Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

They used to have root shell on telnet in early consumer drones. It was a long time ago, but that can't happen by accident; they could have used dropbear with known fixed password, Wi-Fi MAC as password, etc. They also had wildly different mass than competitors - realistically DJI - at same price/performance ranges.

So I assumed ever since that they have their unique opinions about security and architecture of a flying machine control software. Is that odd?



> They used to have root shell on telnet in early consumer drones.

Is that a problem as long as the drone WiFi is protected?


> Is that odd?

A little bit, yeah. They used to make toys, and you assume that the threat model for the toys is probably the same they would use to build anything else, and then you criticise them based on that assumption.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: