ZigBee security by obscurity
The open source ZigBee stack author, Christopher Wang, has released a rebuttal to Travis Goodspeed's Smart Grid "sky is falling" security article on ZigBee Smart Energy devices.
Step back for a moment. Let's not forget that the XBox was cracked by recording a serial stream between a few chips on the board. The bootloader to the iPhone was used to sneak in the jailbreaking code that millions of users now run. And if you're really serious about hacking, then look into the decapsulation of Microchip and Atmel Mega parts by professional reverse engineering outfits.
Let's face it people. If there is physical access to a device there is certainly a way to break it. If there is motivation, someone will do it. Those keys you're looking for? They're potentially in the RAM, they're in the flash and EEPROM, they're running on a bus between the chips, and they're in the air. The solution, more and more layers! Temporal keys! ECC! Public key crypto! Security by obscurity!
Step back for a moment. Let's not forget that the XBox was cracked by recording a serial stream between a few chips on the board. The bootloader to the iPhone was used to sneak in the jailbreaking code that millions of users now run. And if you're really serious about hacking, then look into the decapsulation of Microchip and Atmel Mega parts by professional reverse engineering outfits.
Let's face it people. If there is physical access to a device there is certainly a way to break it. If there is motivation, someone will do it. Those keys you're looking for? They're potentially in the RAM, they're in the flash and EEPROM, they're running on a bus between the chips, and they're in the air. The solution, more and more layers! Temporal keys! ECC! Public key crypto! Security by obscurity!
0 Comments:
Post a Comment
Subscribe to Post Comments [Atom]
<< Home