Bestand wählen
Merken

Unleash your smart-home devices: Vacuum Cleaning Robot Hacking

Zitierlink des Filmsegments
Embed Code

Automatisierte Medienanalyse

Beta
Erkannte Entitäten
Sprachtranskript
to of and
and and it in the these fine gentlemen are researches hailing from 2 to 1 of the finest research universities in the world northeastern and TU Darmstadt Due to personal financial restrictions they became interested in inexpensive smart home here let's give a warm welcome to again dead so he's on Daniel an fat and and the wrong so thank you very much and disorders then and then assigned then you know and to David rose talk ball vacuum cleaners and to be more specific we will talk about the sigh only acutely knows I already know there's some friends over whatever we or I apologize for mispronunciation of the name of the windows or 2 there's no real idea how to pronounce it correctly so let's start with
some numbers y and to choose to pay more attention to auxiliary devices so they claim to have 50 billion connected devices and 2016 and they also say they 1 . 9 million euros in revenue also in 2016 so these are already the impressive numbers from the most uh or the biggest point for us was the the does is actually cheaper sell uh value comparatively to other stuff for example of eventually the nose which cost 1000 EUR or you can buy for the exterior we eventually notes for the same amount of money and yeah so we choose to look into serial the stuff and
then result is advertisement so there is that for a vacuum cleaners they have 3 different processes so the processes lines the 3 processes in the regulatory and all eyes were already like
this so at beverley interested to know what is going on this vacuum cleaner and then we need to restore growth took
a step back and look into how the stood at 2 ecosystem look like so the minimum of everything is basically you're smart phone and then you have your of course you your smarts devices for example motivating because or smart bombs in the top left corner there also was modeled uh Walter catalysts or some other time some source which are often connected via KK and I already knew or this shows in this is the arrows here are product and Richard means that during the connection vase they talk directly to his mouth and then ask that they are connected basically they will have fun connection to the same result and yeah so there's no more time connotation via the up they could talk directly to the cloud and residency there also some of the the techniques which our protocols they use for example polluters only and 6 and so this is
already the end of my part and then then is the various some more in depth stuff about the use of vacuum cleaners marriage was presented here this is an particularly in the Thad I think you Daniel so let's take a look at the they it's also this is again that what is meant and you see it has a lot of sensors so the most important 1 is like this light of sensor with and so has like a lot of an infrared sensors around to device and a which is also very interesting here is called an accelerator so really would ask where devices that but that's actually very and then we saw that it has a lot of sensitive what I call you know if you can wouldn't why not and we tried a lot of
things through this thing and the 1 approach was like to get some kind of have access to that in the next and the next 1 was in at the base of approach so it has actually might be used easily for like all the answer simply connected might use the what could possibly go wrong unfortunately it and this doesn't work because they use some kind of modification for that so and that was impossible for the next thing we try to figure out where some see report as and only like PCB but unfortunately also the label that so we had no idea and negativity OK that's connected to to the Wi-Fi and check like for open devices book services like tell metal something usually you to devise devices laughter Havel entailment holds for tenants service but the thing was while what can wasn't successful all ports are closed and so on this approach is that the that traffic was also not successful because everything is a cryptic so yeah that was pretty bad on the next thing you usually do this to
this whole thing down so basically you screw everything and take a look at that but now you take a look at the whole device them right we very surprised that it was very easy to to disassemble this whole thing and so on so this thing it's also Bollingen yet in terms of you can unplug simply be the parts of all any connect something so it's very nice some of the next thing what we see here
is like the PCB layout so what what you see here is the application process server to circuit court of his arm part with 1 . 5 goes off in the core and they're connected is also like travel itself mimic make about a friend of Mr. there free remember if I remember it has also like for the about the uh flesh and always the A. or there's some by some model was chosen connects the whole thing to survival and for at all of the return tasks like for example the sensors and we're summer Stanford you which takes care of everything like that and a desire on politics and 3 years probably most of you know and there's also an additional um and see you in the lighter which is not shown here in this picture
so um if you look at the back side you see that there's a lot of test points which unlabeled so there's different marks like test point 1 2 sponges and everything and problem of that is that it doesn't give us any information about affairs you whether something with the figured out there so that the only way to test points it didn't have a label they actually you out for the for the application possessor what put into that and if you connect to that you don't see anything so the money can country anything so next step um epiphany
to attack the hottest some to get through Access and or EC for choice was and new for you actually and the idea
behind that as actually owning so if you look in the data sheet of the application as it has some some fallback mode is called the mode so what we did this be some uncertainty in a meaningful and that the VGA chip and shortcut of the MMC data lines so the the application was as a fallback in this uh the mode and then we can and connect through use B and upload some small tool that should then downstream of the complete memory and under the MMC flesh as soon as the happy MMC flesh because some do some modifications so that they didn't have any checks run-time checks on certificates whatever and then reflection again to do chip and fun thing about that is exactly 1 4 1 layer of any meaningful fits on the ship to you are too much actually so you just 1 and the idea just corrected corrupted data as soon as they taken look
into that that make him the image of the continuum image actually figured out that the use actually the 1 to 14 Fitch was mostly untouched in terms of detectors must still know and they do a lot of catching on on a really regular basis for example they close down the um ability for the BPA of quixote which was board navigation the use of open source of their some called player which takes care of all the sensors and they have of course like also a lot of flak proper Jerry sort of which the the complication on the control of the commands which come from the class and 1 thing which of we figured out is actually began to use the there's something be running but the ADB do some custom modification thing so you basically you need information that you don't usually don't have um to access the port and so but that's not possible to to get on making an and ensure most interesting is also like to baby run SSH but this is h is not made by the table so they closed on also that thing so actually not that that technically right and so let's take a quick look at
the data on and on the device and apparently been lost to create log files then of of what files and for example they collected versus log files with the click durations for off-road some of cleaning jobs that the area which which be running around so but also like the important data like a society and estimates have something else rare in some binaries because this line this TCP dump mob questions within that's all so I don't know who can think to rest right and and fall if you have like some kind of LT you've volume-based In all that stuff and this this make human if that's just stand around the reason of they'd already and so multiple megabytes per day uh if you run it in and for cleaning it's crazy more data so basically on if you have even property of a big interest to know who is the and I'm also maps maps maps of books that a latent consonant and so all this data is uploaded to the cloud to the vendor hazards and and a number important thing is if you do a factory search tree and the operation system so this restored from a recovery but the data vector maps and the locks on not needed so basically we're still they cleaner so if you research you may conclude of solids and I'm of that and the next owner of Kimball known URIs the impulse what and how your apartment of I'm not talking about apartments look like this is how the maps look
onto the device so basically this this open-source players of fear and president of maps and technically there but maps of 1024 pixels and square and so 1 pixels small tool into 5 centimeters and 1 thing is the lighter we more precise but they just for like from 5 centimeters so in terms of accuracy and right and before we take a look at the problem at the permutation itself so we want to
take a look at the configuration so 1 thing that is quite usual for all of the show me devices is and that every device has its unique device at the which is an variants at a factory more into the device predicting cancer text files with that technically you can have that but from devices like can you to commemorate amended they have to kind of he's a key which is just use the talk on occasions never changed at a token bitches only use for the communication this change every time a few receptive more connected to commit new Wi-Fi so and I know but we're not off like tax on all sides bearer who try to control the bacon cleaner orders talking but every time you connect to by far the 2 tokenistic generated so we have to stop in there this is just going to appear information about that so if you take
this very simple look at the clock on occasion everything here in this letter boxes actually from the until more of the of debate clear so they have a lot of like processes inside which take care often irrigation and the most central 1 honesty the new client bitch that takes care of all the communication between inside and outside so what what's actually so here are some examples so if 2 cloud wants you to do something that made sense here in Massachusetts which is encrypted obviously 50 kb plot band this new kleptocrats that and forwards it in plain text painted states into the internal devices that should then communicate or 0 for example I perceived between Java and the result of that thing the is again some forwarded inside to make you live a plain text but then as soon as it exists to make intricate again so all the time you see something that encrypted also if you don't elect from various or upload map files then of the fingers in also encrypted with hdp as assumed assist you in the cloud such into top right OK now let's take a quick look at the update process itself so what they
do is actually so be the when these events and they sent from the cloud and encrypted package that depicted package formation so the d plot Tulsa bake human they're tested on of the different so we give them the URL and the next thing they do is they give also the and if I have to you also let's say something goes wrong survivability of defiled when the bacon can track like in the 5 OK so you can act that attack that very easily and the next thing that happens is in that debate amongst dollar that's been shown here we have show here the some simple simplified and structure of the memory so you have technically 2 copies of the operations someone active copy in 1 pass of copying you probably know that from all of the laity devices because it's quite usual for all devices that they have these 2 copies of the prison system so the making those the package then checks in the next step if D and E 5 is obtained which was transmitted encourages general maternal come from the clout if that's OK it uses some secret key to decrypt this package and and it impacts that to some temporary protection next thing this is quite important they upload they update the root password so basically every devices a different reports with which you don't know actually and so no for the month apostle fault was and next thing know so that updates the passive petition In after this this is done in the make you take some time to rethink and and introduced a new updated petition and next that they updated the update the bolts active petition again so after that you have a completely updated of a container with 2 news missions right so I mean the thing this wall how this trend up its looks like actually
and um there 2 kinds of from this 1 for about this like full and the Everest partial they encryptor Katahdin did that set the archives and most of the time they contain so the full image contains the disk image which has the full of the file system of for the mean of the fun thing this and they used to live in then very creative in the past 4 for encryption this work will and the next 1 thing is you can build a pulse of sound files and make human to uses a more complex task than this 1 so they protect there's on 5 better than the about this and up the central to the AES with them which a secret which is so standard Linux tool and in integrity is small as protected by the clock because totals tells you before that you wouldn't be I play right so
I know we know the password for the for the from there and we get them get the strongest somewhere and we can prepare our roots and at this time I mean we simply take the from and were built at for example be included or all dressed key file for SSH so they can work and this is the stage and review moved deity tables rule for that the so that the in this state is not protected by patents and 1 the next thing that they can do is you can send the update command all solves 50 you all of all that sort of and in the 5 of all file and the good thing is that the bacon cleaner accepted in this commands if the interest of the 2 so basically talking with its can somehow get to talking somewhere from from that for example and then in the consent is all of article command it takes a few minutes so that think between 5 and 10 minutes and after that we can
do is you can look into that thing that said before it's a will to so you can do happy to get up at
and install yourself down to that and and the like run
my own H top something and the next interesting thing is that you can also access directed sensors so for example you have some
some that data which is created by the but a lot of sensor right now we have to do with access onto the but that device
and then you want to gain independence from the from the plot and we have 2 methods actually and it depends more on this if you want to usefully be if you want to be is still able to use the app from them so the more drastic 1 has to replace simply because in the face and the other 1 is like 2 parts the clout connotation so them if
you want to get rid of class completely so what you can do is you simply take the new client and install Europe like all inclined to could be some some small Python script which to some external commands like from a fan more home assistant is very easy to do that and to get rid of the demand upload simply use a host file which some details the service and very easy but the problem is not the act of in 1 and but it's very simple and the other thing would
be like to proxy complementation for that we developed some some open source implementation of to show me cloth which we call dust clouds and basically is the determination so it so what you can do is you can actually for what even packets real Cloudera constantly and use it like as a local cloud solution toward like even before what the change commands and suppress them completely you want usually want to suppress some that kind of stuff you don't want to announce and of that of that set and get inside so and this is some somewhere in but you can do it and becomes also this thing on object right some
use cases come you can use this whole thing as a home automation server you can use it also is about gradient and are you mass of the Pfizer butterflies of eponymous actually so this the usable memories like 2 gigabytes mourners so it's not a very uh big file but a good thing is if you have a power outage this sting holds for 2 days with the battery so this is a good thing and I know and know that question become like called can from but combining as thing nowadays it's a little bit difficult it has to DP was that are used somehow but my finger they choose to slow itself so sorry that if you have millions of them may be by and for the home automation server have
some sample from some rare variants sports and some into debating cleaner and you see here but we that can run at as a locally below the talk because an excessive directly and then you can run your homework home automation system and directly on the baking cleaner and no need for asleep I emerging Grunts varies smoothly and we have some
downloadable content for you but the unity IEEE leave the demand money for that so it's free and we have modified some some from for user and all of them and install that and you can at also the Maurer-Cartan relation but the thing is that's a very good pattern for muscle so basically it's totally broken and here so don't you for a productive means and don't put an internet and I'm also very happy if someone can take a look at that and the also the publish and pictures of the knowledge and much more everything under the the main don't make you don't and the at yeah so so we have a lot of things like and today in the evening goes after the talk is over and get but and so we had 2 things we want to mention
um picture to what's of running but once and never leave here devices and provision so we know a lot of people or some people who have you and will who thought like Ollie I don't trust the cloud so I'll simply connected they contributed by factor that might be a better idea because they they have an open by factors pointing making cleaners so what someone can do for you is like it can presume that thing for you and can select malicious from values of your apartments always from device and the 2nd thing is be very very careful with use devices so that people could like water that's kind of devices on Amazon and send them back after they put something on bench and the if you do it for very very expensive devices like some of that love for 1 thousand euros then and there could be some assumption what kind of people would buy this kind of stuff so you know it could be very so have a much that ideas are right and so that's more or
less the end of the representation and so we want to tank to people more less so to hear what people and the the 1 that the attitude after and Professor Libya from the Earth and the reason University and now we are happy to take your questions about of you have the most innocent until so if you have questions for Dennis and were then you please aligner by 1 of the might belong there were over year 1 2 3 4 there are 4 over their wives and 7 and from the internet 1 of our signal angels will be reading your questions allowed on your behalf so the any questions for the show me that you have a signal angel do we have a question from the internet not yet not yet yeah I'll microphone number 2 I 1st hi thank you for your talk how many robots were harmed research and this into a lot of like mind it all over the place so that 1 of the chance of life so we know that we microphone number such a high uh so you say it's what the robot is doing when I have it in my wife I it's there's nothing more the traffic and uploading it to the plot a lot of time OK so and there's a decent outcome of which is to say only that parts of the sentence to your you which then enables monitor more and enables us to see the effect is because of the so we don't exactly know what why there would be some kind of a command like this what resources this training we know that there's this model we did not investigate further into this up until this point so they're not just there but they're not sent by default knowledge so you need to send the command according to Stalin's the locks or a lot of time as soon as the blocks are ontology knowledge but doesn't mean that we get by their so not always uploaded but the cats I have too great to have to be created by common the I I have unit that any of this yummy devices besides the this rover so that this here so this is the point of this with correspond to look into and a lot of us and we were also able to move his head of license or that's the way the 2 of get into your own class if you want to go into the store to recall the beginning of February the and use the people and all the the so your question is of this you know you have a real and positive regulation of everything in the and the players of the sources also use different kinds of hollow rewards and it's just a list of open source most which also use it to you with the center of the world what is your question yeah didn't also in the thousands of this past period that you mentioned you hand it in the in the running and used the did you try to reverse the authentication implemented on that custom installation I yes so we tried actually so we figured out that you need some some strings might be that some kind of fruit password that you usually don't have that you and the vendor probably haven't database so there's they didn't quite also that the cation that's that's not that truly actually this is even have multiple levels they have you know if you have 1 learning you need to to gain another level so it's like that it's way easier to after you wrote this device is to install you're in the open source the software so you can simply connected via of the so if you have want to have that as a recovery metaphor it would make me can do that but to represent the edification of the of the of the the because maybe it's the weight of each just accepts version of passwords for there to be you know that it's some kind of jumped responsibly and if you even the the this little suggests response the 2nd level and I think this is the 1st level of you want to get so whatever so it's like a like a game like the following had did you do close this is to show for because I just got a block release of their form of active and no we didn't have in the regions of the because we don't want to show you don't wanna tell me to closed on the spot and mean so the Reebok but you know and the thing is as soon as you make use this is rooted and as soon as you have to count encryption key they can't do anything anymore because again rhetorical negation can get all the from the other basic and send you on for about this a make so as soon as you have 2 key you you modest protective against a from that show me but the problem is if you buy an our they can onto and they change something in the firmware but that doesn't work anymore than on all right that we have to start from the beginning again are you have to use aluminium foil because against this attack I think it's very hard to some of the footage of at least at the user's very hard to defend against that but it's not very so so so if you have 2 choices to remotely update you make you have your own family please don't use the the enemy involving because I mean that things can happen to us if you miss miss you miss 1 then and then you put some 5 bolts onto the BNC and in our if you have no idea what did you do that and you get meaningful things the you and is and yeah yeah so that the player suffer I think the player suffer supported by the default to basically be used to play a often to control this small more robust to do some college frame this for remember correctly yeah so you know you have the right to do anything you want and the I 10 so that your and to how did together passwords like rock rule or the you know that the voice pictures have a better password um all the rescinding into binaries and the funny thing was that they have still ordered about symbols in the and that because what why removed the about symbols and was very easy to to get the strings possibly some restraint and that was in the year of the grid command and there was this work will think the involvement of the past but because like easy but after we have especially for the old all files of and we look work more deep the burners thing and figured out the rules for real it's basically rows and union the binaries itself the I would be to what
that and if it and I have a little it would be to put but act poop back at
Roboter
Bildschirmfenster
Hochvakuum
Entropie
Twitter <Softwareplattform>
Grundraum
Hacker
Roboter
Resultante
Open Source
Chipkarte
Prozess <Physik>
Punkt
Hochvakuum
Zahlenbereich
Zentraleinheit
Gerade
Hardware
Streuungsdiagramm
Roboter
Einfach zusammenhängender Raum
Resultante
Protokoll <Datenverarbeitungssystem>
Extrempunkt
Gateway
Quellcode
Biprodukt
Chipkarte
Open Source
Hochvakuum
Hochvakuum
Zeitrichtung
Smartphone
Streuungsdiagramm
Zentraleinheit
Portscanner
Open Source
Negative Zahl
Dienst <Informatik>
Offene Menge
Datennetz
Serielle Schnittstelle
Mereologie
Hardware
Task
Informationsmodellierung
Prozess <Physik>
Digitaltechnik
Mereologie
Server
Kartesische Koordinaten
Term
Softwaretest
Auswahlaxiom
Subtraktion
Punkt
Kartesische Koordinaten
Information
Auswahlaxiom
Schnittstelle
Kernel <Informatik>
Server
Spiegelung <Mathematik>
Klasse <Mathematik>
Kartesische Koordinaten
Term
Whiteboard
Open Source
Spezialrechner
Last
Regulärer Graph
System-on-Chip
Bildgebendes Verfahren
Gerade
Roboter
Schnelltaste
ATM
Digitales Zertifikat
Approximationstheorie
Kontinuumshypothese
Open Source
Rechenzeit
Gerade
Quick-Sort
Software
Schnelltaste
Basisvektor
ATM
Gamecontroller
Information
p-Block
Eigentliche Abbildung
Transitionssystem
Versionsverwaltung
Fitnessfunktion
Tabelle <Informatik>
Stereometrie
Zahlenbereich
Term
Binärcode
Wiederherstellung <Informatik>
Physikalisches System
Multiplikation
Prozess <Informatik>
Faktor <Algebra>
Flächeninhalt
Widerspruchsfreiheit
Gerade
Streuungsdiagramm
Schätzwert
Suchbaum
Permutation
Elektronische Publikation
Pixel
Kategorie <Mathematik>
Antwortfunktion
Datenlogger
Open Source
Hasard <Digitaltechnik>
Betriebssystem
Vektorraum
Elektronische Publikation
Web log
Mapping <Computergraphik>
Quadratzahl
Flächeninhalt
Rechter Winkel
Speicherabzug
Wiederherstellung <Informatik>
Faktor <Algebra>
Streuungsdiagramm
Humanoider Roboter
Resultante
Telekommunikation
Prozess <Physik>
Jensen-Maß
Quader
Applet
Mathematisierung
Client
Gruppe <Mathematik>
Interprozesskommunikation
Konfigurationsraum
Roboter
Gleitkommarechnung
Streuungsdiagramm
Schlüsselverwaltung
Plot <Graphische Darstellung>
Telekommunikation
Gasströmung
Elektronische Publikation
Web log
Mapping <Computergraphik>
Advanced Encryption Standard
Token-Ring
Zirkel <Instrument>
Rechter Winkel
Faktor <Algebra>
Binäre Relation
Information
Ordnung <Mathematik>
Schlüsselverwaltung
Streuungsdiagramm
Aggregatzustand
Hydrostatik
Information
Spezialrechner
Puls <Technik>
Konsistenz <Informatik>
Dateiverwaltung
Rootkit
Ereignisdatenanalyse
Nichtlinearer Operator
Prozess <Informatik>
Installation <Informatik>
Kryptologie
Plot <Graphische Darstellung>
Firmware
Abschattung
Ereignishorizont
Gefangenendilemma
Arithmetisches Mittel
Chiffrierung
Twitter <Softwareplattform>
Festspeicher
ATM
Dateiformat
Schlüsselverwaltung
Versionsverwaltung
Message-Passing
Standardabweichung
Total <Mathematik>
Task
Physikalisches System
Chiffrierung
Mini-Disc
Passwort
Passwort
Booten
Datenstruktur
Bildgebendes Verfahren
Normalvektor
URL
Streuungsdiagramm
Rootkit
Physikalisches System
Elektronische Publikation
Packprogramm
Integral
Advanced Encryption Standard
Mini-Disc
Verkehrsinformation
Streuungsdiagramm
Inklusion <Mathematik>
Server
Token-Ring
Hochvakuum
Firmware
Passwort
Schlussregel
Rootkit
Elektronische Publikation
Schlüsselverwaltung
Aggregatzustand
Tabelle <Informatik>
Programm/Quellcode
Rootkit
Roboter
Streuungsdiagramm
Schnittstelle
App <Programm>
Stellenring
Stochastische Abhängigkeit
Klasse <Mathematik>
Telekommunikation
Plot <Graphische Darstellung>
Elektronische Publikation
Open Source
Dienst <Informatik>
Client
Datenverarbeitungssystem
Zirkel <Instrument>
Fächer <Mathematik>
Proxy Server
Mereologie
Client
Notepad-Computer
Skript <Programm>
Installation <Informatik>
Stochastische Abhängigkeit
Notepad-Computer
Humanoider Roboter
Streuungsdiagramm
Roboter
Server
Bit
Open Source
Datei-Server
Mathematisierung
Stellenring
Implementierung
Ruhmasse
Telekommunikation
Elektronische Publikation
Ultraviolett-Photoelektronenspektroskopie
Gradient
Objekt <Kategorie>
Zirkel <Instrument>
Reelle Zahl
Proxy Server
Festspeicher
Determiniertheit <Informatik>
Server
Streuungsdiagramm
Streuungsdiagramm
Datentyp
Relativitätstheorie
Güte der Anpassung
Datenmodell
Einfach zusammenhängender Raum
Firmware
Prozessautomation
Aggregatzustand
Biprodukt
Eins
Internetworking
Arithmetisches Mittel
Token-Ring
Code
SALEM <Programm>
Stichprobenumfang
Mustersprache
ATM
Gerade Zahl
Emulator
Inhalt <Mathematik>
Punkt
Versionsverwaltung
Familie <Mathematik>
Euler-Winkel
Information
Zählen
Binärcode
Übergang
Internetworking
Negative Zahl
Einheit <Mathematik>
Datenverarbeitungssystem
Default
Auswahlaxiom
Datenhaltung
Malware
Firmware
Plot <Graphische Darstellung>
p-Block
Quellcode
Frequenz
Teilbarkeit
Dialekt
Arithmetisches Mittel
Rechter Winkel
Computerunterstützte Übersetzung
Schlüsselverwaltung
Zeichenkette
Subtraktion
Wellenpaket
Gewicht <Mathematik>
Rahmenproblem
Wasserdampftafel
EDIF
Klasse <Mathematik>
Zahlenbereich
Datensatz
Informationsmodellierung
Reelle Zahl
Spieltheorie
Software
Datennetz
Endogene Variable
Passwort
FAQ
Speicher <Informatik>
Schreib-Lese-Kopf
Soundverarbeitung
Videospiel
Ontologie <Wissensverarbeitung>
Open Source
Symboltabelle
Schlussregel
Mailing-Liste
Roboter
Firmware
Mereologie
Authentifikation
Wiederherstellung <Informatik>
Streuungsdiagramm
Hypermedia
Medianwert
Systemprogrammierung

Metadaten

Formale Metadaten

Titel Unleash your smart-home devices: Vacuum Cleaning Robot Hacking
Untertitel Why is my vacuum as powerful as my smartphone?
Serientitel 34th Chaos Communication Congress
Autor Giese, Dennis
Wegemer, Daniel
Lizenz CC-Namensnennung 4.0 International:
Sie dürfen das Werk bzw. den Inhalt zu jedem legalen Zweck nutzen, verändern und in unveränderter oder veränderter Form vervielfältigen, verbreiten und öffentlich zugänglich machen, sofern Sie den Namen des Autors/Rechteinhabers in der von ihm festgelegten Weise nennen.
DOI 10.5446/34878
Herausgeber Chaos Computer Club e.V.
Erscheinungsjahr 2017
Sprache Englisch

Inhaltliche Metadaten

Fachgebiet Informatik
Abstract Did you ever want to run your own IoT cloud on your IoT devices? Or did you ever wonder what data your vacuum cleaning robot is transmitting to the vendor? Why a vacuum cleaning robot needs tcpdump? Nowadays IoT devices are getting more and more powerful and contain a lot of sensors. As most devices are connected directly to the vendor and transmit all data encrypted to the cloud, this may result in privacy issues. An IoT device with no internet connection lacks numerous features or is even unusable. We want to change that. We show you how to root a Xiaomi vacuum cleaning robot in order to get access to the underlying Linux operating system(Ubuntu 14.04 LTS), **without opening the device or tampering the warranty seals**. Furthermore, we will have a look into the vendors cloud interface and its commands, and will show you how to de-attach the device from the cloud and connect it to your local Smart Home system. Finally, we will demonstrate how to run Smart Home software directly on the vacuum cleaning robot itself.
Schlagwörter Hardware & Making

Zugehöriges Material

Folgende Ressource ist Begleitmaterial zum Video
Video wird in der folgenden Ressource zitiert

Ähnliche Filme

Loading...
Feedback