I hacked my washing machine
Network isolation & IoT risk
- Several commenters are uneasy about letting a washing machine onto their home network at all, even “in isolation,” citing risks of botnet activity, data-cap abuse, and vendor spying.
- Others argue isolation is practical: put untrusted devices on an IoT VLAN with no peer-to-peer access, strict firewall rules, and limited/one-way internet access; trusted clients can selectively reach them.
- There’s debate over what “isolated” means: separate VLAN vs truly separate LAN vs unidirectional links. Some note that VLAN-based isolation still depends on correct configuration and non-compromised gear.
- The author explains the washer was on an isolated guest network, with a specific firewall rule allowing only their script to talk to the washer, and minimal/brief internet exposure.
Alternative ways to “hack” a washer/dryer
- Many describe simpler notification setups:
- Smart plug with power monitoring: alert when power drops below a threshold for a set time.
- Vibration sensors (often Zigbee/ESP32) on washer/dryer.
- Door/reed sensors combined with API or power data to detect “wet clothes left in drum.”
- LoRa link for machines in basements or far from the house.
- Some use these techniques broadly for dishwashers, microwaves, countertop ovens, or 3D printers.
- 240V dryers are harder because of limited smart-plug options; people discuss CT clamps, internal wiring, and safety concerns.
Smart vs dumb machines
- A number of commenters prefer “dumb” 1990s-style washers with mechanical timers, predictable cycle lengths, and longevity, using simple phone timers instead of automation.
- Others note new machines often gate features (like delay start) behind Wi-Fi apps, or have very long and variable “eco” cycles, especially in Europe and in combo washer–dryers or ventless dryers.
- There’s debate about whether newer machines truly have shorter lifetimes versus more intense usage; some brands are cited as lasting decades, but this is contested.
Protocol reversing & tooling
- Commenters discuss:
- That the washer uses no TLS and weak XOR “encryption” (sometimes even sending plaintext/garbage).
- Using apk-mitm, Jadx, and similar tools to bypass certificate pinning and extract keys from Android apps.
- Preference for learning and tinkering versus just using the vendor’s app.
Meta: style of post
- Multiple participants praise this as the kind of hands-on, exploratory hacking they want to see more of, contrasting it with LLM-heavy content and pointing to Hackaday for similar projects.