'Smart' Lock Vendor Locks Hundreds Out Of Their Home With Bungled Firmware Update
from the sorry-I-can't-do-that,-Dave dept
So we’ve talked repeatedly about how the real “smart” choice in the era of “smart” internet of things devices is often — dumber technology. Whether it’s your smart refrigerator or TV leaking your gmail details or viewing data over unencrypted connections, your smart car opening the door to potentially fatal attack, or your smart doorbell creating new attack vectors into your WiFi network, more often than not you’re quite frankly better off with the older, less sophisticated versions of these technologies if you want the smart path toward a more secure life.
The latest case in point: smart door lock vendor Lockstate managed to completely disable the smart door locks of an estimated 500 customers after a botched firmware update left customers unable to access their own properties:
A subset of smart locks made by Lockstate have been bricked after an update. The smart lock vendor is part of Airbnb?s Host Assist program, and integrates with the accommodation rental platform so, for instance, hosts can automatically generate and email one-time codes for their guests to use during check-in….Two models of Lockstate smart lock are apparently affected, one of which currently retails for $469.
Airbnb offers property owners a $50 discount code if they use Lockstate products as part of the Host Assist program ? where said products are heralded as ?revolutionary? and capable of withstanding ?high usage?. Because the botched update made it impossible for these locks to subsequently connect to the internet for a new fix, the vendor is informing owners that their only recourse is to wait anywhere from a week to eighteen days for a physical replacement, inundating them with neither smart nor revolutionary added costs:
In the mass mailer email, which begins ?Dear Lockstate customer? and summarizes its contents as an ?update? pertaining to LockState 6i/6000i, affected customers are asked to wait as long as 18 days for a full replacement. Or up to a week if they choose to remove and send the back portion of the lock to the company for repair.
Feel smarter yet? Of course this isn’t the first problem of this type. Internet of things brand darling Nest has, at several different points, botched their own firmware updates for supposedly smart thermostats, resulting in users either being cooked or chilled until they were able to remedy the problem. This is the kind of stuff internet of things evangelists still don’t spend much time talking about when they’re busy hyping and pitching the latest and greatest internet-connected widgets, built by a rotating crop of companies with a fleeting interest in actual security, functionality and privacy.
Granted bungled firmware updates are only one risk. A recent report took a look at sixteen different brands of Bluetooth-enabled smart locks, and found that at least twelve of the brands were notably susceptible to remote attacks. The flaws are fairly standard at this point, ranging from user data and passwords being transmitted in plain text, or a bungled use of encryption to transmit user data when encryption was used at all. Short version of the lesson: if you’re trying to build a smart home either do your homework and consult a hacker to find the best quality devices available, or save both time and money and revert to the best available dumb alternative.