Murder Labs
Debuggers
KiCad

Open Hardware Doomsday Device

You probably don't want one.

$0 raised

of $1 goal

Not Yet Funded Time Expired
0
updates
Jun 22
ended
0
backers
You'll be notified about news and stock updates for this project.

The Open Hardware Doomsday Device, built around an ESP32 and designed in KiCad, exemplifies the power and accessibility of modern embedded design. Leveraging open-source tools like KiCad ensures that the schematic and PCB layout are transparent, modifiable, and community-verifiable—qualities essential for a device with potentially dramatic consequences. The use of the ESP32 provides built-in wireless connectivity, dual-core performance, and a rich set of peripherals, making it well-suited for distributed sensing, coordination with other subsystems, or remote control—if such functionality is desired. These hardware choices reflect a balance of performance, flexibility, and open access.

Debugging support via SWD (Serial Wire Debug) or JTAG is a critical strength, especially for a device of this nature where reliability and full control over the execution flow are paramount. SWD allows for minimal-pin debugging of ARM-based subsystems, while JTAG extends that to a chainable, multi-device environment, ideal for the multiple microcontrollers the device may incorporate. This debug infrastructure enables real-time introspection, breakpoints, memory watchpoints, and firmware flashing—facilitating iterative development and thorough validation. In a high-stakes device, such granular control reduces the risk of unknown behavior during operation.

However, the open nature of the hardware is a double-edged sword. While it promotes transparency and trust, it also removes any form of obscurity-based protection. Anyone with access to the schematics and firmware can replicate, alter, or potentially disarm the device. For projects involving sensitive or potentially hazardous functionality, this may be seen as a critical limitation. The responsibility to implement secure access control, authentication mechanisms, or tamper-proofing falls entirely on the designer, and cannot be outsourced to proprietary layers.

From a technical standpoint, the ESP32, while capable, is not a hardened or safety-certified processor. It lacks features such as ECC memory, redundancy support, or radiation tolerance, which might be required in truly mission-critical scenarios. Additionally, real-time determinism is limited, and despite the dual cores and RTOS support, it may not meet the strict timing constraints of certain control systems. For critical triggering or synchronization tasks, auxiliary MCUs with deterministic behavior may be needed, increasing system complexity.

The Device is designed in KiCad and released under the Cern OHLv2 license.

Ask a Question

Produced by Murder Labs in Portland, OR, USA.

Sold and shipped by Crowd Supply.

Open Hardware Doomsday Device

One Open Hardware Doomsday Device. Included in the box is the device, a USB-C cable, and a spare bootable MicroSD card.

$2,048 Free US Shipping / $18 Worldwide

About the Team

Murder Labs

 · 

Murder Labs develops sophisticated open hardware products for world domination and JTAG debugging.

See Also

Subscribe to the Crowd Supply newsletter, highlighting the latest creators and projects