Ask HN: Probability that Chinese intelligence backdoors consumer electronics?

5 pointsposted 8 days ago
by theoryofx

Item id: 43558523

8 Comments

boznz

8 days ago

For anything important, the manufacturer is going to have a way of getting root so enough front-doors exist already, and how well does that company protect its key?

The bottom line is that if the answer to this question is important, assume yes, and for all threat actors.

uberman

8 days ago

Is the massive problem you see that the Chinese might be doing this or that the company that sold/gave you your device absolutely is?

theoryofx

8 days ago

The massive problem as I see is that Chinese intelligence has the incentive and capability to do this and yet no one seems to be doing anything about it.

firefax

8 days ago

>Maybe the NSA is on this and spends a lot of time reverse engineering consumer electronics but sadly I tend to doubt it.

It's more likely the CIA[0] is exploiting consumer electronics that the NSA -- the Joshua Shulte trial cast a lot of light on the tools folks deploy locally.

There's a LOT more of these exploits that need a human in the loop to deploy -- I'd be more worried about who you let near your electronics than where they were made.

I don't think anyone is deliberately inserting backdoors, but existing business pressures lead to rushed, sloppy code which due to the nature of the internet of things is difficult or impossible to patch.

While these devices may be manufactured in China, they are designed all over -- Korea, Taiwan, and of course, right here in the USA.

Keep in mind how hard it is to avoid "showing your hand" if you have access to information -- even if "The Chinese" (or "The NSA" or any other entity) had some godlike ability to spy, you need a human analyst to listen to the interception. Perhaps a second to translate it. And then someone needs to decide what to do with it. Multiple that by soooo many interesting people having interesting conversations...

I'd focus on things like using E2EE comms, MFA on your accounts, etc rather than some boogieman exploiting nation level tradecraft to own you in particular.

https://en.wikipedia.org/wiki/Joshua_Schulte#Leaks_of_classi...

theoryofx

8 days ago

"these exploits that need a human in the loop to deploy -- I'd be more worried about who you let near your electronics "

These devices are flashed in factories in China and receive firmware updates over the air from China. There's no human required.

"you need a human analyst to listen to the interception. Perhaps a second to translate it."

Have you missed out on this new "AI" thing everyone is talking about?

firefax

8 days ago

>These devices are flashed in factories in China and receive firmware updates over the air from China

The updates often come from US based FTP servers.

>Have you missed out on this new "AI" thing everyone is talking about?

Still need an intelligence officer to act on the data -- takes time.

theoryofx

8 days ago

"The updates often come from US based FTP servers."

Almost never FTP and it's not a significant difference if the Chinese company uploads it to S3 and the device downloads it from there.

user

8 days ago

[deleted]