this post was submitted on 18 Dec 2024
322 points (97.9% liked)

Technology

60047 readers
2777 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 2 years ago
MODERATORS
 

TP-link is reportedly being investigated over national security concerns linked to vulnerabilities in its very popular routers.

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 0 points 4 days ago (1 children)

An even better way is to leave vulnerable pieces in all parts of the firmware / software stack. E.g. old version of SSH with a known vulnerability or two, old web server, etc. Then just exploit as needed.

[–] [email protected] 3 points 4 days ago (2 children)

The examples you gave are all at the OS level and installing OpenWRT would fix them. The firmware/BIOS level is much more custom and can be susceptible to attacks the OS is completely unaware of (effectively pre-installed rootkits). Hence why I mentioned it may not be enough to install OpenWRT.

[–] [email protected] 2 points 3 days ago (1 children)

You are talking about the boot loader, but even that is pretty standard. There could be hardware exploits in place, sure, but we are mostly talking about a very low margin product and the volume of data that you'd need to retrieve and process to sift out anything useful would be massive and obvious so in general I think this is mostly conspiracy level thinking. Any shenanigans is going to be done in small targeted batches if it's done at all to try to infiltrate specific targets and reduce risk of some curious researcher or enthusiast accidentally stumbling across it and ruining it.

[–] [email protected] 1 points 3 days ago

but we are mostly talking about a very low margin product and the volume of data that you'd need to retrieve and process to sift out anything useful would be massive and obvious so in general I think this is mostly conspiracy level thinking

Bold of you to assume they actually need to make money on these.

They also don't need to sort through data to be problematic; they just need to be able to be remotely disabled or remotely given the order to start sniffing if they are one of the higher end systems that would be used in major infrastructure (that could process at volume).

Sure a researcher could stumble upon something... But closed source, embedded deep in the hardware, etc the number of researchers working at that level is not all that high AFAIK. The research is also from my understanding very very difficult at that level. It would be borderline equivalent to reverse engineering the Intel remote management engine or something.

[–] [email protected] 1 points 4 days ago

Yes of course, you're right. The point I'm making is that wherever you're putting in backdoors, instead of backdoors, you can just leave unlatched vulnerabilities. Gives you solid plausible deniability.