• Remote =?UTF-8?B?4oCcS2lsbCBTd2l0Y2jigJ0=?= On A Home Appliance

    From Lawrence =?iso-8859-13?q?D=FFOliveiro?=@ldo@nz.invalid to comp.misc on Sun Nov 2 03:38:43 2025
    From Newsgroup: comp.misc

    A hardware geek bought a robot vacuum cleaner, checked on his network
    traffic out of curiosity, and discovered that the device was sending
    personal details about the layout of his home back to a central server
    -- which he hadnrCOt agreed to. So he set his home firewall to block
    access to the vendorrCOs telemetry servers ... only for the vacuum
    cleaner to stop working altogether a short while later.

    He sent it in to be fixed, after which it would work again for a few
    days, and then stop again. After a few rounds of this, the repairers
    refused to look at it again, claiming it was rCLout of warrantyrCY.

    So he opened it up to take a closer look, including adding connectors
    and writing some custom scripts to test out the various parts. He
    verified that they all worked ... and that the whole OS setup was a
    security nightmare. He also discovered, from a log file, that a
    particular command had been sent from the vendorrCOs server at the
    moment the device stopped working. When he undid the effect of that
    rCLkillrCY command, his vacuum cleaner worked again.

    So herCOs using it again, on his own terms ... and presumably with all
    Internet access completely blocked.

    <https://www.tomshardware.com/tech-industry/big-tech/manufacturer-issues-remote-kill-command-to-nuke-smart-vacuum-after-engineer-blocks-it-from-collecting-data-user-revives-it-with-custom-hardware-and-python-scripts-to-run-offline>
    --- Synchronet 3.21a-Linux NewsLink 1.2