• CPAP opportunities for MitM attack

    From Digital Man@21:1/183 to Ogg on Thursday, October 08, 2020 22:16:28
    Re: CPAP opportunities for MitM attack
    By: Ogg to Digital Man on Thu Oct 08 2020 11:54 pm

    ..There's an app on my phone which communicates (via the
    "cloud") with the CPAP machine, so it knows exactly how..

    Via the cloud? :/ Is the comm connection secure and encrypted?

    I assume so. The CPAP uses some low-speed/cheap cellular
    data connection (which I don't pay for) and the phone is
    most likely using TLS over TCP/IP over whatever Internet
    connection I have for it at the moment (usually Wifi to
    my cable modem). So, lots of opportunities for leakage
    and men in the middle. :-)

    Encryption would be the obvious thing to implement for a life-
    dependent machine like CPAP.

    I don't think the CPAP can be *controlled* remotely, just monitored. Also, it seems to be a "push" protocol (from the CPAP to whatever cloud-server), so they






















































































































    don't have to go polling thousands of inactive or unused devices with statistics to report. And yeah, I'm sure the data is encrypted, though that doesn't always mean "secure".

    digital man

    Rush quote #55:
    He'd like a lover's wings to fly on, to a tropic isle of Avalon
    Norco, CA WX: 62.8øF, 84.0% humidity, 3 mph ESE wind, 0.00 inches rain/24hrs --- SBBSecho 3.11-Linux
    * Origin: Vertrauen - [vert/cvs/bbs].synchro.net (21:1/183)
  • From Arelor@21:2/138 to Ogg on Friday, October 09, 2020 04:32:38
    136
    Re: CPAP opportunities for MitM attack
    By: Ogg to Digital Man on Thu Oct 08 2020 11:54 pm

    Do key fobs still operate unencrypted? I know that they
    utilize rolling codes, so that "grabbing" the signal from a
    nearby fob nolonger works as a means to break in since the
    signal is different the next time you use it. But if the
    rolling code is sequential - which has been found to be the
    case for some manufacturers - then the rolling code is a
    useless solution.

    It depends on the fob.

    I am not a lock and fob expert, but I talked about this long time ago with some guy who was. There are lots of fobs and protocols to select from if you have the money to spend.

    That said, this guy's favourite was a non IT magnetic key. The key is built with lots of mini magnets inside, and the cylinder of the lock has no moving parts you can manipulate with wire or a bumper. The downside is that making a copy of the key is very difficult because tolerances are extremely high.

    --
    gopher://gopher.operationalsecurity.es
    --- SBBSecho 3.11-Linux
    * Origin: Palantir * palantirbbs.ddns.net * Pensacola, FL * (21:2/138)