Software developed to disguise
3D printing files shared online


London designer Matthew Plummer-Fernandez has developed a piece of software that allows users to visually corrupt 3D-print files so they can't be recognised on file-sharing sites.

Disarming Corruptor for disguising 3D print files by Matthew Plummer Fernandez

Matthew Plummer-Fernandez's Disarming Corruptor algorithm can be used to transform and disguise STL (STereoLithography) files - which record the outer shape of an object to be printed - in a way that can be only reversed by trusted recipients with the relevant key.

Disarming Corruptor for disguising 3D print files by Matthew Plummer Fernandez

"Thingiverse lets you share 3D files - these get rendered, tagged, and exposed to the whole internet, and you don’t know who might be looking at them in the near future," Plummer-Fernandez told Dezeen. "Patent trolls frighten me, and so do mysterious law enforcement agencies and their web-crawling technologies."

"In a time of prolific online espionage, crackdowns on file-sharing, and a growing concern for the 3D-printing of illegal items and copyright-protected artefacts, Disarming Corruptor is a free software application that helps people to circumvent these issues," he said, adding that the project was inspired by devices such as the Enigma Machine used to encrypt and decode messages during the Second World War.

"People could alternatively just email each other encrypted files if necessary, but I wanted to devise a system where people could utilise the benefits of a sharing site and maintain a level of privacy and personal control."

Disarming Corruptor for disguising 3D print files by Matthew Plummer Fernandez

After downloading Disarming Corruptor, users open the file they want to distort then use slide bars to set seven values that are displayed as an encryption key at the top of the screen.

Pressing Corrupt transforms the shape according to these settings and saves the new file plus an image of the encryption key in the same location as the original. The disguised object can then be uploaded to a public file-sharing site like Thingiverse and the decoding key distributed to a few trusted people.

The last slider controls how much the form is corrupted, so the result can retain some recognisable elements. "This could be useful for instances where you might want simply make functional object inoperative until keys are shared," the designer suggests.

Disarming Corruptor for disguising 3D print files by Matthew Plummer Fernandez

To restore the file to its original form, the recipient needs both the application and the unique seven-digit settings used by the sender. They simply open the corrupted version in the Disarming Corruptor program, move the sliders to generate the correct key in the top bar and click Repair. Entering the incorrect settings to decode the file would just damage it further.

Disarming Corruptor for disguising 3D print files by Matthew Plummer Fernandez

"I know there are a lot of harmless copyright infringements already on Thingiverse," Plummer-Fernandez continued. "Think of all the Yoda Heads out there. These are exposed to all the patent and copyright trolls to dive in and pick out victims, and I'm sure the small print on these sharing services leaves their communities hanging out to dry when they come for them."

"When patent trolls and law enforcement agencies find these files on sharing sites they will only see abstract contortions, but within the trusting community these files will still represent the objects they are looking for, purposely in need of repair," he said.

Disarming Corruptor for disguising 3D print files by Matthew Plummer Fernandez

The software is free and available for Mac OSX, and Plummer-Fernandez is working on exports for Linux and Windows.

Plummer-Fernandez was born in Colombia and now lives in London, where he graduated from the Royal College of Art's Design Products MA in 2009, and creates his own 3D-editing tools for design projects like the 3D-printed vessels made by scanning and manipulating everyday objects that he presented this time last year.

  • spot

    Serious question: Are there any benefits over packing the file in a password protected rar or zip file? Like it is done with illegal copies of music or movies when they are uploaded to file sharing websites. And give the password to the people you trust. This looks just more complicated to me.

    • Tanuki

      I think there are brute-force cracking methods for password encrypted zip files. I found that out when I protected a file and forgot the password!. Not sure how secure this guy’s system is. I guess we’ll have to wait until there is actually a valuable stl file actually created :P

    • Xela C

      Isn’t the benefit that you can freely share a partially encrypted version of the file and then supply the decryption keys only with certain people?

    • yarrmepantsbelongsaysI

      Yeah, or just use a private BT tracker.

  • Tom

    “Patent trolls” I wish this guy would learn the correct meaning of the word troll, and not just think it means hackers and nasty people on the internet.

    Not to mention that this, like any encryption or protection software, can and will be circumvented, so whilst it may be a good way to restrict content to only paid users of a website, it won’t be foolproof and is certainly not going to result in secret 3D-printed gun plans circulating the internet for a few people to share.

  • Anon

    Has anyone seen the new Autodesk Project Shapesifter I’m guessing it was built of the back of this?