The Register® — Biting the hand that feeds IT

Feeds

Ultra-hackable Google Glass could be a security nightmare

Easy root access opens spyware floodgates

Google's high-tech Glass headsets might be a gadget enthusiast's dream, but in their current form they're far too vulnerable to malicious hacking, according to one developer who has had access to the devices.

In a lengthy blog post on Tuesday, technology consultant Jay Freeman – who goes by the hacker handle "Saurik" – gave a detailed explanation of how he was able to gain root access to his Google specs and the potential implications of that discovery for Glass wearers.

"Sadly, due to the way Glass is currently designed, it is particularly susceptible to the kinds of security issues that tend to plague Android devices," Freeman writes.

One such security issue was the one Freeman was able to exploit to gain full control over his specs. That vulnerability is already eight months old, Freeman says, but it still affects all versions of Android 4.0 "Ice Cream Sandwich," including the build that powers Glass.

In fact, exploiting it on Glass was particularly easy. Many Android vulnerabilities present minimal risks for tablets and phones, Freeman explains, because they can't be exploited while the device is PIN-locked. But the Glass Explorer Edition devices don't use any kind of PIN – just turn them on and they're ready to go.

Because of this flaw, it would be unnervingly easy for someone to use the same technique Freeman employed to root his own device to gain root access to someone else's Glass, Freeman says. All they would need is to gain access to the device, and then only for a few moments.

"If you leave [Glass] somewhere where someone else can get it, it is easy to put the device into Debug Mode using the Settings panel and then ... launch into a security exploit to get root," Freeman says.

Once an attacker has root access, installing malicious software is trivial – and with a device like Glass, Freeman says, that could be a true security nightmare.

"Once the attacker has root on your Glass, they have much more power than if they had access to your phone or even your computer: they have control over a camera and a microphone that are attached to your head," Freeman writes. "A bugged Glass doesn't just watch your every move: it watches everything you are looking at (intentionally or furtively) and hears everything you do."

That kind of access raises concerns that are far more serious than the privacy issues that have been much discussed in the press, Freeman says.

An attacker who has installed spyware on your Glass headset could potentially watch you entering door codes, take pictures of your keys, record your PIN as you enter it into a bank teller machine, and intercept everything you type on computer keyboards, including passwords.

"Nothing is safe once your Glass has been hacked," Freeman bluntly states.

To address these concerns, Freeman says he would like to see Google make significant changes to the way Glass is designed, particularly before it is released in a version for consumers.

For starters, he says, he would like to see some way that Glass can be locked once the wearer takes it off. Perhaps the device could even scan the user's eye to reactivate, he suggests, or respond to a voiceprint – but failing such high-tech measures, a PIN should suffice.

He also would like the devices to be more obvious about when they are recording, such as displaying an LED light or concealing the camera with a plastic shield when it's not operating. That could not only help reassure people that they're not being recorded, but also alert Glass users if their devices start recording without their knowledge.

Moreover, Freeman says he would like to see Google take security concerns with Glass more seriously – and particularly, to avoid comments such as Tim Bray's "duh!" outburst on Friday.

"As long as engineers, advocates, and officers from Google make statements like these without carefully looking into the facts first, it will not be possible to have any kind of reasonable and informed discussion about this system," Freeman writes. "The doors that Google is attempting to open with Glass are simply too large, and the effects too wide-reaching, for these kinds of off-the-cuff statements to be allowed to dominate the discussion." ®

Stupidest Reg story ever?

>"To address these concerns, Freeman says he would like to see Google make significant changes to the way Glass is designed, particularly before it is released in a version for consumers."

D'oh - isn't that the point of releasing a "developer" version, separate from the consumer version?

11
0

Nothing to see (as usual?)

From the same article: "This means that if you leave your device in someone else's hands, and it has an unlocked bootloader, with just a minute alone they can access anything you have stored on it.".

So how do we unlock the bootloader? That is explained in the same article, and well.. I consider the explanation itself more then enough to label this a "non issue":

"The most common command to unlock the bootloader is simply "unlock". On most devices that provide this command, a menu will be displayed that explains that by unlocking the bootloader your warranty will be voided, and that it is disrecommended by the manufacturer. It also has a side effect: it will delete all of your personal data stored on the device (I mention this in more detail later, and explain why).".

For me it's simple.. Leave your device in the hands of a stranger and its contents are in jeopardy, this is the same as with any other mobile device. But the other thing, as can be read here, in order to make this exploit work attackers don't only need physical access but unlock the bootloader as well, which effectively removes all your data. Yet isn't the common idea of an exploit to get their hands on your data first?

So; don't leave your device with someone you don't trust and all is well. Yet if you happen to do so anyway and they are going to try something nasty chances are high they won't be able to get to your private stuff. Mission accomplished.

Why not try another article when there are some real exploits to report? At the very least something remote (here's assuming Glass uses wifi and such).

5
0

I let someone have unrestricted access to a five pound note once

They were able to seize control of the device and used it to purchase a wank mag without my knowledge.

Then it occurred to me to be more careful with my personal possessions and it didn't happen again. Phew!

4
0

Re: The difference...

@Neil - but don't you think that ten thousand security flaws are going to show up and (hopefully) be squashed between now and launch - just like other computing devices?

And post-launch - don't you think Google and others will be looking for bugs and potential hacks and trying to fix them? Just like other computing devices?

I'm quite certain that these eyeglasses will eventually be hacked to death, and people's entire lives will be stolen out from under them - just like with Android phones and iPhones and every credit card on earth. But I highly doubt that this one hack survives without being addressed all the way up to the date of the consumer Glass launch.

4
0

Re: Being able to root my own device is a good thing.

I completely agree.

It's also the only thing that will let Glass1.0 owners install the software from Glass2.0 after the manufacture abandons us, like they always do. I buy phones and tablet based upon their ability to be rooted and the bootloader unlocked. I pick the one with an available root exploit if given a choice.

If you give your device to a friend and they hack it to spy on you, then you need better friends, not a better security policy.

3
0

More from The Register

Pirates scoff at games dev sim's in-game piracy lesson
Dev seeds cracked version of 'Game Dev Tycoon', watches as Pirates run rampant
Fanbois vs fandroids: Punters display 'tribal loyalty'
Buying a new mobe? You'll stick with the same maker - survey
iPhone 5 totters at the top as Samsung thrusts up UK mobe chart
But older Apples are still holding their own
Google to Glass devs: 'Duh! Go ahead, hack your headset'
'We intentionally left the device unlocked'
Japan's naughty nurses scam free meals with mobile games
Hungry women trick unsuspecting otaku into paying for grub
 breaking news
Turn off the mic: Nokia gets injunction on 'key' HTC One component
Dutch court stops Taiwanese firm from using microphones
Next Xbox to be called ‘Xbox Infinity’... er... ‘Xbox’
We don’t know. Maybe Microsoft doesn’t (yet) either
Sord drawn: The story of the M5 micro
The 1983 Japanese home computer that tried to cut it in the UK
Nudge nudge, wink wink interface may drive Google Glass
Two-finger salutes also come in handy, as may patent lawyers
Black-eyed Pies reel from BeagleBoard's $45 Linux micro blow
Gigahertz-class pocket-sized ARM Ubuntu rig, anyone?