{"guid":"f0d3f699-57cd-5bfd-844c-b0c246bc93e3","title":"USB tinkering for hackers and makers","subtitle":null,"slug":"emf2014-64-usb-tinkering-for-hackers-and-makers","link":"https://c3voc.de","description":"We have written USBProxy, an open source software tool targeted at cheap hardware, such as the BeagleBone Black, which allows us to build, explore and break USB devices with simple software. I will show how we can use USBProxy to monitor and debug USB connections and how we can build a USB device in software using £35 of hardware.","original_language":"eng","persons":["Dominic Spill"],"view_count":13,"promoted":false,"date":"2014-08-31T15:00:00.000+02:00","release_date":"2024-08-27T00:00:00.000+02:00","updated_at":"2025-12-30T13:00:15.065+01:00","tags":["emf2014","64","2014"],"length":2437,"duration":2437,"thumb_url":"https://static.media.ccc.de/media/events/emf/2014/64-f0d3f699-57cd-5bfd-844c-b0c246bc93e3.jpg","poster_url":"https://static.media.ccc.de/media/events/emf/2014/64-f0d3f699-57cd-5bfd-844c-b0c246bc93e3_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/emf/2014/64-f0d3f699-57cd-5bfd-844c-b0c246bc93e3.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/emf/2014/64-f0d3f699-57cd-5bfd-844c-b0c246bc93e3.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/emf2014-64-usb-tinkering-for-hackers-and-makers","url":"https://api.media.ccc.de/public/events/f0d3f699-57cd-5bfd-844c-b0c246bc93e3","conference_title":"Electromagnetic Field 2014","conference_url":"https://api.media.ccc.de/public/conferences/emf2014","related":[],"recordings":[{"size":106,"length":2437,"mime_type":"video/webm","language":"eng","filename":"emf2014-64-eng-USB_tinkering_for_hackers_and_makers_webm-sd.webm","state":"new","folder":"webm-sd","high_quality":false,"width":720,"height":576,"updated_at":"2024-08-27T05:46:34.353+02:00","recording_url":"https://cdn.media.ccc.de/events/emf/2014/webm-sd/emf2014-64-eng-USB_tinkering_for_hackers_and_makers_webm-sd.webm","url":"https://api.media.ccc.de/public/recordings/79341","event_url":"https://api.media.ccc.de/public/events/f0d3f699-57cd-5bfd-844c-b0c246bc93e3","conference_url":"https://api.media.ccc.de/public/conferences/emf2014"},{"size":170,"length":2437,"mime_type":"video/webm","language":"eng","filename":"emf2014-64-eng-USB_tinkering_for_hackers_and_makers_webm-hd.webm","state":"new","folder":"webm-hd","high_quality":true,"width":854,"height":480,"updated_at":"2024-08-27T05:38:03.940+02:00","recording_url":"https://cdn.media.ccc.de/events/emf/2014/webm-hd/emf2014-64-eng-USB_tinkering_for_hackers_and_makers_webm-hd.webm","url":"https://api.media.ccc.de/public/recordings/79333","event_url":"https://api.media.ccc.de/public/events/f0d3f699-57cd-5bfd-844c-b0c246bc93e3","conference_url":"https://api.media.ccc.de/public/conferences/emf2014"},{"size":23,"length":2437,"mime_type":"audio/opus","language":"eng","filename":"emf2014-64-eng-USB_tinkering_for_hackers_and_makers_opus.opus","state":"new","folder":"opus","high_quality":false,"width":0,"height":0,"updated_at":"2024-08-27T05:26:03.047+02:00","recording_url":"https://cdn.media.ccc.de/events/emf/2014/opus/emf2014-64-eng-USB_tinkering_for_hackers_and_makers_opus.opus","url":"https://api.media.ccc.de/public/recordings/79328","event_url":"https://api.media.ccc.de/public/events/f0d3f699-57cd-5bfd-844c-b0c246bc93e3","conference_url":"https://api.media.ccc.de/public/conferences/emf2014"},{"size":37,"length":2437,"mime_type":"audio/mpeg","language":"eng","filename":"emf2014-64-eng-USB_tinkering_for_hackers_and_makers_mp3.mp3","state":"new","folder":"mp3","high_quality":false,"width":0,"height":0,"updated_at":"2024-08-27T05:25:45.878+02:00","recording_url":"https://cdn.media.ccc.de/events/emf/2014/mp3/emf2014-64-eng-USB_tinkering_for_hackers_and_makers_mp3.mp3","url":"https://api.media.ccc.de/public/recordings/79327","event_url":"https://api.media.ccc.de/public/events/f0d3f699-57cd-5bfd-844c-b0c246bc93e3","conference_url":"https://api.media.ccc.de/public/conferences/emf2014"},{"size":118,"length":2437,"mime_type":"video/mp4","language":"eng","filename":"emf2014-64-eng-USB_tinkering_for_hackers_and_makers_sd.mp4","state":"new","folder":"h264-sd","high_quality":false,"width":720,"height":576,"updated_at":"2024-08-27T05:24:16.564+02:00","recording_url":"https://cdn.media.ccc.de/events/emf/2014/h264-sd/emf2014-64-eng-USB_tinkering_for_hackers_and_makers_sd.mp4","url":"https://api.media.ccc.de/public/recordings/79326","event_url":"https://api.media.ccc.de/public/events/f0d3f699-57cd-5bfd-844c-b0c246bc93e3","conference_url":"https://api.media.ccc.de/public/conferences/emf2014"},{"size":153,"length":2437,"mime_type":"video/mp4","language":"eng","filename":"emf2014-64-eng-USB_tinkering_for_hackers_and_makers_hd.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":854,"height":480,"updated_at":"2024-08-27T05:19:46.690+02:00","recording_url":"https://cdn.media.ccc.de/events/emf/2014/h264-hd/emf2014-64-eng-USB_tinkering_for_hackers_and_makers_hd.mp4","url":"https://api.media.ccc.de/public/recordings/79323","event_url":"https://api.media.ccc.de/public/events/f0d3f699-57cd-5bfd-844c-b0c246bc93e3","conference_url":"https://api.media.ccc.de/public/conferences/emf2014"}]}