WeSearch

Claude hacked my ("rotary") phone

·6 min read · 0 reactions · 0 comments · 3 views
#ai experimentation#reverse engineering#voip phone#protocol hacking#autonomous ai#Claude#Viking K-1900D-IP#British red telephone booth#Lantronix XPort#Mac#Windows VM#UTM
⚡ TL;DR · AI summary

An AI agent named Claude successfully reverse-engineered the communication protocol of a Viking K-1900D-IP VoIP phone to reprogram it for use in a British red telephone booth project, overcoming the lack of compatible software for Mac systems. The process involved network scanning, brute-forcing command sequences, and setting up a man-in-the-middle proxy to intercept Windows software communications after discovering that configuration changes were not persisting. This experiment demonstrated significant advancements in autonomous AI capabilities compared to a failed attempt using earlier AI technology the previous year.

Original article
Ktoya
Read full at Ktoya →
Opening excerpt (first ~120 words) tap to expand

Claude code hacked my (rotary) phone A rather technical report from claude itself on how it reverse engineered a hardware protocol of a viking voip phone May 1, 2026 As part of my work on putting a voice agent in a British red telephone booth, I needed to reprogram a Viking K-1900D-IP VoIP phone to call the agent. The manufacturer only provided Windows software, and I only had a Mac. So I decided to work around any middleware software, programming hardware directly. Interestingly, our team already tried to crack this phone in 2025. Back then they used a simple chatGPT and failed. This year I closed the loop by connecting claude code directly to the phone and letting it autonomously iterate; and succeeded. The whole process took me about a day.

Excerpt limited to ~120 words for fair-use compliance. The full article is at Ktoya.

Anonymous · no account needed
Share 𝕏 Facebook Reddit LinkedIn Threads WhatsApp Bluesky Mastodon Email

Discussion

0 comments

More from Ktoya