O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

The Hardware Hacker

Book Description

The Hardware Hacker is an illuminating career retrospective from Andrew "bunnie" Huang, one of the world's most esteemed hackers.

Table of Contents

  1. Cover
  2. Praise for The Hardware Hacker
  3. Title Page
  4. Copyright Page
  5. Acknowledgments
  6. brief contents
  7. contents in detail
  8. preface
  9. part 1: adventures in manufacturing
    1. Chapter 1. made in china
      1. The Ultimate Electronic Component Flea Market
      2. The Next Technological Revolution
      3. Touring Factories with Chumby
        1. Scale in Shenzhen
        2. Feeding the Factory
        3. Dedication to Quality
        4. Building Technology Without Using It
        5. Skilled Workers
        6. The Need for Craftspeople
        7. Automation for Electronics Assembly
        8. Precision, Injection Molding, and Patience
        9. The Challenge of Quality
      4. Closing Thoughts
    2. Chapter 2. inside three very different factories
      1. Where Arduinos Are Born
        1. Starting with a Sheet of Copper
        2. Applying the PCB Pattern to the Copper
        3. Etching the PCBs
        4. Applying Soldermask and Silkscreen
        5. Testing and Finishing the Boards
      2. Where USB Memory Sticks Are Born
        1. The Beginning of a USB Stick
        2. Hand-Placing Chips on a PCB
        3. Bonding the Chips to the PCB
        4. A Close Look at the USB Stick Boards
      3. A Tale of Two Zippers
        1. A Fully Automated Process
        2. A Semiautomated Process
        3. The Irony of Scarcity and Demand
    3. Chapter 3. the factory floor
      1. How to Make a Bill of Materials
        1. A Simple BOM for a Bicycle Safety Light
        2. Approved Manufacturers
        3. Tolerance, Composition, and Voltage Specification
        4. Electronic Component Form Factor
        5. Extended Part Numbers
        6. The Bicycle Safety Light BOM Revisited
        7. Planning for and Coping with Change
      2. Process Optimization: Design for Manufacturing
        1. Why DFM?
        2. Tolerances to Consider
        3. Following DFM Helps Your Bottom Line
        4. The Product Behind Your Product
        5. Testing vs. Validation
      3. Finding Balance in Industrial Design
        1. The chumby One’s Trim and Finish
        2. The Arduino Uno’s Silkscreen Art
        3. My Design Process
      4. Picking (and Maintaining) a Partner
        1. Tips for Forming a Relationship with a Factory
        2. Tips on Quotations
        3. Miscellaneous Advice
      5. Closing Thoughts
  10. part 2: thinking differently: intellectual property in china
    1. Chapter 4. gongkai innovation
      1. I Broke My Phone’s Screen, and It Was Awesome
      2. Shanzhai as Entrepreneurs
        1. Who Are the Shanzhai?
        2. More Than Copycats
        3. Community-Enforced IP Rules
      3. The $12 Phone
        1. Inside the $12 Phone
        2. Introducing Gongkai
        3. From Gongkai to Open Source
        4. Engineers Have Rights, Too
      4. Closing Thoughts
    2. Chapter 5. fake goods
      1. Well-Executed Counterfeit Chips
      2. Counterfeit Chips in US Military Hardware
        1. Types of Counterfeit Parts
        2. Fakes and US Military Designs
        3. Anticounterfeit Measures
      3. Fake MicroSD Cards
        1. Visible Differences
        2. Investigating the Cards
        3. Were the MicroSD Cards Authentic?
        4. Further Forensic Investigation
        5. Gathering Data
        6. Summarizing My Findings
      4. Fake FPGAs
        1. The White Screen Issue
        2. Incorrect ID Codes
        3. The Solution
      5. Closing Thoughts
  11. part 3: what open hardware means to me
    1. Chapter 6. the story of chumby
      1. A Hacker-Friendly Platform
      2. Evolving chumby
        1. A More Hackable Device
        2. Hardware with No Secrets
      3. The End of Chumby, New Adventures
      4. Why the Best Days of Open Hardware Are Yet to Come
        1. Where We Came From: Open to Closed
        2. Where We Are: “Sit and Wait” vs. “Innovate”
        3. Where We’re Going: Heirloom Laptops
        4. An Opportunity for Open Hardware
      5. Closing Thoughts
    2. Chapter 7. novena: building my own laptop
      1. Not a Laptop for the Faint of Heart
      2. Designing the Early Novena
        1. Under the Hood
        2. The Enclosure
      3. The Heirloom Laptop’s Custom Wood Composite
        1. Growing Novenas
        2. The Mechanical Engineering Details
      4. Changes to the Finished Product
        1. Case Construction and Injection-Molding Problems
        2. Changes to the Front Bezel
        3. DIY Speakers
        4. The PVT2 Mainboard
        5. A Breakout Board for Beginners
        6. The Desktop Novena’s Power Pass-Through Board
        7. Custom Battery Pack Problems
        8. Choosing a Hard Drive
        9. Finalizing Firmware
      5. Building a Community
      6. Closing Thoughts
    3. Chapter 8. chibitronics: creating circuit stickers
      1. Crafting with Circuits
        1. Developing a New Process
        2. Visiting the Factory
        3. Performing a Process Capability Test
      2. Delivering on a Promise
      3. Why On-Time Delivery Is Important
      4. Lessons Learned
        1. Not All Simple Requests Are Simple for Everyone
        2. Never Skip a Check Plot
        3. If a Component Can Be Placed Incorrectly, It Will Be
        4. Some Concepts Don’t Translate into Chinese Well
        5. Eliminate Single Points of Failure
        6. Some Last-Minute Changes Are Worth It
        7. Chinese New Year Impacts the Supply Chain
        8. Shipping Is Expensive and Difficult
        9. You’re Not Out of the Woods Until You Ship
      5. Closing Thoughts
  12. part 4: a hacker’s perspective
    1. Chapter 9. hardware hacking
      1. Hacking the PIC18F1320
        1. Decapping the IC
        2. Taking a Closer Look
        3. Erasing the Flash Memory
        4. Erasing the Security Bits
        5. Protecting the Other Data
      2. Hacking SD Cards
        1. How SD Cards Work
        2. Reverse Engineering the Card’s Microcontroller
        3. Potential Security Issues
        4. A Resource for Hobbyists
      3. Hacking HDCP-Secured Links to Allow Custom Overlays
        1. Background and Context
        2. How NeTV Worked
      4. Hacking a Shanzhai Phone
        1. The System Architecture
        2. Reverse Engineering the Boot Structure
        3. Building a Beachhead
        4. Attaching a Debugger
        5. Booting an OS
        6. Building a New Toolchain
        7. Fernvale Results
      5. Closing Thoughts
    2. Chapter 10. biology and bioinformatics
      1. Comparing H1N1 to a Computer Virus
        1. DNA and RNA as Bits
        2. Organisms Have Unique Access Ports
        3. Hacking Swine Flu
        4. Adaptable Influenza
        5. A Silver Lining
      2. Reverse Engineering Superbugs
        1. The O104:H4 DNA Sequence
        2. Reversing Tools for Biology
        3. Answering Biological Questions with UNIX Shell Scripts
        4. More Questions Than Answers
      3. Mythbusting Personalized Genomics
        1. Myth: Having Your Genome Read Is Like Hex-Dumping the ROM of Your Computer
        2. Myth: We Know Which Mutations Predict Disease
        3. Myth: The Reference Genome Is an Accurate Reference
      4. Patching a Genome
        1. CRISPRs in Bacteria
        2. Determining Where to Cut a Gene
        3. Implications for Engineering Humans
        4. Hacking Evolution with Gene Drive
      5. Closing Thoughts
    3. Chapter 11. selected interviews
      1. Andrew “bunnie” Huang: Hardware Hacker (CSDN)
        1. About Open Hardware and the Maker Movement
        2. About Hardware Hackers
      2. The Blueprint Talks to Andrew Huang
  13. epilogue
  14. index
  15. about the author
  16. The Electronic Frontier Foundation (EFF)
  17. Footnotes
    1. Chapter 1. made in china
    2. Chapter 2. inside three very different factories
    3. Part 2: thinking differently: intellectual property in china
    4. Chapter 4. gongkai innovation
    5. Chapter 5. fake goods
    6. Chapter 6. the story of chumby
    7. Chapter 7. novena: building my own laptop
    8. Chapter 9. hardware hacking
    9. Chapter 10. biology and bioinformatics
    10. Chapter 11. selected interviews