[HN Gopher] Void captures over a million Android TV boxes
       ___________________________________________________________________
        
       Void captures over a million Android TV boxes
        
       Author : Katana_zero
       Score  : 141 points
       Date   : 2024-09-14 02:12 UTC (20 hours ago)
        
 (HTM) web link (news.drweb.com)
 (TXT) w3m dump (news.drweb.com)
        
       | nox101 wrote:
       | What's going to be even more fun is when the cars gets hacked,
       | given that their are 100+ (200+) car makers, specially with ev
       | cars (WSJ claimed 140+ makers in China) Bloomberg claimed 500+.
       | I'm not dissing Chinese makers. I'm only sure that like
       | everything there's an exponential curve of how serious companies
       | take security. I'm guessing, of the car makers out there, Tesla
       | and Rivan are near the top since they are new and have people
       | with security experience? I'd expect traditional car makers
       | (Ford, Chevy, Chrysler, Toyota, Honda, Nissan) to all be pretty
       | mediocre. And then I'd expect all the tiny companies to be no
       | different than the tiny companies that made the TVs above.
        
         | 77pt77 wrote:
         | > I'm guessing, of the car makers out there, Tesla and Rivan
         | are near the top since they are new and have people with
         | security experience?
         | 
         | From what little has been leaked, I really doubt Tesla should
         | be enar the top.
        
           | asynchronous wrote:
           | Tesla is amazingly good at software development practices.
           | It's the new Fords that are bricking themselves via updates,
           | not Teslas.
        
             | AlotOfReading wrote:
             | That's not the impression I've gotten from Tesla's
             | software. From the flash wear issue to the numerous vehicle
             | opening issues, to the entire mess of their UDS
             | implementation, there's quite a lot to complain about
             | compared to a hypothetical "best practices" manufacturer,
             | as opposed to the dumpster fire software of other OEMs.
        
               | zoover2020 wrote:
               | It's easy to complain since they're the only manufacturer
               | who opens up your car as an API
        
               | AlotOfReading wrote:
               | None of the issues I mentioned where discovered via API.
               | The flash wear issue was discovered by bricked cars.
               | Security researchers are pretty good at publishing about
               | remote unlock mechanisms for all manufacturers, though
               | Tesla's bounty program has helped. The UDS implementation
               | issues are non user facing and were discovered by reverse
               | engineering. Ford, as an interesting point of comparison,
               | published a competent (if incomplete) open source UDS
               | server.
        
               | mdaniel wrote:
               | I wanted to say thank you, searching for that phrase[1]
               | produced a ton of fascinating reading, including https://
               | mpese.com/publication/uds_fuzzing/SAE_UDS_Paper.pdf
               | "Comparing Open-Source UDS Implementations Through Fuzz
               | Testing" from Apr 2024 which itself linked to a lot of GH
               | repos of the tools they used
               | 
               | I didn't find the Ford one specifically, but I also
               | didn't go surfing through the many pages of results
               | 
               | 1:
               | https://duckduckgo.com/?q=open+source+UDS+server&ia=web
        
               | rapnie wrote:
               | I don't know anything about their practices, but once
               | bumped into this Reddit post by someone claiming to be
               | ex-Tesla and describing exceptionally bad practices.
               | There's no way to verify the claims, they could as well
               | be total misinformation. But I found the link to that
               | Reddit post:
               | 
               | https://old.reddit.com/r/EnoughMuskSpam/comments/99sbwa/f
               | orm...
        
               | numpad0 wrote:
               | Was it Chris Lattner or Francois Chollet that joined
               | Tesla, set up their CI pipeline, and politely left?
        
           | mavhc wrote:
           | Which car makers offer prizes at pwn2own?
        
             | numpad0 wrote:
             | Have _anyone_ seen a Prius crash and reboot while driving?
             | There are plenty viral videos for Tesla.
        
         | wmf wrote:
         | The sorry state of IOT security combined with V2V/V2X really
         | worries me.
        
           | defrost wrote:
           | The S in IoT is for Security; the P is for Privacy.
        
             | mnsc wrote:
             | We need to make SPIT a thing.
        
             | throwawayQQOWJF wrote:
             | This made me laugh hard :D
             | 
             | I'm gonna steal this one from you - it's quite clever IMO
        
               | appendix-rock wrote:
               | It's heavily, heavily recycled. Don't be surprised if you
               | don't get similar accolades!
        
           | sulandor wrote:
           | ever tried shutting down a botnet with wheels?
        
             | blacksmith_tb wrote:
             | We'll just need to set an orange traffic cone on every
             | hood, if Cruise is any indication.
        
         | AlotOfReading wrote:
         | There's actually a strange tradeoff with automotive companies.
         | Security requirements are a big forcing function driving
         | vehicle electronics architectures to modernize and adopt
         | similar security practices to consumer electronics, away from
         | the traditionally developed and profoundly insecure embedded
         | systems of yesteryear. That brings a lot of security features
         | with secure communications, secure boot, signed updates, etc.
         | It also means that all the exploit development that's been done
         | on consumer electronics becomes applicable to vehicle systems.
         | 
         | The teams maintaining all of this usually have a LOC/headcount
         | ratio approaching 1 million too. It's a very different threat
         | model than the old days when every manufacturer had their own
         | systems and trying to craft an exploit required individualized
         | work for all of them.
        
         | BiteCode_dev wrote:
         | Even if the companies took security seriously (which they don't
         | since it rarely affects their bottom line, even in the event of
         | a breach), it's one of the hardest topics in IT, and there are
         | very few people actually competent in it.
         | 
         | With the explosion of the number of those boxes, we added more
         | surface of attack, but the number of good security people
         | didn't increase.
        
         | Veserv wrote:
         | Every company, car or otherwise, has security grossly
         | inadequate for the current and especially the near future
         | threat landscape. Everybody knows everything is easily hacked
         | and companies people tout as exemplars like Apple and Microsoft
         | just keep piling on the abject failures to prove the common
         | wisdom true like it is going out of style. Decades of claimed
         | success followed shortly after by failure after failure should
         | really pound in the lesson: "Fool me once, shame on you. Fool
         | me ten thousand times, shame on me."
         | 
         | You need systems secure against teams commercially motivated
         | attackers with 10 M$+ budgets and tens of full-time
         | professionals working for years. Nobody in commercial IT would
         | even dare to claim they could stop such attacks even though
         | they are regular occurrences these days. If they do not even
         | dare to say they can do it, why on Earth would anybody believe
         | those vendors have, what, accidentally made things better than
         | they think?
         | 
         | Ranking companies by security is like ranking the relative
         | resistance of individual sheets of toilet paper to bullets.
         | Sure, maybe the single ply toilet paper is not as good as the
         | two ply, but neither of them provide objectively useful degrees
         | of protection. And that is just talking about the bare minimum
         | to protect against current threats.
         | 
         | If you can hack every Honda at rush hour to turn off the
         | brakes, slam the accelerator, and drive slightly into oncoming
         | traffic how many people do you think would die in the next
         | minute before anything can be done or people informed to stop
         | driving their cars? 1K? 10K? 100K? 1M? Does Honda survive
         | killing more people than died in most wars? If a criminal
         | organization demonstrates they can and will do it, how much
         | would Honda pay in extortion to avoid being put out of
         | existence and their executives jailed? How much security is
         | adequate to avoid the deaths of thousands to millions?
         | Certainly orders of magnitude more than the 10 M$ attacks that
         | steam roll the "best commercial IT security" available today.
         | Any reasonable number is vastly in excess of what these
         | companies can secure today.
         | 
         | 20 years ago, the hackers were 18 year olds demanding 300
         | dollars from grandmas. 10 years ago, the hackers were 28 year
         | olds founding businesses demanding 10 thousand dollars from
         | small businesses. Now they are 38 year olds managing teams
         | demanding millions from billion dollar companies. Soon we will
         | see them demanding billions if the trends continue for 5-10
         | more years. The software security doomsayers were right, just
         | early. Even Mark Zuckerberg took a decade with huge piles of VC
         | funds to get to a multi-billion dollar valuation; you have to
         | forgive the hacking teenagers who had to bootstrap their
         | criminal enterprises for taking so long.
        
         | MarcusE1W wrote:
         | That makes me think, will we have car theft in the future where
         | someone hacks your self driving car and it makes off on itself
         | in the night? The next day you wake up to notice that your car
         | has left you for someone else?
        
           | pdimitar wrote:
           | Only a matter of time IMO, and quite the short one at that.
           | Car thieves are an adaptive bunch.
        
           | dageshi wrote:
           | I think this is one of the reasons (among many) why self
           | driving cars will largely be robo taxi's.
           | 
           | I'd trust google to maintain the security in a fleet of robo
           | taxi's where cars can be brought in, modified or replaced
           | relatively quickly over Tesla trying to convince individual
           | owners to do the same...
        
           | poikroequ wrote:
           | Self driving cars aren't fully autonomous yet. They
           | occasionally require human intervention to make decisions,
           | which I would guess makes it difficult to steal these cars
           | without being detected. They're constantly cloud connected
           | and so they know where the car is at all times. I imagine
           | these factors may deter theft of self driving cars for a
           | while longer.
           | 
           | Repossessing a self driving car, on the other hand...
        
             | tzs wrote:
             | The plan when having a self driving car help you steal it
             | would _not_ be to have it self-drive from the owner 's home
             | in, say, San Francisco, to a chop shop in Tijuana where you
             | gang awaits, thus requiring it to make a long trip without
             | human intervention.
             | 
             | It would be have it self-drive from the owner's home to
             | someplace nearby not associated with the the thieves to get
             | it out of sight from the owner's security cameras and
             | whatever other security cameras in the neighborhood might
             | be watching where the gang can disable the cloud connection
             | and then transport it by truck or driving it in manual mode
             | to their chop shop.
        
       | Namidairo wrote:
       | I wonder what SoC these are running?
       | 
       | Quite a few of them actually end up configured to preference SD
       | boot over internal flash and/or have easily accessible buttons or
       | shortable pads to trigger bootrom recovery modes.
       | 
       | Which at least, stops them being automatically consigned to
       | e-waste.
       | 
       | Although, customising a LibreELEC image for the dozens of
       | different models of TV box isn't great. Typically involves
       | sorting out the dts for the device and remapping the remote.
        
       | TiredOfLife wrote:
       | It's not Android TV boxes. It's TV boxes running Android.
        
         | rf15 wrote:
         | What's the difference?
        
           | TiredOfLife wrote:
           | Android TV is Google certified with Play store. The other is
           | aosp with halbaked launcher + often bundled malware (actual
           | one)
        
         | oldgradstudent wrote:
         | It's Android (TV boxes), not (Android TV) boxes.
        
         | ajross wrote:
         | So distressing to see this so far down. In fact "Android TV" is
         | an OS product, and not related to this exploit. These are
         | televisions that simply run "Android" as in an open source AOSP
         | build unrelated to a Google product certification.
        
       | mrweasel wrote:
       | > such devices often run on outdated Android versions, which have
       | unpatched vulnerabilities and are no longer supported with
       | updates.
       | 
       | Many of them NEVER received a single update ever. There are so
       | many shady companies producing TV boxes with no plan to ever
       | provide any updates.
       | 
       | Unless one of the larger brands make such a device, I don't see
       | any reason to recommend anything but the ChromeCast or whatever
       | Google calls it now. Or a Roku or an AppleTV, if you swing that
       | way.
        
         | dannyw wrote:
         | A HTPC (with an Intel N100, etc) can work amazingly well too.
        
           | dbcooper wrote:
           | I never got mine working as a chrome cast target. Does that
           | work now?
        
             | puzzlingcaptcha wrote:
             | Not really, google specifically doesn't want you to run
             | chromecast receivers on commodity hardware. There are some
             | hacks and reverse engineering attempts but they are not
             | very reliable.
        
         | kuschku wrote:
         | Nvidia's SHIELD is also okay, probably better than Roku even so
         | far.
        
           | ThatMedicIsASpy wrote:
           | Shields have the best upscalers and will always be the better
           | option for media
        
           | beastman82 wrote:
           | I've had my shield for nearly a decade, gotten updates the
           | whole time. Much faster and better than Roku in basically
           | everything
        
         | giantg2 wrote:
         | It'd be nice if they weren't collecting your data though.
        
         | itsoktocry wrote:
         | 99% of these devices are purchased to view pirated content. You
         | think the guy selling boxes off Craigslist should be providing
         | support? The company who manufactured the computer?
         | 
         | You are responsible to update your device.
        
           | bombcar wrote:
           | An AppleTV is perfectly happy playing pirated content.
           | 
           | Just because you're doing something insane/illegal doesn't
           | mean you can't do it _safely_.
        
           | dlachausse wrote:
           | How are people supposed to install updates that don't exist?
           | This is a massive vulnerability in the overall Android
           | ecosystem.
        
       | _ink_ wrote:
       | How does this work? Are those TV boxes not running behind routers
       | with firewalls?
        
         | usrusr wrote:
         | What makes you assume the vector is an incoming connection?
         | Routers and firewalls won't protect a device from a user lured
         | into installing malware with promises of "free Netflix,
         | completely legal" running off some pirate mirror, or simply
         | wrapping stolen credentials (note how people trying to break
         | into your computers can not always be trusted with legal
         | advice). And neither from simply luring them onto some
         | malicious website (or just getting them to see a malicious ad)
         | in case there's the juicy combination of a media decoder
         | vulnerability with some privilege escalation that can be
         | reached from the decoder.
        
         | 1oooqooq wrote:
         | Firewall? No. Everyone just trust nat. And You'd be surprised
         | how trivial it is to bypass modem nat and reach inside.
        
           | xnyan wrote:
           | I'm not aware of even a single consumer-marketed router that
           | ships without a firewall (often ip/nftables) configured to
           | drop all unsolicited incoming packets by default. If an
           | attacker can create outbound connections from inside the
           | network then they can get around this of course, but you have
           | to already be inside.
        
         | xbmcuser wrote:
         | A lot of these boxes probably are iptv/piracy streamers and I
         | would not be shocked if it's one those apps backdooring these
         | devices
        
       | 1oooqooq wrote:
       | > such devices often run on outdated Android versions,
       | 
       | Ah the new economical divide.
       | 
       | Most "real people" also have phones which aren't receiving
       | updates for a few years by now.
       | 
       | In south america the median android version is 8.
       | 
       | And phones are not optional as most countries already jumped into
       | both digital government and money transfer.
        
         | kome wrote:
         | mobile first was a mistake
        
         | jmyeet wrote:
         | Updates for Android continue to be a huge problem.
         | 
         | Android OEMs have historically been terrible at releasing
         | timely updates (it can take months), releasing updates at all
         | (particularly cheap Android phones get EOLed long before an
         | admittedly way more expensive iPhone would) and such updates
         | aren't typically pushed in the same way.
         | 
         | One big problem with Android is the way driver updates work.
         | It's a nontrivial process to add hardware support for a later
         | Android version because of the Linux roots and having no stable
         | ABI.
         | 
         | I think back to how Windows has changed over the last 2
         | decades. Once Windows updates were all paid and people would
         | hang on to old versions of Windows forever. Microsoft
         | eventually realized this was a problem for them so paid
         | upgrades aren't what they once were.
         | 
         | Additionally, driver instability used to be a massive problem
         | on Windows. Microsoft to their credit spent a lot of effort
         | improving their driver situation to isolate drivers and have a
         | stable ABI. Windows is way more stable than it was 20 years
         | ago.
         | 
         | Even OSX has adopted user space drivers (DriverKit).
         | 
         | By the way, the above reasons is why some at Google have pushed
         | Fucshia as essentially an Android ecosystem and architecture
         | reset. It's been close to 10 years now. I don't see this going
         | anywhere despite billions being poured into it at this point.
        
           | 1oooqooq wrote:
           | Fuchsia was a backup plan.
           | 
           | Google is now the only option for phone manufacturers. No
           | backup needed. Plan A worked.
        
             | saghm wrote:
             | I'm not sure I understand how having a second OS would
             | hedge against people not wanting to use their first OS, but
             | Fuschia being some sort of backup plan would at least
             | explain why it didn't really ever get used. My guess was
             | always that it just didn't ever have full support as a
             | replacement due to turf wars with people in charge of
             | Android-related things.
        
             | throwaway48476 wrote:
             | Fuchsia is a jobs program to prevent OS devs from making
             | something that fan compete with android.
        
           | wappieslurkz wrote:
           | May I ask what mobile OS you use?
        
           | tannhaeuser wrote:
           | > _Windows is way more stable than it was 20 years ago._
           | 
           | The problem with Windows today is more that it wants to
           | opaquely update itself all the time, and the user gets
           | undesired mandatory "updates" such as ads in menus and
           | sending "telemetry" home (ie user activity data for MS'
           | machine learning ambitions). But of course the most important
           | thing is to keep fucking web browsers up-to-date with
           | laughable and undesired CSS or WASM features (including
           | subsequent exploit/fingerprinting fixes) all the time and
           | even more often than actual content, or what's left of it
           | anyway on the extant web.
        
             | afavour wrote:
             | This just reads as a grab bag of complaints about modern
             | tech with little relevance to the topic at hand
        
             | secondcoming wrote:
             | Ubuntu and Debian both have unattended-uogrades running by
             | default
        
           | ajross wrote:
           | > Updates for Android continue to be a huge problem.
           | 
           | As is being pointed out elsewhere, this isn't a vulnerability
           | in an "Android" product. These are TVs running vendor-
           | maintained AOSP builds. They get updates when and how the
           | vendor decides to do it. It's not related to the (fairly
           | reasonable, though often spun) arguments about updates in the
           | phone licensee ecosystem.
        
             | jmyeet wrote:
             | This is a distinction without a difference. It's not like
             | you can take your Android hardware and move to a different
             | software supplier. You're stuck with whatever your OEM
             | chooses to do or not do.
             | 
             | It's also something you don't necessarily have knowledge of
             | when you purchase a phone.
             | 
             | It's one reason why people (myself include) prefer Apple.
             | You know you're going to get 4-5+ years of updates.
        
               | ajross wrote:
               | > This is a distinction without a difference.
               | 
               | No? For a licensed Android phone there's a clean split
               | between OEM and OS updates, a clear declaration for
               | support period and a OS-managed tracking of updates with
               | clear visibility to the customer. I get that there are
               | constant platforms flames about whether this is
               | acceptable or inferior to Apple's offering, yada yada
               | yada.
               | 
               | But the point is that _none of that is relevant here_ ,
               | because these aren't phones and aren't running a licensed
               | "Android" variant. They're just TVs running vendor-custom
               | firmware that _happens to be based on AOSP_ , and clearly
               | can't be expected to conform to any update regime except
               | whatever the integrator put together.
               | 
               | Basically, the story here is saying "I hacked product A"
               | and you're trying to have an argument like "That's
               | because this unrelated product B is bad". It's a non-
               | sequitur.
        
           | Krssst wrote:
           | I am using an Android phone which gets timely updates.
           | However the vendor does not seem to do enough testing for
           | major versions and has ended up with at least one significant
           | bug upon release twice. I could do with less timely updates
           | that come with less bugs.
        
         | donkeybeer wrote:
         | Its a self created problem of locked down user hostile devices.
         | Operating system and software upgrades are not locked to the
         | hardware manufacturer in the laptop world (not yet, for the
         | most part). It is a pipe dream of mine that someday these
         | attacks are used as an excuse by some government perhaps the EU
         | to force opening up devices for install of other operating
         | systems, maybe forced to open sourcing firmware etc.
        
           | ThatMedicIsASpy wrote:
           | It is the reason why I have Windows tablets not Android ones.
           | I know there are OS updates. And once they are dead I have
           | options for Linux tablets now.
        
             | shakna wrote:
             | Windows 8 stopped receiving updates in January last year,
             | which killed my Surface for me.
        
           | F7F7F7 wrote:
           | Fragmentation used to be touted as a feature of Android, not
           | a ... well, you know.
           | 
           | "Freedom", I believe they called it.
           | 
           | Also, hardware standardization in the PC world is pretty much
           | a thing. Not so much in the mobile (and mobile offshoot)
           | world.
        
             | donkeybeer wrote:
             | Fragmentation is not the problem. The problem is inability
             | to change os or firmware. If control of upgrading or
             | changing os wasn't solely with the maker there wouldn't
             | have been an issue in the first place. I bet for example
             | many of these bugs might be due to the much older linux
             | kernels in use in phones. Again something easily solved by
             | making the os easily changeable and not presenting
             | cryptographic etc roadblocks to reverse engineering, if
             | they don't even want to open source the firmwares at least.
             | At the end of the day these are software bugs not hardware
             | bugs, so the solution as with any software is to be able to
             | push fixes. It does not matter if there are a million
             | different Android phone platforms, a fix to some bug in the
             | Linux kernel for example should work the same on all of
             | them. More importantly, as a piece of pure software this
             | should be something anyone working on Linux or Android
             | should be able to fix as happens in the more sane world of
             | laptop, server etc hardware. If we weren't locked to the
             | manufacturer for all operating system and software support
             | this won't be a problem in the first place. Imagine how
             | ridiculous it'd be if we had a Dell XPS 13 OS, a Lenovo
             | Thinkpad T14 OS etc that went out of support the moment the
             | model is discontinued instead of the sane and normal
             | situation where your Debian or whatever os continues
             | receiving software updates as long as Debian wants to
             | support it.
        
               | lupire wrote:
               | You're making a bold assumption that an alternate,
               | extremely uneconomical, OS would be more secure. This is
               | far from obvious.
               | 
               | Now, if the phone's original OS were open source, it
               | would be easier to make bugfix patches when old vulns are
               | discovered.
        
               | donkeybeer wrote:
               | By "alternate" I don't necessarily mean some obscure os,
               | but any os in general , in fact I rather specifically had
               | in mind Android or Linux. By alternate here I meant the
               | fact of being able to install any you want instead of
               | being stuck with whatever ancient Android version and
               | Linux kernel the original came with. Ie if your phone
               | came with an ancient Android, you should be able to
               | without OEM support install a newer Android or a recent
               | Linux or anything else you'd like.
        
             | donkeybeer wrote:
             | And honestly I doubt 99.9% of these attacks are anything
             | hardware specific but rather generic software bugs like
             | buffer overflows in the kernel, so hardware is in any case
             | a moot point.
        
           | afavour wrote:
           | The problem is that the "self" in that statement is not the
           | consumer. They have no choice, yet the bear the burden. The
           | people who made these choices benefit from it.
        
             | donkeybeer wrote:
             | By "self" I meant the manufacturers of the device, not the
             | end user.
        
               | ptero wrote:
               | The manufacturers do not have the problem. They _created_
               | a problem for many users as a side effect of forced
               | obsolescence making consumers in richer countries buy new
               | hardware every few years.
               | 
               | So it is not really "self created" in my book.
        
               | croes wrote:
               | Didn't Google create the problem. They could have made
               | the Android core updatable without the need for a
               | manufacturer update
        
               | ptero wrote:
               | Google certainly contributed to it. But whether the issue
               | for consumers was caused by hardware makers or by OS
               | makers it is not a self-imposed wound for the consumers
               | -- they had nothing to do with it.
        
           | Zigurd wrote:
           | Androids are less locked-down than iOS devices. The problem
           | is that Google used to not have the ability to require long
           | term support from device OEMs and now that it has the market
           | power to demand long term support they seem reluctant to
           | prioritize that in license agreements.
           | 
           | Then there are devices, like in China, where Google Mobile
           | Services is not on many phones so Google has no leverage at
           | all re supporting updates.
        
             | donkeybeer wrote:
             | There is nothing in principle requiring Android phones be
             | locked down, but its a de facto reality that manufacturers
             | of almost all phones have made them locked down and you
             | have to research to even know beforehand if you can even do
             | something as little as a bootloader unlock or a rooting.
             | Why is os and phone model so tightly integrated and locked
             | together, when in the pc world you can generally install
             | any os on any computer? That's what I was saying.
             | 
             | Which is to say I think you are speaking in terms of what
             | you can do within the android's playground itself, its
             | certainly much more open than ios in that regard. But when
             | it comes to the fact of being able to change the playground
             | itself ie install whatever os you want on the hardware or
             | upgrade the os on the phone then suddenly most phones
             | aren't any better than iphones either. Some are slightly
             | better in that you can at least unlock the bootloader or
             | root it, but I don't know if much progress has been made
             | beyond that in being able to reverse engineer or otherwise
             | them to able to install anything you want on them. That was
             | the point with respect to I was speaking.
        
               | sangnoir wrote:
               | > Why is os and phone model so tightly integrated and
               | locked together, when in the pc world you can generally
               | install any os on any computer?
               | 
               | Qualcomm is the reason. Qualcomm wants OEMs to buy new
               | chips every year, and for that to happen, consumers have
               | to buy new phones every year. To upgrade Android (across
               | kernel versions), OEMs need Qualcomm to provide updated
               | drivers, which Qualcomm has been reluctant to do, because
               | their sales will be undercut by chips they sold years
               | ago. Android phones are closer to Mac than PCs, as
               | there's one hardware-maker who determines which models
               | become obsolete, and when, based on the software they
               | choose to update (or not).
        
               | RulerOf wrote:
               | That's something that I've found really notable about
               | Linux, compared to Windows. Windows drivers seem to work
               | across versions, whereas binary Linux drivers are
               | typically specific to a kernel minor release.
               | 
               | Does Microsoft just maintain broad kernel backward
               | compatibility, or are driver authors doing more work to
               | support more Windows versions? Is it a fundamental
               | architecture difference with how each OS implements their
               | kernel APIs?
        
               | InvaderFizz wrote:
               | Linux intentionally has an unstable driver ABI in part to
               | make life a living hell for vendors who don't want to
               | upstream their drivers.
               | 
               | Windows on the other hand maintains a very stable
               | interface and has no desire to maintain vendor drivers.
        
             | donkeybeer wrote:
             | And thats my point, you should not need OEM support for a
             | pure software issue of operating system upgrades. I do not
             | ask Dell or Lenovo before writing 'apt update && apt
             | upgrade' when on my pc. I do not need to ask Dell or Lenovo
             | before plugging in a flash drive with the iso of my
             | favorite os or to upgrade the next version of the same and
             | so on. These are things that if the device wasn't locked
             | down, shouldn't have required the OEM's direct involvement
             | in the first place.
        
           | throwaway48476 wrote:
           | Laptops work because the BIOS provides a universal
           | abstraction layer and because support is upstreamed in the
           | Linux kernel. Supporting phones for longer would require them
           | to also upstream support.
        
             | donkeybeer wrote:
             | Its true that a lack of standardization on phones makes
             | things a bit harder but its as you said, still the key
             | point is that they need to make the firmwares opened up. If
             | manufacturers want to keep it all locked down then they
             | deserve and should expect these type of attacks all the
             | time. If they don't want these to happen, they should make
             | their firmwares available and upstreamed or at least not
             | cause roadblocks toward reverse engineering of the device
             | by means of cryptographic locks or otherwise.
        
         | yas_hmaheshwari wrote:
         | Out of curiosity, where did you find this data (genuine
         | question)
         | 
         | After reading your comment, I was trying to find that for
         | India, and landed on this page:
         | https://gs.statcounter.com/android-version-market-
         | share/all/..., and thought that India it is Android 13
         | 
         | But then for South America, the same page
         | (https://gs.statcounter.com/android-version-market-
         | share/all/...) tells should be Android 13 as well
         | 
         | India also has the same setup - digital money transfer happens
         | via phones (in some ways, your phone number is your identity)
        
       | photonthug wrote:
       | There's always one thread where we are discussing how everything
       | needs to auto-update for security/stability forever, and another
       | thread (currently crowdstrike) where that approach has caused the
       | problem we wanted to avoid. Would be nice to see more discussion
       | of this basic tension in the abstract since $current_issue is
       | often just a distraction.
       | 
       | Auto updates also have a reputation for harming the user at least
       | as often as helping (removing features, adding ads, whatever) and
       | so trust in that is declining while the need for decent security
       | (smart cars/homes) is increasing. Not sure what to conclude from
       | this except that we need more focus on secure-by-design systems
       | and maybe immutability guarantees rather than autoupdates, app
       | stores, and plugin/extension frameworks but these things are
       | sometimes impractical fundamentally and sometimes just
       | inconvenient for surveillance capitalism.
        
         | TiredOfLife wrote:
         | The problem with Crowdstrike was that they DID NOT TEST before
         | release.
        
           | photonthug wrote:
           | Sure, but again the specifics are a distraction. The problem
           | with pushing any release onto users who have no ability to
           | opt out is that those users never have any guarantee that
           | vendors tested things, or that the vendor is even hoping to
           | help rather than hurt users.
           | 
           | it's pretty safe to assume that most companies spend money
           | trying to make money, which usually involves exfiltrating my
           | data, turning off things I need but they don't want to
           | support, general rent seeking, ads injection.
           | 
           | Trusting any small manufacturer of anything to spend
           | time/money on fixing problems with security or quality
           | control is a hilariously naive idea these days, when
           | crowdstrike and Boeing are showing that even big companies
           | don't care. We all know the security update is enhanced
           | spyware, planned obsolescence / a slow push to force me to
           | buy a new device, or something else that's going to make
           | things worse.
        
       | happyopossum wrote:
       | Given the nature of some (most?) of the generic tv boxes running
       | random AOSP, I would not be at all surprised if these didn't ship
       | with so basic C&C malware already installed.
       | 
       | This was apparently found due to seeing some changed files, so
       | they didn't ship with void, but it wouldn't have been hard to
       | push it out to pre-comprised boxes.
        
         | tuetuopay wrote:
         | Not sure why this is downvoted. It is well documented that most
         | cheap android tv boxes have more or less the same trojan
         | preinstalled. Is it due to malice of the manufacturer or most
         | of them seemingly all taking the same pre-infected android base
         | , who knows.
         | 
         | Linus Tech Tips made a full video on the subject. They seem to
         | lean to the second option.
        
       | notsurprising wrote:
       | This is the result of giving your Android TV WIFI access. Use it
       | like a dumb monitor and such exploits go away.
        
         | geor9e wrote:
         | These aren't monitors, they're little sticks with just an HDMI
         | plug and microusb power you buy at the bogeda for $20. Android
         | TV is an operating system name (often fake, some very outdated
         | AOSP build, preinstalled with bootleg soccer streaming apps,
         | and some skins/hacks/tweaks to make it look like the newest
         | Android TV OS)
        
       | steelframe wrote:
       | Some of my hard requirements for a media device are that it must
       | not share any of my personal information with any third party and
       | it must fully cache the full-resolution and complete media
       | content prior to beginning playback. If it's going to be
       | connected to the Internet it must receive regular security
       | updates for anything that's not written in a memory- and type-
       | safe language like Go or Rust.
       | 
       | While Go and Rust aren't necessarily magic pixie-dust that can
       | account for all types of security vulnerabilities, if I'm going
       | to be faced with the possibility of some project being abandoned
       | at some point for the next new shiny thing that everyone would
       | rather work on, I'd at least like to give it a fighting chance of
       | remaining secure for some time after abandonment without any
       | updates. Ideally it would be a Rust userspace media management
       | package running on Debian Stable getting unattended upgrades
       | every night.
       | 
       | Since nothing like that exists I've recently decided to give
       | CoreELEC/Kodi a try on an ODROID-N2+, albeit disconnected from
       | any network. I was surprised at how seamless and integrated
       | everything was.
       | 
       | The remote control for my television "just worked" with it out of
       | the box thanks to HDMI CEC support. Arrow buttons, play/pause,
       | back, etc. all did just what I expected them to do. It's a marked
       | improvement from the last time I built a custom media box, which
       | I had running MythTV on Gentoo, when I needed to jump through
       | hoops to set up an IR blaster. And you can't argue with a 12v/2a
       | power supply.
       | 
       | For now I'm keeping it off my home network and am "sneaker-
       | netting" content on a USB drive between my trusted devices and
       | the ODROID. When I get tired of doing that I might add some
       | firewall rules to my router to only allow it to talk to a locked-
       | down VM doing nothing but hosting a read-only file share. But
       | some day I hope to look forward to building a similar form-factor
       | box that has all the media gadgets and gizmos with a Rust
       | userspace that respects my privacy and auto-updated Debian Stable
       | so I can actually connect it to the Internet.
        
       ___________________________________________________________________
       (page generated 2024-09-14 23:01 UTC)