Wireless Carriers, Hardware Companies Use Flimsy IOT Security To Justify Attacks On Right To Repair Laws

from the lobbyists-within-lobbyists dept

A few years ago, anger at John Deere's draconian tractor DRM birthed a grassroots tech movement. The company's lockdown on "unauthorized repairs" turned countless ordinary citizens into technology policy activists, after DRM and the company's EULA prohibited the lion-share of repair or modification of tractors customers thought they owned. These restrictions only worked to drive up costs for owners, who faced either paying significantly more money for "authorized" repair, or toying around with pirated firmware just to ensure the products they owned actually worked.

The John Deere fiasco resulted in the push for a new "right to repair" law in Nebraska. This push then quickly spread to multiple other states, driven in part by consumer repair monopolization efforts by other companies including Apple, Sony and Microsoft. Lobbyists for these companies quickly got to work trying to claim that by allowing consumers to repair products they own (or take them to third-party repair shops) they were endangering public safety. Apple went so far as to argue that if Nebraska passed such a law, it would become a dangerous "mecca for hackers" and other ne'er do wells.

Wary of public backlash, many of these companies refuse to speak on the record regarding their attacks on consumer rights and repair competition. But they continue to lobby intensely behind the scenes all the same. The latest example comes courtesy of the "The Security Innovation Center," a new lobbying and policy vehicle backed by hardware vendors and wireless carriers. The group issued a new "study" this week that tries to use the understandable concerns over flimsy IOT security to fuel their attacks on right to repair laws.

The study starts out innocuously enough, noting how they hired Zogby to run a poll of 1015 users on consumer privacy and security concerns in the internet of broken things era:

"Almost two-in-three American consumers said that the explosive growth of Internet-connected products makes them more concerned about their privacy and security, the survey of 1,015 Americans found. And only 1 in 3 Americans expressed confidence that people they know would not be affected if one of their devices was hacked."

Which is understandable. Especially in an era where countless IOT companies value gee whizzery over privacy or security. But it doesn't take long for the real purpose of this study to reveal itself--demonizing efforts to break the monopoly over repair:

"These concerns have placed a focus on security when getting Internet-enabled products fixed: 84 percent value the security of their data over convenience/speed of service....More than 80 percent expect repair professionals to both provide a warranty for their repairs and demonstrate that they are trained or certified to fix their specific product. Further, 75 percent value warranty protections over convenience and 70 percent feel most comfortable having their products fixed by a manufacturer or authorized repair shop. Yet, only 18 percent can determine if an electronics repair shop is protecting their security and privacy."

In other words, the not so subtle message being sent by hardware vendors and wireless carriers is this: don't allow third-party or user self repair because you'll wind up hacked, or worse. That matches the same message being sent by Verizon, Apple, Microsoft and others as they try to convince the public that being able to access less expensive third-party repair vendors (or repair your own devices yourself) will result in reduced security and privacy, dogs and cats living together and the world being ripped off its axis.

Again, the "Security Innovation Center" isn't much of a center at all. It's basically just a lobbying and policy vessel created by a New York PR firm (Vrge), backed by other, existing lobbying and policy vessels (CTIA, CompTIA, NetChoice). It's such a thin veneer, the Center's press release lists its "executive director" as Josh Zecher, the guy who founded the PR outfit running the campaign. It's basically just the Russian nesting doll equivalent of lobbying and policy, all to obfuscate Apple's, Verizon's and other companies' blatant disdain for repair competition and consumer rights.

Hide this

Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.

Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.

While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.

–The Techdirt Team

Filed Under: anti-circumvention, drm, iot, lobbying, ownership, right to repair, security


Reader Comments

Subscribe: RSS

View by: Time | Thread


  • icon
    Ninja (profile), 5 Mar 2018 @ 6:10am

    Hmm, if anything these security problems are the sole responsibility of the industry itself to the point that only custom made software or DIY hardware changes will ever fix those problems because said manufacturers couldn't care less. And I'd further argue that software and hardware should be completely free for whoever wants to pop it open and scrutinize it because we can't trust the industry to do their job properly.

    Careful with this piece of argument dear companies. I hope somebody uses it to show the industry can't be trusted with repairs and patches by itself and thus we need strong rights to repair and no circumvention restrictions of drm and whatsoever.

    link to this | view in chronology ]

    • identicon
      Anonymous Coward, 5 Mar 2018 @ 11:39am

      Re:

      yeah it seems like it is the argument for open sourcing all code.

      link to this | view in chronology ]

  • identicon
    kallethen, 5 Mar 2018 @ 6:29am

    If anything, the fact that there is such a disaster of security in IoT devices makes me more wanting to be able to adjust it myself. As the saying goes, "If you want something done right, do it yourself."

    link to this | view in chronology ]

    • identicon
      MathFox, 5 Mar 2018 @ 6:38am

      Something done right

      Do it yourself or choose someone that does it right for you.

      If a manufacturer does not let you verify the quality of his work, it's likely shoddy (or worse).

      link to this | view in chronology ]

  • identicon
    Anonymous Coward, 5 Mar 2018 @ 6:53am

    Abolish Copyright

    Promote freedom.

    link to this | view in chronology ]

    • identicon
      Anonymous Coward, 5 Mar 2018 @ 8:27pm

      Re: Abolish Copyright

      Without copyright why would anybody make tractors?

      link to this | view in chronology ]

  • identicon
    Anonymous Coward, 5 Mar 2018 @ 7:05am

    Lets assume I own a very large tractor.

    Why would I own such?

    Most like it is to do productive work.

    If my tractor does not work and I can not repair it, I loose money.

    If I own a tractor that cost me money why would I own it?

    There is a local park which has a train steam engine in it. The engine was order from the factory in 1948 and delivered in 1952 and retired in 1954.

    Why would a railroad retire and give away a major piece of equipment that should have a service life of 20 years after 2 years? Would the 1952 coal strike have something to do with this? No coal equals no run equals useless useless. The railroad replaced the steam engine with a diesel electric because of coal cost and coal unavailability. There was simply no coal to be had.

    Why would one replace a new John Deere tractor with an older model or a foreign import. If you can not fix it it is useless. Just a big mound of useless scrap iron. How many tractors that can not be repaired will John Deere then sell before John Deere goes bankrupt? How many steam engines did Baldwin sell after the coal strike? None.

    link to this | view in chronology ]

    • identicon
      Anonymous Coward, 5 Mar 2018 @ 8:23pm

      Re:

      If my tractor does not work and I can not repair it, I loose money.

      Not being able to repair your tractor yourself is not the same as the tractor be non-repairable. John Deere wants to keep you from repairing it yourself so that they can make money by repairing it for you.

      link to this | view in chronology ]

  • icon
    Anonymous Anonymous Coward (profile), 5 Mar 2018 @ 7:30am

    Who built in the risk?

    Isn't the bigger risk in the way IoT companies collect and share information, often on the sly? Fixing something and making a mistake wouldn't cause more sharing, but it might make a device more vulnerable to hackers. Of course, if the IoT companies didn't set their model up to leak private information to themselves, those same hackers would not have the same paths to take advantage of.

    link to this | view in chronology ]

  • identicon
    Rich Kulawiec, 5 Mar 2018 @ 7:42am

    And yet...

    ...there are ignorant newbies who think driverless vehicles are a good idea -- conveniently ignoring the fact that they're just another thing in the IoT. They're not magically exempt from this dumpster fire.

    link to this | view in chronology ]

    • identicon
      Anonymous Coward, 5 Mar 2018 @ 7:46am

      Re: And yet...

      You greatly underestimate just how much people do in fact want someone telling them what to do.

      People desire leadership and inclusion. This means loss of liberty and rights.

      World history in a nutshell. Just like how all the people in Nazi Germany were Nazis.

      link to this | view in chronology ]

      • identicon
        Ding, 5 Mar 2018 @ 8:45am

        Re: Re: And yet...

        link to this | view in chronology ]

      • identicon
        Anonymous Coward, 5 Mar 2018 @ 10:15am

        Re: Re: And yet...

        What does that have to do with the fact that driverless vehicles will be the target of attacks and neither the manufacturer nor government seems to be doing anything about stopping it. I imagine their concern might ratchet up a bit after they are inconvenienced by these rouge pirate vessels.

        link to this | view in chronology ]

        • icon
          An Onymous Coward (profile), 5 Mar 2018 @ 11:15am

          Re: Re: Re: And yet...

          You can never be too careful when dealing with rouge pirates. You may end up with a whole new look.

          link to this | view in chronology ]

    • icon
      OA (profile), 5 Mar 2018 @ 8:03am

      Re: And yet...

      ...there are ignorant newbies who think driverless vehicles are a good idea...

      I don't understand the need for an insult, here... I like the idea of a driverless car (I am biased though: I sometimes don't like driving) so as long as I am ultimately in control. Your comment is worthless, as is, but I suspect that in the existing climate, driverless cars will be executed in an irresponsible manner and be hostile to consumers in some way(s).

      conveniently ignoring the fact that they're just another thing in the IoT. They're not magically exempt from this dumpster fire.

      Please defend this statement.

      link to this | view in chronology ]

      • identicon
        Rich Kulawiec, 5 Mar 2018 @ 10:35am

        Re: Re: And yet...

        "Please defend this statement."

        Have you not been paying attention?

        There are insecure TVs.
        There are insecure fitness watches.
        There are insecure car washes.
        There are insecure "smart" locks.
        There are insecure pacemakers.
        There are insecure sex toys.
        There are insecure speed cameras.
        There are insecure vacuum cleaners.
        There are insecure toys.
        There are insecure safes.
        There are insecure toasters.

        And yet, somehow, amazingly, incredibly, the same group of people who are responsible for all of these are going to avoid making the same set of mistakes with vehicles -- because gosh, driverless vehicles are magically different, and so what has failed everywhere else with entirely predictable and depressing monotony is going to succeed here.

        To borrow a line from Theo de Raadt, anyone who thinks that will happen is deluded, if not stupid.

        link to this | view in chronology ]

        • identicon
          Thad, 5 Mar 2018 @ 10:53am

          Re: Re: Re: And yet...

          the same group of people who are responsible for all of these

          I wasn't aware that Uber made insecure sex toys and Google made insecure vacuum cleaners. Do you have a citation for that?

          because gosh, driverless vehicles are magically different

          Nothing magic about it. Cars are different because they are far more expensive to produce than any of the objects you've mentioned, and because security vulnerabilities in cars are potentially fatal.

          If someone compromises your TV, they can use it to spy on what you're watching.

          If someone compromises your self-driving car, they can use it to kill you.

          If you don't see the difference in risk assessment between those two outcomes, then you're the one who's deluded or stupid.

          link to this | view in chronology ]

          • identicon
            Anonymous Coward, 5 Mar 2018 @ 11:43am

            Re: Re: Re: Re: And yet...

            not to mention there is oversight in the vehicle industry that does not exist in the vacuum and sex toy industry.

            link to this | view in chronology ]

          • identicon
            Anonymous Coward, 5 Mar 2018 @ 1:10pm

            Re: Re: Re: Re: And yet...

            "I wasn't aware that Uber made insecure sex toys and Google made insecure vacuum cleaners. Do you have a citation for that?"

            I said "same group". And I stand by that characterization.

            "Cars are different because they are far more expensive to produce than any of the objects you've mentioned, and because security vulnerabilities in cars are potentially fatal."

            True (as far as it goes) but neither of these make them magically immune to the same kinds of problems that permeate the entire IoT ecosystem. (They're also far more complex than most of the things I listed, which means of course that they're far more susceptible.)

            "f someone compromises your self-driving car, they can use it to kill you."

            Yes, but: that's a naive, best-case scenario: it's an extraordinarily optimistic outcome that is unsupported by our collective experience with the IoT to date.

            When, not if, someone compromises a particular make/model of self-driving car, then -- just as we've seen with other IoT devices -- the most likely outcome will be that they have ALL of that particular make/model, i.e., a class breach.

            Think about the consequences of that. Then talk to me about risk assessment.

            link to this | view in chronology ]

        • icon
          OA (profile), 5 Mar 2018 @ 12:43pm

          Re: Re: Re: And yet...

          Could you not express everything in rant form?

          You claim driver-less cars are like other internet of broken things. EXPLAIN! As in why do you say that? In non-self-evident terms.

          Will the cars require the internet to function? Can they be controlled by remote? Can they be remotely shut down by force?... IOT is not the same as yelling BOO! I want a driver-less car, perhaps I shouldn't.

          link to this | view in chronology ]

    • identicon
      Thad, 5 Mar 2018 @ 10:47am

      Re: And yet...

      While there are certainly major concerns about the security of driverless cars, you're conflating things that, despite cursory similarities, are actually significantly different.

      IoT devices have poor security because they are cheaply made by dodgy companies, and because the damage they do is typically external: if Alice sells Bob an IoT toaster, and Mallory pwns it and uses it as part of a DDoS attack against Carol, then Alice and Bob are unaffected. Bob probably doesn't even know that his toaster is part of a botnet; as far as he knows, his IoT toaster is working fine, and he has no disincentive to buy from Alice (or other cheap, dodgy vendors) in the future.

      The first distinction between that scenario and driverless cars is, driverless cars aren't made cheaply by dodgy no-name vendors. They're prohibitively expensive, such that only established, big-name companies are able to manufacture and deploy them at scale.

      The second distinction is that presumably when you mention security threats to driverless cars, you're not talking about externalities; you're not talking about a car merely joining a botnet, you're talking about an attacker causing a car accident.

      That's not an externality. That's not some third party Carol being harmed without car buyer Bob's knowledge. That's Bob being harmed. The buyer.

      The cost/benefit analysis is completely different. If you're a fly-by-night operation selling IoT toasters, your incentive is to minimize costs. So what if they're not secure? Your customer probably won't even know that.

      If you're a major tech company selling driverless cars, your incentive is to minimize accidents. Any car accident is harmful to your brand; any major security vulnerability is potentially devastating. Not only will your customers be put off your product, but there will be massive negative press coverage, and lawsuits. Look how badly VW's cheating on emissions turned out for the company -- an incident where a security vulnerability actually caused fatalities would dwarf that scandal.

      Alice doesn't have any financial incentive to make her toasters secure against third-party attackers. Google has a major financial incentive to make its cars secure against third-party attackers.

      This is not to say there will never be security vulnerabilities in driverless cars. This is not to say that Google, Uber, Apple, et al shouldn't be very, very careful. But your suggestion that the current security problems in IoT devices presage comparable security problems in driverless cars is a false comparison.

      link to this | view in chronology ]

      • identicon
        Anonymous Coward, 5 Mar 2018 @ 10:56am

        Re: Re: And yet...

        The first distinction between that scenario and driverless cars is, driverless cars aren't made cheaply by dodgy no-name vendors.

        Neither was the Jeep Cherokee, in theory. (If you own one, be sure to install the latest software updates.)

        link to this | view in chronology ]

        • identicon
          Anonymous Coward, 5 Mar 2018 @ 11:03am

          Re: Re: Re: And yet...

          Cars have been recalled for mechanical faults that were safety issues as well, and that is despite the fact that then can be baked rattled and soaked in holistic tests to see what breaks, while software can only be tested detail by detail.

          link to this | view in chronology ]

          • identicon
            Anonymous Coward, 5 Mar 2018 @ 1:57pm

            Re: Re: Re: Re: And yet...

            The article was light on detail. Was that one mistake in an otherwise secure system, or was the whole thing awful? I lean toward the latter when I see people can cut the brakes through the cell connection.

            I don't have faith that a regulator can find every software bug, but I'm hopeful they might notice the brake controller is connected to the wireless network.

            link to this | view in chronology ]

      • identicon
        Rich Kulawiec, 5 Mar 2018 @ 1:54pm

        Re: Re: And yet...

        This analysis is fine, as far it goes. The problem is that it doesn't go far enough. Let me comment on a couple of points:

        "That's not an externality. That's not some third party Carol being harmed without car buyer Bob's knowledge. That's Bob being harmed. The buyer."

        And everyone else in the car with Bob. And everyone else that Bob's car hits. And everyone in all the other models of this car with all the other Bobs and everyone in all the other cars those hit. And all the pedestrians and everyone else.

        If you're going to tell me that this kind of class breach is impossible in driverless vehicles even though we've seen it in myriad other IoT devices (and servers) (and routers) (and laptops) (and CPUs) (and smartphones) (and SCADA) (and pretty much every other computing device), then that's an extraordinary claim. Where is the extraordinary proof?

        "But your suggestion that the current security problems in IoT devices presage comparable security problems in driverless cars is a false comparison."

        It's actually a very easy and obvious comparison, because the people working on these vehicles are very intent on repeating the failures of the rest of the IoT ecosystem. They're working hard on it. They're spending money and time on it. And you know, we can already see some of the signs that they're succeeding:

        https://arstechnica.com/cars/2018/02/no-one-has-a-clue-whats-happening-with-their-connect ed-cars-data/

        Think about the implications of that. Put the privacy issues aside for a moment and think about what it tells you about the design decisions being made. And think about what it does to the overall system security posture -- which is more than just the vehicles.

        (non-sequitur) I should probably write this up at length, because trying to articulate a complex argument in little snippets really doesn't work that well. But in the interim let me refer you to this excellent piece by Zach Aysan:

        https://www.zachaysan.com/writing/2018-01-17-self-crashing-cars

        He has a slightly different take on it than I do, but I think (not speaking for him) we're roughly on the same page.

        I also have a suggestion -- AFTER you read that piece.

        Sit down and make a back-of-the-envelope estimate of the available attacker budget (a la http://www.schneier.com/crypto-gram-0404.html#4). Then keep in mind the massive asymmetry between attackers and defenders -- that is, we routinely see attackers with only a tiny fraction of defenders' budgets succeed, but succeed massively. (See: 9/11/2001.) So based on the available attacker budget, pick a multiplicative factor that suits you - 100X, 500X, 617X, whatever -- and calculate the defender budget necessary to have a reasonable chance of thwarting attacks.

        It will be a big number. (If it's not, you did it wrong.)

        Nobody is spending that on vehicle security.

        You know what they're spending money on? They're spending it on things that make the vehicles LESS secure. Scroll back up and read the Ars Technica piece again.

        I'll try to write something longer that lays out the argument better. But in the meantime, feel free to stick a pin in this, come back in ten years and tell me I was wrong. I'd be happy to be.

        link to this | view in chronology ]

        • identicon
          Thad, 5 Mar 2018 @ 4:14pm

          Re: Re: Re: And yet...

          If you're going to tell me that this kind of class breach is impossible in driverless vehicles even though we've seen it in myriad other IoT devices (and servers) (and routers) (and laptops) (and CPUs) (and smartphones) (and SCADA) (and pretty much every other computing device), then that's an extraordinary claim.

          It's also a claim I explicitly did not make. My exact words were "This is not to say there will never be security vulnerabilities in driverless cars."

          You're not off to a good start, Rich. Your very first argument, straight out the gate, is with a strawman.

          It's actually a very easy and obvious comparison, because the people working on these vehicles are very intent on repeating the failures of the rest of the IoT ecosystem. They're working hard on it. They're spending money and time on it. And you know, we can already see some of the signs that they're succeeding:

          https://arstechnica.com/cars/2018/02/no-one-has-a-clue-whats-happening-with-their-connec t ed-cars-data/

          That article is about spying on user behavior and selling the data. I find that concerning, but I don't find it surprising; it's Google's entire business model. It's also an entirely separate issue from devices being compromised by third parties.

          Sit down and make a back-of-the-envelope estimate of the available attacker budget (a la http://www.schneier.com/crypto-gram-0404.html#4). Then keep in mind the massive asymmetry between attackers and defenders -- that is, we routinely see attackers with only a tiny fraction of defenders' budgets succeed, but succeed massively. (See: 9/11/2001.)

          Did you just describe 9/11 as "routine"?

          So based on the available attacker budget, pick a multiplicative factor that suits you - 100X, 500X, 617X, whatever

          That sounds an awful lot like "pull a number out of your ass" to me.

          You know what they're spending money on? They're spending it on things that make the vehicles LESS secure. Scroll back up and read the Ars Technica piece again.

          I did. And you know what I noticed? It's not about self-driving cars. It doesn't mention self-driving cars at all. It's about traditional, manually-driven cars that connect to the Internet.

          And you know what? I'm with you. I wouldn't buy one. I won't even turn on Bluetooth in my car; if I want to listen to music from an external player, I use a mini-stereo cable.

          But you just defended your thesis about security vulnerabilities in driverless cars by repeatedly referencing an article that does not mention driverless cars. It's a related issue, but it's not the same thing.

          In much the same way that IoT toasters are not the same thing.

          I share your concern that an attack from the other side of the world could compromise driverless cars and cause collisions. But your examples and comparisons are poor.

          link to this | view in chronology ]

      • icon
        orbitalinsertion (profile), 6 Mar 2018 @ 2:06pm

        Re: Re: And yet...

        There is a huge difference, for sure, but your not-driverless car is insecure already.

        Giant corporations with insecure products are certainly not fly-by-night, but they are at least partly dodgy. Whether or not you consider some of their devices to be "IoT" or not, they are insecure (possibly by design) and networked. Just, idk - Google, Cisco.

        I realize that some of you are arguing against some extreme claims, but you are, at the same instance, making somewhat extreme assumptions yourselves.

        Also, driverless cars are not yet in production. That rather tends to change things. Will these cars be magically better than current and historical automobiles?

        link to this | view in chronology ]

  • identicon
    Anonymous Coward, 5 Mar 2018 @ 7:54am

    It is weird seeing CompTIA (a supposed industry certification organization,) up there with the real bad hombres at CTIA and NetChoice. And then I remember how they tried to lobby the government to revoke all CompTIA "for-life" certifications and switch them to the three year gravy train certs before the community managed to persuade them to keep all pre-2011 certs "for-life" and just stick the new guys with the gravy train certs. I wish this company (which we all pay for, due to its 501(3)c status,) would go out of business. CompTIA is seen, in the industry, as a basic cert and usually derided compared to SANS or CISSP (though, CISSP is an ass organization too.)

    If CompTIA wants to fix this shit, require the companies that make IOT devices be as open and as secure as possible...if you sell your stuff, you must either support it or provide the firmware/software source to your users so they can support it. Don't lock it down.

    link to this | view in chronology ]

  • icon
    Ed (profile), 5 Mar 2018 @ 8:01am

    So, then, we can sue Apple, Verizon, et al, when we get hacked? Class action them?

    link to this | view in chronology ]

    • identicon
      Anonymous Coward, 5 Mar 2018 @ 11:48am

      Re:

      No. They are correct that the IoT is a crap-shoot that will allow hacking if the right to repair law is passed. They are also conveniently ignoring the fact that IoT will still be a crap-shoot if the right to repair law is not passed.

      link to this | view in chronology ]

  • identicon
    Anonymous Coward, 5 Mar 2018 @ 8:13am

    The only security that the supporters of this are concerned with is the security of a continuing income from their customers.

    link to this | view in chronology ]

  • identicon
    Anonymous Coward, 5 Mar 2018 @ 8:55am

    "Security Innovation Center"

    LOL - more like Bullshit Innovation Center

    link to this | view in chronology ]

  • identicon
    Anonymous Coward, 5 Mar 2018 @ 8:55am

    Mecca for hackers

    Lots of cities try to market themselves as a new Silicon Valley, with little success. Being a Mecca for hackers would be great for Nebraska's economy.

    link to this | view in chronology ]

  • identicon
    Anonymous Hero, 5 Mar 2018 @ 9:27am

    Circular Logic?

    "Almost two-in-three American consumers said that the explosive growth of Internet-connected products makes them more concerned about their privacy and security"

    So we should only trust the vendors whose crappy products convinced two-third of consumers to be concerned about their privacy and security?

    link to this | view in chronology ]

  • identicon
    Anonymous Coward, 5 Mar 2018 @ 9:44am

    "don't allow third-party or user self repair because you'll wind up hacked".

    I don't think this is quite correct. While they are posing it in that form, the real culprit is that it prevents people from finding out the security holes they have. So instead of fixing the problem, it is allows them to force their customers heads into the sand as well.

    link to this | view in chronology ]

    • identicon
      Anonymous Coward, 5 Mar 2018 @ 10:18am

      Re:

      Or - you are pre-hacked by the original manufacturer who installed their own malware to steal from you.

      link to this | view in chronology ]

  • icon
    orbitalinsertion (profile), 5 Mar 2018 @ 10:22am

    I can fully determine so often that i assume !00% of products i don't even know about come from an OEM or software vendor whose only concern over my privacy is that they know everything possible about me and have no regard for security.

    The only downside i can imagine for 3rd party repair other than a poor job or failure is that they accidentally increase the security of a device by breaking something. If i send it to them with my data on it, i am an idiot, so that vector is ignored. Sure, some repair outfits or guys may do something evil, but i don't see how the same sort could not be working for the oh-so-trustworthy original vendor, so i find this point moot also.

    Holding an invisible watermelon does not make your argument valid, The Security Innovation Center. Also, your entire cake is clearly a lie.

    link to this | view in chronology ]

  • identicon
    MikeOh Shark, 5 Mar 2018 @ 11:49am

    warranties

    If companies want customers to use them as a repair source, all they have to do is lengthen their warranties. Everyone wants their product repaired if it's not going to cost them.

    We need to get a politician, if their are any that haven't been bought off yet, to add riders to every bill prohibiting right to repair that lengthen warranties to 5 years parts and labor and 10 years software.

    link to this | view in chronology ]

  • icon
    ECA (profile), 5 Mar 2018 @ 12:07pm

    dONT GIVE YOURSELF A HEADACHE

    "75 percent value warranty protections over convenience and 70 percent feel most comfortable having their products fixed by a manufacturer or authorized repair shop."

    I have come to the conclusion that in the First warranty period I will TRY to destroy my products..without going OVER the basic restrictions of the product.
    30 days to the Local store
    90 days to the Seller/distributor..
    1 tear to the manufacturer..
    Or what ever adds up to THEM PAYING TO GET IT FIXED OR A NEW PRODUCT..

    best company for this..HARBORFRAIGHT..they have a no nonsense warranty.. even on CHEAP PRODUCTS..

    As convoluted as what they are saying is...PRIVACY HAS NO MEANING ON TOOLS.. ANd I dont need my DEVICES, EVER, sending random data to HOME BASE..
    Gizmodo did this, a Connected home...and watching more then 6 devices all sending data to a Router/modem, for 1 year..it got real stupid. Even setting it up, most routers only do 4-6 devices(not said on the box)..and the AMOUNT of data (even a small home) can send with SMART devices, is HUGE..and you will NOT like CAPS.. DEVICES SENDING DATA OUT RANDOMLY, even the Coffee maker..(WHY)..Interlinking some devices (NOT EASY) to work together.. Computer and REMOTE controls..AND THINKING, that a SMART person setup the networking protocols in ANY OF THESE PRODUCTS..and nothing was DRM/PROPRIETARY.. In your dreams..

    link to this | view in chronology ]

  • identicon
    Anonymous Coward, 5 Mar 2018 @ 12:34pm

    IOT in driverless vehicles opens up a new attack vector for russian meddling in our elections. On election day, they will simply tell all vehicles to run around in circles but never go anywhere. This is another reason mail in ballots are better.

    link to this | view in chronology ]

  • identicon
    Dave, 5 Mar 2018 @ 2:52pm

    You know, it would seem that John Deere is only interested in selling huge, expensive bricks and paperweights.

    link to this | view in chronology ]

    • icon
      orbitalinsertion (profile), 6 Mar 2018 @ 2:10pm

      Re:

      They all advertise like they are even remotely cognizant, never mind supportive, of small / family farming. They are not. And there is very little private farming acreage, on the whole.

      link to this | view in chronology ]

  • identicon
    Anonymous Coward, 6 Mar 2018 @ 3:24pm

    So the companies that screwed up the security of the product in the first place now want to ensure that only they can continue to screw it up?

    link to this | view in chronology ]

  • icon
    NaBUru38 (profile), 7 Mar 2018 @ 8:33pm

    So preventing third parties from examining stuff will make things safer?

    Linus Torvalds disagrees.

    link to this | view in chronology ]

  • identicon
    higherground91303, 26 Jul 2018 @ 10:25am

    IoT and Cybersecurity

    Check out this interesting article on IoT and Cybersecurity: https://www.higherground.com/single-post/2018/03/14/IoT-and-Cybersecurity

    link to this | view in chronology ]


Follow Techdirt
Essential Reading
Techdirt Deals
Report this ad  |  Hide Techdirt ads
Techdirt Insider Discord

The latest chatter on the Techdirt Insider Discord channel...

Loading...
Recent Stories

This site, like most other sites on the web, uses cookies. For more information, see our privacy policy. Got it
Close

Email This

This feature is only available to registered users. Register or sign in to use it.