It's a little racy - the code is jumping between frequencies while looking for a Ring, so in the worst case you end up with enough time for the notification to get through before you see it. But if you know which channel the Ring is on in advance, it's super reliable.
-
-
Prikaži ovu nit
-
This form of attack isn't Ring specific, and there's really nothing novel here. Most wifi-based home security systems probably have similar failure modes.
Prikaži ovu nit -
https://www.youtube.com/watch?v=hN3L41Ga8mE … described this being used against Nest devices back in 2016, so there's literally years of prior art and it's still all broken.
Prikaži ovu nit -
802.11w defines support for protected management frames to prevent this type of attack, and it's enabled almost nowhere
Prikaži ovu nit -
ANYWAY yes it's trivial for people to design hardware to do this and also local laws may have opinions on the legality of doing this to other people's devices
Prikaži ovu nit -
Here's a blog writeup: https://mjg59.dreamwidth.org/53968.html
Prikaži ovu nit -
Novi razgovor -
-
-
Nice. Similar to the basic stuff I was doing here, but I was just watching the frame rate of matching OUI’s. https://twitter.com/_mg_/status/960269383774842881?s=21 …https://twitter.com/_MG_/status/960269383774842881 …
1:41 -
Oh that's *very* good
- Još 1 odgovor
Novi razgovor -
-
-
I need to get headphones to watch this because my dog is so trained on the ring doorbell sound no matter where it originates from that he assumes there is an intruder at the front door and goes into bark and sentinel mode
-
you automated away his job with the police state door bell and didn't even tell him he was fired?!?!
- Još 2 druga odgovora
Novi razgovor -
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.