• fubarx@lemmy.ml
    link
    fedilink
    English
    arrow-up
    45
    arrow-down
    1
    ·
    6 months ago

    Many years ago, folks figured out how to crack firmware and find embedded keys. Since then, there have been many technological advances, like secure enclaves, private/public key workflows, attestation systems, etc. to avoid this exact thing.

    Hopefully, the Rabbit folks spec’d a hardware TPM or secure-enclave as part of their design, otherwise no amount of firmware updating or key rotation will help.

    There’s a well-established industry of Android crackers and this sort of beating will keep happening until morale improves.

  • LainTrain@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    17
    ·
    6 months ago

    What I don’t understand is why the TTS key could even delete voices or read past responses from other devices, ideally each device should have its own properly scoped API key that only lets it access the immediately necessary functionality and no more.

    • ReveredOxygen@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      3
      ·
      6 months ago

      I would imagine that the devices aren’t making elevenlabs requests directly, but just making requests to the rabbit backend, which forwards the responses. if I’m wrong, then that’s quite impressively bad security

      • LainTrain@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        2
        ·
        edit-2
        6 months ago

        Then wouldn’t it be just one API key to the rabbit backend instead? The researchers are suggesting it’s several keys though. Or are you suggesting every device has the same key to Elvenlabs that it sends over to the rabbit backend which passes that through to the request? That’s also very silly if they did that.

        • ReveredOxygen@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          2
          ·
          6 months ago

          My understanding was that they leaked the key that the rabbit backend uses to make requests to elevenlabs, and were just too lazy to change it. I could easily be wrong though

          • LainTrain@lemmy.dbzer0.com
            link
            fedilink
            English
            arrow-up
            1
            ·
            6 months ago

            I don’t think that’s the case, because otherwise how did they leak this key that the backend uses, that presumably stayed in the backend, by reverse-engineering the rabbit android application?

            I think the devices all just have hardcoded keys to the APIs themselves.

  • geography082@lemm.ee
    link
    fedilink
    English
    arrow-up
    4
    ·
    edit-2
    6 months ago

    The official webpage is a buy it now bait, it doesn’t even explain what the hell is the device . What it does. Examples. I can’t believe there is press for this kind of money baits.