According to the researchers, TCL patched the vulnerabilities they had identified silently and without any warning. “They updated the (TCL Android) TV I was testing without any Android update notification or warning,” Sick Codes said. Even the reported firmware version on the TV remained unchanged following the patch. “This was a totally silent patch – they basically logged in to my TV and closed the port.”
Sick Codes said that suggests that TCL maintains full, remote access to
They should just call it "telemetry". Then it will be fine. We're only bashing them because they're Chinese, aren't we? Like Microsoft doesn't have full control over your PC. Or like Amazon will let you know what its spy pods are really doing. People act like you could port scan a device and know if it has some remotely accessible service running. It is absolutely trivial to make a device behave like nothing is listening and still allow the manufacturer to remotely access the device. On any device with auto
by Anonymous Coward writes:
on Friday November 13, 2020 @06:46AM (#60719058)
And while you're naming names, you forgot to meantion that Sony updates their devices to actively remove functionality you had from when you originally purchased it. Where do you think Tesla learned that trick from?
If posting the whole article keep the funny part.. (Score:5, Informative)
According to the researchers, TCL patched the vulnerabilities they had identified silently and without any warning. “They updated the (TCL Android) TV I was testing without any Android update notification or warning,” Sick Codes said. Even the reported firmware version on the TV remained unchanged following the patch. “This was a totally silent patch – they basically logged in to my TV and closed the port.”
Sick Codes said that suggests that TCL maintains full, remote access to
Re: (Score:5, Insightful)
Re:If posting the whole article keep the funny par (Score:2, Interesting)