• fubarx@lemmy.ml
    link
    fedilink
    English
    arrow-up
    38
    arrow-down
    1
    ·
    9 months ago

    Many years ago, folks figured out how to crack firmware and find embedded keys. Since then, there have been many technological advances, like secure enclaves, private/public key workflows, attestation systems, etc. to avoid this exact thing.

    Hopefully, the Rabbit folks spec’d a hardware TPM or secure-enclave as part of their design, otherwise no amount of firmware updating or key rotation will help.

    There’s a well-established industry of Android crackers and this sort of beating will keep happening until morale improves.

  • geography082@lemm.ee
    link
    fedilink
    English
    arrow-up
    2
    ·
    edit-2
    9 months ago

    The official webpage is a buy it now bait, it doesn’t even explain what the hell is the device . What it does. Examples. I can’t believe there is press for this kind of money baits.