My smart sleep mask broadcasts users' brainwaves to an open MQTT broker
583 points by minimalthinker 2 days ago | 244 comments

Aurornis 2 days ago
Kickstarter is full of projects like this where every possible shortcut is taken to get to market. I’ve had some good success with a few Kickstarter projects but I’ve been very selective about which projects I support. More often than not I can identify when a team is in over their heads or think they’re just going to figure out the details later, after the money arrives.

For a period of time it was popular for the industrial designers I knew to try to launch their own Kickstarters. Their belief was that engineering was a commodity that they could hire out to the lowest bidder after they got the money. The product design and marketing (their specialty) was the real value. All of their projects either failed or cost them more money than they brought in because engineering was harder than they thought.

I think we’re in for another round of this now that LLMs give the impression that the software and firmware parts are basically free. All of those project ideas people had previously that were shelved because software is hard are getting another look from people who think they’re just going to prompt Claude until the product looks like it works.

reply
noduerme 8 hours ago
I think you're right. And it's going to be loads of fun to watch.

Not go say there haven't also been very good coders who weren't outsourcing anything, who still got out over their skis with stuff they promised on Kickstarter. I worked on Star Citizen and saw the lure of inflating project scope, responding to the vox populi, go to someone's head in realtime. Where they could still at some point conceivably have done what they had promised if they could just resist promising more stuff.

I find it odd that industrial designers wouldn't have a firmer grasp on what was involved in shipping a product than coders do, since code seems much more prone to mission creep than a physical product would be. But I totally agree that if you're used to outsourcing the build phase of whatever you do, AI is going to be the ultimate mirage.

reply
lr4444lr 2 days ago
At this point, I trust LLMs to come up with something more secure than the cheapest engineering firm for hire.
reply
nozzlegear 2 days ago
"Anyone else out there vibe circuit-building?"

https://xcancel.com/beneater/status/2012988790709928305

reply
godelski 24 hours ago
Is there more context to this? I'm assuming Ben is experimenting and demonstrating the danger of vibe circuit designing? Mostly because I know he has a ton of experience and I'd expect him to not make this mistake (also seems like he told the AI why it was wrong)
reply
nozzlegear 21 hours ago
I'm not sure, it was posted on HN a couple weeks ago with the same title as the text in his tweet. I'd guess he was experimenting and trying to show the dangers, like you suggested.
reply
stared 12 hours ago
In https://quesma.com/blog/nano-banana-pro-intelligence-with-to... (Nov 2025) we had an illustrative diagram of using Nano Banana Pro to create a circuit diagram.
reply
alexjplant 2 days ago
People make these mistakes too. Several times in my high school shop class kids shorted out 9V batteries trying to build circuits because they didn't understand how electronics work. At no point did our teacher stop them from doing so - on at least one occasion I unplugged one from a breadboard before it got too toasty to handle (and I was/am an electronics nublet). Similarly there was also a lot of hand-wringing about the Gemini pizza glue in a world where people do wacky stuff like cook fish in a dishwasher or defrost chicken overnight on the counter or put cooked steak on the same plate it was on when raw just a few minutes prior.

LLMs are just surfacing the fact that assessing and managing risk is an acquired, difficult-to-learn skill. Most people don't know what they don't know and fail to think about what might happen if they do something (correctly or otherwise) before they do it, let alone what they'd do if it goes wrong.

reply
Majromax 9 hours ago
> Several times in my high school shop class kids shorted out 9V batteries trying to build circuits because they didn't understand how electronics work. At no point did our teacher stop them from doing so

Yes, and that's okay because the classroom is a learning environment. However, LLMs don't learn; a model that releases the magic smoke in this session will be happy to release it all over again next time.

> LLMs are just surfacing the fact that assessing and managing risk is an acquired, difficult-to-learn skill.

Which makes the problem worse, not better. If risk management is a difficult skill, then that means we can't extrapolate from 'easy' demonstrations of said skill to argue that an LLM is generally safe for more sensitive tasks.

Overall, it seems like LLMs have a long tail of failures. Even while their mean or median performance is good, they seem exponentially more likely than a similarly-competent human to advise something like `rm -rf /`. This is a deeply unintuitive behaviour, precisely because our 'human-like' intuition is engaged with resepct to the average/median skill.

reply
nozzlegear 24 hours ago
Well said, but I'd add that LLMs are also surfacing the fact that there's a swathe of people out there who will treat the machines as more trustworthy than humans by default, and don't believe they need to do any assessment or risk management in the first place.
reply
hnlmorg 12 hours ago
People are just lazy. It’s got nothing to do with LLMs having more trust because they’re a machine because most people would happily trust their friend over an expert. They’d trust the first blog post they find online over an expert. Most people are just too lazy and not skilled enough to perform independent review.

And to be fair to those people, coming to topics with a research mindset is genuinely hard and time consuming. So I can’t actually blame people for being lazy.

All LLMs do is provide an even easier way to “research”. But it’s not like people were disbelieving random Facebook posts, online scams, and word-of-mouth before LLMs.

reply
noduerme 6 hours ago
As right as this may be, it elides the crucial difference between asking LLMs and all the other methods of asking questions you enumerated. The difference is not between the quality of information you might get from a friend or a blog versus an LLM. The difference is the centralization and feeding of the same poor quality information to massive numbers of people at scale. At least whatever bonkers theory someone "researches" on their own is going to be a heterodox set of ideas, with a limited blast radius. Even a major search engine up-ranking a site devoted to, like, how horse dewormers can cure covid, doesn't present it as if that link is the answer to how to cure covid, right? LLMs have a pernicious combination of sounding authoritative while speaking gibberish. Their real skill is not in surfacing the truth from a mass of data, it's in presenting a set of assertions as truth in a way that might satisfy the maximum number of people with limited curiosity, and in establishing an artificial sense of trust. That's why LLMs are likely the most demonic thing ever made by man. They are machines built to lie, tell half-truths, obfuscate and flatter at the same time. Doesn't that sound enough like every religion's warning about the devil?
reply
hnlmorg 2 hours ago
But nothing has changed there. People have been posting intelligent-sounding gibberish on social media and blogs for years before LLMs.

The problem with centralisation isn’t that it gobbles up data. It’s that it allows those weights to be dictated by a small few who might choose to skew the model more favourably to the messaging they’ve want to promote.

And this is a genuine concern. But it’s also not a new problem either. We already have that problem with new broadcasters, newspaper publications, social media ethics teams, and so on and so forth.

The new problem LLMs bring to human interaction isn’t any of the issues described above. It’s with LLMs replacing human contact in situations where you need something with a conscience to step in.

For example, conversations leading to AI promoting negative thoughts from people with mental health problems because the chat history starts to overwhelm the context window, resulting in the system prompt doing a poorer job of weighting the conversation away from dangerous topics like suicide.

This isn’t to say that the points which you’ve addressed aren’t real problems that exist. They definitely do exist. But they’ve also always existed, even before GPT was invented. We’ve just never properly addressed those problems because:

either there’s no incentive to. If you are powerful enough to control the narrative then why would you use that power to turn the narrative against you?

…or there simply isn’t a good way of solving that problem. eg I might hate stupid conspiracy theories, but censoring research is a much worse alternative. So we just have to allow nutters to share their dumb ideas in the hope that enough legitimate research is published, and enough people are sensible enough to read it, that the nutters don’t have any meaningful impact on society.

reply
godelski 24 hours ago
What's your point?

The AI is being sold as an expert, not a student. These are categorically different things.

The mistake in the post is one that can be avoided by taking a single class at a community college. No PhD required, not even a B.S., not even an electricians certificate.

So I don't get your point. You're comparing a person in a learning environment to the equivalent of a person claiming to have a PhD in electrical engineering. A student letting the magic smoke escape from a basic circuit is a learnable experience (a memorable one that has high impact), especially when done in a learning environment where an expert can ensure more dangerous mistakes are less likely or non existent. But the same action from a PhD educated engineer would make you reasonably question their qualifications. Yes, humans make mistakes but if you follow the AI's instructions and light things on fire you get sued. If you follow the engineer's instructions and set things on fire then that engineer gets fired likely loses their license.

So what is your point?

reply
bethekidyouwant 23 hours ago
No one thinks their breadboard wont catch on fire because an AI agent told them it wouldn’t. Its never been easier to learn because of these agents.
reply
zdragnar 23 hours ago
Lawyers are getting in trouble because they use AI and submit fabricated citations about fabricated cases as precedent. A bunch of charges were recently thrown out in Wisconsin because of this, and it's not the first time such behavior has made the news.

https://www.wpr.org/news/judge-sanctions-kenosha-county-da-a...

AI is indeed being understood to be an expert that replaces human judgement, and people are being hurt because of it.

reply
DrewADesign 11 hours ago
The real analog here would be an electronics teacher leading his students to create a circuit that caught fire. If you’re confidently giving faulty information to people that don’t know any better, you’re not teaching them.
reply
techpression 22 hours ago
In my experience people don’t use LLMs to learn but to circumvent learning.
reply
aix1 15 hours ago
I am sure this is true. On the flip side, as someone who is addicted to learning, I've been finding LLMs to be amazing at feeding my addiction. :)

Some recent examples:

* foreign languages ("explain the difference between these two words that have the same English translation", "here's a photo of a mock German exam paper and here is my written answer - mark it & show how I could have done better")

* domains that I'm familiar with but might not know the exact commands off the top of my head (troubleshooting some ARP weirdness across a bunch of OSX/Linux/Windows boxes on an Omada network)

* learning basic skills in a new domain ("I'm building this thing out of 4mm mild steel - how do I go about choosing the right type of threading tap?", "what's the difference between Type B and Type F RCCB?")

Many of these can be easily answered with a web search, but the ability to ask follow-up questions has been a game changer.

I'd love to hear from other addicts - are there areas where LLMs have really accelerated your learning?

reply
rescbr 9 hours ago
Hah, yesterday I was discussing solar panels and moving shadows. I would have wasted money buying a commercial solar panel if I didn’t have this chat.

Learned a lot on how it works, to the point I’m confident that I can go the DIY route and spend my money in AliExpress buying components instead.

Why not ask a pro solar panel installer instead? I live in an apartment, of course they would say it’s not possible to place a solar panel on my terrace. I don’t believe in things not being possible.

But I had two semesters of electronics/robotics in my CS undergrad and I know to not to trust the LLM blindly and verify.

reply
maximalthinker 8 hours ago
[dead]
reply
godelski 2 hours ago
I'm of a similar mind but I think you also need to be careful. I find that people are more willing to believe a chatbot than a search result simply due to the way the information is presented. But if you're thinking "but search results can be wrong too!" then that's exactly my point. The problem is quite similar to people "doing their own research". I'm sure conspiracy theorists do a lot of reading, a lot of searching, and all that cargo cult research stuff. But I say cargo cult because it has all the form of research but none of the substance. That doesn't mean using LLMs is exclusive cargo cult learning but it is also easy to fall into a trap of that, and I'd argue easier than it is to fall into cargo cult learning by searching, which is easier to fall into cargo cult learning than by reading books, which is easier than being in a university lecture. Doesn't mean the tools are bad, but that it's easy to fool ourselves.

Basically if you can't differentiate how your typical conspiracy theorist isn't researching then you're at greater risk. It's worth thinking about that question, as they do do a lot of reading, thinking, and looking things up. It's more subtle, right?

FWIW, a thing I find LLMs really useful for is learning the vernacular of fields I'm unfamiliar or less familiar with. It is especially helpful when searches fail due to overloaded words (and let's be honest, Google's self elected lobotomy), but it is more a launching point. Though this still has the conspiracy problem as it is easy to self-reinforce a belief and not considering the alternatives. Follow-up questions are nice and can really help sifting through large amounts of information, but they certainly have a preference to narrow the view. I think this makes learning feel faster and more direct but have also taught (at the university level) I think it is important to learn all the boring stuff too. That stuff may not be important "now" but a well organized course means that that stuff is going to be important "soon" and "now" is the best time to learn it. No different than how musicians need to practice boring scales and patterns, athletes need to do drills and not just learn by competing (or "simulated" computations), or how children learn to write by boringly writing shapes over and over. I find the LLMs like to avoid the boring parts.

reply
techpression 13 hours ago
I agree, I always ask to know more if I don’t get it or it’s a new subject. But I think we’re in the minority, it’s easier to just accept the answer and move on, it requires very little effort compared to trying to understand and retain.
reply
FrinkleFrankle 15 hours ago
Just because a calculator will only ever be used by a subset of the population to type 80085 and giggle, doesn't mean it can't also be used for complex calculations.

AI is a tool that can accelerate learning, or severely inhibit it. I do think the tooling is going to continue to make it easier and easier to get good output without knowing what you're doing, though.

reply
godelski 2 hours ago

  > Just because a calculator will only ever be used by a subset of the population
I'm not sure what your argument is here. I think everyone knows this but also recognizes that the vast majority of people are not using calculators in that way. The vast majority of people are using calculators to replace calculation.

I'll give an example. I tell people I tip by: round the decimal, divide by 10, multiply by 2. Nearly every time I say that people tell me it is too difficult. This includes people with PhD STEM educations...

reply
techpression 27 minutes ago
Hearing these stories (and I hear them more than I would like) is mind boggling to me. As someone who’s quite bad at math, doing what you describe is insanely basic stuff, anyone in a developed country with access to school should be able to do that. It will be hard to convince me those people are using a LLM to learn.
reply
cwillu 16 hours ago
Exactly. I like to say that learning feels like frustration. If I'm right, then LLM's eliminate precisely the thing that is learning.
reply
godelski 23 hours ago
That's a very strong claim. I don't think people expect their circuits to ignite, LLM instruction or not. But I'd expect learning from a book or dedicated website would be less likely for that to occur. (Even accounting for bad manufacturing)

You're biased because you're not considering that by definition the student is inexperienced. Unknown unknowns. Tons of people don't know very basic things (why would they?) like circuits with capacitors bring dangerous when the power is off.

Why are you defending there LLM? Would you be as nice to a person? I'd expect not because these threads tend to point out a person's idiocy. I'm not sure why we give greater leeway to the machine. I'm not sure why we forgive them as if they are a student learning but someone posting similar instructions on a blog gets (rightfully) thrashed. That blog writer is almost never claiming PhD expertise

I agree that LLMs can greatly aid in learning. But I also think they can greatly hinder learning. I'm not sure why anyone thinks it's any different than when people got access to the internet. We gave people access to all the information in the world and people "do their own research" and end up making egregious errors because they don't know how to research (naively think it's "searching for information"), what questions to ask, or how to interrogate data (and much more). Instead we've ended up with lots of conspiratorial thinking. Now a sycophantic search engine is going to fix that? I'm unconvinced. Mostly because we can observe the result.

reply
xvilka 16 hours ago
> We gave people access to all the information in the world and people "do their own research" and end up making egregious errors because they don't know how to research (naively think it's "searching for information"), what questions to ask, or how to interrogate data (and much more).

You pin pointed a major problem with education, indeed. Personally, I think 3 crucial courses should be taught in school to mitigate that: 1) rational thinking 2) learning how to learn 3) learning how to do a research.

reply
godelski 2 hours ago
I think so too, but I also think this is part of the failure of math and science education. That is exactly what those topics are. But many courses will focus on the facts and not the substance. Instead of linking Feynman's Cargo Cult Science, which also broaches this I'll link this one instead[0] as I think it better illustrates what I'm saying.

[0] https://enlightenedidiot.net/random/feynman-on-brazilian-edu...

reply
bethekidyouwant 20 hours ago
The result of more people getting into electronics because it’s easier now?
reply
godelski 16 hours ago
When reading I suggest trying to interpret what the person wrote rather than just ignore it. I'd probably start by taking the advice of your username
reply
azan_ 24 hours ago
What’s wrong with dishwasher salmon?
reply
astura 20 hours ago
It doesn't get hot enough to be a safe cooking method

https://youtu.be/dSwzau2_KF8?t=1108

reply
wafflemaker 12 hours ago
In Norway we eat plenty of salmon which is quite raw or even raw (in sushi). It has to be frozen and thawed first, to kill parasites.

A friend that studied fish production did recommend not eating salmon though and eating trout instead (ørret in Norwegian). Based on scientific evidence difference is pretty small (15% fish not surviving for salmon vs 12% for trout). But rainbow trout does have more DHA per kg.

reply
kortilla 17 hours ago
The difference is that LLMs pretend to be experts on all things. The high school shop kids aren’t under the impression they can build a smart toaster or whatever.
reply
JKCalhoun 23 hours ago
Ha ha, I said this before when Ben's post came up earlier, but, yes I am. And so far it has been a positive experience.
reply
Aurornis 2 days ago
The cheapest engineering firms you hire are also using LLMs.

The operator is still a factor.

reply
jama211 2 days ago
Yeah, but they’ll add another layer of complexity over doing it yourself
reply
Aurornis 2 days ago
The people doing these kickstarters are outsourcing the work because they can’t do it themselves. If they use an LLM, they don’t know what to look for or even ask for, which is how they get these problems where the production backend uses shared credentials and has no access control.

The LLM got it to “working” state, but the people operating it didn’t understand what it was doing. They just prompt until it looks like it works and then ship it.

reply
caminante 2 days ago
You're still not following.

The parents are saying they'd rather vibe code themselves than trust an unproven engineering firm that does(n't) vibe code.

reply
numpad0 15 hours ago
This took me a while(I'm slow), but I think GP is saying: "I've seen enough of (expressions) thinking ideas is the key when engineering was; with everyone snorting LLMs, we'll see that replicating in software world" but nicely.

THAT makes sense. Engineering was never cheap nor non-differentiating if normalized by man-hours, only when it was USD normalized. If a large enough number of people were to get the same FALSE impression that software and firmware parts are now basically free and non-differentiating commodities, then there will be tons of spectacular failures in software world in coming years. There has already been early previews of those here.

reply
Aurornis 23 hours ago
I’m following exactly, but the parent commenter is off on a tangent unrelated to the topic.

We’re not taking about the parent commenter, we’re talking about unskilled Kickstarter operators making decisions. Not a skilled programmer using an LLM.

reply
TeMPOraL 2 days ago
> they'd rather vibe code themselves than trust an unproven engineering firm

You could cut the statement short here, and it would still be a reasonable position to take these days.

LLMs are still complex, sharp tools - despite their simple appearance and proteststions of both biggest fans and haters alike, the dominating factor for effectiveness of an LLM tool on a problem is still whether or not you're holding it wrong.

reply
caminante 20 hours ago
I forgot about that Jobs/Apple reference!

Paraphasing, LLMs are great (bad) tools for the right (wrong) job...

in the right hands,

at the right time,

in the right place...

reply
jama211 5 hours ago
Well I certainly hope that’s true to some degree or I’m out of a job
reply
seanmcdirmid 23 hours ago
I don’t know, you can get a lot of nice engineering done in a Shenzhen dark alley.
reply
Kiro 2 days ago
LLMs definitely write more robust code than most. They don't take shortcuts or resort to ugly hacks. They have no problem writing tedious guards against edge cases that humans brush off. They also keep comments up to date and obsess over tests.
reply
thayne 24 hours ago
> They don't take shortcuts or resort to ugly hacks.

That hasn't, universally, been my experience. Sometimes the code is fine. Sometimes it is functional, but organized poorly, or does things in a very unusual way that is hard to understand. And sometimes it produces code that might work sometimes but misses important edge cases and isn't robust at all, or does things in an incredibly slow way.

> They have no problem writing tedious guards against edge cases that humans brush off.

The flip side of that is that instead of coming up with a good design that doesn't have as many edge cases, it will write verbose code that handles many different cases in similar, but not quite the same ways.

> They also keep comments up to date and obsess over tests.

Sure but they will often make comments or tests that aren't actually useful, or modify tests to succeed instead of fixing the code.

One significant danger of LLMs is that the quality of the output is higly variable and unpredictable.

That's ok, if you have someone knowledgeable reviewing and correcting it. But if you blindly trust it, because it produced decent results a few times, you'll probably be sorry.

reply
godelski 23 hours ago

  > Sure but they will often make comments or tests that aren't actually useful, or modify tests to succeed instead of fixing the code.
I've been deeply concerned that there's been a rise of TDD. I thought we already went through this and saw its failure. But we're back to we're people cannot differentiate "tests aren't enough" from "tests are useless". The amount of faith people put into tests is astounding. Especially when they aren't spending much time analyzing the tests and understanding their coverage.
reply
godelski 23 hours ago

  > They don't take shortcuts or resort to ugly hacks.
My experience is quite different

  > They have no problem writing tedious guards against edge cases that humans brush off. 
Ditto.

I have a hard time getting them to write small and flexible functions. Even with explicit instructions about how a specific routine should be done. (Really easy to produce in bash scripts as they seem to avoid using functions, but so do people, but most people suck at bash) IME they're fixated on the end goal and do not grasp the larger context (which is often implicit though I still find difficulty when I'm highly explicit. Which at that point it's usually faster to write myself)

It also makes me question context. Are humans not doing this because they don't think about it or because we've been training people to ignore things? How often do we hear "I just care that it works?" I've only heard that phrase from those that also love to talk about minimum viable products because... frankly, who is not concerned if it works? That's always been a disagreement about what is sufficient. Only very junior people believe in perfection. It's why we have sayings like "there's no solution more permanent than a temporary fix that works". It's the same people who believe tests are proof of correctness rather than a bound on correctness. The same people who read that last sentence and think I'm suggesting to not write tests or believe tests are useless.

I'd be concerned with the LLM operator quite a bit because of this. Subtle things are important when instructing LLMs. Subtle things in the prompts can wildly change the output

reply
Hendrikto 5 hours ago
> They don't take shortcuts or resort to ugly hacks.

In my experience that is all they do, and you constantly have to fight them to get the quality up, and then fight again to prevent regressions on every change.

reply
girvo 23 hours ago
They absolutely take shortcuts and resort to ugly hacks.

My AGENTS.md is filled with specific lines to counter all of them that come up.

reply
kahnclusions 21 hours ago
What? Yes they do take shortcuts and hacks. They change the tests case to make it pass. As the context gets longer it is less reliable at following earlier instructions. I literally had Claude hallucinate nonexistent APIs and then admitted “You caught me! I didn’t actually know, let me do a web search” and then after the web search it still mixes deprecated patterns and APIs against instructions.

I’m much more worried about the reliability of software produced by LLMs.

reply
BoorishBears 2 days ago
I had 5.3-Codex take two tries to satisfy a linter on Typescript type definitions.

It gave up, removed the code it had written directly accessing the correct property, and replaced it with a new function that did a BFS to walk through every single field in the API response object while applying a regex "looksLikeHttpsUrl" and hoping the first valid URL that had https:// would be the correct key to use.

On the contrary, the shift from pretraining driving most gains to RL driving most gains is pressuring these models resort to new hacks and shortcuts that are increasingly novel and disturbing!

reply
devmor 2 days ago
Interesting and completely wrong statement, what gave you this impression?
reply
dylanowen 2 days ago
I know right. I kept waiting for a sarcasm tag at the end
reply
majorchord 2 days ago
right and wrong don't exist when evaluating subjective quantifiers
reply
Kiro 2 days ago
The discourse around LLMs has created this notion that humans are not lazy and write perfect code. They get compared to an ideal programmer instead of real devs.
reply
joe_mamba 2 days ago
This. The hacks, shortcuts and bugs I saw in our product code after i got hired, were stuff every LLM would tell you not to do.
reply
salawat 2 days ago
LLM's at best asymptotically approach a human doing the same task. They are trained on the best and the worst. Nothing they output deserves faith other than what can be proven beyond a shadow of a doubt with your own eyes and tooling. I'll say the same thing to anyone vibe coding that I'd say to programmatically illiterate. Trust this only insofar as you can prove it works, and you can stay ahead of the machine. Dabble if you want, but to use something safely enough to rely on, you need to be 10% smarter than it is.
reply
gxs 2 days ago
Amen. On top of that, especially now, with good prompting you can get closer to that better than you think.
reply
Aurornis 23 hours ago
> LLMs definitely write more robust code than most.

I’ve been using Opus 4.6 and GPT-Codex-5.3 daily and I see plenty of hacks and problems all day long.

I think this is missing the point. The code in this product might be robust in the sense that it follows documentation and does things without hacks, but the things it’s doing are a mismatch for what is needed in the situation.

It might be perfectly structured code, but it uses hardcoded shared credentials.

A skilled operator could have directed it to do the right things and implement something secure, but an unskilled operator doesn’t even know how to specify the right requirements.

reply
lukan 2 days ago
And the cheapest engineering firm won't use LLMs as well, wherever possible?
reply
fc417fc802 2 days ago
The cheapest engineering firm will turn out to be headed up by an openclaw instance.
reply
TheRealPomax 2 days ago
fun fact, LLMs come in cheapest and useless and expensive but actually does what's being asked, too.

So, will they? Probably. Can you trust the kind of LLM that you would use to do a better job than the cheapest firm? Absolutely.

reply
minimalthinker 2 days ago
this.
reply
girvo 23 hours ago
Oh gosh anyone who thinks LLMs make firmware free haven’t seriously tried to use it for firmware engineering then.
reply
dnw 2 days ago
I would love to see the prompt history. Always curious how much human intervention/guidance is necessary for this type of work because when I read the article I come away thinking I prompt Claude and it comes out with all these results. For example, "So Claude went after the app instead. Grabbed the Android APK, decompiled it with jadx." All by itself or the author had to suggest and fiddle with bits?
reply
minimalthinker 2 days ago
Very little intervention tbh. I will try to retrieve it and post.
reply
dnw 2 days ago
That's great to hear. I'd be interested to see the session. Yes, Claude Code keeps sessions in ~/.claude/projects/ by default. Thank you!
reply
selkin 2 days ago
By default, Claude code keeps session history (as jsonl files in ~/.claude).

It’s wasteful not to save and learn from those.

reply
dnw 2 days ago
reply
cyanydeez 2 days ago
Really is a derth of livestreams demostrating these things. Youd think if thetes so much Unaided AI work people would stream it.
reply
ndespres 11 hours ago
Why would anyone watch a live stream of someone else poking a computer into completing a task? It’s barely more interesting than having someone tell you about a dream they had.
reply
cyanydeez 8 hours ago
Fantastic claims require fantastic Evidence.
reply
yumraj 2 days ago
While most comments are focused on the issue that they found, I’m more intrigued by the fact that Claude was able to reverse engineer so well.

Lowering the skills bar needed to reverse engineer at this level could have its own AI-related implications.

reply
flutas 15 hours ago
One of my earlier experiences with codex was actually reverse engineering, far before it was good at actual coding.

It was able to decompile a react native app (Tesla Android app), and fully trace from a "How does X UI display?" down to a network call with a payload for me to intercept.

Granted it did it by splitting the binary into a billion txt files with each one being a single function and then rging through it, but it worked.

reply
madeofpalk 9 hours ago
I heard about this and tried quite a bit to reverse engineer a decompiled binary from a big game to find struct/schema information but could never get anything useful.
reply
yieldcrv 18 hours ago
I love that it shows you the thought process that to a Senior or Staff level person would be expected to know in their approach to a reverse engineering problem with no documentation

Levels up the way I think about things

reply
Neywiny 23 hours ago
I wholeheartedly disagree. Running strings and a decompiler explicitly written for that language is kinda the first thing that comes to mind. Trying hundreds of random ways to talk to it before even doing any real reverse engineering is just a waste of compute. You're never going to guess the JSON to send to it or the random bytes. But it's not my tokens getting spent on it so meh
reply
wildylion 12 hours ago
> and send them electric impulses in their sleep. So, it's like Lovense, but for dreams?

Sorry, I know it's horrible, but I couldn't resist.

reply
rbbydotdev 2 days ago
> I was not expecting to end up with the ability to read strangers' brainwaves and send them electric impulses in their sleep. But here we are.

Almost out of a Phillip K Dick novel

reply
nephihaha 11 hours ago
Just what I was thinking.

China has a recent history of spying on personal data. https://www.telegraph.co.uk/news/2026/01/26/china-hacked-dow...

reply
SubiculumCode 2 days ago
How about complaining that brain waves get sent to a server? I'm a neuroscientist, so I'm not going to say that the EEG data is mind reading or anything, but as a precedent, non privacy of brain data is very bad.
reply
willturman 2 days ago
Non-privacy of this person is currently sleeping data is very bad as well, for different reasons.

You know, now that I'm thinking about it, I'm beginning to wonder if poor data privacy could have some negative effects.

reply
thayne 24 hours ago
It sounds like there was "presence in room" data as well, which could be very bad
reply
andai 17 hours ago
This is the easiest signal though, on basically any account. You can see the time that communication happens, and the times when it doesn't.

For example a while back I wanted to map out my sleep cycle and I found a tool that charts your browser history over a 24 hour period, and it mapped almost perfectly to my sleep / wake periods.

reply
fc417fc802 2 days ago
Unsecured fitness monitor data revealed military guard post (IIRC) activity a while back.
reply
iririririr 2 days ago
not because you knew how much someone worked out. But because it had GPS.
reply
fc417fc802 20 hours ago
True.

But keep in mind that other less obvious data sources can often lead to similar issues. For example phone accelerometer data can be used to precisely locate someone driving in a car in a city by comparing it with a street map.

In the context of the military even just inferring a comprehensive map of which people are on which shift and when they change might be considered a threat.

reply
b00ty4breakfast 2 days ago
People will be lining up to have their brainwaves harvested because it'll be mildly easier to send emails or something similarly inane.
reply
RobotToaster 2 days ago
Corporations will be lining up to require their employees have their brainwaves harvested, so they can fire employees who aren't alert enough.
reply
kyleee 19 hours ago
Will someone invent the equivalent of a mouse jiggler to get around this?
reply
HowTheStoryEnds 13 hours ago
Porn?
reply
masfuerte 4 hours ago
They'll update the required brain state to "alert but not enjoying yourself".
reply
delichon 2 days ago
You could read the alertness level from an EEG, which could be helpful to a burglar. The device with slow-wave status seems ideal.
reply
amarant 2 days ago
How useful could something like this be for research? I'm not a neuroscientist so I have no clue, but it seems like the only justification I can think of..
reply
mattkrause 2 days ago
The general idea of an EEG system that posts data to a network?

Very, but there are already tons of them at lots of different price, quality, openness levels. A lot of manufacturers have their own protocols; there are also quasi/standards like Lab Streaming Layer for connecting to a hodgepodge of devices.

This particular data?

Probably not so useful. While it’s easy to get something out of an EEG set, it takes some work to get good quality data that’s not riddled with noise (mains hum, muscle artifacts, blinks, etc). Plus, brain waves on their own aren’t particularly interesting—-it’s seeing how they change in response to some external or internal event that tells us about the brain.

reply
brabel 2 days ago
Not a neuroscientist either but I would imagine that raw data without personal information would not be useful for much. I can imagine that it would be quite valuable if accompanied with personal data plus user reports about how they slept each night, what they dreamed about if anything, whether it was positive dreams or nightmares etc. And I think quite a few people wouldn’t mind sharing all of that in the name of science, but in this case they don’t seem to have even tried to ask.
reply
iberator 2 days ago
What if you gonna think about your social security number 30000 times in your dreams, and someone knows the pattern? See the danger? That's evil.
reply
minimalthinker 2 days ago
I believe they use it for sleep tracking
reply
AnimalMuppet 2 days ago
If they're taking patient data for research without permission, they are not ethical researchers.
reply
sneak 2 days ago
Is it really “without permission” if it’s from a server for which the access credentials have been deliberately published to the entire internet?
reply
wlonkly 4 hours ago
From the perspective of research ethics: it is very much without permission in that situation
reply
AnimalMuppet 2 days ago
If it's without the patient's permission, then yes, it is without the only permission that matters for medical ethics.
reply
minimalthinker 2 days ago
I would presume data privacy laws already have good precedent for health data?
reply
baby_souffle 2 days ago
> I would presume data privacy laws already have good precedent for health data?

Google for a list of all the exceptions to HIPPA. There are a lot of things that _seem_ like they should be covered by HIPPA but are not...

reply
minimalthinker 2 days ago
Interesting...
reply
freedomben 2 days ago
Only for "covered entities" under HIPAA (at least in the US)
reply
zephen 2 days ago
"Broker" is right there in the title of the post.

Baby's gotta get some cash somewhere.

reply
Kuinox 2 days ago
An MQTT Broker just mean server, that's MQTT terminology.
reply
zephen 24 hours ago
Dark humor is like food.

Not everybody gets it.

reply
Kuinox 24 hours ago
Here it's more Poe's law.
reply
zephen 2 hours ago
Maybe?

Poe's law is always described as being about parodies of extreme viewpoints, not about perceived misunderstandings of what is being commented on.

I don't think that the viewpoint that these people will sell your data in a heartbeat is extreme.

reply
sneak 2 days ago
Millions of people voluntarily use Gmail which gives a lot more useful data than EEG output to DHS et al without a warrant under FAA702. What makes you think people who “have nothing to hide” would care about publishing their EEG data?
reply
nilsherzig 16 hours ago
Can someone explain the other iot devices using the same broker? I tried cross referencing the feature list, information about the user base, kickstarter origin and flutter app with some search results and I’m pretty sure that I found the company and product in question. But they don’t (publicly) produce iot devices? Sooo I’m wondering if different companies are streaming their data into a shared sink and why they would do that?
reply
rglover 9 hours ago
They were scanning BLE so any device using that protocol in range would be picked up. Similar to seeing your neighbor's Wi-Fi router from your couch.
reply
autoexec 2 days ago
This guy bought an internet connected sleep mask so it's not surprising that it was collecting all kinds of data, or that it was doing it insecurely (everyone should expect IoT anything to be a security nightmare) so to me the surprising thing about this is that the company actually bothered to worry about saving bandwidth/power and went through the trouble of using MQTT. Probably not the best choice, and they didn't bother to do it securely, but I'm genuinely impressed that they even tried to be efficient while sucking up people's personal data.
reply
8n4vidtmkvmk 2 days ago
Meanwhile streaming everyone's data, negating any benefit.
reply
simonbw 2 days ago
Ok, obviously unethical to do it, but this sounds like you've got the power to create some sci-fi shared dreaming device, where you can read people's brainwaves and send signals to other people's masks based on those signals. Or send signals to everyone at the same time and suddenly people all across the world experience some change in their dream simultaneously.

Like, don't actually do it, but I feel like there's inspiration for a sci-fi novel or short story there.

reply
ddtaylor 24 hours ago
I feel if you're doing something that will require a Hans Zimmer soundtrack you might be the bad guy.
reply
pjerem 2 days ago
That’s the plot of Paprika.
reply
billylo 2 days ago
Inception
reply
rzzzt 24 hours ago
The Cell
reply
JKCalhoun 23 hours ago
Brainstorm.
reply
StanislavPetrov 2 days ago
Dreamscape, 1984
reply
darba 2 days ago
[dead]
reply
nrenegar 5 hours ago
You should financialize this by creating a prediction market around it.
reply
abeppu 22 hours ago
Ok so obviously this is a security disaster. But also ... is there a hackable consumer EEG device that gets useful data and is as comfortable as a sleep mask (and presumably you're not slathering electrode every time you put on your sleep mask)? Cuz once the thing can't phone home, that sounds pretty cool.
reply
Larrikin 2 days ago
This feels like a reason to buy the device to me? I would want to block all of the data going to the cloud and would only want operations happening locally. But the MQTT broadcast then allows me to create a local only integration in Home Assistant with all of the data.

What's the real risk profile? Robbers can see you are asleep instead of waiting until you aren't home?

I have not implemented MQTT automations myself, but it's there a way to encrypt them? That could be a nice to have

reply
matthewfcarlson 2 days ago
Sounds like you cannot control which MQTT endpoint it is headed to? It just goes to the server of the device. Assuming you could modify the firmware, you could program it to send to a local MQTT.
reply
erazor42 2 days ago
Simpler just update your local network dns so whatevercompany.brain.com redirect to your local 10.0.0.3 mqtt
reply
wongogue 17 hours ago
With no encryption, this isn’t a problem.
reply
andai 17 hours ago
I thought the author was going to change the hardcoded server (or override DNS) and set up his own.
reply
pedalpete 2 days ago
I'm the founder of neurotech/sleeptech company https://affectablesleep.com, and this post shows the major issue with current wellness device regulation.

I believe there was some good that came from last months decision to be more open to what apps and data can say without going through huge regulatory processes (though because we apply auditory stimulation, this doesn't apply to us), however, there should be at least regulatory requirements for data security.

We've developed all of our algorithms and processing to happen on device, which is required anyway due to the latency which would result from bluetooth connections, but even the data sent to the server is all encrypted. I'd think that would be the basics. How do you trust a company with monitoring, and apparently providing stimulation, if they don't take these simple steps?

reply
basedrum 2 days ago
Name the company, hiding it is irresponsible
reply
Jolter 2 days ago
Author doesn’t spell out why they are not naming them, but my guess is they are trying to not promote the product to malicious actors who would be interested in the sleep data of others.

I guess that’s not a huge problem, though, since all users are presumably at least anonymous.

reply
bstsb 2 days ago
less sleep data, i imagine, and more the whole “send remote electrical impulses” thing
reply
brabel 2 days ago
It’s probably safe to assume they are all like that.
reply
thedougd 10 hours ago
Agents are excellent for reverse engineering. I was also recently working on a BLE reverse engineering exercise and followed a similar path. I ran into lots of headaches with BLE on my Mac and tabled it.

Author or others who know, did you perform this on Linux? I imagine it lacks the tooling challenges I had with BLE on MacOS.

reply
minimalthinker 10 hours ago
It was on a MBP, didn’t run into any issues
reply
thedougd 6 hours ago
What sort of tools did it use? I suppose the path mine took may have been a dead end. The Tuya app (I was also using decompiled APK) downloads the BLE definitions on-demand and weren't embedded in the app. It wanted me to capture traffic on a device with the app. I punted but plan to resume with an emulator setup or real device connected with adb.
reply
bryanrasmussen 2 days ago
huh, not sure if life imitates snark and bull https://medium.com/luminasticity/great-products-of-illuminat...

"The ZZZ mask is an intelligent sleep mask — it allows you to sleep less while sleeping deeper. That’s the premise — but really it is a paradigm breaking computer that allows full automation and control over the sleep process, including access to dreamtime."

or if this is another scifi variation of the same theme, with some dev like embellishments.

reply
mrguyorama 2 days ago
That is the premise of HypnoSpace Outlaw, a neat game about 90s internet nostalgia and scifi.
reply
tomsmithtld 2 days ago
the shared MQTT credentials pattern is unfortunately super common in budget IoT. seen the exact same thing in smart plugs and air quality sensors. the frustrating part is per-device auth is not even hard to set up, mosquitto supports client certs and topic ACLs with minimal config. manufacturers skip it because per-device key provisioning adds a step to the assembly line and nobody wants to think about key management. so they hardcode one set of creds and hope nobody runs strings on the binary.
reply
RyJones 18 hours ago
Why is it that almost all ODB-II dongles you buy have the same MAC address? If you buy two, one for each car, your app can never tell which car you're connected to.

They all come with Bluetooth certified logos, as well.

The ones that don't reuse everything cost like $120, not $15.

reply
baby_souffle 2 days ago
Well that’s a brand new sentence.
reply
amelius 2 days ago
But not a beautiful sentence.
reply
eatrocs_allday 3 hours ago
damn, this would make a cool midi controller
reply
Jang-woo 18 hours ago
Really interesting read. This feels less like a security bug and more like a missing execution boundary.
reply
victor106 19 hours ago
I asked ChatGPT which product this could be and it came up with

https://www.kickstarter.com/projects/selepu/dreampilot-ai-gu...

Claude could not tell which one

reply
PunchyHamster 14 hours ago
> For obvious reasons, I am not naming the product/company here, but have reached out to inform them about the issue.

It's working as intended

reply
anonymousiam 2 days ago
The narrator in the article acts as a third person observer and identifies "Claude" as the active hacker. So assuming the (unidentified) company that sells/manages the product wants to prosecute a CFAA violation, who do they go after? Was Claude the one responsible for all of the hacking?
reply
arter45 7 hours ago
What do you mean? IANAL, but Claude doesn't just "wake up" (whatever that means) and decide to reverse engineering/hack stuff, so if this is a CFAA violation the person who prompted Claude is indeed responsible. At best, one could argue that the company producing Claude is partially responsible because it didn't prevent people from using it to reverse engineer stuff, but there's no way Claude is "responsible for all of the hacking", regardless of how many times the blog posts says "Claude did X".
reply
wongogue 17 hours ago
The narrator. It doesn’t matter to the law the kind of intimate relationship you have with your tool.
reply
ssener2001 16 hours ago
[dead]
reply
speedgoose 2 days ago
Remember that the S in IoT stands for Security.

I have deployed open MQTT to the world for quick prototypes on non personal (and healthcare) data. Once my cloud provider told me to stop because they didn’t like it, that could be used for relay DDOS attacks.

I would not trust the sleep mask company even if they somehow manage to have some authentication and authorisation on their MQTT.

reply
n4bz0r 2 days ago
I don't think there is an S in IoT?..
reply
BenjiWiebe 2 days ago
Right - the saying indicates that IoT stuff is well known for ignoring security.
reply
n4bz0r 2 days ago
Went right over my head :)
reply
BenjiWiebe 5 hours ago
It did get me thinking - maybe there should be IoTS devices, where the S stands for Security. A commitment to updates for a certain amount of time, the source code in escrow to be released when updates/support ceases, probably other things I'm not thinking of.
reply
rationalist 2 days ago
Where I work, the saying is, "The H in ABC stands for Happiness."

(Also, "We're not happy until you're not happy.")

reply
Terr_ 19 hours ago
It does work a lot better with verbal inflection.
reply
roysting 2 days ago
Thank you for your astute observation. :)
reply
absoluteunit1 2 days ago
Exactly
reply
zephen 2 days ago
And the P in IoT stands Privacy, and the Q for quality.

The K, of course, stands for Ka-ching!

reply
arcanemachiner 21 hours ago
The L stands for longevity.
reply
mr_toad 15 hours ago
> I recently got a smart sleep mask from Kickstarter. I was not expecting to end up with the ability to read strangers' brainwaves and send them electric impulses in their sleep. But here we are.

One of the best opening paragraphs in a SF novel that I’ve ever read.

Oh, wait.

reply
bronlund 14 hours ago
That's exactly what I need. A radio transmitter as close as possible to my brain when I sleep.
reply
digiown 2 days ago
As an aside, it seems cool that the bar to reverse engineering has lowered from all the LLMs. Maybe we'll get to take full control of many of these "smart" devices that require proprietary/spyware apps and use them in a fully private way. There's no excuse that any such apps solely to interact with devices locally need to connect to the internet, like dishwasher.

https://www.jeffgeerling.com/blog/2025/i-wont-connect-my-dis...

reply
morkalork 2 days ago
>Since every device shares the same credentials and the same broker, if you can read someone's brainwaves you can also send them electric impulses.

Amazing.

reply
neuroelectron 21 hours ago
OK, but can we get a teledildonics device that records all thrusts onto the Blockchain?
reply
HeartofCPU 14 hours ago
How is the smart sleep mask called?
reply
secbear 24 hours ago
Amazing to see claude's reasoning and process through reversing this
reply
dlenski 2 days ago
I discovered a very similar vulnerability in Mysa smart thermostats a year ago, also involving MQTT, and also allowing me to view and control anyone's thermostat anywhere in the world: https://news.ycombinator.com/item?id=43392991

Also discovered during reverse-engineering of the devices’ communications protocols.

IoT device security is an utterly shambolic mess.

reply
stevage 2 days ago
That is terrifying. Messing with thermostats could be enough to kill vulnerable people.
reply
dlenski 24 hours ago
Yes. An excerpt from my initial email to Mysa's security contact…

> I stumbled upon these vulnerabilities on one of the coldest days of this winter in Vancouver. An attacker using them could have disabled all Mysa-connected heaters in the America/Vancouver timezone in the middle of the night. That would include the heat in the room where my 7-month-old son sleeps.

reply
minimalthinker 2 days ago
I’m not super familiar with MQTT. I wonder how common this is..
reply
dlenski 2 days ago
MQTT is a very simple pub/sub messaging protocol.

It's used in a enormous number of IoT devices.

The "IoT gateway" service from AWS supports MQTT and a whole lot of IoT devices are tethered to this service specifically.

reply
flax 2 days ago
This smells like bullshit to me, although I am admittedly not experienced with Claude.

I find it difficult to believe that a sleep mask exists with the features listed: "EEG brain monitoring, electrical muscle stimulation around the eyes, vibration, heating, audio." while also being something you can strap to your face and comfortably sleep in, with battery capacity sufficient for several hours of sleep.

I also wonder how Claude probed bluetooth. Does Claude have access to bluetooth interface? Why? Perhaps it wrote a secondary program then ran that, but the article describes it as Claude probing directly.

I'm also skeptical of Claude's ability to make accurate reverse-engineered bluetooth protocol. This is at least a little more of an LLM-appropriate task, but I suspect that there was a lot of chaff also produced that the article writer separated from the wheat.

If any of this happened at all. No hardware mentioned, no company, no actual protocol description published, no library provided.

It makes a nice vague futuristic cyperpunk story, but there's no meat on those bones.

reply
petercooper 24 hours ago
This isn't to the level of the OP, but I just asked Claude "Are there any interesting Bluetooth devices in my vicinity which aren't actually mine or ones I am connected to?" and it downloaded a tool called `blueutil` and identified a variety of things.

When I complained that the results were boring, it installed a Python package called 'bleak', found a set of LED lights (which I assumed are my daughter's) and tried to control them. It said the signal was too weak and got me to move around the house, whereupon it connected to them, figured out the protocol, and actually changed the lights while I was sat on her bed - where I am right now. Now I have a new party trick when she gets home! I had no idea they were Bluetooth controlled, nor clearly without any security at all.

reply
skibz 2 days ago
A lot of BLE peripherals are very easy to probe. And there are libraries available for most popular languages that allow you to connect to a peripheral and poke at any exposed internals with little effort.

As for the reverse engineering, the author claims that all it took was dumping the strings from the Dart binary to see what was being sent to the bluetooth device. It's plausible, and I would give them the benefit of the doubt here.

reply
threecheese 2 days ago
Claude could access anything on your device, including system or third party commands for network or signal processing - it may even have their manuals/sites/man pages in the training set. It’s remarkably good at figuring things out, and you can watch the reasoning output. There are mcp tools for reverse engineering that can give it even higher level abilities (ghidra is a popular one).

Yesterday I watched it try and work around some filesystem permission restrictions, it tried a lot of things I would never have thought of, and it was eventually successful. I was kinda goading it though.

reply
llm_nerd 2 days ago
https://www.kickstarter.com/projects/selepu/dreampilot-ai-gu...

Found that in seconds. EEG, electrical stimulation, heat, audio, etc. Claims a 20 hour battery.

As to the Claude interactions, like others I am suspicious and it seems overly idealized and simplified. Claude can't search for BT devices, but you could hook it up with an MCP that does that. You can hook it up with a decompiler MCP. And on and on. But it's more involved than this story details.

reply
flax 2 days ago
That appears to be more than a centimeter thick, and not particularly flexible. It's more like ski goggles than a sleep mask.

So yeah, a product exists that claims to be a sleep mask with these features. Maybe someone could even sleep while wearing that thing, as long as they sleep on their back and don't move around too much. I remain skeptical that it actually does the things it claims and has the battery life it claims. This is kickstarter after all. Regardless, this would qualify as the device in question for the article. Or at least inspiration for it.

Without evidence such as wireshark logs, programs, protocol documentation, I'm not convinced that any of this actually _happened_.

reply
orsorna 2 days ago
Claude, or any good agent, doesn't need MCP to do things. As long as it has access to a shell it can craft any command that it needs to fulfill its prompt.
reply
llm_nerd 2 days ago
There are no shell commands to do what is described. I could get Claude to interact with BLE devices, but it did it by writing and running various helper applications, for instance using the Bleak library. So I guess not an MCP per se.
reply
kfajdsl 22 hours ago
Not really? I did something similar for a different device recently. It can make files and has access to bash. It's perfectly capable of installing packages and writing small scripts basically entirely autonomously. No MCP needed.
reply
RachelF 2 days ago
Yes, it is very lacking in details. The Claude output would have been interesting, or a few logs or protocol dumps.

The lack of detail makes me suspect the truth of most of the story.

reply
d0mine 16 hours ago
reply
RachelF 15 hours ago
wow! Thanks for that.
reply
sublinear 2 days ago
I was originally going to ask something similar, but from a different angle.

These blog posts now making the rounds on HN are the usual reverse engineering stories, but made a lot more compelling simply because they involve using AI.

Never mind that the AI part isn't doing any heavy lifting and probably just as tedious as not using AI in the first place. I am confused why the author mentions it so prominently. Past authors would not have been so dramatic and just waved their hands that they had some trial and error before finding out how the app is built. The focus would have been on the lack of auth and the funny stuff they did before reporting it to the devs.

reply
nephihaha 11 hours ago
A lot of so called "smart" devices have little or no concept of privacy or personal boundaries built into them.
reply
Insanity 21 hours ago
Reading a blog post where Claude did all the actual work is kinda sad.
reply
skibz 2 days ago
It's disappointing to see. It doesn't take much work to configure a MQTT server to require client certificates for all connections. It does require an extra step in provisioning to give each device a client certificate. But for a commercial product, it's inexcusably negligent.

Then there's hardening your peripheral and central device/app against the kinds of spoofing attacks that are described in this blog post.

If your peripheral and central device can securely [0] store key material, then (in addition to the standard security features that come with the Bluetooth protocol) one may implement mutual authentication between the central and peripheral devices and, optionally, encryption of the data that is transmitted across that connection.

Then, as long as your peripheral and central devices are programmed to only ever respond when presented with signatures that can be verified by a trusted public key, the spoofing and probing demonstrated here simply won't work (unless somebody reverse engineers the app running on the central device to change its behaviour after the signature verification has been performed).

To protect against that, you'd have to introduce server-mediated authorisation. On Android, that would require things like the Play Integrity API and app signatures. Then, if the server verifies that the instance of the app running on the central device is unmodified, it can issue a token that the central device can send to the peripheral for verification in addition to the signatures from the previous step.

Alternatively, you could also have the server generate the actual command frames that the central device sends to the peripheral. The server would provide the raw command frame and the command frame signed with its own key, which can be verified by the peripheral.

I guess I got a bit carried away here. Certainly, not every peripheral needs that level of security. But, into which category this device falls, I'm not sure. On the one hand, it's not a security device, like an electronic door lock. And on the other hand, it's a very personal peripheral with some unusual capabilities like the electrical muscle stimulation gizmo and the room occupancy sensor.

[0]: Like with the Android KeyStore and whichever HSMs are used in microcontrollers, so that keys can't be extracted by just dumping strings from a binary.

reply
SilentM68 2 days ago
Interesting project. Here's a thought which I've always had in the back of my mind, ever since I saw something similar in an episode of Buck Rogers (70s-80s)! Many people struggle with falling asleep due to persistent beta waves; natural theta predominance is needed but often delayed. Imagine an "INEXPENSIVE" smart sleep mask that facilitates sleep onset by inducing brain wave transitions from beta (wakeful, high-frequency) to alpha (8-13 Hz, relaxed) and then theta (4-8 Hz, stage 1 light sleep) via non-invasive stimulation. A solution could be a comfortable eye mask with integrated headphones (unintrusive) and EEG sensors. It could use binaural beats or similar audio stimulation to "inject" alpha/theta frequencies externally, guiding the brain to a tipping point for abrupt sleep onset. Sensors would detect current waves; app-controlled audio ramps from alpha-inducing beats to theta, ensuring natural predominance. If it could be designed, it could accelerate sleep transition, improve quality, non-pharmacological.
reply
BenjiWiebe 2 days ago
So are the brain waves the cause or the effect?

Are beta waves a sign that my mind is racing and wide awake, or are they the reason?

reply
SilentM68 23 hours ago
Don't know but as AI advances, questions like that may get easier to answer.
reply
Jolter 2 days ago
What’s your proposed mechanism for how audio waves would induce brain waves?
reply
pixl97 24 hours ago
No idea about audio frequencies close to hearing, but I'm pretty sure it's common to manipulate the brain with ultrasonic frequencies these days.
reply
SilentM68 23 hours ago
Yeah, I'm sure that technology has existed for decades. Common folks just not allowed to know about it. It's "for our own good!" sarcastically speaking :(
reply
SilentM68 23 hours ago
That's a toughie, but if it were me and I had the energy, I'd start by looking at the following patents:

- US20030171688A1: Mind controller - Induces alpha/theta brainwaves via audio messages. - US20070084473A1: Brain wave entrainment in sound - Modulates music for desired brain states. - US11309858: Inducing brainwaves by sound - Adjusts volume gains for specific frequencies. - US5036858A: Changing brain wave frequency - Generates binaural beats to alter waves. - US3951134: Remotely altering brain waves - Monitors and modifies via RF/EM waves. - US5306228A: Brain wave synchronizer - Uses light/sound for entrainment. - US6587729: RF hearing effect - Transmits speech via microwaves to brain. - US6488617: Desired brain state - Electromagnetic pulses for mind states. - US4858612: Microwave hearing simulation - Induces sounds in auditory cortex. - US6930235B2: EM to sound waves - Relates waves for brain influence. - EP0747080A1: Brain wave inducing - Sine waves via speaker for alpha waves. - US5954629A: Brain wave system - Feedback light stimulation. - US5954630A: FM theta sound - Superposes low frequencies for theta induction. - US5159703A: Silent subliminal - Ultrasonic carriers for brain inducement. - US6017302A: Acoustic manipulation - Subaudio pulses for nervous system control.

reply
sodapopcan 19 hours ago
Who cares. I'm so tired.
reply
ThouYS 2 days ago
the headlines these days
reply
4gotunameagain 16 hours ago
> Claude ran strings on the binary and this was the most productive step of the whole session.

After $150 in tokens, inflating GPU prices by 10%, spending $550 of VC money, and increasing the earth's temperature by 0.2 degC, claude did what a 16 year old that read two blog posts about reverse engineering would do.

reply
dash2 16 hours ago
I think the number of people who could do this in half an hour is low.
reply
therein 15 hours ago
Article is saying it was the most productive step and crediting it to Claude. However it is indeed what anyone would do pretty much as a first step.
reply
azan_ 12 hours ago
The impact of AI on environment is overblown.
reply
roywiggins 2 days ago
cyberpunk
reply
mystraline 2 days ago
> For obvious reasons, I am not naming the product/company here, but have reached out to inform them about the issue.

Coward. The only way to challenge this garbage is "Name and Shame". Light a fire under their asses. That fire can encourage them to do right, and as a warning to all other companies.

My guess is this is Luuna https://www.kickstarter.com/projects/flowtimebraintag/luuna

reply
a4isms 2 days ago
Doesn't disclosing this to the world at the same time as you disclose it to the company immediately send hundreds of black hats to their terminals to see how much chaos they can create before the company implements a fix?

Perhaps the author is not a coward, but is giving the company time to respond and commit to a fix for the benefit of other owners who could suffer harm.

reply
rkagerer 2 days ago
but is giving the company time to respond and commit to a fix for the benefit of other owners who could suffer harm.

If that's the case then they should have deferred this whole blog post.

reply
mystraline 2 days ago
It took me 30 seconds with ChatGPT by saying:

Identify the kickstarter product talked around in this blog post: (link)

To think some blackhat hasn't already did that is frankly laughable. What I did was like the lowest of low-bars these days.

reply
Barbing 2 days ago
Put the product name in the title & maybe it sends thousands instead of hundreds of blackhats…

We often treat doxxing the same way, prohibiting posting of easily discovered information.

reply
mystraline 2 days ago
So your plan is to let the blackhats in the know attack user devices, rather than send out a large warning to "Quit using immediately"?

If we applied this similar analogy to a e.coli infection of foods, your recommendation amounts to "If we say the company name, the company would be shamed and lose money and people might abuse the food".

People need to know this device is NOT SAFE on your network, paired to your phone, or anything. And that requires direct and public notification.

reply
pphysch 2 days ago
And ChatGPT hallucinated a misleading answer that you are confidently regurgitating.
reply
croisillon 2 days ago
their original message said "my guess", not ChatGPT's, talk about responsible disclosure...
reply
minimalthinker 2 days ago
I did consider naming, but they were very responsive to the disclosure and I was not entirely familiar with potential legal implications of doing so. (For what it's worth, it is not Luuna)
reply
stavros 2 days ago
Please name 50 other companies it's not.

It's good that they were responsive in the disclosure, but it's still a mark of sloppiness that this was done in the first place, and I'd like to know so I can avoid them.

reply
itishappy 2 days ago
I don't see estim mentioned on that website, but I do see a comparison chart with 4 other competitors with similar capabilities to the one you linked.

What makes you think this is the one?

reply
mystraline 2 days ago
reply
everdrive 2 days ago
Even if naming and shaming doesn't work, I sure want to know so I can always avoid them for myself and my family. Thanks for the call-out and the educated guess.
reply
j45 2 days ago
EEG devices can cost a lot to own personally as well.

The other side of owning equipment like this is it still could be useful for some for personal and private use.

reply
minimalthinker 2 days ago
EEG is very useful for accurate sleep tracking.
reply
hxbdg 2 days ago
Presumably they’ll be named and shamed after they’ve been given a chance to fix things.
reply
intellirim 2 days ago
[dead]
reply
plagiarist 2 days ago
It is a governance failure.

It is also technically a user failure to have purchased a connected device in the first place. Does the device require a closed-source proprietary app? Closed-source non-replaceable OS? Do not buy it.

reply
brabel 2 days ago
Very few options available, if any, if you actually do that. The IoT market is unfortunately small and dominated by vendors that don’t want at all an open ecosystem. That would hinder their ability to force you to pay for a subscription which is where all the money is.
reply
jmb99 2 days ago
Yes, that’s right, don’t buy any new car, any phone, any television. Hell don’t buy any x86 laptop or desktop computer, since you can’t disable out replace Intel ME/etc.
reply
ai-x 2 days ago
There should be two separate lines of products. One in which privacy is priority and adheres to government regulations (around privacy) and probably costs 2x and one with zero government intervention (around privacy) which costs less and time-to-market is faster.

I don't want a few irrationally paranoid people bottlenecking progress and access to the latest technology and innovation.

I'm happy to broadcast my brainwaves on an open YouTube channel for the ZERO people who are interested in it.

reply
drnick1 2 days ago
> I don't want a few irrationally paranoid people bottlenecking progress and access to the latest technology and innovation.

Paranoid? Is there not enough evidence posted almost daily on HN that tech companies are constantly spying on their users through computers, Internet-of-Shit devices, phones, cars and even washing machines? You might not care about the brainwave data specifically, but there is bound to be information on your devices that you expect remains private.

Things have become so bad that I now refuse to use computers that don't run a DIY Linux distro like Arch that allows users to decide what goes into their system. My phone runs GrapheneOS because Google and Apple can't be trusted. I self host email and other "cloud" services for the same reason.

reply
tgv 2 days ago
Explain how sending EEG recordings is progress. And why faster access to the latest tech is always good, for everyone.
reply
selkin 2 days ago
otoh: the non regulated should cost more.

It’s kinda like “qualified investors” - you want to make sure people who are wiling to do something extremely stupid can afford it and acknowledge their stupidity.

We don’t need regulation to protect those that can afford to buy protection: we need it for those who can’t.

reply
kevincloudsec 2 days ago
[dead]
reply
roysting 2 days ago
> nobody budgets time for security architecture on v1

It’s quite literally why the internet is so insecure, because at many points all along the way, “hey, should we design and architect for security?” is/was met with “no, we have people to impress and careers to advance with parlor tricks to secure more funding; besides, security is hard and we don’t actually know what we are doing, so tow the line or you’ll be removed.”

reply
techsocialism 2 days ago
[dead]
reply
t3chd33r 2 days ago
[flagged]
reply
snayan 14 hours ago
Are you ok?
reply
t3chd33r 2 days ago
Is this some kind of joke? Claude hallucinated everything, including capacity of device to accurately measure EGG of brain waves and hallucinated the process of decoding APK to some paranoidal user who has posted his conspiracy level AI hallucinations “finds” to his blog post and everyone is like “Yeah, Claude can do this”. Is everyone here insane? I am insane?
reply
logicprog 11 hours ago
Why do you think it's all hallucinated?

You have no evidence of that, and it seems very unlikely unless you're intentionally wildly assuming the craziest possible scenario, as if you're paranoid or insane.

You do realize the user can see the tool calls running and check their real, actual output, during this process, right?

You do realize that there are several sleep masks on Kickstarter that actually have these features, right?

The user has also shared the Claude transcript:

https://gist.github.com/aimihat/a206289b356cac88e2810654adf0...

reply
bobim 2 days ago
Won't they sue for the reverse engineering?
reply
Jolter 2 days ago
On what grounds could they sue?
reply
bobim 10 hours ago
Well, in the end user agreement there are usually clauses that forbids it. It's tolerated in some geographies for interoperability, research and infosec, but you agreed on ToS already.
reply
throw876987696 2 days ago
Without a brand name, how can we verify this is real?
reply
ohyoutravel 2 days ago
Without any skin in the game with your username, why should we take anything you say seriously?
reply
edgarvaldes 2 days ago
Interesting position in a thread about the dangers of exposing yourself to the internet.
reply
avanai 7 hours ago
“Ask an LLM to hack your app” should be a production-readiness step from now on.
reply