OnQ Blog

Kinect Hackers Change Public Opinion of Typical “Hacker”

Oct 12, 2012

Qualcomm products mentioned within this post are offered by Qualcomm Technologies, Inc. and/or its subsidiaries.

Hackers, once seen only as security threats, are quickly becoming the cool guys on the digital playground. Whether it’s a kid genius “modding” his dad’s tablet computer, the extremely gifted game developer, or even the digital security expert, hacking has evolved from a destructive hobby to an encouraged one. One platform that has sparked the imaginations of an entire breed of new hackers is the Microsoft Kinect and its gesture-based technology.

Released at midnight on November 4, 2010, Kinect is an interface that allows you to control a player on screen with real-life physical motion or gestures. Within weeks of its release, curious minds got inside the device, modifying it to do things Microsoft never dreamed of or intended.

But it hasn’t always been fun and games. Back in 2011 when Adafruit offered a $3000 bounty for the first person who could create and release Kinect software for use on a computer rather than an Xbox--Microsoft’s response was rather icy. In a comment to CNET, a Microsoft spokesperson said, “Microsoft does not condone the modification of its products,” adding, “With Kinect, Microsoft built in numerous hardware and software safeguards designed to reduce the chances of product tampering. Microsoft will continue to make advances in these types of safeguards and work closely with law enforcement and product safety groups to keep Kinect tamper-resistant." But that just added the proverbial fuel to the fire.

Then, possibly seeing the altruistic potential that Kinect offered beyond gaming, Microsoft changed its stance on Kinect hacking in 2011 by releasing the official SDK. The result? Kinect is credited for spawning a commercial ecosystem when hacks with greater potential are developed—everything from mapping gear for firefighters and rehabilitation for stroke patients to space orbit docking systems.

Sure, there’s still the occasional bad hacker bust—people that have chosen to wear the black hat and go to the “dark side,”—but if you take the bad with the good, and hope that good prevails; Kinect is clearly becoming a springboard for good.

Speaking about the dark side, we don’t know too much about this Kinect hacker, but he still has some work to do before he’s as amusing as the original “Star Wars Kid.”

H/T: CNET, CNN, LA Times, NY Times, Wired, ZDNet

Engage with us on


Opinions expressed in the content posted here are the personal opinions of the original authors, and do not necessarily reflect those of Qualcomm Incorporated or its subsidiaries ("Qualcomm"). Qualcomm products mentioned within this post are offered by Qualcomm Technologies, Inc. and/or its subsidiaries. The content is provided for informational purposes only and is not meant to be an endorsement or representation by Qualcomm or any other party. This site may also provide links or references to non-Qualcomm sites and resources. Qualcomm makes no representations, warranties, or other commitments whatsoever about any non-Qualcomm sites or third-party resources that may be referenced, accessible from, or linked to this site.

Anthony Eng

Senior Marketing Mgr., Qualcomm Technologies

©2021 Qualcomm Technologies, Inc. and/or its affiliated companies.

References to "Qualcomm" may mean Qualcomm Incorporated, or subsidiaries or business units within the Qualcomm corporate structure, as applicable.

Qualcomm Incorporated includes Qualcomm's licensing business, QTL, and the vast majority of its patent portfolio. Qualcomm Technologies, Inc., a wholly-owned subsidiary of Qualcomm Incorporated, operates, along with its subsidiaries, substantially all of Qualcomm's engineering, research and development functions, and substantially all of its products and services businesses. Qualcomm products referenced on this page are products of Qualcomm Technologies, Inc. and/or its subsidiaries.

Materials that are as of a specific date, including but not limited to press releases, presentations, blog posts and webcasts, may have been superseded by subsequent events or disclosures.

Nothing in these materials is an offer to sell any of the components or devices referenced herein.