“This does not mean vendors are hiding anything or that the missing commands are backdoors. It just means they have chosen not to document all VSCs publicly for customers, and to keep some for internal use only.”
I think there’s merit to considering undocumented functionality a bad thing. It’s attack surface we should know about. Why should the chip maker reserve functionality for their use on a chip they sold me? I better get all of that.
jmclnx 7 days ago [-]
The odd thing is, if true, the damage has been done. Few people will believe otherwise.
I know little about bluetooth and I kind of believe what this article says, the original did not seem "right" to me.
But, in reality, bluetooth security has no real meaning to me since I do all I can to avoid bluetooth :)
drweevil 7 days ago [-]
Likewise, to me the characterization of this as a "backdoor", coupled with "China", is a 'smell', not only in this case but in many articles I've seen in the recent past. I don't think it's hard to get this right. Media outlets can and should do better.
seba_dos1 7 days ago [-]
> if true
There's no doubt it's true. There's no mention of any "backdoor" in the original presentation slides, it all came from twisted reporting which falls apart as soon as you actually look at the supposed "backdoor". No extensive Bluetooth knowledge required, just some basic computer literacy.
If there's a backdoor there, it hasn't been found yet ;)
vaxman 3 days ago [-]
"dark" mentor? seriously? I think I saw that film in college.
All SoCs manufacturers that are Chinese companies in China are subject by Chinese Law to operate with immediate CCP oversight. This is an immutable and undenied fact. Period. End of Story. There are CCP officers running around the hallways of Allwinner/RockChip and even fabless producers like Espressif, as well as small companies that use Western chips (from Intel, etc.) with their own BIOS and peddle online.
You have exactly two options: (a) Take the blue pill ..connection interrupted
Seriously, do not live in a false reality where you expect the government of any country hundreds with millions of people to feed will not fight tooth and nail in defense of their way system of doing that --using the same techniques of competing states and the latest technical capabilities at their disposal.
By the way, can I interest you in a lovely cell phone, my friend? No? How about a 100Mbps battery powered mobile satellite dish the size of a dinner plate? NO?! Maybe just a plain 'ol receive-only pager --I hear they can be a blast!
jaggs 7 days ago [-]
Cue agenda...
trod1234 3 days ago [-]
TL;DR
The finding by Tarlogic is not suspect, aside from the potential ambiguity in the reporting word choice. Reporters are known for flair, and to drum up FUD outside author or researcher intention.
The finding is a undisclosed feature that supports backdoor capabilities without having the glue to call it a full backdoor (semantics imo).
Importantly, this is exactly how a clever individual would design a backdoor for plausible deniability and separation of concerns.
The fact that it was undisclosed and undocumented means it was secret, and not direct or honest with customers who purchased said devices. Each customer may have a very different threat landscape.
By longstanding Cambridge definition, this meets the term definition for a backdoor in general, though is not the working definition among cybersecurity professional contexts.
Of note, secrecy coupled with negligence is sufficient for general intent (i.e. malice) in many localities. Which also meets the author's interpretation of the Wikipedia definition, though not the author's conclusion.
The conclusions made in the article are nuanced, and not entirely wrong, but I don't care for the doublespeak, it overgeneralizes and misleads sentiment of those who are without a working knowledge of the contexts involved.
Is this a backdoor in the cybersecurity context? The author says no, but it really comes down to the legal question, is it negligence if a customer can suffer loss because of an undisclosed undocumented secret in what they bought.
This depends, and deviates somewhat in practice and modern law, and I'm not an attorney (IANAL, not legal advice).
In western philosophy defects under common law can lead to legal claims and have remedy under a 'rule of law', when it is present.
There are modern loopholes that allow manufacturers to not perform the same due dilligence required of physical defects (i.e. disclaim liability for software defects), where it is impossible to remedy, made even moreso by international differences in law (US v. China).
Selling devices whose sole purpose is connectivity, where security cannot be managed does violate fundamental cybersecurity principles, and can be used in a classic poisoning the well, supply chain attack.
In my opinion, the researchers involved at Tarlogic provided great value in bringing this to the public's attention.
7 days ago [-]
Rendered at 14:29:16 GMT+0000 (Coordinated Universal Time) with Vercel.
I think there’s merit to considering undocumented functionality a bad thing. It’s attack surface we should know about. Why should the chip maker reserve functionality for their use on a chip they sold me? I better get all of that.
I know little about bluetooth and I kind of believe what this article says, the original did not seem "right" to me.
But, in reality, bluetooth security has no real meaning to me since I do all I can to avoid bluetooth :)
There's no doubt it's true. There's no mention of any "backdoor" in the original presentation slides, it all came from twisted reporting which falls apart as soon as you actually look at the supposed "backdoor". No extensive Bluetooth knowledge required, just some basic computer literacy.
If there's a backdoor there, it hasn't been found yet ;)
All SoCs manufacturers that are Chinese companies in China are subject by Chinese Law to operate with immediate CCP oversight. This is an immutable and undenied fact. Period. End of Story. There are CCP officers running around the hallways of Allwinner/RockChip and even fabless producers like Espressif, as well as small companies that use Western chips (from Intel, etc.) with their own BIOS and peddle online.
You have exactly two options: (a) Take the blue pill ..connection interrupted
Seriously, do not live in a false reality where you expect the government of any country hundreds with millions of people to feed will not fight tooth and nail in defense of their way system of doing that --using the same techniques of competing states and the latest technical capabilities at their disposal.
By the way, can I interest you in a lovely cell phone, my friend? No? How about a 100Mbps battery powered mobile satellite dish the size of a dinner plate? NO?! Maybe just a plain 'ol receive-only pager --I hear they can be a blast!
The finding by Tarlogic is not suspect, aside from the potential ambiguity in the reporting word choice. Reporters are known for flair, and to drum up FUD outside author or researcher intention.
The finding is a undisclosed feature that supports backdoor capabilities without having the glue to call it a full backdoor (semantics imo).
Importantly, this is exactly how a clever individual would design a backdoor for plausible deniability and separation of concerns.
The fact that it was undisclosed and undocumented means it was secret, and not direct or honest with customers who purchased said devices. Each customer may have a very different threat landscape.
By longstanding Cambridge definition, this meets the term definition for a backdoor in general, though is not the working definition among cybersecurity professional contexts.
Of note, secrecy coupled with negligence is sufficient for general intent (i.e. malice) in many localities. Which also meets the author's interpretation of the Wikipedia definition, though not the author's conclusion.
The conclusions made in the article are nuanced, and not entirely wrong, but I don't care for the doublespeak, it overgeneralizes and misleads sentiment of those who are without a working knowledge of the contexts involved.
Is this a backdoor in the cybersecurity context? The author says no, but it really comes down to the legal question, is it negligence if a customer can suffer loss because of an undisclosed undocumented secret in what they bought.
This depends, and deviates somewhat in practice and modern law, and I'm not an attorney (IANAL, not legal advice).
In western philosophy defects under common law can lead to legal claims and have remedy under a 'rule of law', when it is present.
There are modern loopholes that allow manufacturers to not perform the same due dilligence required of physical defects (i.e. disclaim liability for software defects), where it is impossible to remedy, made even moreso by international differences in law (US v. China).
Selling devices whose sole purpose is connectivity, where security cannot be managed does violate fundamental cybersecurity principles, and can be used in a classic poisoning the well, supply chain attack.
In my opinion, the researchers involved at Tarlogic provided great value in bringing this to the public's attention.