| ▲ | cbsks 9 hours ago | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Wow. SubC’s software engineering needs some work. They thought the camera’s file system was unencrypted, when it was encrypted. They didn’t know where the keys were to decrypt it. It turned out the key was written unencrypted to a UFS storage device. There was a file written to /mnt/nas/Stills, which indicates that the camera was to writing to a remote file system that wasn’t mounted. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| ▲ | userbinator 8 hours ago | parent | next [-] | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
They thought the camera’s file system was unencrypted, when it was encrypted. Unfortunately this situation is likely to get more common in the future as the "security" crowd keep pushing for encryption-by-default with no regard to whether the user wants or is even aware of it. Encryption is always a tradeoff; it trades the possibility of unauthorised access with the possibility of even the owner losing access permanently. IMHO this tradeoff needs careful consideration and not blind application. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| ▲ | londons_explore 5 hours ago | parent | prev [-] | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
> They thought the camera’s file system was unencrypted, when it was encrypted. Willing to bet plenty of hn readers are unaware of encryption going on at lower layers of the tech stack than they're aware of. For example most hard drives encrypt all data, even when not commanded to, as a way to do 'data whitening' (ie making sure there are even numbers of 0's and 1's in the data stream and not some pattern which might throw off tracking.) The encryption key is simply stored elsewhere in the drive - or nvram or in the firmware. But it means if you extract the physical magnetic surface and read it with the right microscope, you might well find the data encrypted with no available key. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||