Skip Navigation
86 comments
  • I had free laundry for most of my freshman year of college. We had coin operated machines, and somebody quickly figured out that you can strip 2 wires and just touch them together, or touch a coin to both of them, and every time you did that the machine would think a coin had been inserted. Eventually the college caught on and one day I went down there and all the machines were taken apart with maintenance guys working on them, and after that there was a heavy duty housing for the coin acceptor with no exposed wires. It was nice while it lasted!

  • This is the best summary I could come up with:


    That’s because of a vulnerability that two University of California, Santa Cruz students found in internet-connected washing machines in commercial use in several countries, according to TechCrunch.

    The two students, Alexander Sherbrooke and Iakov Taranenko, apparently exploited an API for the machines’ app to do things like remotely command them to work without payment and update a laundry account to show it had millions of dollars in it.

    CSC never responded when Sherbrooke and Taranenko reported the vulnerability via emails and a phone call in January, TechCrunch writes.

    That includes that the company has a published list of commands, which the two told TechCrunch enables connecting to all of CSC’s network-connected laundry machines.

    CSC’s vulnerability is a good reminder that the security situation with the internet of things still isn’t sorted out.

    For the exploit the students found, maybe CSC shoulders the risk, but in other cases, lax cybersecurity practices have made it possible for hackers or company contractors to view strangers’ security camera footage or gain access to smart plugs.


    The original article contains 294 words, the summary contains 171 words. Saved 42%. I'm a bot and I'm open source!

    • Sherbrooke and Taranenko reported the vulnerability

      Finks :(

      • Forreal, I highly doubt CSC has a big bounty program so why did they even bother? Guaranteed they were the "Teacher you forgot our homework" kids

      • Honestly, in this case, the company in question are even bigger finks because they don't actually care about fixing a vulnerability that could cost them money.

        If that speaks to their security practices, well... Let's just say I wouldn't be surprised if customer data was all in an unsecured, unencrypted, plain-text Microsoft Word document.

  • There used to be this music festival in my college town and they liked to charge absurd money for "tokens" to use at the vendors. I didn't use all of them but I found they worked in the parking meters (I think they detected as slugs, because they immediately gave me an hour and flashed the meter) but nobody in the city bothered to ticket me for it. I dunno, I felt kinda bad but at the same time, I don't like to parallel park.

    For what its worth, I paid more for the tokens than I ever did parking.

86 comments