March 22, 2026
Spark first, ask root later
Can you get root with only a cigarette lighter? (2024)
Hacker zaps an old laptop with a $2 lighter—comments are on fire
TLDR: A hacker proved you can zap an old laptop into admin control with a cheap lighter and some wire. Comments split between cheering the DIY stunt, blasting [JEDEC] paywalls, and reminding everyone that tricking humans beats gadgets—highlighting how physical access and gatekeeping still matter in security.
Forget lasers and lab budgets—this hacker clicked a $2 lighter next to a junky laptop and watched a single memory bit flip on command. That tiny glitch let them craft a local “level-up” to root (computer god mode) on an old Samsung, all in the name of brushing up for the rumored Switch 2. The trick? A bit of wire acting like an antenna, a spark from a piezo lighter, and patience. No remote hacking, no software bug—just physics and vibes, turning a throwaway into a teaching moment about how cheap, physical tricks can bypass the “no bugs left” wall.
The comments lit up. One camp crowned it mad scientist energy, cheering a convenience-store Bic beating pricey gear. Another camp rolled its eyes: “cute demo, but the real exploit is people,” joked one user about “convincing the sysadmin” with the lighter. The biggest villain? Standards body JEDEC catching heat for paywalled docs. Memes and puns flew—“can your laptop light the cigarette back?”; Aussies riffed on “getting a root,” and skeptics insisted it’s all lab-only. But even critics agreed: it’s a loud reminder that security isn’t just software—if someone can touch your hardware, they can touch your data. And somewhere in the middle, pragmatists shrugged: neat party trick, scary lesson, probably not how your work laptop gets pwned tomorrow, but still a spark worth watching.
Key Points
- •A researcher used a piezoelectric cigarette lighter to perform low-cost EMFI on a laptop’s DDR3 memory bus.
- •A minimal probe (wire antenna plus 15‑ohm resistor on a SODIMM DQ line) induced reproducible bit flips observed in memtest.
- •Despite coarse timing control, the induced faults consistently flipped the same bit across 64‑bit reads/writes.
- •The test platform was a 2011 Samsung S3520 laptop with an Intel i3‑2310M and 1GB DDR3 running Arch Linux.
- •The goal was to build a local privilege escalation exploit from hardware-induced faults, informed by prior DFA on software AES using an Arduino.