Comment by jetrink

2 years ago

Since they've gone to the trouble of protecting it with an insecure hash, couldn't they also have designed this hardware feature so that it could be completely disabled until the device is rebooted? This vulnerability doesn't persist through reboots, so it would be sufficient to have the firmware lock the feature out during startup outside of development or manufacturing contexts.

> This vulnerability doesn't persist through reboots

I suspect, once you stop receiving data from the device, you just text it the invisible message every few minutes until you start getting data again.