frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Start all of your commands with a comma (2009)

https://rhodesmill.org/brandon/2009/commands-with-comma/
230•theblazehen•2d ago•66 comments

OpenCiv3: Open-source, cross-platform reimagining of Civilization III

https://openciv3.org/
694•klaussilveira•15h ago•206 comments

Hoot: Scheme on WebAssembly

https://www.spritely.institute/hoot/
5•AlexeyBrin•59m ago•0 comments

The Waymo World Model

https://waymo.com/blog/2026/02/the-waymo-world-model-a-new-frontier-for-autonomous-driving-simula...
962•xnx•20h ago•553 comments

How we made geo joins 400× faster with H3 indexes

https://floedb.ai/blog/how-we-made-geo-joins-400-faster-with-h3-indexes
130•matheusalmeida•2d ago•35 comments

Unseen Footage of Atari Battlezone Arcade Cabinet Production

https://arcadeblogger.com/2026/02/02/unseen-footage-of-atari-battlezone-cabinet-production/
66•videotopia•4d ago•6 comments

Vocal Guide – belt sing without killing yourself

https://jesperordrup.github.io/vocal-guide/
53•jesperordrup•5h ago•24 comments

Jeffrey Snover: "Welcome to the Room"

https://www.jsnover.com/blog/2026/02/01/welcome-to-the-room/
36•kaonwarb•3d ago•27 comments

ga68, the GNU Algol 68 Compiler – FOSDEM 2026 [video]

https://fosdem.org/2026/schedule/event/PEXRTN-ga68-intro/
10•matt_d•3d ago•2 comments

Show HN: Look Ma, No Linux: Shell, App Installer, Vi, Cc on ESP32-S3 / BreezyBox

https://github.com/valdanylchuk/breezydemo
236•isitcontent•15h ago•26 comments

Monty: A minimal, secure Python interpreter written in Rust for use by AI

https://github.com/pydantic/monty
233•dmpetrov•16h ago•124 comments

Where did all the starships go?

https://www.datawrapper.de/blog/science-fiction-decline
32•speckx•3d ago•21 comments

Show HN: I spent 4 years building a UI design tool with only the features I use

https://vecti.com
335•vecti•17h ago•147 comments

Hackers (1995) Animated Experience

https://hackers-1995.vercel.app/
502•todsacerdoti•23h ago•244 comments

Sheldon Brown's Bicycle Technical Info

https://www.sheldonbrown.com/
385•ostacke•21h ago•97 comments

Show HN: If you lose your memory, how to regain access to your computer?

https://eljojo.github.io/rememory/
300•eljojo•18h ago•186 comments

Microsoft open-sources LiteBox, a security-focused library OS

https://github.com/microsoft/litebox
361•aktau•22h ago•185 comments

UK infants ill after drinking contaminated baby formula of Nestle and Danone

https://www.bbc.com/news/articles/c931rxnwn3lo
8•__natty__•3h ago•0 comments

An Update on Heroku

https://www.heroku.com/blog/an-update-on-heroku/
422•lstoll•21h ago•282 comments

PC Floppy Copy Protection: Vault Prolok

https://martypc.blogspot.com/2024/09/pc-floppy-copy-protection-vault-prolok.html
68•kmm•5d ago•10 comments

Dark Alley Mathematics

https://blog.szczepan.org/blog/three-points/
96•quibono•4d ago•22 comments

Was Benoit Mandelbrot a hedgehog or a fox?

https://arxiv.org/abs/2602.01122
21•bikenaga•3d ago•11 comments

The AI boom is causing shortages everywhere else

https://www.washingtonpost.com/technology/2026/02/07/ai-spending-economy-shortages/
19•1vuio0pswjnm7•1h ago•5 comments

How to effectively write quality code with AI

https://heidenstedt.org/posts/2026/how-to-effectively-write-quality-code-with-ai/
264•i5heu•18h ago•215 comments

Delimited Continuations vs. Lwt for Threads

https://mirageos.org/blog/delimcc-vs-lwt
33•romes•4d ago•3 comments

Introducing the Developer Knowledge API and MCP Server

https://developers.googleblog.com/introducing-the-developer-knowledge-api-and-mcp-server/
63•gfortaine•13h ago•28 comments

I now assume that all ads on Apple news are scams

https://kirkville.com/i-now-assume-that-all-ads-on-apple-news-are-scams/
1076•cdrnsf•1d ago•460 comments

Female Asian Elephant Calf Born at the Smithsonian National Zoo

https://www.si.edu/newsdesk/releases/female-asian-elephant-calf-born-smithsonians-national-zoo-an...
39•gmays•10h ago•13 comments

Understanding Neural Network, Visually

https://visualrambling.space/neural-network/
298•surprisetalk•3d ago•44 comments

I spent 5 years in DevOps – Solutions engineering gave me what I was missing

https://infisical.com/blog/devops-to-solutions-engineering
154•vmatsiiako•20h ago•72 comments
Open in hackernews

How I discovered a hidden microphone on a Chinese NanoKVM

https://telefoncek.si/2025/02/2025-02-10-hidden-microphone-on-nanokvm/
465•ementally•2mo ago

Comments

kotaKat•2mo ago
https://wiki.sipeed.com/hardware/en/kvm/NanoKVM/introduction...

Probably an older NanoKVM.

"NanoKVM-Cube hardware is built on the LicheeRV Nano platform. To coordinate production and maintain consistency with the LicheeRV Nano for the SMT project, the hardware retains the display, touch, MIC, and amplifier circuits. To address potential privacy concerns, versions 2.2.6 of the application and 1.4.1 of the firmware and above will remove the relevant drivers. We will also eliminate these components in future productions."

tayiorrobinson•2mo ago
To be fair, the microphone _is_ listed on the specsheet of the LicheeRV Nano

https://wiki.sipeed.com/hardware/en/lichee/RV_Nano/1_intro.h...

I assume they didn't intend to put a mic on the KVM product, but they wanted to make a KVM product, already had this SBC product, which reusing their existing stock of helped keep cost low.

Should they have been more up front about it it? Sure, and it's not great that they had a bunch of security issues in the FW anyway, so not exactly great, but "hidden microphone in a Chinese KVM" lets the mind wander

ndsipa_pomu•2mo ago
It doesn't strike me as that useful to have a hidden microphone in a KVM product as most of the time, they're going to be stuck in server rooms with just lots of fan noise to record.

Far more of an issue would be any kind of keylogger built into the software, which is why it's best to go for devices that support open source software.

i_am_proteus•2mo ago
It is possible to keylog via audio.

https://ieeexplore.ieee.org/abstract/document/10190721

BenjiWiebe•2mo ago
But the point of a device like this is that you (and your keyboard) are NOT physically present.
hinkley•2mo ago
They mean the K in KVM could trivially have a keylogger. For the computers attached to that KVM. Audio is for logging for computers not attached to the device in question. Which could be up to and including a whole server room save a couple machines.
ndsipa_pomu•2mo ago
What would you be able to get from the noise of loads of servers in a room where no-one is using a keyboard?
Featherknight•2mo ago
The conversations of server goblins ofc. Gotten listen in on the little gnomes inside the racks.
hinkley•2mo ago
I think I’m thinking of old school kvms you attach a laptop to instead of VNCing into.
ErroneousBosh•2mo ago
A long time ago (maybe in the mid-90s) I knew an elderly radio amateur who could not just "copy" CW by ear, but also RTTY. He could also pretty much tell what a teleprinter was printing just by listening to the noises it made, like he'd be facing away from it on the other side of the room reading out entire words from what was coming through.

Apparently in the 50s when he did his National Service he'd been in the Signals but "not in the regiment that's on his papers", make of that what you will.

I have noticed that with PSK modes and particularly PSK31 you can hear "CQ CQ CQ" as a distinctive pattern much in the same way as it is with CW.

IBM spent a fortune developing ATM keypads that - when correctly mounted - had keys that made the exact same noise no matter how you pressed them or how worn they were.

So I don't doubt that someone suitably clever could extract audio from a room and work out what was being typed.

f1shy•2mo ago
Do you have a pointer to learn more about the ATM keyboards? I would love to learn more about it
ErroneousBosh•2mo ago
Maybe. They were necessarily very cagey about it back then, but I might have some documentation kicking about in storage. I tended to keep copies of every service manual I could get my hands on back then.
CamperBob2•2mo ago
One really-cool way to solve that problem is to embed a 7-segment LED under each keycap. You walk up to the keypad and the 0-9 digits appear in random order. No one can shoulder-surf, look for wear or IR emission from the buttons, or train on the click sounds.

Dell had those on every lab door in the building back in the early 90s. You felt like 007 every time you punched in your access code. I've never seen them anywhere since.

NoMoreNicksLeft•2mo ago
And now days I can't put in my card's pin without 10 overhead cameras aimed at the register area. All the cameras of which are network-connected, video stored persistently, and high res/fidelity enough to here the little beeps as I press the keys, and to know that I've hit the enter because the screen indicates it immediately. But then Dell cared about its own security, and the grocery store doesn't give a single shit about whether my life is ruined by identity theft.
ndsipa_pomu•2mo ago
That's why I always cover the pin pad with my other hand (probably also holding my wallet) when putting in a pin. However, I think the more likely scenario to defend against is shoulder surfers - the pin by itself is useless until combined with the card, so physical presence is needed to lift the card from me.
ErroneousBosh•2mo ago
Contactless doesn't need a PIN, and indeed if it's looking for one that's a good indication that the card reader is compromised and skimming.
n5NOJwkc7kRC•2mo ago
The Austin airport has, or used to have, such keypads in places. (Doors from the baggage carousel area through to the airside ground staff areas, for example.)
seszett•2mo ago
It would take an especially perverse mind to keylog using audio on a KVM, though. The KVM basically has access to everything, any secondary spying using a microphone or a camera would provide very little added value.
saltcured•2mo ago
Maybe it's for the super secret stuff that the datacenter emergency ops worker knows not to type through the KVM? ;-)
Y_Y•2mo ago
just fan noise?

https://arxiv.org/abs/1606.05915

Any signal that you can modulate can be an exfiltration channel, and fan noise is no different.

ndsipa_pomu•2mo ago
I wonder if that's feasible in a room filled with many servers and fans going?
runjake•2mo ago
Yes, just modulate the fan noise on the transmitter, and apply a filter on the receiver.
faidit•2mo ago
Doesn't being able to modulate the fan presume you already control the target device?
alextingle•2mo ago
It's possible to get malware onto even air-gapped machines. This is a way to then communicate across the air-gap.
overfeed•2mo ago
> Any signal that you can modulate can be an exfiltration channel, and fan noise is no different.

This KVM has HDMI input and can directly emulate USB mass storage; fan-modulation is the lowest-bandwidth (side-)channel available to the attackers.

nine_k•2mo ago
You can exfiltrate data from a machine which is not connected to the KVM. A high-security machine may be even air-gapped most of the time, but be physically nearby.
close04•2mo ago
I don’t think too many of these devices will end up in server rooms as opposed to home labs. And the ones that do end up in a datacenter are very unlikely to be allowed to ever reach the internet.

If the microphone was used for exfiltrating data, it would work against random targets that happened to let the KVM connect to the internet, and who have a nearby machine infected with some malware. That kind of non-targeted attack can be damaging but is semi-useless to the attacker.

PunchyHamster•2mo ago
The KVM just uses a devboard that's also sold separately and just happens to have a microphone, given how cheap the mics are having one extra SKU would probably just cost them more than savings.

Also I wouldn't really consider it "server room" product. Pretty much any new server has KVM, this is more "a hobbyist needing KVM for their home server"

ndsipa_pomu•2mo ago
I can't recall seeing any server that includes KVM-over-IP, but instead they have some shitty remote access controller (e.g. Dell iDRAC) that is buggy as hell and requires a subscription to even get working.
fsmv•2mo ago
Supermicro boards have it via the IPMI Ethernet port. Doesn't require any sign up.
ndsipa_pomu•2mo ago
That sounds good - I thought they required a license key to get working.

(However, IMPI is a security nightmare with backdoors, default passwords and weak encryption)

n5NOJwkc7kRC•2mo ago
Intel AMT? Whatever AMD calls theirs?
hinkley•2mo ago
Ultrawideband never caught on because it turns out that the speed of light and sound in air is frequency dependent, so you have to know the distance to the target pretty accurately and then skew the signal to send or receive. (Imagine a phased array antenna but also with a frequency domain to work out as well).

But that doesn’t mean you can’t make it function in a loud server room. The whole point of it is working in and around noise.

parineum•2mo ago
The Chinese part makes one think the Chinese could access the microphone.

Nevermind that, if they could access the device, they'd also be able to read your kvm i/o.

motbus3•2mo ago
You might be right but I think we cannot assume malice when it could be laziness. It might be that the exact same board has multiple target audiences and they just rebrand it for different purposes with different pricing.

That said, the microphone is so weirdly positioned that it gets suspicious indeed.

inetknght•2mo ago
> I think we cannot assume malice when it could be laziness

Why can't it be both?

calmworm•2mo ago
Perception of laziness with an option for later maliciousness and somewhat plausible deniability.
Ekaros•2mo ago
>That said, the microphone is so weirdly positioned that it gets suspicious indeed.

How is it weirdly positioned? To me it seems there is rather few options for such small board.

b00ty4breakfast•2mo ago
> I think we cannot assume malice when it could be laziness

If you are too lazy to go back and check if you left the gas on, you bear responsibility if the place explodes.

At the very least, it's negligent to leave something like that in and not be very upfront about it.

TheRealPomax•2mo ago
And rather than "the Chinese", how about "anyone robo-dialling some SSH connections"?
hinkley•2mo ago
Microphones and LEDs have been used famously for side channel attacks and also to circumvent air gaps. From a Least Power point of view this is troubling.
Rygian•2mo ago
"hidden microphone in a Chinese KVM" is the correct way to describe what is going on.

"Reusing existing stock" is not a valid excuse. They are currently selling this device without advertising that it contains a working microphone.

mintplant•2mo ago
A working microphone and recording software and hacking tools like aircrack-ng on an otherwise stripped-down OS image...
heavyset_go•2mo ago
Vendor BSPs are horrible, it would not surprise me if tools like that were included with it.

I used one that included everything in C:\Users\<actual dev's name>\Desktop in it.

firesteelrain•2mo ago
Was it made in China?
ghostpepper•2mo ago
Aren't virtually all SBCs made in China?
firesteelrain•2mo ago
I was referring to Board Support Packages
heavyset_go•2mo ago
Depends on what part of the hardware or software stack you're talking about. In general, yes there Chinese software and hardware components. This BSP looks like it was an international effort.
LorenPechtel•2mo ago
Given it's history I suspect there is nothing malicious going on here, just a Chinesium approach to building something. Security isn't documented so it's made of tissue paper.
MomsAVoxell•2mo ago
I'm completely fine with there being a microphone in the thing. It's literally a remote eyes/hands interface, so it being an eyes/ears/hands interface is perfectly acceptable.
mannanj•2mo ago
any speaker can be tapped into as a microphone by a motivated government.
Aachen•2mo ago
From a hardware point of view I've also noticed that speakers work like poor microphones (and LEDs like poor solar panels / light sensors), but is there any way to actually make this work on most devices without physically changing wiring? If the circuits aren't made to take measurements (or the software can't get at the readings) but only set a voltage on the wires, there wouldn't be a way to (ab)use this. I don't know enough about electronics to know whether this is commonly the case

Not that it's not a good thing to be aware of, but do you have any sort of source for what kinds of devices can have their speakers turned into microphones? Then I'll believe you about the government part

withinboredom•2mo ago
I don’t think they meant literally “any” but more like a device with a speaker could be delivered to you that has a speaker/microphone. Like a Bluetooth speaker you order of the internet. It seems it would probably have to be personally targeted to you, but in that case, there are probably simpler ways.
stragies•2mo ago
Many a soundcard supports changing jack "direction". Here's a StackExchange answer from 2012, on how to do it with the GUI tool `hdajackretask` : https://askubuntu.com/a/911961
mannanj•2mo ago
Any was an exaggeration and less than honest on my part, I apologize. I think the speakers in most smart devices though can because they have the circuitry as another comment mentioned to record the input in reverse via software.

I think most speakers would have that today, most modern speakers. Plain speakers that just take a voltage signal though, probably not. Though how many people use those kinds of speakers today I wonder.

Workaccount2•2mo ago
No, because the drive circuit for a speaker is the opposite of the circuit for a microphone. The output stage of a speaker amplifier is just that, an output. The only way to record audio from a speaker, which is totally possible, is to have also purposely built an input stage also attached to the speaker. Which at that point you might as well just use a microphone...

Audio input and output are not reversible.

Y_Y•2mo ago
I don't know what you mean here, I can plug a speaker into my mic slot and use that to record, just as plugging a mic into the speaker slot gives a (crappy) speaker.
cdaringe•2mo ago
> purposely built input stage

You moved your device to the purposely built input stage.

Not an expert, but your remark doesn’t compute with the parent comment

Workaccount2•2mo ago
Because on your computer the engineers purposely put a switch that can direct the signal to either the input hardware or the output hardware.

It's not a mic slot, it's a general analog I/O port with a 3.5mm form factor.

15155•2mo ago
A DAC and amplifier circuit is electrically incapable of processing input (on its own.)

Physically unplugging and moving a speaker to a mic input works, sure, but very few devices can do this switching electronically.

tosti•2mo ago
I think most intel HDA compatible chips can do this. You can specify which pins are connected to what.
stragies•2mo ago
on many cards they are, check out the tool `hdajackretask` from package `alsa-gui-tools`.
Milpotel•2mo ago
> [...] and runs a heavily stripped-down version of Linux that lacks systemd and apt. And these are just a few of the issues.

?!

stefan_•2mo ago
> But what additionally raised red flags was the presence of tcpdump and aircrack - tools commonly used for network packet analysis and wireless security testing. While these are useful for debugging and development, they are also hacking tools that can be dangerously exploited.

Must be another AI slop article. Stop feeding your writings into GPT & co to turn into extra long nonsense.

kenjackson•2mo ago
What was wrong with the above paragraph?
nottorp•2mo ago
Let's see:

1. It lacks systemd and apt.

systemd is so resource hungry that i'm sure they removed it to reduce the RAM bill. Apt... why install apt if the distro has a different means of updating?

2. While these are useful for debugging and development, they are also hacking tools that can be dangerously exploited.

This is purely fear mongering. Even the shell could be a "hacking tool that can be dangerously exploited". Let's remove the shell too.

There are some legitimate complaints in the article, like the use of the same key on all installs. The rest looks more like fear mongering and security theater.

Including the microphone. What were they supposed to do, desolder it manually and add $10 to the price of each device?

I don't see the article complaining that a PiKVM has so many unused peripherals when used as a KVM. To go in the spirit of item #2, the usb ports could be used as "dangerous hacking tools" so you should desolder your usb ports from a Pi used as a KVM, right?

mystraline•2mo ago
Cat is a hacking tool cause you can see the contents of /proc/kcore?

Cp is a hacktool cause bad files can be copied?

Grep is a hacktool cause only monster hackers use regex?

(This is obvious sarcasm)

f1shy•2mo ago
Heck, everybody knows Linux is a hacker OS…
nottorp•2mo ago
Hey I didn't think of that. They forgot to complain that the device doesn't use a properly licensed OS that they certified secure!

Absolutely with systemd and apt. Like apt couldn't be used to install "hacking tools".

whalesalad•2mo ago
I don’t see this as noteworthy myself. It’s expected on a small embedded device such as this. You’re usually lucky to have busybox.
kps•2mo ago
Presumably Alpine. I bet it doesn't run GNOME either. And these are just a few of the issues!
knallfrosch•2mo ago
Lacking software (apt) is a security issue. Having software installed (tcpdump) is also a security issue.
margalabargala•2mo ago
Could you elaborate on how lacking apt is a security issue?
FateOfNations•2mo ago
apt is a package manager. It's only relevant if the system uses it to manage it's packages. Red Hat based distributions, for example, don't use apt. Embedded devices typically don't manage packages on an individual basis, rather updating the entire distribution via "firmware updates".
lousken•2mo ago
is there a recording sample to hear the quality?
jlward4th•2mo ago
I recently discovered a similar concerning security issue with my KVM. In my case it was a pretty standard KVM for multiple machines to share a keyboard, mouse, and screen but also Ethernet. One day while looking at my home network I noticed the KVM had its own IP and was transferring GBs of data everyday. I quickly blocked it from my network. But having used it for a number of months I worried that with screen capture and access to all my input devices, someone could have gotten access to pretty much everything I use. I wasn’t able to figure out if any data was actually being sent off my network and I really didn’t want to put myself in any more risk so I just threw it in an electronics recycling bin. Pretty scary what a network connected KVM could maliciously do.
Renaud•2mo ago
Shame you threw it away. It would have been useful to collect the traffic with Wireshark and share that with info about the device in a post or a blog for others to investigate and be warned about that brand and model.
stragies•2mo ago
Why did you not just login to the device, and switched off "Broadcast to multicast", or changed the destination address?

Edit: Some brands of Network-KVM use this, so that you can control the target device from another device, like e.g. an App on a tablet. That way you don't have to stand next to the target device in the noisy and cold machine room

jlward4th•2mo ago
The KVM didn't have any documentation on anything related to its network interface. I ran a port scan on it but didn't know if there was a way to log into it.
simoncion•2mo ago
> The KVM didn't have any documentation on anything related to its network interface.

My research disagrees. See [0]

[0] <https://news.ycombinator.com/item?id=46177462>

CoastalCoder•2mo ago
Is it possible for you to name the KVM model?

It sounds like a potential risk is to the public.

jlward4th•2mo ago
It is this one: https://www.amazon.com/dp/B0CP4PD3SM

I did post a review there citing my security concerns.

Honestly I didn't go further with the investigation because if someone really has all my data, I'm worried about retribution.

stragies•2mo ago
Was the network port bridged to both PCs all the time (as the description makes it sound, or did only the "active" PC get a functioning network connection? Could you tell from the FDB of the upstream device, if there were more than two MAC addresses active on the port? Did you (hopefully) open it up and make PCB pictures before chucking it?
jlward4th•2mo ago
The network was active for both machines connected to it. And it had its own IP. So 3 MAC addresses in total. I didn't ever open it up. But maybe someone will be interested in buying one and exploring more.
simoncion•2mo ago
This picture from the list of product pictures [0] indicates that the thing acts as an Ethernet bridge. It probably exposes itself as a USB-C gigabit Ethernet device to the machine it's plugged into.

Page four of TFM [1] supports this theory.

Also, this functionality is called out in the product listing and in the manual. I'm over here laughing my ass off because OP got so frightened by this clearly-documented feature that they immediately threw the thing in the trash, rather than first investigating to see if the source of the network traffic was the machines plugged into the device.

[0] <https://m.media-amazon.com/images/I/71GglDmzCYL._SL1500_.jpg> (If this direct link fails, it's the image that has the header "A Stable Gigabit Ethernet Port".

[1] <https://avaccess.com/wp-content/uploads/2024/01/UM-_-iDock-C...> (This is the "DOWNLOAD USER MANUAL" link in the Downloads subsection of the More Information section of [2])

[2] <https://www.avaccess.com/products/idock-c20-kvm-switch-docki...>

stragies•2mo ago
The manual, as OP said, does not offer any explanation, why the device might show up with an additional MAC/IP at the upstream switch port, and which services it might offer. OP sounds knowledgeable enough to be able to exclude the possibility, that the additional MAC/IP could be from one of the PCs, like e.g. when playing with VMs using an internal bridge in the Hypervisor.

Maybe the device has a bigger "cousin" device, that includes "control via APP", and this feature was not properly/fully disabled on this one.

n5NOJwkc7kRC•2mo ago
> why the device might show up with an additional MAC/IP at the upstream switch port

> the thing acts as an Ethernet bridge

A USB-C NIC has its own MAC and would thus get its own IP.

supportengineer•2mo ago
What an amazing device, but also the price is incredible. This kind of device would have been such a game changer 15 to 20 years ago. Thank you for the detailed security analysis. At least the developers are responsive, that does seem like a green flag.
bethekidyouwant•2mo ago
If someone hacks your KVM, I’m thinking the onboard microphone is the least of your problems.
_def•2mo ago
Anyone got a link to some community work on the open source side? Sounds like useful devices, if you fix the issues mentioned.
gunalx•2mo ago
I dont see the issue here. Its not like they have not disclosed what board it is based upon. And I do feel like its correct not advertising a mic if you dont have it enabled on this one.

I dont really like nanokvm for being slow with updates and not patching stuff fast enough.

pirbull•2mo ago
> You can start with your iPhone - last year Apple has agreed to pay $95 million to settle a lawsuit alleging that its voice assistant Siri recorded private conversations. They shared the data with third parties and used them for targeted ads. “Unintentionally”, of course! Yes, that Apple, that cares about your privacy so much

the clickbait title makes sense after reading this paragraph

gruez•2mo ago
Not really, because the paragraph you quoted was highly misleading. Even the plaintiffs admit that the recordings were caused by accidental activation, not some sort of nefarious conspiracy by Apple. Moreover there's no evidence that Apple "used them for targeted ads", only that they handed over to third party contractors for improving siri.
LorenPechtel•2mo ago
And Siri promptly got disabled on my wife's iPad because she kept triggering it inadvertently. Something about her accent kept tripping it. (And, in reverse, Alexa will often not trigger when my wife tries. She comes from a tonal language and it creeps into her English extensively.)
jxhdh•2mo ago
You are using a KVM. When not trusting the manufacturer a microphone is the least of your problems xD
pixl97•2mo ago
This said wildly inappropriate features included do violate the principle of least user authorization. You expect if your KVM gets hacked your servers are pretty fucked, the problem now is any conversation you had by the KVM is suspect too.

Goes along with 'the S in IOT stands for security'.

snapdeficit•2mo ago
A kvm that requires Chinese dns servers? Just the fact it KvM over Ethernet should set off alarm bells from here till next Thursday. I would have a hard time trusting an internet based kvm.
macki0•2mo ago
wait till you find out about iLO/iDRAC or vPro
Ekaros•2mo ago
Should I really be more trusting of some NSA controlled DNS server?
snapdeficit•2mo ago
Yes. Hahaha. Of course not. Or maybe?? No, just kidding. But am i?
ghostpepper•2mo ago
A lot of the complaints here don't make a lot of sense and read like the author has never used an embedded linux device. The previously reported bugs are more substantial - hardcoded secrets for JWT access and firmware encryption, everything running as root, etc.

However, "Chinese product uses Chinese DNS servers and it's hard to change them" or "no systemd nor apt installed" are totally expected and hardly make it "riddled with security flaws". Same with tcpdump and aircrack being installed - these hardly compromise the security more than having everything run as root.

I would expect most users of this device will not be exposing the web interface externally, and the fact that they ship with Tailscale installed is actually impressive. I can't imagine the lack of CSRF protection will be a vulnerability for 99% of users.

I am curious what the "weird" version of wireguard the author refers to but based on their apparent lack of knowledge on embedded systems in general I would not be shocked to find that it's totally innocuous.

itopaloglu83•2mo ago
Hanlon's Razor at work; most of the shortfalls described in the article points to incompetence more than malice.

Though I find it strange though, because I would call this the shortcomings of a crowdfunded project, but the author took it as a malicious and planned act to take over target computers and networks.

As far as I remember, some of the botnets are formed by routers that vendors refused to patch, because they're no longer being sold and not profitable to do so.

butvacuum•2mo ago
I think you haven't gone far enough. Most of this thread is rampant ignorance and propaganda influenced bandwagoning.

1) It's from a company known for dev boards and SoCs- not consumer products.

2) The code is available on GitHub (nice!)

3) SiSpeed actively contributes to the mainline linux kernel for RISC-V in general as well as their SoCs.

4) Security in Embedded Applications is just... Bad. Amercian, Chinese, European, Russian, Indian- it doesn't matter.

Ekaros•2mo ago
Also what do you really expect for 30€ or 60€ price point? On relatively low volume product. It even doing what is promised is already a good start to me. And that probably tells their priorities. Start from some already working image with wide support for features. And then add the features that are needed in specific use case. And then ship it.
nickphx•2mo ago
yeah.. their list of issues speaks more to their lack of experience and understanding of linux and embedded linux devices wrapped in xenophobic nonsense...
unknown_rookie•2mo ago
Once I dissected the code of a FDA-approved medical device, Vendys Endothelix. If connected to the internet, the device would covertly send measurement data to a specific email address. The usernames and comments baked in the code suggested Chinese development. I would be curious to know what percentage of our highly sensitive data ends up overseas.
SoftTalker•2mo ago
I think it's safe (or maybe prudent) to assume that pretty much all phones, computers, and network switching gear are backdoored by someone.
n5NOJwkc7kRC•2mo ago
What was "covert" about it? What is "measurement data"?
finaard•2mo ago
> To summarize: the device is riddled with security flaws, originally shipped with default passwords, communicates with servers in China, comes preinstalled with hacking tools, and even includes a built-in microphone

So like pretty much any BMC out there, just with the benefit that an attacker taking over that thing doesn't have direct access to reflash your bios with a backdoored version?

Any halfway sane person deployed any kind of BMC or networked KVM to a access restricted management VLAN for at least a decade now because all of those things are a big mess, and the impact of them getting owned typically is pretty severe.

neom•2mo ago
Gotta be careful about them hidden microphones, they could be listening and recording all the keyboard clicks and translating them to the device.
iJohnDoe•2mo ago
Such a cool device.

Is it possible to buy something like this which is intended to be user installable for Linux that I could test/mess around with?

PunchyHamster•2mo ago
The device is based on linux devboard so... yes
kyrofa•2mo ago
> [It] runs a heavily stripped-down version of Linux that lacks systemd and apt. And these are just a few of the issues.

You mean it's not Debian-based? How is this an issue?

mrbluecoat•2mo ago
> The device initially came with a default password, and SSH access was enabled using this preset password

That alone ends my trust in the brand.

PunchyHamster•2mo ago
...you need a password to log in onto it to change it. That's hardly unique.

You could say "but they could make random one that is displayed on display!", but they also sell headless version with no display at all so that's not an option

DooMMasteR•2mo ago
they also fixed the issue, SSH is off by default now.

BUT BE WARNED: it runs a web-server by default with no password set from the factory, you have to configure it first run to secure it....

yeah, this article is mostly a no banger, they made some dumb oversights/mistakes with the firmware but fixed them quickly and even documented the issues and concerns. The firmware if open source after all.

wkat4242•2mo ago
Whoa I have a bunch of these.

But I never trusted them in the first place so they don't have internet access anyway. They're on a separate subnet. It'll be fine.

Also where my servers are there's nothing interesting to hear except more servers and 3D printers.

milesvp•2mo ago
Mics have a pretty standard look, and are hard to miss on the board. It would be more insideous if there were cheap film caps leading into a very expensive ADC. I work with with analogue audio, and it’s very important to design around the noise of cheap caps. They are for all intents and purposes microphones and if you were clever about different caps for different frequencies and good digital processing I have no doubt you could build something with comparable fidelity to some of the cheapers MICs in the vocal range.
nixpulvis•2mo ago
Why is there a component on the board that isn't used in the product for any official purpose then? Even if you believe it was an accident and an oversight (which it could have been), you should be upset because it's something that could be pretty serious if you used in your home.

Just because you might claim it's not malicious, doesn't make it not negligence.

milesvp•2mo ago
So usually you would DNP the parts and they wouldn’t populate at the factory. But sometimes you have a bunch of boards already made that for some reason you can’t use for another SKU, and so you put them in another housing, and change the board for the next rev.

Mind you, I’m not saying a mic in a KVM isn’t sus, just that it’s a little obvious, and certainly not stuxnet level espionage.

slanterns•2mo ago
Cuz it's simply built upon the existing LicheeRV Nano SBC, then it has the same component just as the board.
rcarmo•2mo ago
This is… not news. The base board has always had a microphone, the NanoKVM was just built around that base board.
eps•2mo ago
tcpdump is not a "hacking" tool, not in a sense implied in the article.
PeterStuer•2mo ago
These days tbh I'm just assuming every device I purchace has a microphone for one of the completely unwanted 'assistants'.
franga2000•2mo ago
Why is this article trending again?? The NanoKVM is showcase product for the LicheeRV Nano. A built-in microphone is an advertised feature of that board.

I like Matej's work, especially his GSM stuff, but this article is so overblown. A third are known issues and another third are non-issues. The last third was good security work and I genuinely appreciate he did it. Beat me to it by a feew weeks, since my order was stuck in customs while I tried to explain to them what a KVM was...

crest•2mo ago

  * Includes a microphone? Look at the datasheet of the devboard they used, dummy.

  * Running everything as root? Valid point. That's a inexcusable mistake and has been for ever a sign of laziness and ignorance. 

  * Not including systemd? Yes please.

  * Not including a package manager the author nows? Shows the authors ignorance to assume apt would be found on a small embedded system.
account42•2mo ago
> For instance, a security researcher even found an image of a cat embedded in the firmware.

How can the article not include this picture or at least link to it. Internet, today you have disappointed me.

zepan•2mo ago
Thanks to everyone for following the discussion on NanoKVM security. I think most of you will know exactly what to make of this article the moment you read the complaint that it 'runs a heavily stripped-down version of Linux that lacks systemd and apt.'

Most of the claims in the article are not real vulnerabilities. Some harmless behaviors were indeed easy to misinterpret if viewed with bias, but we actually changed those behaviors and implementations over 10 months ago. It is surprising to see this article coming out today instead of last year.

As for the onboard mic, it is not 'hidden.' It is a component that has been clearly documented and explained in our Wiki: https://wiki.sipeed.com/hardware/en/kvm/NanoKVM/introduction... We believe open source lets the facts speak for themselves. Thanks to the NanoKVM community for using your technical common sense to help clear this up!