TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

When baby monitors fail to be smart

46 pointsby kushtiabout 7 years ago

9 comments

kees99about 7 years ago
I have a problem with those two &quot;vulnerabilities&quot; listed:<p>- Available Serial Interface (referring to easy-to-solder console port pads on PCB, accessible once you tear device apart);<p>- Weak Default Credentials (referring to weak root password that is only ever accepted via serial console).<p>Life-span of a baby monitor is couple of years, by definition. After that, this hardware could either become a cool easy-to-tinker Linux device, or e-waste.<p>Researchers at sec-consult seem to think e-waste option is better, or at least it&#x27;s a necessary evil to deter those pesky hackers who sneak near your child&#x27;s crib, armed to their teeth with soldering irons and screwdrivers.
评论 #16438922 未加载
评论 #16440405 未加载
stuaxoabout 7 years ago
Haven&#x27;t RTFA yet, but read a lot of internet of shit.<p>When I bought a baby monitor I made sure it was dumb, because why would I trust some random company with data from a camera in my house?
评论 #16440968 未加载
评论 #16437569 未加载
_pmf_about 7 years ago
A baby monitor having accessible UART ports on the board has the same security implications as a PC having a CD-ROM drive.<p>Actually, considerably less.
评论 #16437565 未加载
kwhitefootabout 7 years ago
Just don&#x27;t use a baby monitor.
评论 #16438253 未加载
评论 #16438038 未加载
评论 #16437991 未加载
评论 #16441779 未加载
评论 #16438002 未加载
thinkMOARabout 7 years ago
So how does this differ from other camera security concerns&#x2F;complaints that get posted regularly? Because its called a baby monitor?
评论 #16437545 未加载
JeanMarcSabout 7 years ago
&gt; trading privacy for convenience<p>That’s the important sentence to me. That’s where we all gone wrong in my opinion.
ateesdalejrabout 7 years ago
&gt; it is possible to identify the following very weak 4-digit default credentials<p>And we all know what the password is... &quot;1234&quot;
jasonmaydieabout 7 years ago
why does a baby monitor have to go through the cloud? you aren&#x27;t supposed to be more 0-50 feet from your baby.
评论 #16439845 未加载
tzsabout 7 years ago
What are some good solutions to authentication for IoT devices?<p>There&#x27;s nothing wrong in principle with using a certificate (other than it being overly complicated...there&#x27;s a reason we aren&#x27;t all using client certificates to authenticate with our email server, Twitter, Facebook, etc). Just as there is nothing wrong in principle with using a user&#x2F;password scheme.<p>Both certificates and user&#x2F;passwords suffer from the same serious problem: how do you change them on the device? If you don&#x27;t have a way to change them, all someone has to do is learn the factory default and game over. (Even if you provide a way to change them there is the issue of how to make sure people actually change them, which is a whole other problem).<p>IoT devices often do not have a good interface on the device itself that you could use to change a user&#x2F;password (let alone enter a new certificate!).<p>You could include Bluetooth in the device, and provide a configuration application that the user runs on their phone. If the device does not otherwise need Bluetooth that is going to raise the cost a little, and if the device does not otherwise need a mobile app making people get one just to set the thing up is going to seriously annoy many.<p>What I would like to see is this:<p>1. Every IoT device (and every non-IoT device, for that matter, for reasons given below) should have at least one of: (A) A USB port that you can plug a thumb drive into, (B) A USB port that you can use to connect the device to a computer, or (C) some type of SD card port. I think that USB is cheap enough now that it would not cost much to add it.<p>2. If you plug a FAT or FAT32 formatted thumb drive or SD card into the device, it reads and applies configuration information from a file on the drive or card. There should be a convention established for the naming and location of configuration files so that multiple devices from multiple vendors can all have configuration files on the same drive.<p>3. If you plug the device into a computer via USB, the device shows up as a FAT or FAT32 formatted drive with its current configuration in files on that drive. You can edit them to change the configuration.<p>4. When you connect a thumb drive or insert an SD card and there is a &quot;DOCS&quot; directory on it, the device makes a subdirectory in that named after itself, and in that directory writes a copy of its user manual and other documentation. If there is a &quot;LOGS&quot; directory, it should do a similar thing, but with any logs it keeps. If there is an &quot;INFO&quot; directory, do a similar thing but with information about the device, such as model number, serial number, and other such stuff useful to have if you need to contact customer service.<p>5. This mechanism could also be used to provide firmware updates to the device.<p>(#4 and #5 are why I want this everywhere, not just IoT).<p>Another issue with IoT devices, once you have figured out how to change authentication information, is how to keep that safe? For instance, I&#x27;m making a motion detecting bird camera to take photos of the birds that stop by for the food I leave out. If I want it to use my home wifi to upload photos...it needs my home wifi credentials.<p>But it will be outside. If someone steals it, they have my credentials! (I&#x27;m currently using a Raspberry Pi, so they could just steal the SD card...or if they came prepared they could just borrow it, copy it, and put it back, and I might not even find out about it).<p>My current thoughts are to have the thing come up after boot offering its own wifi network. I can connect to that from my computer, and start the bird cam software, which can ask for my wifi credentials. It can then stop offering a wifi network and join mine, keeping the credentials only in RAM.<p>Still vulnerable, but it would then take an attack more sophisticated than simply stealing it, or cloning the SD card.
评论 #16438852 未加载
评论 #16439007 未加载