- cross-posted to:
- [email protected]
- [email protected]
- cross-posted to:
- [email protected]
- [email protected]
TP-link is reportedly being investigated over national security concerns linked to vulnerabilities in its very popular routers.
The US government is just upset because it’s harder to place back doors in non-US hardware. It’s a US national security concern to NOT have US back doors in devices.
That’s not all. The US government exists to look out for the interests of wealthy americans.
Every dollar spent on a different nation is a dollar that could’ve been spent on them, in their eyes.
American business owners know that China is competitive because they can provide better products at cheaper prices. Americans would need to invest in making their products better or lower prices to compete with China. Both result in lower profits for owners.
This is why we will never stop seeing FUD against products that offer us a better deal than those looking to exploit us further. It’s more profitable to convince useful idiots to “buy american” than it is to actually sell them products worth buying at competitive prices.
This comment is suspicious to me. It’s been companies like Apple that have pioneered using Chinese labor to increase their profits. Moving jobs to the USA won’t help make them any richer. It makes economic sense but not strategic sense
I’d personally hope they just force open sourcing their firmwares if they want to stay in the market. I really like my Omada stuff, ubiquiti is just a tough pill to swallow on price.
They (FCC) forced firmwares being signed so nobody can install their own on the off chance it unlocks TX power or frequencies not allowed by FCC.
Can’t say I’ve ever seen an example of signed firmware that didn’t exist to further exploit the working class.
I honestly like the GL.iNet approach in terms of software which is kinda like Android.
I recently bought their Flint 2 (GL-MT6000) based on multiple recommendations online when looking for a router that supports OpenWRT. That’s preinstalled, with AdGuard Home and WireGuard VPN on top of it. I’m looking forward to set it up and play around with it.
What do you exactly mean when you describe their approach in software as Android-like? That it’s easy to install services in OpenWRT?
We have this really great approach to security where we allow the adversary to infiltrate a huge portion of our infrastructure for years and at many different levels, and then we say “hm, maybe we shouldn’t be allowing this?”
Almost like it has less to do with security and more to do with securitization of economic competition.
If you really think this is just about economic competition, you’re very wrong.
The FBI didn’t recommend using encrypted messaging apps because our infrastructure being compromised is no biggie.
These are computers manufactured by and in a foreign country that’s expressed mutual hostility to the US. Computers follow instructions and manufacturers are in the best positioning to add custom instructions like “if you receive this instruction, brick yourself.”
After the cyber attacks in the last decade people should realize crypto scammers aren’t the only one’s that have an interest in shutting down important infrastructure.
This comment of yours immediately evokes the idea of the right hand that doesn’t know what the left hand is doing.
The right hand is the security theatre that the west is showing its citizens against foreign adversaries who hack their devices and introduce vulnerabilities.
Meanwhile the left hand has been doing mass layoffs and moving manufacturing off-shore ever since the 60s and 70s and trying to fuck over it’s own labour forces to make exponential profits.
Whats funny here is that you guys are bitching about “foreign adversaries” while also handing over the blueprints of your entire infrastructure to said adversaries without giving them anything valuable in return for their cheap labour cost and weak laws.
What did you expect to happen?
The right hand doesn’t know what the left hand is doing; that’s just it you’re right.
There’s no conspiracy where the left and right hand have carefully coordinated this system or conspiracy to protect companies from their legitimate competition. We’re not saying this about Taiwan or European devices (even though many of them are better than the Chinese and American devices) and that’s kind of “case and point” that it’s about more than the economy.
Basically the politicians just screwed up and didn’t think through their decisions and effects of trusting a foreign power to do all this manufacturing for important pieces of infrastructure that “think” … and now there’s a problem.
Yes, this is what a capitalist, non-centrally-planned economy does. There are multiple hands and the hand of the capitalist class is often the strongest and it will do all the things you mentioned, while the gov’t hand is trying to do damage control, but only able to the point where it hurts capitalists.
Well its just natural for coubtries to do this at this point when they dont like each other
In an off topic, I often prefer a open hardware router like raspberry pi router as it gives me control! For me it’s safer to use as documentation is open like pfsense and openwrt.
I don’t understand why doesn’t Raspberry Pi make a router when they’ve ideas like the 500 🤦🏻♂️
There’s already OpenWrt for Pi. All you need is to add a switch or a USB ethernet adapter.
Running OpenWRT is generally a good idea. I’m not gonna lie and say it’s easy to setup. But it’s worth it.
It’s a good idea, but there’s going to be firmware at lower levels (roughly the BIOS) that could still be compromised. It’s best to just not buy Chinese hardware designed and manufactured by a Chinese company with no western involvement when you can avoid it.
I’m not sure, but with routers, I think OpenWRT installs/flashes at the firmware level. There could be hardware level vulnerabilities I suppose.
In the case of Lenovo laptops used in Iraq (2004), China had additional hardware chips snooping and sending data back via Ethernet cable.
This didn’t even occur to me when I bought my new router recently. I just went with one of the best-reviewed models that had all the features and speed I needed.
Did you get a TP Link?
Last time I was in the market, they were a top pick.
Out of curiosity, what would happen with older models. Also other devices, like I don’t have a TPlink router but I do have a TPlink Ethernet to power to Ethernet I bought when I lived in an appartment and didn’t want to drill holes in the walls. (Wifi ran from center of house, but outed it to a 110 in the wall and hardwired to a PC into a RAP for work in bedroom at the time.
Sure did. The Archer BE1100 Pro.
An even better way is to leave vulnerable pieces in all parts of the firmware / software stack. E.g. old version of SSH with a known vulnerability or two, old web server, etc. Then just exploit as needed.
The examples you gave are all at the OS level and installing OpenWRT would fix them. The firmware/BIOS level is much more custom and can be susceptible to attacks the OS is completely unaware of (effectively pre-installed rootkits). Hence why I mentioned it may not be enough to install OpenWRT.
You are talking about the boot loader, but even that is pretty standard. There could be hardware exploits in place, sure, but we are mostly talking about a very low margin product and the volume of data that you’d need to retrieve and process to sift out anything useful would be massive and obvious so in general I think this is mostly conspiracy level thinking. Any shenanigans is going to be done in small targeted batches if it’s done at all to try to infiltrate specific targets and reduce risk of some curious researcher or enthusiast accidentally stumbling across it and ruining it.
Yes of course, you’re right. The point I’m making is that wherever you’re putting in backdoors, instead of backdoors, you can just leave unlatched vulnerabilities. Gives you solid plausible deniability.
Someone in the comment section posted a good question. Which specific routers that TP-Link makes are the issue?
Is it all routers that they make or is this just because they are selling inexpensive routers that have become a large part of the US market?
Does someone have an article that isn’t biased one way or the other that gives a list of effected routers ?
Which specific routers that TP-Link makes are the issue?
They are presumably talking about CovertNetwork-1658 and the reason there’s no list of routers is because no one has publicly described the vulnerability that is being leveraged.
My guess is that the vulnerability is present on most of their routers. I’m basing that opinion on the fact that previous CVEs issues against TP-LINK have impacted their most popular product lines like Archer and Deco.
It’s possible that this is related to CVE-2024-21833 which was open in January of 2024, update in July of 2024, then updated again in late November of 2024.
Does someone have an article that isn’t biased one way or the other
We’re literally inside an imperial core.
that gives a list of effected routers ?
If there was a list of effected routers, TP-Link would most likely have patched them.
Most likely old routers still sold on Amazon instead of the latest WiFi 7 models on the website~
Wait until they hear where all electronics come from. Are they gonna ban Apple?
Apple has been slowly shifting production to India for years now, and the software is made domestically.
More importantly, the hardware is designed and inspected by Apple’s engineers. Security vulnerabilities would be Apple’s failure regardless of the origin of the parts.
I am from India actually, long way to go honestly.
If that happens and the factory layoffs come, those nets are gonna be full
So they’re going to flush the TP?
I feel sorry for D-Link, they’re probably going to get caught in the crossfire via people thinking they’re the same company.
D-Link already sucks
That’s also true, they’re like the Dell of home routers~
So you’re saying that D-Link’s reputation will increase as a result?
Oof, fair 😅
So many MSPs are gonna panic if tplink is banned