Hot Topics | |
---|---|
BigInJapan wrote:High-tech Japanese toilets are vulnerable to attack from their manufacturer's own Android app. As The Atlantic reports, a security advisory from researchers at Trustwave says all Inax Satis Bluetooth toilets have the same Bluetooth PIN ("0000") hardcoded, allowing anyone with the My Satis Android app to control any toilet within range.
What can you do with the app? Apart from activating the flush and checking in on the detailed defecation records stored by the commode, you can also activate the toilet's bidet and drying functions, summoning a jet of water or hot air from below. Trustwave has attempted to inform Inax of the flaw three times since its discovery in June, and is only now making the vulnerability public. We've reached out to Inax USA for comment on the revelation, and will update this article accordingly. [seen on the Verge]
, allowing anyone with the My Satis Android app to control any toilet within range.
Yokohammer wrote:I'm pretty sure Coligny has a new idea for a movie car chase scene right about now.
Yokohammer wrote:I'm pretty sure Coligny has a new idea for a movie car chase scene right about now.
Screwed-down Hairdo wrote:Yokohammer wrote:I'm pretty sure Coligny has a new idea for a movie car chase scene right about now.
Now, you're mention of Coligny has got my moral compass pointing in a strange(r than usual) direction...
Coligny wrote:This Lawnmower tuning trend haz to stop... before somebody gets hurtzed...
Coligny wrote:Screwed-down Hairdo wrote:Yokohammer wrote:I'm pretty sure Coligny has a new idea for a movie car chase scene right about now.
Now, you're mention of Coligny has got my moral compass pointing in a strange(r than usual) direction...
Next you will tell me than joining th3 USNA don't make you play topless gay ass beach volley in th3 hot sand...
Seriously... the lyrics are golden... (shower worthy)
Coligny wrote:BigInJapan wrote:High-tech Japanese toilets are vulnerable to attack from their manufacturer's own Android app. As The Atlantic reports, a security advisory from researchers at Trustwave says all Inax Satis Bluetooth toilets have the same Bluetooth PIN ("0000") hardcoded, allowing anyone with the My Satis Android app to control any toilet within range.
What can you do with the app? Apart from activating the flush and checking in on the detailed defecation records stored by the commode, you can also activate the toilet's bidet and drying functions, summoning a jet of water or hot air from below. Trustwave has attempted to inform Inax of the flaw three times since its discovery in June, and is only now making the vulnerability public. We've reached out to Inax USA for comment on the revelation, and will update this article accordingly. [seen on the Verge]
0000 is the default pairing number for countless bluetooth device lacking a screen.
But... you have to activate the pairing on the device itself by pushing the pairing button before linking it to your phone...
And with bluetooth range... it's barely good enough for bro/sis family warfare...., allowing anyone with the My Satis Android app to control any toilet within range.
That's a really pretentious way of saying "flushing after taking a dump"....
Coligny wrote:So you managed to find the version without the hot tat00ed chick...
viewtopic.php?f=43&t=18613&start=1530#p323766
Users browsing this forum: No registered users and 14 guests