Few things give more anger than to play with an extremely simple device that does not respond exactly as you want. An example is the appliances that should be at our service, but sometimes they pass from us, they are unnecessarily complex or have many functions, but not as simple as “do not automatically turn off.” That is what a software developer was found when buying a coffee maker, and made the most logical decision.
Return it? No: Hold it. And be careful, because that of ‘hacking’ the coffee makers is not so weird.
Functions vs User. Gabriel Ciubotaru is a software developer, but also a cybersecurity and reverse engineering expert, among other skills. In a recent conference at the Defcamp 2024 (a relevant cybersecurity and hacking conference at European level), Gabriel told how he had acquired a coffee maker that he liked a lot, but that had a very annoying function: at 30 minutes of being on, he automatically went out.
It is a function to save energy, and that is fine, but the problem is the enormous contradiction that arises when, every time it turns on, it performs a refined cycle that expels a moderate amount of water. In addition to water, it was a loss of time and Gabriel search between the options until finding a higher time limit: three hours. As he made a coffee every four hours, it was not adequate for his rhythm of life and decided to open the machine.
Hold the coffee maker. The task seemed simple: extract the motherboard, locate the microcontroller and identify the system programmed to automatically turn off the machine and perform that refined process, change the firmware with the desired time value and reassemble the machine. The reality is that it found that component relatively easy, but the complicated thing was to find, throughout the code tangle, the lines that it should modify so that the coffee maker went out when he wanted.
He did it, looking at a code that controls the warning icons that shows the coffee maker screen so that the user identifies his status following the instructions of the manual, so he modified those values, the modified code rose to the microcontroller and … ready, the coffee maker now works as he wants.
I have explained it in a very simple way, but in Gabriel he gives all the details in his conference. He also comments that he has saved 30 seconds a day by investing 100 hours of work to hack the coffee maker, but that it is something that has been totally worth it because now it is the device that works as the user wants.
More homemade projects. It is clear that not everyone has the resources, desire, time or interest in getting what Gabriel has achieved. Those 30 seconds, to many, would not be bother us, but what is also true is that there is an interest on the part of some users to hack their coffee makers in one way or another. One of the most popular coffee makers is Delonghi dedicates. It is what I have and has a series of default values that respond to the amount of coffee extraction time.
For a pressurized portfilters like the one that carries the machine, they are adequate, but when you Buy a portfiltros in the air, these values fall short and we have a way of programming a slower extraction based on combining its three buttons. It is something indicated in the manual, but what is not indicated is how to achieve a better milk foam.
The sparkler included is functional, but not perfect. A trick to have more control over the process is to remove the metal part of the sparkler and keep the rubber, with a much thinner nozzle. Thus we can better control the process, but there is a problem: due to the pressure, the nozzle jumps. The solution? Set that mouthpiece to the coffee maker through a flange, and problem solved.

Removing functions to the machine. That is a very simple modification, but there is another that is perhaps more interesting because it directly affects how coffee knows. In filter coffee makers, the most common is that the base has a resistance that keeps hot coffee for a longer time. This implies that coffee ‘cooks’ by extraction, but then continues to warm up with a high temperature base that modifies its flavor. It is not ideal, but even expensive machines (and that, supposedly, its manufacturers should know that it affects the flavor) implements it.
Therefore, a common modification in this type of coffee makers is to open them and remove the cables that give energy to that resistance. It does not affect anything to the operation of the coffee maker when preparing coffee, but you eliminate that base that continues to cook the coffee once extracted. It is a modification that gives more “fear” than placing a flange, but it is worth it because, as I say, it has a direct influence on coffee.
And as that modification there are many others, such as placing a more quality milk foamer in the aforementioned dedicate or change the water pump pressure, change the water diffuser in a moccamSter …
More serious implications. Ok, these cases are curious and allow to improve the functioning of the coffee maker, but really hacking a coffee maker is a serious thing. It is something that Martin Hron, Avast Security researcher, showed when a smart coffee maker. Focusing on the first generation smartger, Hron got access to the system and realized that it worked as a unprotected Wi-Fi access point, with unbalanced connections and that allowed firmware updates without authentication.
What did you demonstrate? Two things. On the one hand, which could rotate the mill without control, waste boiling water or emit beeps. He could also show a rescue message with a URL in which to make the payment so that the coffee maker ceases to behave like this.
But the most important thing is that Hron shows how insecure IoT devices can become a headache. They can even be used to undermine cryptocurrencies, although hardware of these devices is usually too simple for it.
Images | Avast, Tom’s Coffee Corner, Coffeehaus
In WorldOfSoftware | Science already knows why we spill coffee when walking with a cup in our hands. And has the formula to avoid it