Skip to main content

Xerox PARC creates computer chip that explodes on command

xerox parc creates computer chip that explodes on command s new
Image used with permission by copyright holder
Like something straight out of a science fiction movie, Xerox PARC have developed a chip that can self-destruct on command, as noted by IDG.tv. But this isn’t a James Bond movie, it’s actual technology that’s made with some tweaks and modifications to existing glass.

The chip was developed as part of DARPA’s vanishing programmable resources project, and could have several practical applications in cases where extreme security measures are required. For example, top-secret data stored by the government and military might be able to benefit from a chip that could be destroyed on command. This could save some serious data leaks from occurring.

Recommended Videos

Down the line, there could be some commercial usse for chips like this. Users who are extremely security conscience may be willing to install something like this in their devices.

The chip is made using Corning’s Gorilla Glass — yes, the very same glass found in many smartphones on the market today. The team modified the glass to become tempered under stress. From there, a resistor at the chip’s bottom is heated with a laser, and that causes the entire chip to explode into dust. After that, the smaller glass pieces will continue to melt and explode into even smaller pieces for the next few seconds.

The entire process is outlined in the video above. The team says that a laser isn’t required to cause the chip to explode, and that anything from radio signals to a physical switch could be used to initiate the process and cause the chip to turn to dust. It sounds like a long process, but in real-time, it happens almost instantly.

“We take the glass and we ion-exchange temper it to build in stress,” explained Gregory Whiting, a senior scientist at PARC,  “What you get is glass that, because it’s heavily stressed, breaks its fragments into tiny little pieces.”

As one might expect, there are no plans in place to sell these chips just yet, as they are still early in development, but it’s not too soon to think about how these might see later use.

Dave LeClair
Former Digital Trends Contributor
Dave LeClair has been writing about tech and gaming since 2007. He's covered events, hosted podcasts, created videos, and…
This gorgeous Mac mini hub exacerbates the power button placement problem
M4 Mac mini with Satechi hub on a desk.

Satechi, known for its high-quality tech accessories, is updating its Mac mini hub for the new M4 model. Like previous hubs, it allows Mac mini owners to expand their storage and ports while preserving airflow, wireless signal, and performance. It looks awesome, but this time, the design highlights the problematic nature of the new Mac mini's placement of its power button.

With previous Mac mini models, the power button was at the back, making it easily accessible even when it was in a Satechi hub. The new button placement on the bottom of the PC, however, may prove even more annoying for anyone who wants to buy this accessory.

Read more
Proton VPN vs. Mullvad: Which is the best open-source VPN?
Proton VPN Plus and Mullvad websites appear in a split-screen on a PC monitor.

Open-source software is exploding in popularity and even virtual private networks (VPNs) share code for transparency. With over 100 million open-source developers contributing to the community, there’s an improved chance to find bugs and patch vulnerabilities.

Proton VPN and Mullvad are among the best VPNs available, and both are open-source solutions. You can browse the code used in Proton VPN and Mullvad on GitHub to check that there isn’t any secret logging or undisclosed data collection.

Read more
Some older D-Link routers are vulnerable to attack
D-Link Omna 180 Cam HD

A few legacy D-Link routers can be vulnerable to Remote Code Execution (RCE) attacks since the company refuses to send any updates to patch them up, claiming they have reached end-of-life, as recently posted on its announcement page.

The vulnerability is a serious issue since it allows hackers to take control from anywhere in the world and use a stack buffer overflow. This attack sends more data than the buffer size can handle, potentially corrupting critical information like the return address. Thus, hackers can take control of your PC. However, the company did not detail how the threat works, possibly not informing the hackers too much about the issue.

Read more