Reply to post:

Hackers manage – just – to turn Amazon Echoes into snooping devices

EveryTime

Presumably they needed to remove, reprogram, and re-install the flash chip so that they could access the private key in that specific device's CPU or TPM. (Probably a TrustZone 'enclave'.) Without the key stored in the original CPU, the device wouldn't be recognized as a valid Echo and wouldn't be given the ability to control nearby devices.

This is a illustrative hack -- it shows that the device is pretty well locked down, and not (easily) remotely vulnerable. But the difficult problem of unbroken chain of trust remains. In this case they trusted "already installed" software.

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon