hacks

secret-calculator-hack-brings-chatgpt-to-the-ti-84,-enabling-easy-cheating

Secret calculator hack brings ChatGPT to the TI-84, enabling easy cheating

Breaking free of “test mode” —

Tiny device installed inside TI-84 enables Wi-Fi Internet, access to AI chatbot.

An OpenAI logo on a TI-84 calculator screen.

On Saturday, a YouTube creator called “ChromaLock” published a video detailing how he modified a Texas Instruments TI-84 graphing calculator to connect to the Internet and access OpenAI’s ChatGPT, potentially enabling students to cheat on tests. The video, titled “I Made The Ultimate Cheating Device,” demonstrates a custom hardware modification that allows users of the graphing calculator to type in problems sent to ChatGPT using the keypad and receive live responses on the screen.

ChromaLock began by exploring the calculator’s link port, typically used for transferring educational programs between devices. He then designed a custom circuit board he calls “TI-32” that incorporates a tiny Wi-Fi-enabled microcontroller, the Seed Studio ESP32-C3 (which costs about $5), along with other components to interface with the calculator’s systems.

It’s worth noting that the TI-32 hack isn’t a commercial project. Replicating ChromaLock’s work would involve purchasing a TI-84 calculator, a Seed Studio ESP32-C3 microcontroller, and various electronic components, and fabricating a custom PCB based on ChromaLock’s design, which is available online.

The creator says he encountered several engineering challenges during development, including voltage incompatibilities and signal integrity issues. After developing multiple versions, ChromaLock successfully installed the custom board into the calculator’s housing without any visible signs of modifications from the outside.

“I Made The Ultimate Cheating Device” YouTube Video.

To accompany the hardware, ChromaLock developed custom software for the microcontroller and the calculator, which is available open source on GitHub. The system simulates another TI-84, allowing people to use the calculator’s built-in “send” and “get” commands to transfer files. This allows a user to easily download a launcher program that provides access to various “applets” designed for cheating.

One of the applets is a ChatGPT interface that might be most useful for answering short questions, but it has a drawback in that it’s slow and cumbersome to type in long alphanumeric questions on the limited keypad.

Beyond the ChatGPT interface, the device offers several other cheating tools. An image browser allows users to access pre-prepared visual aids stored on the central server. The app browser feature enables students to download not only games for post-exam entertainment but also text-based cheat sheets disguised as program source code. ChromaLock even hinted at a future video discussing a camera feature, though details were sparse in the current demo.

ChromaLock claims his new device can bypass common anti-cheating measures. The launcher program can be downloaded on-demand, avoiding detection if a teacher inspects or clears the calculator’s memory before a test. The modification can also supposedly break calculators out of “Test Mode,” a locked-down state used to prevent cheating.

While the video presents the project as a technical achievement, consulting ChatGPT during a test on your calculator almost certainly represents an ethical breach and/or a form of academic dishonesty that could get you in serious trouble at most schools. So tread carefully, study hard, and remember to eat your Wheaties.

Secret calculator hack brings ChatGPT to the TI-84, enabling easy cheating Read More »

how-strong-is-nintendo’s-legal-case-against-switch-emulator-yuzu?

How strong is Nintendo’s legal case against Switch-emulator Yuzu?

The eye of Nintendo's legal department turns slowly towards a new target.

Enlarge / The eye of Nintendo’s legal department turns slowly towards a new target.

Aurich Lawson

Nintendo has filed a lawsuit against Tropic Haze LLC, the makers of the popular Yuzu emulator that the Switch-maker says is “facilitating piracy at a colossal scale.”

The federal lawsuit—filed Monday in the District Court of Rhode Island and first reported by Stephen Totilo—is the company’s most expansive and significant argument yet against emulation technology that it alleges “turns general computing devices into tools for massive intellectual property infringement of Nintendo and others’ copyrighted works.” Nintendo is asking the court to prevent the developers from working on, promoting, or distributing the Yuzu emulator and requesting significant financial damages under the DMCA.

If successful, the arguments in the case could help overturn years of legal precedent that have protected emulator software itself, even as using those emulators for software piracy has remained illegal.

“Nintendo is still basically taking the position that emulation itself is unlawful,” Foundation Law attorney and digital media specialist Jon Loiterman told Ars. “Though that’s not the core legal theory in this case.”

Just follow these (complicated) instructions

The bulk of Nintendo’s legal argument rests on Yuzu’s ability to break the many layers of encryption that protect Switch software from being copied and/or played by unauthorized users. By using so-called “prod.keys” obtained from legitimate Switch hardware, Yuzu can dynamically decrypt an encrypted Switch game ROM at runtime, which Nintendo argues falls afoul of the Digital Millennium Copyright Act’s prohibition against circumvention of software protections.

Crucially, though, the open source Yuzu emulator itself does not contain a copy of those “prod.keys,” which Nintendo’s lawsuit acknowledges that users need to supply themselves. That makes Yuzu different from the Dolphin emulator, which was taken off Steam last year after Nintendo pointed out that the software itself contains a copy of the Wii Common Key used to decrypt game files.

Just a little light console hacking...

Enlarge / Just a little light console hacking…

Aurich Lawson

Absent the inherent ability to break DRM, an emulator would generally be covered by decades of legal precedent establishing the right to emulate one piece of hardware on another using reverse-engineering techniques. But Yuzu’s “bring your own decryption” design is not necessarily a foolproof defense, either.

Nintendo’s lawsuit makes extensive reference to the Quickstart Guide that Yuzu provides on its own distribution site. That guide gives detailed instructions on how to “start playing commercial games” with Yuzu by hacking your (older) Switch to dump decryption keys and/or game files. That guide also includes links to a number of external tools that directly break console and/or game encryption techniques.

“Whether Yuzu can get tagged with [circumvention] simply by providing instructions and guidance and all the rest of it is, I think, the core issue in this case.”

Attorney Jon Loiterman

Through these instructions, Nintendo argues, “the Yuzu developers brazenly acknowledge that using Yuzu necessitates hacking or breaking into a Nintendo Switch.” Nintendo also points to a Yuzu Discord server where emulator developers and users discuss how to get copyrighted games running on the emulator, as well as publicly released telemetry data that shows the developers were aware of widespread use of their emulator for piracy (as the Yuzu devs wrote in June 2023, “Tears of the Kingdom is by far the most played game on Yuzu”).

While Loiterman says that “instructions and guidance are not circumvention,” he added that “the more layers of indirection between Yuzu’s software and activity and distribution of the keys the safer they are. The detailed instructions, the Discord server, and the knowledge of what all this is used for are at least problematic.”

“Whether Yuzu can get tagged with [circumvention] simply by providing instructions and guidance and all the rest of it is, I think, the core issue in this case,” he continued.

How strong is Nintendo’s legal case against Switch-emulator Yuzu? Read More »