Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

If you can root the device and replace the firmware, sure. Or do extremely difficult hardmodding to tap the data buses, perhaps.

But both of those approaches are very difficult and resource-intensive. The first requires many, many hours of reverse engineering to find a security hole which allows you to write unsigned firmware to the device (or find a way to sign your own firmware and then upload it), then hack the firmware to do your snooping (good luck if the firmware updates are encrypted!).

The second is so fiddly and awkward, I've never heard of anyone actually doing it.



Okay I guess that makes sense. If I'm understanding you could get that information but you don't have access to the memory addresses unless you crack the firmware? Though in the case of Mozilla, wouldn't that be open so this wouldn't be that big of an issue?


> you could get that information but you don't have access to the memory addresses unless you crack the firmware.

Correct, from the moment the IoT device puts a packet on the line, it is encrypted end to end. This is a fundamental aspect of TLS to prevent snooping. To view unencrypted data, you have to access it prior to being sent out on the network which requires you to gain root privileges on the IoT device.


That makes sense. Thanks for the explanation!




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: