FAQ
TL;DR: Trying to make a pokie/slot machine pay out remotely is unethical and illegal; EMP field tests show only 4–6 ft range, and “basically fries the components,” not precise control. [Elektroda, Chuck Sydlo, post #21663021]
Why it matters: Engineers and hobbyists often ask “can we?”—this FAQ explains why you shouldn’t, and where legitimate security research belongs, in clear, practical terms for learners and professionals.
Quick Facts
- EMP disablement range is limited to approx. 4–6 feet in testing; precise targeting is unreliable. [Elektroda, Chuck Sydlo, post #21663021]
- Late‑1970s coin‑slot zaps could rack up “hundreds of free credits,” now obsolete with modern protections. [Elektroda, Sarah Harris, post #21663023]
- Attempting remote payout is doubted by engineers and can carry jail‑time risk. [Elektroda, Chuck Sydlo, post #21663013]
- Makers have no incentive to ship machines with built‑in payout backdoors or radio triggers. [Elektroda, Jake Watts, post #21663022]
- Strong electromagnetic signals may cause failure or permanent damage instead of controlled behavior. [Elektroda, Jeff Evemy, post #21663020]
What is a “pokies” machine?
In Australian usage, “pokies” means fruit machines or slot machines. They accept bets and pay out per regulated odds. [Elektroda, vince, post #21663015]
Can you design a circuit to remotely trigger a slot machine payout?
Engineers in the thread say it’s highly doubtful and likely criminal. Manufacturers design against wireless exploits. Expect legal consequences. [Elektroda, Chuck Sydlo, post #21663013]
Did any old tricks ever work on vintage machines?
One anecdote describes using a gas‑stove piezo ignitor and wire to add credits in the late 1970s. Modern machines block such exploits. [Elektroda, Sarah Harris, post #21663023]
Would an EMP stop a fleeing car cleanly and safely?
Tests show EMP devices need close proximity, about 4–6 feet, and tend to fry components rather than disable gracefully. [Elektroda, Chuck Sydlo, post #21663021]
Why don’t police widely use EMP stoppers on the road?
Getting an EMP close enough to the vehicle’s ECU is hard. Range limits and reliability issues block practical deployment. [Elektroda, Chuck Sydlo, post #21663021]
What would it take to influence a commercial machine’s behavior?
You’d need detailed design knowledge and precise field injection. “The right signal in the right place” often causes failure instead. [Elektroda, Jeff Evemy, post #21663020]
Is asking how to hack payouts appropriate on engineering forums?
Moderators call such questions ethically suspect and discourage them. Direct manufacturer contact is suggested for responsible inquiry. [Elektroda, Peter Owens, post #21663016]
Could this topic fit a legitimate university or security‑consulting project?
Yes, framed as defensive research with clear ethics and scope. Provide context and purpose when seeking guidance. [Elektroda, Joe Wolin, post #21663018]
So what conclusion did the original asker reach?
They acknowledged the argument was lost: it can’t be done, or is too hard to be practical. [Elektroda, vince, post #21663027]
Do manufacturers ever include remote payout mechanisms?
Participants argue there’s zero incentive to ship such vulnerabilities. Cash handling uses secure, physical processes. [Elektroda, Jake Watts, post #21663022]
What is an EMP, in simple terms?
An EMP is a burst of electromagnetic energy. In tests here, it required an explosive‑driven generator and close range. [Elektroda, Chuck Sydlo, post #21663021]
Is trying to override ATMs or slots likely to land me in legal trouble?
Yes. Engineers explicitly warn of jail‑time risks for attempting such exploits. Don’t pursue it. [Elektroda, Chuck Sydlo, post #21663013]
Could a targeted RF signal make a slot machine pay out without damage?
Even with access, unintended effects dominate. Field injection more often crashes or damages systems than yields controlled payouts. [Elektroda, Jeff Evemy, post #21663020]
What’s an edge case people forget about?
Old carbureted cars lack ECUs; EMP tactics won’t stop them. “He’s getting away in the Model‑T.” [Elektroda, Joe Wolin, post #21663025]
How should I ask security questions responsibly?
State your ethical intent, avoid exploit details, and engage manufacturers or IRBs. Keep community guidelines in mind. [Elektroda, Peter Owens, post #21663016]
How‑To: frame a defensible security research question (3 steps)
- Declare goals, scope, and non‑malicious intent.
- Omit exploit paths; focus on risk models and mitigations.
- Direct sensitive details to vendors or approved channels. [Elektroda, Peter Owens, post #21663016]