this post was submitted on 06 Dec 2025
142 points (92.3% liked)

Technology

77090 readers
1961 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
top 21 comments
sorted by: hot top controversial new old
[–] NuXCOM_90Percent@lemmy.zip 59 points 10 hours ago (1 children)

Apalrd has done some great "popular computer science" videos on the various remote KVM devices that is well worth looking up. One of them specifically goes into the ridiculously sketchy methods that are used to fetch and execute unsigned code in random buckets to handle firmware updates.

But as for the mic? Honestly, if you open up a LOT of consumer devices you are going to find random microphones. Not because they are all secretly spying on you. But because they use "off the shelf" chips and boards that already have those embedded. Especially since microphones and speakers are kind of the same hardware in most cases and we ALL love a good beep.

I 100% agree the software stack shouldn't be on there. But, as the blog post points out, there is a LOT of developmental code and packages in that image that shouldn't be. It is likely just a case of not removing unnecessary packages from the base image.

Because... the entire point of a device like this is that you plug it in somewhere you aren't. MAYBE JetKVM corp can hear me muttering profanity or wondering where I left that USB c splitter when I am trying to assemble it the first time. The rest of the time? It is plugged into the back of a server that I am booting up so that I can install proxmox without having to drag a monitor over. And while you can potentially get some juicy info out of that? It is not at all worth the hassle to set up fake companies and market a fake (moderately high demand in the right circles) device.

[–] BCOVertigo@lemmy.world 47 points 10 hours ago* (last edited 7 hours ago)
[–] paraphrand@lemmy.world 24 points 8 hours ago* (last edited 8 hours ago)

To summarize: the device is riddled with security flaws, originally shipped with default passwords, communicates with servers in China, comes preinstalled with hacking tools, and even includes a built-in microphone - fully equipped for recording audio - without clear mention of it in the documentation. Could it get any worse?

I am pretty sure these issues stem from extreme negligence and rushed development rather than malicious intent. However, that doesn’t make them any less concerning.

Slop everywhere. As far as the eye can see.

[–] GreenKnight23@lemmy.world 24 points 9 hours ago (2 children)

I had several IOT smart plugs that have GPS built in.

why? why would it need to know its exact geographic location?!

after that I created an entire hardware segmented network that's specifically used for IOT and cameras.

last I checked the router/firewall it's on has blocked over 11million requests a month trying to access the outside.

I will never have a "smart" device in my home that's connected to the internet. I'll live like it's the 1930s if I ever have to.

[–] phoenixz@lemmy.ca 13 points 9 hours ago (1 children)

Likely because the manufacturer used of off the shelf hardware that just happened to have GPS built in? That's just how these things go, it's easier to just use pre designed hardware for what you need, even if it has functionalities you won't use.

Hell, I'd argue that the vast majority of computer hardware out there isn't using half of the features that it has.

Just because features are there doesn't mean they're used, and definitely doesn't automatically mean that there are evil or nefarious intentions with its design

[–] BCOVertigo@lemmy.world 8 points 8 hours ago* (last edited 8 hours ago)

I agree with you in principle but that doesn't really help us much when poorly wrought digital devices get compromised en masse. I can say "Mirai" and way too much of the population knows that it's an IoT botnet.

Those default passwords and superfluous software packages are cut corners, and directly translate to risk in your own home. Maybe you don't feel that 2025 has been enough years of neglect to start calling it malfeasance , but if they're tired of shit breaking and getting hacked and losing support I can definitely see the point of keeping more analog devices to minimize those risks.

Opportunity makes the thief, right?

[–] Nighed@feddit.uk 7 points 5 hours ago

GPS is a great way to get an accurate time.

[–] BlackEco@lemmy.blackeco.com 15 points 10 hours ago (5 children)

FFS... I'm never going to buy anything hyped by LTT before doing more thorough research on it.

[–] ImgurRefugee114@reddthat.com 20 points 9 hours ago

Obviously never rely on a single source before buying something, but this isn't news. See the other dude's comment https://lemmy.world/comment/20879776

[–] moonshadow@slrpnk.net 8 points 9 hours ago

Paid hype is a red flag imo

[–] myfunnyaccountname@lemmy.zip 5 points 4 hours ago

Well it’s LTT. They would sell shit in a box for the right price.

[–] paraphrand@lemmy.world 1 points 8 hours ago

Their reviewers are always so flippant and trying to be cool and casual about it all. I don’t know how anyone can take them seriously.

[–] NuXCOM_90Percent@lemmy.zip -1 points 8 hours ago

Yeah. Believe it or not but the sex pest who actively didn't warn his contemporaries about the impact of the honey plugin and who now advertises on kiwi farms might be kind of a piece of shit who will say anything for a buck?

And now for a word from d-brand!

[–] phoenixz@lemmy.ca 11 points 9 hours ago (1 children)

How I discovered a microphone by reading the he documentation on GitHub?

[–] cyberpunk007@lemmy.ca 3 points 6 hours ago* (last edited 6 hours ago) (1 children)

Is that a question or a statement?

[–] Retro_unlimited@lemmy.world 8 points 11 hours ago

I was really sketched out with my BLI-KVM. I had a server that was off, when I booted it the bios was in Chinese. Although someone did say that motherboard had a flaw that would do that, I wasn’t Sure if it was the KVM or the motherboard, but still…

[–] beerclue@lemmy.world 6 points 5 hours ago (1 children)

I mean, I wouldn't call tcpdump a "hacking tool"..

[–] ripcord@lemmy.world 2 points 5 hours ago

I have this hacking tool called "passwd" which is useful for hacking. Also one called "Linux"

[–] Krudler@lemmy.world 4 points 9 hours ago (1 children)

Guys I discovered a hidden microphone in my headphones speaker!!!

[–] FauxLiving@lemmy.world 4 points 6 hours ago

And poorly designed software in my… everything