M5Stack Cardputer Zero · Volume 11

M5Stack Cardputer Zero Volume 11 — Operational Posture

Regional rules, LiPo small-cell safety, education/classroom posture, fleet-ops chain of custody, legal/ethics

Contents

SectionTopic
1About this volume
2Regional regulatory framework
3LiPo small-cell handling
4Education / classroom posture
5Fleet-ops chain of custody
6Legal / ethics for pentest use
7When NOT to deploy Zero
8Pre-engagement checklist
9Resources

1. About this volume

Vol 11 covers operational posture for Cardputer Zero. Most regulatory + legal content is inherited unchanged from the Cardputer family — Zero is an ESP32-S3 + Wi-Fi + BLE device, subject to the same rules as any other 2.4 GHz unlicensed device. The Zero-distinctive considerations focus on:

  1. Education / classroom: how to deploy responsibly to students
  2. Fleet operations: chain of custody, data handling, recovery
  3. Smaller battery: thermal + safety implications

Cross-reference: ../../../M5Stack Cardputer ADV/03-outputs/Cardputer_ADV_Complete.html Vol 12 covers ADV operational posture; Zero inherits the framework and adds the budget-tier specifics.


2. Regional regulatory framework

2.1 ESP32-S3 Wi-Fi 2.4 GHz

ESP32-S3 transmits in the 2.4 GHz ISM band (2400-2483.5 MHz). Regional rules:

RegionBandMax TX powerDuty cycle
US (FCC §15.247)2400-2483 MHz+30 dBmNone (spread spectrum req’d)
EU (ETSI EN 300 328)2400-2483.5 MHz+20 dBmStrict
JP (ARIB STD-T66)2400-2483.5 MHz+20 dBmVarious
Most regions2.4 GHz ISMvariousvarious

ESP32-S3 typically transmits at +20 dBm — within all major region limits.

2.2 BLE 5.0

Bluetooth Low Energy is also 2.4 GHz; same regulatory framework. ESP32-S3 BLE typically transmits at +10 dBm.

2.3 Pentest-attack regulatory considerations

Wi-Fi pentest workflows (deauth, evil portal, beacon spam) operate at TX layer — subject to regional rules even if the target is your own equipment. For Zero specifically:

  • Wi-Fi deauth: legal on your own network; gray area elsewhere; illegal in many jurisdictions
  • Beacon spam: same considerations
  • Evil Portal: works at the SoftAP layer; subject to “you can’t broadcast on a band you don’t own” rules
  • BLE spam: typically less regulated but still subject to authorized-use principle

Cross-ref ../../../_shared/legal_ethics.md for the project-wide posture.

2.4 ESP-NOW

ESP-NOW (Espressif’s peer-to-peer protocol over Wi-Fi MAC) operates on the same 2.4 GHz radio. Same regulatory framework. Useful for short-range covert / coordinated comms.


3. LiPo small-cell handling

3.1 Standard discipline (carries from family)

  • Never charge a swollen cell
  • Operate at 0-40 °C
  • Store at ~50% charge
  • Don’t operate when wet
  • Replace at first sign of capacity drop

3.2 Smaller-cell-specific concerns

Vol 5 § 7 covers this in detail. Summary:

  • Faster discharge ratio under heavy load (~0.5C peak)
  • Smaller thermal mass — warms faster under high current
  • Brownouts more likely under aggressive Wi-Fi TX
  • Less voltage headroom at low charge

3.3 Classroom/education considerations

Students may abuse LiPo cells. Education-tier safety:

  • Brief students on LiPo basics — swelling = stop using
  • Provide replacement service — broken cells replaced cheaply
  • Restrict TX-heavy workflows in classroom to instructor-supervised time
  • Recycle bin for retired cells — proper disposal at end of life

3.4 Fleet-ops + storage

For units stored long-term between engagements:

  • Charge to ~50% before storage
  • Don’t store in hot warehouses (>30 °C accelerates degradation)
  • Check periodically (~monthly) for swelling
  • Replace cells at 80% of nameplate capacity

4. Education / classroom posture

4.1 Wi-Fi pentest in classroom

Teaching Wi-Fi pentest workflows on classroom Zeros:

DO:
  ─ Use a dedicated classroom Wi-Fi for pentest exercises
  ─ Instructor authorizes specific attacks against the lab network
  ─ Document what each student does (attribution)
  ─ Test on lab equipment only — NEVER the school's production Wi-Fi
  ─ Cover Wi-Fi rules + ethics first before TX experiments

DON'T:
  ─ Let students freely run deauth on production school Wi-Fi
  ─ Allow Wi-Fi pentest in residences (e.g., dorms)
  ─ Skip the ethics curriculum
  ─ Permit unauthorized TX in any classroom-adjacent area

4.2 Privacy in classroom

For deployed BLE / probe scanning:

  • Inform students that the device captures wireless data
  • Don’t capture personal devices during exercises unless directly authorized
  • Anonymize captured data before storage / analysis
  • Delete captures after the exercise concludes

4.3 Hardware accountability

  • Each Zero assigned to a specific student (or station)
  • Serial number logged at issue
  • Returned at end of course
  • Damage / loss covered by lab fee or department budget

5. Fleet-ops chain of custody

5.1 Pre-deployment

  • Each unit has a serial number + custody tag
  • Pre-deployment baseline: SD card formatted, factory firmware, no payload
  • Photograph each unit before deployment
  • Document deployment plan (location, time, expected duration)

5.2 During deployment

  • Track each unit’s location (if mobile)
  • Status updates if remote-accessible
  • Watch for OS/firmware crashes (NEMO-style fleet typically auto-restarts)

5.3 Post-deployment

  • Retrieve each unit (or confirm loss)
  • Extract SD data (encrypted bundle for transfer)
  • Sanitize SD before next deployment
  • Factory-restore firmware
  • Document the engagement

5.4 Data handling

Captured data (probes, BLE scans, etc.):

  • Encrypt at rest during transfer
  • Limit retention per engagement contract (typically 30-90 days)
  • Out-of-band hash verification for evidence-grade captures
  • Bystander filtering — purge non-target data

Cross-ref Cardputer ADV Vol 12 § 5 for the canonical chain-of-custody.


6.1 The core principle

Authorization in writing for every TX-related activity. Don’t deauth, jam, beacon spam, or run Evil Portal without explicit scope.

6.2 Zero-specific considerations

For Cardputer Zero in particular:

  • Lower cost = lower “stake” but same legal exposure — a $30 device used illegally exposes you to the same criminal/civil penalties as a $300 one
  • Multiple units increase exposure — fleet ops means each unit is potentially evidence; encrypt and sanitize systematically
  • Education context doesn’t lower the bar — students under your supervision making illegal TX puts liability on you

6.3 What’s typically OK

  • RX-only Wi-Fi/BLE scanning in public spaces (with reasonable awareness)
  • TX on your own networks
  • TX in licensed bands (only if you hold the license; e.g., amateur radio)
  • TX with explicit written authorization

6.4 What’s typically not OK

  • Deauth on a network you don’t own
  • Beacon spam in public spaces
  • Captive portal targeting random users
  • Cellular interference (ESP32 doesn’t TX in cell bands, but bad firmware could interfere)
  • TX without authorization, period

Cross-ref ../../../_shared/legal_ethics.md for the project-wide posture.


7. When NOT to deploy Zero

Beyond the Vol 9 § 7 “wrong tool” list, Zero-specific operational deployment risks:

ScenarioRiskMitigation
Public hackathon with unsupervised teensMisuse riskCurated firmware only; supervisor present
Long-duration unsupervised collectionBattery / theft / weather damageFixed power, sheltered, regular check
Cross-border travel with pre-flashed pentest firmwareCustoms inspection riskTravel with factory firmware; flash custom on arrival
Locations with sensitive RF infrastructureInterference riskVerify regional rules; avoid TX
Educational deployment without consentPrivacy / liabilityInform participants; opt-in scanning only

8. Pre-engagement checklist

For any deliberate Zero deployment:

AUTHORIZATION
[ ] Written authorization (if TX-heavy)
[ ] Verbal authorization (if classroom / known venue)
[ ] Out-of-band contact ready

PREPARATION
[ ] Unit charged to ≥80%
[ ] USB-C battery pack ready (>3h engagement)
[ ] SD card formatted FAT32 + sufficient space
[ ] Firmware version locked + tested
[ ] Engagement scope clear

OPERATIONAL
[ ] Region setting in firmware matches venue
[ ] TX rules understood for this band/region
[ ] Sanitization plan post-engagement
[ ] Discovery response plan

LEGAL / ETHICAL
[ ] Authorized to TX in band X for duration Y?
[ ] Bystander data handling clear?
[ ] Documentation policy clear?

FINAL
[ ] All above checked — proceed

If any item isn’t checked: abort.


9. Resources

End of Vol 11. Next: Vol 12 is the laminate-ready cheatsheet — with explicit “what to verify on receipt” content reflecting Zero’s research-stub status.