I just received a new Fire TV cube gen 3, because my old one is malfunctioning. I know, I hate these devices myself, but it’s the only option right now, since a new version of the Nvidia shield isn’t coming in the foreseeable future.

So, I plugged in the power chord and the HDMI cable into the cube.

When it booted up it showed a screen that it’s downloading the newest update. At first I thought this must be some typo-bug on the initial boot steps, because I haven’t even connected it to the internet yet, neither via cable nor did I go through the wifi setup.

After the update has finished, I was greeted with my real name and the cube indeed had the actual WiFi settings!

WTF?! How’s that even possible?

  • GlenRambo@jlai.lu
    link
    fedilink
    arrow-up
    18
    ·
    10 months ago

    From @7eter below.

    “Frustration-Free Setup utilizes a network of helper devices (such as compatible Echo devices, Fire TV devices, routers, or smartphones with certain Amazon apps) that are already connected to the internet to help you set up new devices in fewer steps. When you turn on a new compatible device, helper devices in range can help it connect to your networks and/or to Alexa via wifi, Zigbee, Bluetooth, or Matter.”

    • Darkassassin07
      link
      fedilink
      English
      arrow-up
      12
      arrow-down
      2
      ·
      10 months ago

      In other words: your amazon devices are freely giving your wifi info to any nearby new amazon device regardless of whether you’ve signed into that new device or not.

      Begs the question: What other clearly private info do they give away with 0 auth or verification?

      • GlenRambo@jlai.lu
        link
        fedilink
        arrow-up
        5
        ·
        10 months ago

        “Freely” if you enable the setting as the user posted above.

        with 0 auth or verification

        The verification still needs one of the devices listed in my post to be active on your wifi to allow the setup and communication.

        The auth is likely done by device to device handshake. Its just that there isn’t a human involved.

        Don’t get me wrong I hate Amazon as much as anyone and would never have one of their devices in my home.

        But most of the other posts in this thread are missing the technical aspect of the question.

        • Darkassassin07
          link
          fedilink
          English
          arrow-up
          2
          ·
          10 months ago

          Depending on a setting being disabled thats more than likely on by default isn’t much comfort. Most people won’t know about or look for those kinds of settings, especially with the deceptive descriptions often used for features like these.

          To be clear, I don’t use these devices either; I’m just concerned for those that don’t know any better.

          The verification still needs one of the devices listed in my post to be active on your wifi to allow the setup and communication.

          Yes, that’s what I said; your amazon devices are giving away your wifi info to new devices. As in once you’ve allowed an amazon device onto your network, any new device can add itself to that network via your existing device without your input.

          This happens before the new device has authenticated into your amazon account as it doesn’t yet have an internet connection (ie before its proven to be your device and not say a neighbours) and before you manually provide authentication for your wifi. Hence the ‘with 0 auth’.

          The auth is likely done by device to device handshake. Its just that there isn’t a human involved.

          A handshake between a device you own but have little control over and a device you’ve never seen before, may not have physical access too, and that could have been compromised before requesting your info. Great.

          I’m not saying they’re beaming it out in plain text for all to read; just that they’ll give your info to a device you may not even be aware of let alone own or have any control over. That device may be a stock Amazon device, or it could be something more malicious.

          • thragtacular@kbin.social
            link
            fedilink
            arrow-up
            1
            arrow-down
            2
            ·
            10 months ago

            Yes, that’s what I said; your amazon devices are giving away your wifi info to new devices.

            No, they are not. You make it sound like any asshole can walk by and just turn something on and get your wifi info.

            If you’re worried about a device somehow being compromised between being shipped by Amazon and making it to your front door, please dispose of all electronics and go live in the woods. That level of paranoia is not reasonable.

            • Darkassassin07
              link
              fedilink
              English
              arrow-up
              2
              ·
              10 months ago

              Yes, that is exactly what I’m saying as that’s what it sounds like.

              If you can buy a new amazon device and have it connect to all your stuff without your input; what stops someone else buying an amazon device and connecting to your network with it?

              Obviously I’m not worried about the device I actually receive; I’m concerned that someone can buy their own device and use it to connect to other people’s networks via existing amazon devices.

              • thragtacular@kbin.social
                link
                fedilink
                arrow-up
                1
                arrow-down
                1
                ·
                10 months ago

                My dude, if someone is able to just walk up to your house with a random device and hang out long enough to establish a wifi connection and pull out any sort of useful data you have WAY BIGGER PROBLEMS than someone potentially using your Amazon account to order dildos.

                First of all, they have to already know you have that device.
                Then they have to physically get close enough to it for a connection to be made.
                THEN they have to hang around long enough for any sort of updates and shit to happen.
                THEN THEN they have to try and figure out how to get any useful data from this connection, which is likely an extremely limited one unless they’ve already established how to pivot out of the device and into something else in which case they probably would have just done that through your original device anyway.
                THEN THEN THEN they have to find a way to remove said useful information to a device that can actually store it.

                All while standing next to your front door holding their dick.

                It would be FAR easier to just leave a random USB stick on your porch and wait for your dumb ass to forget it isn’t yours.

                Or, even easier than that, just goddamn buy your information on the open market. They already have your address. It’s not like you can’t be found.

                Have I illustrated quite yet why these low percentage attacks are the realm of movies?

                • Darkassassin07
                  link
                  fedilink
                  English
                  arrow-up
                  2
                  ·
                  edit-2
                  10 months ago

                  First of all, they have to already know you have that device.

                  Ie: any amazon smart device; which are becoming increasingly popular and found in many homes globally.

                  Also, I’m not taking about someone targeting me, you, or anyone specifically. I’m talking about someone wandering around looking for homes that happen to have a vulnerable device and seeing where they can get from there.

                  Really not hard to find.

                  THEN they have to hang around long enough for any sort of updates and shit to happen.

                  Trivial when you consider not everyone lives in a single-family home with significant yardspace around it. Apartments exist, so do smaller multi-family dwellings.

                  THEN THEN they have to try and figure out how to get any useful data from this connection

                  The useful info here being your WIFI password (the info this connection is intended to spread) allowing an attacker to piviot to the rest of your network.

                  THEN THEN THEN they have to find a way to remove said useful information to a device that can actually store it.

                  This would be where I’ve repeatedly talked about an attacker being able to purchase an amazon device, jailbreak it, and use it to connect to your network

                  They can buy a device from Amazon then have all the time in the world to figure out a method of retrieving data from it. Once a method is worked out, they then deploy it against unsuspecting victims. (ie any random home they can get near and find an amazon device thats broadcasting looking for new devices)

                  if someone is able to just walk up to your house with a random device and hang out long enough to establish a wifi connection and pull out any sort of useful data you have WAY BIGGER PROBLEMS

                  I completely agree which is why I’m not happy with Amazon providing a hole to achieve exactly that.

                  • Lojcs@lemm.ee
                    link
                    fedilink
                    arrow-up
                    1
                    ·
                    10 months ago

                    Can’t this all be prevented by the already connected devices checking if the new device matches a newly purchased, not yet set up device in your purchase history? Really slim chance someone eavesdrops on its id and retransmits fast enough to hijack the setup

                  • thragtacular@kbin.social
                    link
                    fedilink
                    arrow-up
                    1
                    arrow-down
                    1
                    ·
                    10 months ago

                    Oh, by the way, the person with the device has to have received one that wasn’t already tied to THEIR account in any way. You know, like by the automated system that sends these things out reading a barcode on the side of the box that associates device IDs with a particular account. Not sure about anything else but this was the case a decade ago when I bought my first Kindle. I’d imagine it’s a bit more sophisticated now.

                    Go hang around a random apartment complex with wifi sniffing boxes and see how long it is before someone tackles you.

                    Honey, if you think a wifi password is needed to pivot to a network then you don’t know what the word pivot means. At that point you’re fucking BREACHED, BITCH. There’s no pivoting, only ownership.

                    Ah yes, just jailbreak the Amazon device with phantom software that somehow has completely different checksums but still… has the same checksums.

                    All of this just illustrates you’re an ignorant-ass that doesn’t know how any of this works, wringing your hands about scenarios that DO NOT EXIST IN THE REAL WORLD.

                    If I absolutely need to get into your network I’m not fucking around with a fucking rooted Amazon FireTV I’m just going to CRACK YOUR FUCKING WIFI PASSWORD DIRECTLY.

                    Apparently I have all day every day to fuck around so why do I give a shit about it taking a week or two?

                    More likely, I’ll walk up to your door with my phone in my hand and go “Hey, I just moved into the apartment next to yours and the wifi up at the office is broken. Could I log onto yours for a moment and pay a bill real quick? I apparently don’t get any damn signal here either. I just moved from a fuckin’ building where I had no signal, you’d think they’d have figured it out by now!”

                    And almost every time this will be more than enough.