it, such as Arduino and Raspberry Pi.
USB Type-C port can be used for firmware upgrades, virtual serial port deployment, and HID input device emulation. That is, in essence, Flipper can act like a Rubber Ducky and be used for attacks like BadUSB.
At the same time, Flipper does not fall under the description of a special means or device for secret information collection. The device does not have the ability to record audiovisual information, it is not disguised as household items. The factory firmware will not have jamming, brute-force and other potentially harmful functions.
The fundraising campaign for Flipper Zero will continue for another 29 days, with device shipments expected in February 2021. At the same time, Pavel Zhovner recently wrote that the fate of the Flipper One version directly depends on the success of this campaign: he promised that if the required amount is collected, work on the One version will continue. Since the set goals have already been fulfilled (and will clearly be exceeded), we can safely congratulate the creator of the hacker Tamagotchi on his victory and start waiting for Flipper One.