Hubbry Logo
search
logo
2525295

Flipper Zero

logo
Community Hub0 Subscribers
Write something...
Be the first to start a discussion here.
Be the first to start a discussion here.
See all
Flipper Zero

The Flipper Zero is a portable multi-functional hacking device developed for interaction with access control systems. The device is able to read, copy, and emulate RFID and NFC tags, radio remotes, iButtons, and digital access keys. It also has a GPIO interface. It was first announced in August 2020 through the Kickstarter crowdfunding campaign, which raised $4.8 million. The first devices were delivered to backers 18 months after completion of the crowdfunding campaign. The device's user interface embodies a pixel-art dolphin virtual pet. The interaction with the virtual pet is the device's core game mechanic. The usage of the device's functions defines the appearance and emotions of the pet.

In the built-in game, the main mechanism to "upgrade" the dolphin is to use the various hacking tools. While harmless uses (like as a remote control for a television, or carbon dioxide sensor) exist, some of the built-in tools have potential criminal uses, including RFID skimming, Bluetooth spamming (spamming a Bluetooth connection, crashing a person's phone), and emulation of RFID chips such as those found in identification badges, using the built-in radio cloner to open garage doors, unlocking cars, and functioning as a wireless BadUSB.

The device was developed by Alex Kulagin and Pavel Zhovner in 2019. They started raising funds on Kickstarter.

Flipper Zero is designed for interaction with various types of access control systems, radio protocols, RFID, near-field communication (NFC), and infrared signals. To operate the device, a computer or a smartphone is not required; it can be controlled via a 5-position D-pad and a separate back button. Flipper Zero has a monochrome orange backlight LCD screen with a resolution of 128 × 64 pixels. For connection with external modules, the device has general-purpose input/output (GPIO) pinholes on the top side. User data and firmware updates are stored on a microSD card. Some actions, such as firmware or user data update, require a connection to a computer or a smartphone with the developer's software installed.

In July 2023, an app store was opened for the device.

The electronic schematics and firmware of the Flipper Zero project are open sourced under the GNU General Public License. At the same time, the device does not fit into the open-source hardware category because the printed circuit boards are not open-sourced, which does not allow enthusiasts to make their own copies of the device without knowledge of electrical engineering.[citation needed]

Flipper Zero's hardware consists of four PCB modules connected by flexible cables. The battery is positioned in the center of the device between three of the PCBs.

Flipper Zero is based on a dual-core ARM architecture STM32WB55 microcontroller, which has 256 KB of RAM and 1 MB of Flash storage. The first core is a 64 MHz Cortex-M4 which runs the main firmware. The second core is a 32 MHz Cortex-M0 which runs STMicroelectronics proprietary firmware that implements the Bluetooth Low Energy protocol. Secret keys stored in the Secure Enclave of STM32WB55 are used to decrypt cryptographic keys on the fly, which are then applied to decode Sub-GHz protocols. This mechanism allows the device to handle encrypted communication for Sub-GHz protocols. However, the encryption used is not entirely secure and primarily serves as a form of obfuscation rather than robust protection. Its purpose is to make reverse engineering more challenging, but it does not provide absolute security.

See all
User Avatar
No comments yet.