• Regna@lemmy.world
    link
    fedilink
    English
    arrow-up
    295
    ·
    edit-2
    14 days ago

    At first I thought ”Well, duh!”, but the manufacturer having a remote kill switch when he network blocked his vacuum from sharing his home map data with them, as well as unprotected root access when connecting to the vacuum… urgh.

    The engineer says he stopped the device from broadcasting data, though kept the other network traffic — like firmware updates — running like usual. The vacuum kept cleaning for a few days after, until early one morning when it refused to boot up.

    After reverse engineering the vacuum, a painstaking process which included reprinting the devices’ circuit boards and testing its sensors, he found something horrifying: Android Debug Bridge, a program for installing and debugging apps on devices, was “wide open” to the world. “In seconds, I had full root access. No hacks, no exploits. Just plug and play,” Narayanan said.

    • justsomeguy@lemmy.world
      link
      fedilink
      English
      arrow-up
      152
      ·
      14 days ago

      All crappy IoT devices ever made. They aren’t used in bot nets all the time because hackers like the challenge of hacking them so much. Security simply isn’t a priority.

      • KazuyaDarklight@lemmy.world
        link
        fedilink
        English
        arrow-up
        110
        ·
        14 days ago

        Tend to agree, security is always the goal but if someone is in my house hacking my vacuum, I have bigger issues. The no-notice remote kill is the bigger issue to me.

        • subignition@fedia.io
          link
          fedilink
          arrow-up
          17
          ·
          14 days ago

          The much bigger concern is that the pathway used to send the remote kill command could very easily be utilized by nefarious actors.

    • Monument@lemmy.sdf.org
      link
      fedilink
      English
      arrow-up
      53
      ·
      edit-2
      14 days ago

      A few years ago I noticed an annoyance with a soundbar I had. After allowing it onto my WiFi network so we could stream music to it, it still broadcast the setup WiFi network.

      While dorking around one day, I ran a port scan on my network and the soundbar reported port 22 (ssh) was open. I was able to log in as root and no password.
      After a moment of “huh, that’s terrible security.” I connected to the (publicly open) setup network, ssh’d in, and copied the wpa_supplicant.conf file from the device to verify it had my WiFi info available to anyone with at least my mediocre skill level. I then factory reset the device, never to entrust it with any credentials again.

        • Monument@lemmy.sdf.org
          link
          fedilink
          English
          arrow-up
          14
          ·
          edit-2
          13 days ago

          It was a TCL Alto 9+.

          A quick internet search reveals that this issue was known about at least three years ago.

          Another model, the 8i was reported to have a root password of “12345678” - which is partially how I got the idea to start seeing if I could gain root.

          • 6nk06@sh.itjust.works
            link
            fedilink
            English
            arrow-up
            3
            ·
            13 days ago

            TCL

            The Chinese company that steals corporate secrets (I kicked a bunch of their devs once when they were trying to take pictures of prototypes and copy source code on USB keys) and send everything to China? Who would have thought.

  • 87Six@lemmy.world
    link
    fedilink
    English
    arrow-up
    171
    ·
    14 days ago

    Since I dont see it mentioned, the company is

    iLife

    iLife makes vacuums that map your house and can be remote controlled

    Just so we are clear. You should all up your name and shame game.

  • ByteOnBikes@discuss.online
    link
    fedilink
    English
    arrow-up
    79
    ·
    14 days ago

    In addition, Narayanan says he uncovered a suspicious line of code broadcasted from the company to the vacuum, timestamped to the exact moment it stopped working. “Someone — or something — had remotely issued a kill command,” he wrote.

    “I reversed the script change and rebooted the device,” he wrote. “It came back to life instantly. They hadn’t merely incorporated a remote control feature. They had used it to permanently disable my device.”

    In short, he said, the company that made the device had “the power to remotely disable devices, and used it against me for blocking their data collection… Whether it was intentional punishment or automated enforcement of ‘compliance,’ the result was the same: a consumer device had turned on its owner.”

    They kill switched it remotely. Yikes.

    • muusemuuse@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      12
      ·
      13 days ago

      All IoT devices do this to keep you from blocking their data collection. They won’t work reliably without a regular ping home. They lock up if they can’t phone home frequently enough.

      • Taleya@aussie.zone
        link
        fedilink
        English
        arrow-up
        7
        ·
        edit-2
        13 days ago

        Tapo’s sockets don’t - in fact they explicitly have a ‘local only’ function. All you lose is control outside your home network.

        Tuya on the other hand will start leeching off the fucking Bluetooth of your pairing device if you hobble them.

        • muusemuuse@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          2
          ·
          13 days ago

          tapo cameras do. mine all went offline and factory reset themselves after not having internet access or even accounts for several months, all at the same time.

          • Taleya@aussie.zone
            link
            fedilink
            English
            arrow-up
            1
            ·
            13 days ago

            Haven’t experienced that one - but your statement was “all iot devices do that” (emphasis mine)

            And i haven’t even touched on Zigbee…

      • Auli@lemmy.ca
        link
        fedilink
        English
        arrow-up
        1
        ·
        13 days ago

        Haven’t had one yet. Block all IOT devices from internet all work fine.

  • Treczoks@lemmy.world
    link
    fedilink
    English
    arrow-up
    62
    ·
    14 days ago

    Well, yes, that’s what those cheap “smart” devices do. Or does anyone think cheap smart would fit into that device? Rule of thumb: if a device needs internet access, it is spying on you.

      • Treczoks@lemmy.world
        link
        fedilink
        English
        arrow-up
        8
        ·
        14 days ago

        Yes, but some devices simply don’t work without calling home, or have 99% of their brain in a cloud. For those cases, the vLAN does not help.

        • CeeBee_Eh@lemmy.world
          link
          fedilink
          English
          arrow-up
          15
          ·
          14 days ago

          Then don’t buy those devices. If you have any excuse as to why you “can’t do that”, then there’s zero point in complaining. I’m not saying your complaints are invalid, and companies should be held accountable and criticised. But as long as people buy privacy violating products, companies will continue to violate privacy.

          • Novaling@lemmy.zip
            link
            fedilink
            English
            arrow-up
            3
            ·
            edit-2
            14 days ago

            Very valid and true point, but that requires companies to openly admit that they’ve made their devices to not work if it can’t phone home, and no company is gonna do that. At best, they’ll tell you it needs internet access, but even then they’ll probably downplay it.

            Either that or some poor sacrifice will have to be the guinea pig and buy the thing to test it and tell others. Ah, I guess Consumer Reports could do that at least.

        • Landless2029@lemmy.world
          link
          fedilink
          English
          arrow-up
          4
          ·
          14 days ago

          Thankfully there are groups to replace boards or flash some devices. I need to keep better bookmarks to plug them.

        • Joelk111@lemmy.world
          link
          fedilink
          English
          arrow-up
          3
          ·
          13 days ago

          There’s a version of every device that doesn’t phone home. I switched to HomeAssistant a couple years ago now, and I think all of my stuff is finally local as of a few months ago, including my robot vacuum.

  • ExLisper@lemmy.curiana.net
    link
    fedilink
    English
    arrow-up
    61
    ·
    14 days ago

    Yeah, I read about iRobot gathering and selling info about apartments like 10 years ago. People still alarmed by this are simply ignorant.

  • andrew0@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    49
    ·
    edit-2
    14 days ago

    This article just screams rage-bait. Not that I am against making people aware of this kind of privacy invasion, but the authors did not bother to do any fact checking.

    Firstly, they mention that the vacuum was “transmitting logs and telemetry that [the guy] had never consented to share”. If you set up an app with the robot vacuum company, I’m pretty sure you’ll get a rather long terms and services document that you just skip past, because who bothers reading that?

    Secondly, the ADB part is rather weird. The person probably tried to install Valetudo on it? Otherwise, I have no clue what they tried to say with “reprinting the devices’ circuit boards”. I doubt that this guy was able to reverse engineer an entire circuit board, but was surprised when seeing that ADB is enabled? This is what makes some devices rather straight forward to install custom firmware that block all the cloud shenanigans, so I’m not sure why they’re painting this as a horrifying thing. Of course, you’re broadcasting your map data to the manufacturer so that you can use their shitty app.

    The part saying that it had full root access and a kill-switch is a bit worse, but still… It doesn’t have to be like this. Shout-out to the people working on the Valetudo project. If you’re interested in getting a privacy-friendly robot vacuum, have a look at their website. It requires some know-how, but once it’s done, you know for sure you don’t need to worry about a 3rd party spying on you.

    • MountingSuspicion@reddthat.com
      link
      fedilink
      English
      arrow-up
      10
      ·
      14 days ago

      Just checked out Valetudo. Gotta love the FOSS community. Can I ask if you’ve used it? If so, which vacuum did you set it up on?

      • andrew0@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        2
        ·
        edit-2
        14 days ago

        I have a friend who set up a Dreame L10s Ultra. I helped them solder the breakout board, and was there when they flashed the new firmware. Relatively straight forward! Just follow the guide on the website and you should be good.

        The robot is now accessible only on the local network, and they got it working in Home Assistant. The only feature that is missing now is direct camera view, which the original robot had. Basically, you could get a live feed of the robot’s camers at any time. Looked fun, but it was not necessary.

    • Monument@lemmy.sdf.org
      link
      fedilink
      English
      arrow-up
      4
      ·
      14 days ago

      I commented elsewhere, but I once had a soundbar that just had a no password ssh login. It was one of those ‘connect to your WiFi’ to stream music through models and for whatever reason, after connecting it to my WiFi, it continued to broadcast the publicly joinable setup network.

      SSH was open to both the unsecured and secured networks, so anyone within WiFi distance of the device could have gained root control of it. Or if I had a sufficiently weak network setup, anyone online could have taken control of it.

  • Basic Glitch@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    39
    ·
    13 days ago

    “Someone — or something — had remotely issued a kill command,” he wrote.

    “I reversed the script change and rebooted the device,” he wrote. “It came back to life instantly. They hadn’t merely incorporated a remote control feature. They had used it to permanently disable my device.”

    In short, he said, the company that made the device had “the power to remotely disable devices, and used it against me for blocking their data collection… Whether it was intentional punishment or automated enforcement of ‘compliance,’ the result was the same: a consumer device had turned on its owner.”

  • imetators@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    36
    ·
    14 days ago

    Am I too dumb to understand why sending cartographer data is wrong?

    His model is iLife A11 that has Lidar. He probably has an app that is used to control robot and shows cleaning progression. Vac 100% Lidar’d his entire home and sent data to create map in the app.

    How in the fuck he thinks it is getting that map? If his ass so smart to find a killswitch and reverse it, how come he doesn’t grasp that map data is sent to a server though which he ca use vac app? Like in what world is it not obvious?

    Not even gonna discuss about TOS he signed, or that it is general cheap brand cheap but super smart model for it’s price.

    Unless some FOSS firmware and software is installed, that thing most certainly will ping back home every chance it gets.

    Sidenote: My TV now is offline cause when it kept calling home (ove 60% of my pi-holes querries of all time was TV), it would freeze due to pi-hole block. Once set offline - issue is gone. I also know my robo vac is pinging, but at the same time if I block it, I’ll lose app controls which I wont do. Sadly, my vac doesn’t support Valetudo.

    • Reginald_T_Biter@lemmy.world
      link
      fedilink
      English
      arrow-up
      15
      ·
      14 days ago

      I think yes, to your first question. Couldn’t it just crunch the lidardata locally to feed into cartographer, I don’t understand why you don’t understand that this is the issue.

      • Wispy2891@lemmy.world
        link
        fedilink
        English
        arrow-up
        9
        ·
        14 days ago

        afaik the lidar data is crunched locally, then sent to the remote server for easy consumption

        when those vacuums are flashed with valetudo, they can still make the map with lidar without internet connection

        • Reginald_T_Biter@lemmy.world
          link
          fedilink
          English
          arrow-up
          1
          ·
          13 days ago

          Exactly. So it’s pure surreptitious data exfiltration. They only reason they send the data back is because they can, and there is value for them.

    • Basic Glitch@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      8
      ·
      edit-2
      13 days ago

      Worst case, it’s sold to ICE or some other fascist regime.

      Every single government that has a contract with Palantir for Gotham or even whatever the fuck they’re doing with the UK NHS data, is reason enough to know this kind of shit is a bad idea. The entire existence of Palantir makes this kind of shit a bad idea by default.

      Even if they’re not using lavender or where’s daddy (yet), I do not want them to have a detailed layout of my home, in addition to all the other information already being collected.

      If the day comes when any government needs to crush civil unrest, Palantir gives them an easy button to weaponize your data against you.

  • madjo@feddit.nl
    link
    fedilink
    English
    arrow-up
    24
    ·
    14 days ago

    That is why I have denied internet access for my robot vacuum cleaner. Xiaomi doesn’t need to know the blueprint of my house, and if it can’t connect to the internet, there’s no need for firmware updates.

    I’ll start the thing by pressing the button at the top.

    • ohshit604@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      2
      ·
      14 days ago

      I’m unfamiliar with Xiaomi “smart” products, I assume there is an app to control the vacuum, if it does have an app does it still work for you strictly behind your LAN network?

      • madjo@feddit.nl
        link
        fedilink
        English
        arrow-up
        10
        ·
        14 days ago

        It does have an app, but I’m not using it. It also doesn’t work, because it can’t find the vacuum on the network.

        The device has 2 buttons: “turn on/off” and “find home”, those are the only two I need.

        A vacuum doesn’t need internet access.

        • ohshit604@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          5
          ·
          edit-2
          13 days ago

          Did a little digging, not sure if you’re someone who self hosts (or owns Homekit enabled devices) but Homebridge appears to offer plugins for Xiaomi smart vacuums this will give you more “smart” functionality without the cost of exposing it to the internet.

          Shame they don’t offer that flexibility natively.

        • sugar_in_your_tea@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          3
          ·
          14 days ago

          It would be nice if it had Bluetooth or something to control from the app. There’s no reason I’d want to run the vacuum outside a defined schedule when not at home, so the only useful feature of an app is local config.