{"guid":"cbecd698-af14-5763-bd45-d36d25c21bc5","title":"Hacked in translation: Giving an Abandoned IoT Device a New Life","subtitle":null,"slug":"why2025-14-hacked-in-translation-giving-an-abandoned-iot-device-a-new-life","link":"https://program.why2025.org/why2025/talk/TUD7EB/","description":"As everybody knows, \"L\" in IoT stands for long-term support.\nI'll take you on a tour of my technical adventure where I revived an abandoned IoT \"AI\" translator and gave it a new life, 2025-style. \nThrough deciphering peculiar protocols and formats, reverse engineering firmware and software and doing the necessary research to write new software, we'll see how curiosity and persistence can help you overcome the most obscure technical challenges.\n\nLicensed to the public under https://creativecommons.org/licenses/by/4.0/","original_language":"eng","persons":["Artem Makarov"],"tags":["14","2025","why2025","Hacking","Cassiopeia","why2025-eng","Day 6"],"view_count":98,"promoted":false,"date":"2025-08-12T11:00:00.000+02:00","release_date":"2025-08-12T00:00:00.000+02:00","updated_at":"2025-11-27T11:00:10.786+01:00","length":2349,"duration":2349,"thumb_url":"https://static.media.ccc.de/media/events/why2025/14-cbecd698-af14-5763-bd45-d36d25c21bc5.jpg","poster_url":"https://static.media.ccc.de/media/events/why2025/14-cbecd698-af14-5763-bd45-d36d25c21bc5_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/why2025/14-cbecd698-af14-5763-bd45-d36d25c21bc5.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/why2025/14-cbecd698-af14-5763-bd45-d36d25c21bc5.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/why2025-14-hacked-in-translation-giving-an-abandoned-iot-device-a-new-life","url":"https://api.media.ccc.de/public/events/cbecd698-af14-5763-bd45-d36d25c21bc5","conference_title":"What Hackers Yearn 2025","conference_url":"https://api.media.ccc.de/public/conferences/WHY2025","related":[],"recordings":[{"size":244,"length":2349,"mime_type":"video/webm;codecs=av01","language":"eng","filename":"why2025-14-eng-Hacked_in_translation_Giving_an_Abandoned_IoT_Device_a_New_Life_av1-hd.webm","state":"new","folder":"av1-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2025-08-12T17:52:07.455+02:00","recording_url":"https://cdn.media.ccc.de/events/why2025/av1-hd/why2025-14-eng-Hacked_in_translation_Giving_an_Abandoned_IoT_Device_a_New_Life_av1-hd.webm","url":"https://api.media.ccc.de/public/recordings/89985","event_url":"https://api.media.ccc.de/public/events/cbecd698-af14-5763-bd45-d36d25c21bc5","conference_url":"https://api.media.ccc.de/public/conferences/WHY2025"},{"size":35,"length":2349,"mime_type":"audio/mpeg","language":"eng","filename":"why2025-14-eng-Hacked_in_translation_Giving_an_Abandoned_IoT_Device_a_New_Life_mp3.mp3","state":"new","folder":"mp3","high_quality":false,"width":0,"height":0,"updated_at":"2025-08-12T13:58:33.286+02:00","recording_url":"https://cdn.media.ccc.de/events/why2025/mp3/why2025-14-eng-Hacked_in_translation_Giving_an_Abandoned_IoT_Device_a_New_Life_mp3.mp3","url":"https://api.media.ccc.de/public/recordings/89769","event_url":"https://api.media.ccc.de/public/events/cbecd698-af14-5763-bd45-d36d25c21bc5","conference_url":"https://api.media.ccc.de/public/conferences/WHY2025"},{"size":24,"length":2349,"mime_type":"audio/opus","language":"eng","filename":"why2025-14-eng-Hacked_in_translation_Giving_an_Abandoned_IoT_Device_a_New_Life_opus.opus","state":"new","folder":"opus","high_quality":false,"width":0,"height":0,"updated_at":"2025-08-12T13:58:29.213+02:00","recording_url":"https://cdn.media.ccc.de/events/why2025/opus/why2025-14-eng-Hacked_in_translation_Giving_an_Abandoned_IoT_Device_a_New_Life_opus.opus","url":"https://api.media.ccc.de/public/recordings/89768","event_url":"https://api.media.ccc.de/public/events/cbecd698-af14-5763-bd45-d36d25c21bc5","conference_url":"https://api.media.ccc.de/public/conferences/WHY2025"},{"size":79,"length":2349,"mime_type":"video/webm","language":"eng","filename":"why2025-14-eng-Hacked_in_translation_Giving_an_Abandoned_IoT_Device_a_New_Life_webm-sd.webm","state":"new","folder":"webm-sd","high_quality":false,"width":720,"height":576,"updated_at":"2025-08-12T17:43:19.208+02:00","recording_url":"https://cdn.media.ccc.de/events/why2025/webm-sd/why2025-14-eng-Hacked_in_translation_Giving_an_Abandoned_IoT_Device_a_New_Life_webm-sd.webm","url":"https://api.media.ccc.de/public/recordings/89982","event_url":"https://api.media.ccc.de/public/events/cbecd698-af14-5763-bd45-d36d25c21bc5","conference_url":"https://api.media.ccc.de/public/conferences/WHY2025"},{"size":273,"length":2349,"mime_type":"video/webm","language":"eng","filename":"why2025-14-eng-Hacked_in_translation_Giving_an_Abandoned_IoT_Device_a_New_Life_webm-hd.webm","state":"new","folder":"webm-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2025-08-12T17:24:20.233+02:00","recording_url":"https://cdn.media.ccc.de/events/why2025/webm-hd/why2025-14-eng-Hacked_in_translation_Giving_an_Abandoned_IoT_Device_a_New_Life_webm-hd.webm","url":"https://api.media.ccc.de/public/recordings/89971","event_url":"https://api.media.ccc.de/public/events/cbecd698-af14-5763-bd45-d36d25c21bc5","conference_url":"https://api.media.ccc.de/public/conferences/WHY2025"},{"size":86,"length":2349,"mime_type":"video/mp4","language":"eng","filename":"why2025-14-eng-Hacked_in_translation_Giving_an_Abandoned_IoT_Device_a_New_Life_sd.mp4","state":"new","folder":"h264-sd","high_quality":false,"width":720,"height":576,"updated_at":"2025-08-12T14:56:29.177+02:00","recording_url":"https://cdn.media.ccc.de/events/why2025/h264-sd/why2025-14-eng-Hacked_in_translation_Giving_an_Abandoned_IoT_Device_a_New_Life_sd.mp4","url":"https://api.media.ccc.de/public/recordings/89845","event_url":"https://api.media.ccc.de/public/events/cbecd698-af14-5763-bd45-d36d25c21bc5","conference_url":"https://api.media.ccc.de/public/conferences/WHY2025"},{"size":318,"length":2349,"mime_type":"video/mp4","language":"eng","filename":"why2025-14-eng-Hacked_in_translation_Giving_an_Abandoned_IoT_Device_a_New_Life_hd.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2025-08-12T13:56:56.971+02:00","recording_url":"https://cdn.media.ccc.de/events/why2025/h264-hd/why2025-14-eng-Hacked_in_translation_Giving_an_Abandoned_IoT_Device_a_New_Life_hd.mp4","url":"https://api.media.ccc.de/public/recordings/89750","event_url":"https://api.media.ccc.de/public/events/cbecd698-af14-5763-bd45-d36d25c21bc5","conference_url":"https://api.media.ccc.de/public/conferences/WHY2025"}]}