We all know that smoking is bad for your health, but what about your network? I'll show you that an eCig isn't just a glorified smoke machine but an ARM powered covert exploit platform. You'll find out how to decrypt the firmware, write your own functionality and use this to pwn some systems. Pwning not your thing? How about turning an eCig into a covert storage device? On the way we'll do a bit of reverse engineering, write a bit of embedded code, copy a lot more and show how you can do most of this on a shoe string budget.