this post was submitted on 23 Jul 2024
232 points (98.7% liked)

Technology

59377 readers
4289 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
 

The Department of Homeland Security (DHS) has announced that it has developed a four-legged robot designed to jam the wireless transmissions of smart home devices. The robot was revealed at the 2024 Border Security Expo and is called NEO. It is built using the Quadruped Unmanned Ground Vehicle (Q-UGV) and looks a lot like the Boston Dynamics Spot robot.

According to the transcript of the speech by DHS Federal Law Enforcement Training Centers (FLETC) director Benjamine Huffman, acquired by 404 Media, NEO is equipped with an antenna array that is designed to overload home networks, thus disrupting devices that rely on Wi-Fi and other wireless communication protocols. It will thus likely be effective against a wide range of popular smart home devices that use wireless technologies for communications.

you are viewing a single comment's thread
view the rest of the comments
[–] KairuByte@lemmy.dbzer0.com 4 points 3 months ago (1 children)

I don’t believe this is the case. 3 is fairly robust, and 2 is still just brute forcing, though rapidly on a local CPU. The one that’s trivial is trivial to crack is WEP.

[–] Trainguyrom@reddthat.com 1 points 3 months ago* (last edited 3 months ago) (1 children)

WPA2 is pretty trivial too. Not as easy as WEP since you do have to locally brute-force the PSK (password), but that's pretty quick on modern systems. We had multiple assignments when I was in college that had cracking a WPA2 password as a step (in the interest of time, the instructor used passwords from the RockYou list but still)

[–] KairuByte@lemmy.dbzer0.com 4 points 3 months ago (1 children)

Yeah, if you’re using common words or variants thereof, you’re gonna have a bad time. But a 128 character string of random characters is going to be functionally safe from such an attack, for now.

[–] JasonDJ@lemmy.zip 1 points 3 months ago* (last edited 3 months ago)

And you'll go crazy every time you try to add a device that doesn't support QR code scanning.

Just use multiple dictionary words with a symbol or two thrown in. Or go all out and set up 802.1x with client certificates and save the PSKs for a firewalled segment of less important crap.

Although it's worth mentioning that wireless security means nothing to jamming. Jamming is RF, it's destroying layer 1 before WPA matters.