HN
Today

Man accidentally gains control of 7k robot vacuums

A software engineer reverse-engineering his DJI robot vacuum stumbled upon master credentials, granting him accidental access to 7,000 other vacuums' live cameras and microphones globally. This profound security lapse, exposing intimate home data across 24 countries, highlights the alarming negligence in IoT device security. Hacker News users are aghast at the corporate incompetence and debate the fundamental privacy risks inherent in our increasingly 'smart' homes.

74
Score
40
Comments
#8
Highest Rank
6h
on Front Page
First Seen
Feb 22, 3:00 PM
Last Seen
Feb 22, 8:00 PM
Rank Over Time
81210101323

The Lowdown

A software engineer's attempt to customize his new DJI robot vacuum took an unexpected turn when he inadvertently gained control over thousands of other devices worldwide. Using an AI coding assistant to reverse-engineer his vacuum's communication protocol, Sammy Azdoufal discovered a catastrophic security flaw that exposed intimate details from nearly 7,000 homes.

  • Sammy Azdoufal was building a custom remote-control app for his DJI Romo robot vacuum.
  • He discovered that the credentials for his device also provided access to live camera feeds, microphone audio, floor maps, and status data from approximately 7,000 DJI vacuums across 24 countries.
  • DJI confirmed an internal vulnerability in their 'DJI Home' system and released two patches in early February to resolve the issue automatically.
  • This incident is not isolated, echoing growing concerns about smart home surveillance capabilities, as seen with recent controversies around Ring cameras and Nest Doorbell data retention.
  • The article also touches on broader geopolitical anxieties regarding Chinese tech manufacturers like DJI and their potential security implications.
  • As home robots become more sophisticated and integrated, requiring unprecedented access to personal spaces, such vulnerabilities represent a significant risk for consumer privacy.

Azdoufal's 'accidental' discovery underscores a critical truth: the convenience of smart home technology often comes with significant, and sometimes shockingly overlooked, security and privacy trade-offs.

The Gossip

Credential Catastrophe & Corporate Callousness

Commenters lambasted DJI for what they perceived as 'criminal levels of incompetence' in implementing a system where a single set of credentials granted access to thousands of devices. Many questioned the use of 'accidentally' in the title, clarifying that while the discoverer's intent was benign, the vulnerability itself was a profound design failure due to corporate negligence.

Privacy Predicaments & Prudent Purchases

The discussion highlighted the inherent privacy risks of smart home devices equipped with cameras and microphones. Many users shared their strategies for mitigating these risks, such as explicitly choosing vacuums without such features or opting for open-source firmware like Valetudo, though some found the latter too complex for everyday use.

Manufacturing Misfires & Missing Micro-IDs

Commenters speculated on the technical root cause of the shared credential issue, suggesting it stemmed from manufacturing shortcuts like skipping unique key installation or a 'configuration management nightmare.' They noted that modern microcontrollers often possess unique ID capabilities, making this a clear case of 'laziness' rather than technical impossibility.

Omnipresent Observation & IoT Insecurity

The conversation broadened to the general landscape of IoT security, pointing out that robot vacuums are just one facet of a wider issue where devices like smart thermostats, coffee makers, and security cameras can become surveillance tools. While some acknowledged potential 'features' like voice control or pet-spying, most emphasized the critical lack of security scrutiny in IoT compared to smartphones.