| ▲ | EvanAnderson 2 days ago | |||||||||||||||||||||||||
They're also injecting a CA bundle so, presumably, they're in including their own root of trust so they can sign their own certificate. I'm on mobile and can't easily look at what they're including. Edit: Guess I've got openssl in my termux environment. They're injecting a fake Nest root CA key. Makes sense. I'm shocked it was this easy to subvert the root of trust on these devices. I would expect a newer device would have the trust root pinned in hardware (TPM, etc) and firmware updates would be have been authenticated. | ||||||||||||||||||||||||||
| ▲ | gruez 2 days ago | parent | next [-] | |||||||||||||||||||||||||
>I would expect a newer device would have the trust root pinned in hardware (TPM, etc) and firmware updates would be have been authenticated. All those things cost money in hardware or development time, so companies basically never bother. You're probably also letting all the stories about DRM on phones or whatever color your experience on IOT as a whole. TPM basically makes no sense to implement on anything that's not a PC. Not even phones use it. | ||||||||||||||||||||||||||
| ||||||||||||||||||||||||||
| ▲ | tracker1 2 days ago | parent | prev [-] | |||||||||||||||||||||||||
I'm glad they didn't go that far... I wouldn't want that to get into a home device as long as it requires physical access to bypass/update the security in place. I'm really not a fan of excessively locked down hardware. | ||||||||||||||||||||||||||