(no title)
foldor
|
1 year ago
Hard disagree. That "smart IoT coffee maker" stores your wifi details, including the password so it can reconnect. I appreciate the level of sophistication and effort required for someone to be able to abuse that is beyond the realm of likelihood, it's not unreasonable to believe that there may be higher value targets (like journalists) who are being targeted where this is a reasonable method for dedicated attackers to use to gain access to a targets home network. Better to just secure these things by default.
crispyambulance|1 year ago
But most of the "pizza-box-shaped" things I've worked on in telecom have jtag enabled even when in the field. I've never thought about it much, but to actually get to a jtag interface requires a level of physical access that would be far-fetched unless you're talking about "James-Bond-level" bad actors or "inside-job" people who are already entrusted with an enormous amount of privileges anyway.
JTAG is super useful for troubleshooting and in general, for things that aren't throw aways and that can be repaired, re-calibrated, or re-configured, it makes sense to keep it available.
londons_explore|1 year ago
The vast majority of microcontrollers aren't hardened against physical attack - especially not anything with wifi capability.
"disable jtag" is intended to make it harder to make modchips (ie. bypass the coffee subscription), but doesn't help against someone willing to do a one-off glitching attack or similar to dump secrets.
OJFord|1 year ago
bongodongobob|1 year ago
y04nn|1 year ago
numpad0|1 year ago
To secure a thing, you are supposed to literally secure the thing, as in, placing the equipment away from walls, bolted down to the floor, chassis locked and rigged for self destruction, perimeters patrolled and monitored by armed guards.
Software security is additional parts that build on top of that physical security. Hardware root of trust, Secure Boot, code signing, all helps, but physical security has to come first.
If you're throwing out the coffee maker not securely erased(military guys call it zeroizing - cool), or not maintaining custody of it by either keeping it to yourself or having dogs and your grandsons taking part watching it at all times, then the coffee maker is technically not secure, by any of those alone.
unknown|1 year ago
[deleted]
fullspectrumdev|1 year ago
boznz|1 year ago
flash for microcontrollers such as ESP, Rpi pico etc is usually saved on an 8-pin flash chip which most people forget about and is easy to unsolder and pop into a reader. bigger devices using bootloaders sometimes store a whole FAT32 filesystem in one of these, you can even unsolder most flash and re-mount it with a little skill and suitable hardware.
I once read an AWS private key stored in plain text from an IOT board once. Go figure!
ronsor|1 year ago
unknown|1 year ago
[deleted]
ProllyInfamous|1 year ago
My new water heater came with WiFi, and I just cannot understand why my tank needs-do anything more than just heat water..?
sunshinesnacks|1 year ago
For a water heater, participating in a utility program where they modify your temperature sweeping in exchange for a reduced rate or similar incentive.
Those are the first reasons I can think of.
Dowwie|1 year ago
Larrikin|1 year ago
The only downside is companies trying to scoop up that data for their own purposes and when companies disable perfectly working products because they claim the servers are too expensive. The Home Assistant community makes a big point of recommending products that guard against issues like that.
https://www.home-assistant.io/
margalabargala|1 year ago
Some people have solar installations, but do not have 1-to-1 net metering from their power company. For these people, having a connected hot water heater allows them to use their own solar power for heating water when they can, lowering their power bill.
Essentially any high-consumption electrical device can similarly benefit, especially ones that store energy such as hot water heaters and electric car chargers.
beeboobaa3|1 year ago
Or do you think that physical access does not mean you own the device?