149 points by WaitWaitWha 1 day ago | 27 comments
vessenes 1 day ago
Interesting. I'm not sure if the public comment period is over (The original proposal is dated August, 2023), but this stands out to me from their paper:

    We propose to focus the scope of our program on intentional radiators that generate and emit RF energy by radiation or induction.31 Such devices – if exploited by a vulnerability – could be manipulated to generate and emit RF energy to cause harmful interference. While we observe that any IoT device may emit RF energy (whether intentionally, incidentally, or unintentionally), in the case of incidental and unintentional radiators, the RF energy emitted because of exploitation may not be enough to be likely to cause harmful interference to radio transmissions.
I guess it is the FCC so this makes sense from their point of view. From my perspective, I'd like to see marks indicating:

* If the devices can be pointed to an alternate API provider if the company stops supporting

* If firmware has been escrowed / will be made available if the company stops supporting

* If device data is stored by the company

* If that data is certified as end to end encrypted

* Some marks for who / how the data is used

kube-system 1 day ago
You might be getting a bit too far ahead of where the industry is at with some of those wishlist items. NIST's requirements are things that are best practices that everyone agrees with, like:

* data stored/transmitted is secured by some kind of means

* the device supports software updates

* the device requires users to authenticate

* the device has documentation

* you can report security vulnerabilities to the developer

And even these are things that many devices fail to do, today. We gotta get the basics fixed first.

But for now, you can presume the Netflix button on your TV remote can't be configured to point to an alternative API if Netflix goes away. :)

rkagerer 23 hours ago
the device supports software updates

'Cause they need somewhere to load in those exploits!

A hypothetical device which is all read-only (except perhaps for a very carefully crafted, limited set of configurable parameters) might in some cases be more secure than the bulk of what's on the shelves today. After all, how many widespread hacks do you read about on old, single-purpose fixed analog or digital devices (which in a sense are similarly 'read-only').

jayd16 9 hours ago
Some things to realize about read-only devices is that once they are cracked, they are cracked forever. The devs have dev time to secure the device, the hackers have infinite time to crack it. Once done, the game is up. All instances are now easily exploited.

The more popular the device, the more knowable upside to an exploit. If the device can be updated, then usually the exploitable timeframe is limited and its unknown if the attempt is even worthwhile.

> After all, how many widespread hacks do you read about on old, single-purpose fixed analog or digital devices (which in a sense are similarly 'read-only').

Well basically because any device of consequence is trivially hacked by now. Think about game consoles or anything that would have DRM today.

mjevans 7 hours ago
A really dumb camera that just has an interface that's polled for data by a remote host is more likely to be used in a secure way than a 'smart' camera that tries to remember state and talk to an external server itself.
kube-system 7 hours ago
Not at all. Many old mjpeg IP cameras worked this way and they ended up on the open internet. Shodan is full of them, still.
ndriscoll 6 hours ago
So don't put them on the open Internet. It's much easier to do that than it is to secure a device that creates outbound connections to some untrusted external server (which manufacturers are). If it doesn't try to use UPnP or anything, it will not be in the open by default.

If your threat model for consumer IoT devices does not include manufacturers in 2025, you are completely confused about computer security. Having a standard to encourage devices to talk to manufacturers is completely backwards. We should have certifications that devices create no outbound TCP/UDP flows.

comex 5 hours ago
I hear all the time about non-consumer devices being left exposed to the public Internet, most recently traffic cameras two days ago:

https://news.ycombinator.com/item?id=42624930

I do not know for sure whether these devices use UPnP or similar, but considering that they are not intended to be accessible from the Internet, probably not. The blame probably lies with (in this case) all the random government agencies deploying the devices in an insecure way. But assigning blame won’t fix the problem. Something needs to change, and it’s probably going to be the devices.

Consumer devices are different. On one hand, they’re less likely to be exposed to the public Internet… at least proportionally. I think. But on the other hand, consumers expect to be able to access their devices from anywhere, and right now in practice that means going through a manufacturer-controlled proxy server. I would love if someone would come up with a standardized mechanism to make home devices securely remotely accessible, without a manufacturer-controlled proxy, but just as easy to use as the status quo. Until that happens, don’t expect anything to change.

kube-system 5 hours ago
> So don't put them on the open Internet.

That's a valid answer for an audience familiar with computer networking concepts. It's a silly suggestion for consumer IoT customers, who do not understand those concepts. They don't know what is or is not 'on the open internet'; they buy a product at the store and plug it in.

> We should have certifications that devices create no outbound TCP/UDP flows.

This is the "bury your head in the sand" method of solving the problem. If you design your requirement so that zero consumer accessible devices are capable of meeting them, then what's the point? As long as people (1) want to watch their camera away from home, and (2) don't have the networking expertise to configure a remote access VPN tunnel, the devices are going to have to reach outbound to traverse home router firewalls.

ndriscoll 4 hours ago
IoT customers by default would not have devices exposed to the Internet. This has been the status quo for decades ever since wifi and NAT became popular. If they don't understand it, it will be secure by default.

It would be technically quite easy for either a dedicated home-access box or just the router-AP combo box to have some auto-config wireguard setup (e.g. scan a QR code or install an app that looks for the box on the local network or through bluetooth). This would be far more secure than the current setup, which is for devices to constantly connect to generally malicious C&C servers. If regulations pushed for actual security (no-cloud), this would be the obvious solution to guide to market toward. Then you only have to trust your gateway device, which also would have no reason to ever create outgoing Internet connections, though it would need outgoing/forwarded LAN connections.

With SLAAC to generate a random initial IPv6 address that it never rotates combined with UDP so there's no indication that you talked to anything if your wireguard keys are wrong, there's basically no way to find such a box if you didn't have the correct config.

kube-system 4 hours ago
> IoT customers by default would not have devices exposed to the Internet. This has been the status quo for decades ever since wifi and NAT became popular. If they don't understand it, it will be secure by default.

Because IoT devices have historically been known as secure? Definitely not. Devices that presume someone else has already configured a firewall correctly often presume wrong. Consumers are not networking professionals.

> It would be technically quite easy for either a dedicated home-access box or just the router-AP combo box to have some auto-config wireguard setup

Well yeah, if everything about home networks was different, then the situation would be different. The problem is, that isn't the reality in which IoT devices are manufactured.

> If regulations pushed for actual security (no-cloud), this would be the obvious solution to market.

If they pushed for this, the only solutions with the sticker would be ones that are commercial failures because they won't work out of the box with the router people actually have at their house. You may be 'right' but your labelling program will have failed. A labelling program has to be realistically achievable within the current reality to have any effect, otherwise it'll just be ignored by manufacturers.

Incremental improvements, such as this, are not bad, even if not perfect. People are going to buy doorbell cameras that connect outbound to the internet, because the technology works out of the box.

jayd16 4 hours ago
What you're describing is a completely unsecured device. Any security comes from elsewhere.
kube-system 8 hours ago
Most software vulnerabilities aren't intentionally added backdoors, but flaws in the software that shipped on a device.

> After all, how many widespread hacks do you read about on old, single-purpose fixed analog or digital devices (which in a sense are similarly 'read-only').

Quite a lot -- these are some of the easiest devices to hack. The only saving grace is that most of them are not connected to the internet so they are only vulnerable to local attacks. But garage doors, cordless phones, keyless entry, smart locks, smart home protocols, etc are notoriously vulnerable.

The reason you don't hear about new vulnerabilities each week is precisely because they're aren't updatable. The fact that they don't get updates with new vulnerabilities is not an advantage when they permanently have older vulnerabilities.

ndriscoll 7 hours ago
> Most software vulnerabilities aren't intentionally added backdoors, but flaws in the software that shipped on a device.

Disagree, it is extremely common for e.g. TVs and smart phones to ship with malware included. In fact it is almost impossible to buy some classes of devices that aren't intentionally compromised.

Having the thing never connect to the Internet at all and never receive updates is a far better security posture, and is the common recommendation among knowledgeable people for e.g. TVs.

In practice, your neighbors are almost certainly quite a bit less malicious than whatever a smart device might talk to on the Internet. Your neighbor isn't going to hack your cordless phone. Your TV manufacture is definitely going to drop malware onto it, disable functionality (i.e. damage it), etc.

AJ007 5 hours ago
Any sort of warranty or security representation is basically snake oil except in a very narrow set of circumstances and conditions, yet still not 100%. If Apple can't keep iPhones 100% locked down, with billions of security spend, no fucking way some government program is going to authentic security across a wide variety of devices or various hardware & software qualities.

One thing the government can or perhaps should mandate, and is easily verifiable, is kill switches - devices should be physically incapable of connecting to any wireless network when a kill switch is engaged. If the FTC or a trade regulator wants to regulate at another level, maybe they could also say certain classes of devices must continue to function when disconnection (I might want the Apple TV plugged in to the TV connected to the internet, but the TV itself totally disconnected.) Because some devices now will surreptitiously search for open WiFi networks and try to go online even if a user does not connect via WiFi, this seems reasonable.

If we go down the route of a government agency creating and mandating security,

#1 Government back doors will persist and perhaps even be required (relevant to the whole TikTok thing this week.) #2 They will be unable to quickly respond to new threat surfaces while still representing that whatever is present is secure (it isn't.)

reverendsteveii 4 hours ago
> Most software vulnerabilities aren't intentionally added backdoors

>it is extremely common for e.g. TVs and smart phones to ship with malware included

These aren't mutually exclusive. With that being said, I'm probably with you when it comes to the overall debate. For something to get exploited it needs a vulnerability and a means to exploit it. The most insecure device in the world can't be exploited if I'm the only one who ahs the means to do it. Unfortunately we live in a world where Zawinski's Law has itself expanded such that everyone wants to be able to access everything from everywhere, which rules out airgapping a lot of devices. It's a consumer economy - we have to build what people want and then secure it. We don't have the luxury of building secure things and then convincing people to want them.

kube-system 6 hours ago
> Disagree, it is extremely common for e.g. TVs and smart phones to ship with malware included.

Both are common! But there are many hundreds of thousands of known software vulnerabilities.

> Having the thing never connect to the Internet at all and never receive updates is a far better security posture

It might be, depending on the particular situation. But it doesn’t really matter for IoT devices, because they all, by definition, connect to the internet. “Don’t connect to the internet” is a nonsensical suggestion for IoT devices.

nyrikki 8 hours ago
You don't need access to persistent storage, especially with multi-entry executables like busybox, which are often similar to built in rootkits today.

I actually just spent time last week getting rid of tftpd, telnetd, netcat etc... on some IP cameras last week.

You only need a few k of ram to have a bot, especially with how it is almost the rule that embedded system run everything as root.

If you have the ability to do firmware extraction, look at just how bad the industry is now.

moritonal 14 hours ago
An interesting thought is how when devices couldn't auto-update, they had to work out the gate. I imagine this encouraged companies to do much better testing to reach a gold-plate before deploying.
helsinkiandrew 9 hours ago
Assuming these are network devices - it can be harder to certify future working if the network services they rely on become unavailable or when the failure only occurs at scale.

Case in point when 700,000 Netgear routers pinged the University of Wisconsin–Madison NTP server (harcoded IP address) every second.

https://en.wikipedia.org/wiki/NTP_server_misuse_and_abuse#Ne...

jonhohle 10 hours ago
Less critical, but video games are the same way. Companies will press and ship discs with known broken games and then issue a patch of dozens of GBs day one. The whole point of having a disc is when all the servers are off line, and the store have shut down, the game is still playable.
kube-system 8 hours ago
This is true, but mostly only relevant to the expected user functionality. User acceptance testing in waterfall development doesn't often identify security vulnerabilities.
hn_throwaway_99 8 hours ago
> After all, how many widespread hacks do you read about on old, single-purpose fixed analog or digital devices (which in a sense are similarly 'read-only').

Tons and tons? I don't understand this viewpoint at all. As the saying goes "There is no 'Internet of Things', just an Internet of unpatched Linux devices." That is, the primary vector for malware is devices that aren't (or can't) be patched after vulnerabilities are discovered.

ocdtrekkie 10 hours ago
Yep! My Insteon home automation devices have no firmware update capabilities. They also have an extremely simple local RF protocol. They allow smart device behavior but are too stupid to be "compromised".
wpm 10 hours ago
Local RF? What protocol? Proprietary?
ocdtrekkie 9 hours ago
It's proprietary but relatively easy to reverse engineer, the details are out there. In the US it uses like 914.5 MHz or something, and I can send instructions to devices with an extremely simple serial protocol on my computer.

No Bluetooth, no Wi-Fi, no protocol sophisticated enough to distribute code. Just locally transmitted instructions.

kube-system 8 hours ago
Do they require auth and use solid crypto? If not, they are vulnerable, it's just that the vulnerability requires the attacker to be within range.

People thought old analog 900mhz cordless phones were fine until others realized you could just tune a radio to that freq and listen to your neighbors.

ocdtrekkie 7 hours ago
They're not vulnerable in any way that matters. If you manage to get a device in range you can... turn my lights on and off? You can't program them to do malicious things over the Internet. They don't have any sensitive information you can access. There's no damage you can do them.

The problem with saying you need auth and crypto is now you just added a bunch of complexity you have to maintain and update and hence now you've introduced vulnerabilities.

kube-system 4 hours ago
Sure, keeping things offline and vulnerable to only local attackers is a valid security posture for some.

But the 'I' in IoT is for internet. "Don't build IoT devices" is not a helpful proposal to increase the security of IoT devices, which is the scope of this initiative.

ocdtrekkie 3 hours ago
Eh. Debateable. I can control them over the Internet, I am just not delegating Internet access directly to cheap consumer electronics, which simply put, shouldn't be done.

I would argue the crisis of IoT security is caused largely by poor IoT design.

kube-system 3 hours ago
> I am just not delegating Internet access directly to cheap consumer electronics, which simply put, shouldn't be done.

Yeah, but most people are going to do that. Most people aren't security-conscious professionals, and they do like cheap things.

In a hypothetical reality where home networks were better designed to accommodate remote access, we wouldn't have this problem. And for those of us who can configure networks to be securely accessed remotely, there are definitely better ways to do things.

But that isn't the reality of the landscape of consumer IoT -- which is that people expect to buy a cheap device, connect it to the wifi network of any consumer wifi router, and have it work out of the box. They are already buying these devices regardless of whether they are secure, and will continue to do so. This initiative is about encouraging reasonable incremental changes to the existing reality.

If the requirements for this label were drastic enough that they required people to secure the devices behind behind a firewall, store data locally, and provide remote access only with an inbound VPN or something like that, it would simply be ignored by manufacturers and would have zero impact. Because vanishingly few people are going to replace their Comcast modem/router just to install some IoT device. To most people, they "get wifi" from their ISP. The concept of "reconfiguring a home network" is a nonstarter. Whatever the ISP provides is what normal people use, by default.

ocdtrekkie 2 hours ago
You missed my point. On the contrary, having every light switch in the house need its own network stack is not just insecure, it's overengineered and expensive.

It's fine to have a computer or "gateway" device that calls outbound to a server for outside access, no firewall rules or VPN required. The point is there should only be one point of contact with the outside world, and that's a tech device with enough power to update, secure, etc. As Wi-Fi standards and such change, people should expect to replace it.

Hardware in and on your walls should be dumb, cheap, and long-lasting. Insteon's technology hasn't substantially changed in twenty years, most of my smarthome hardware is over ten years old, and is no less secure or current than when I installed it. And of course, all of it works just like a "dumb" counterpart when the Internet is down or there's no smarthome controller involved. This should be cheaper at scale than "wi-fi smart outlets", if they aren't selling your data to offset the cost.

kube-system 1 hour ago
I understand your point, it's just not relevant. Consumers aren't doing any of that, nor are they going to. Expecting consumers to buy smart-home devices as a whole system and integrate it into their structure is just not practical. The barriers to entry are too high.

I'm glad you bought up Insteon. They're a great example of this, they failed commercially.

https://www.pcmag.com/news/smart-home-company-insteon-shuts-...

I understand the benefits to the architecture you're advocating for. Personally, I started with X10 in 1995. But that simply isn't what people buy anymore. People are buying individual smart-home products, not integrated systems.

The requirements of this program are to address the reality of the types of devices people are actually buying, and the security concerns that affect them.

ocdtrekkie 1 hour ago
I mean, fwiw, Insteon is in business today as a new entity. They're producing new hardware and all. It's viable enough a technology to have survived business issues that killed the company.

I disagree with your assumption you understand consumers: Many prefer to buy all products from unified systems, and the complaints about how disconnected and disjointed having odds and ends are have led to Matter, which is struggling to solve the problem.

The major players have all sold home automation hubs, and a lot of solutions still use them, but a lot of the hardware is still overengineered, has a short usable life, and creates security risks.

kube-system 1 hour ago
Yeah, people have gripes about all kinds of things that are commercially successful. A status-quo with a gripe is no less the status-quo.

It is a fact that all of the top selling devices in this market overwhelmingly connect to WiFi directly.

e.g.: https://www.amazon.com/Best-Sellers-Smart-Home/zgbs/smart-ho...

reverendsteveii 4 hours ago
>If you manage to get a device in range you can... turn my lights on and off?

Is that all it's capable of or all you use it for?

ocdtrekkie 2 hours ago
So the highest risk device on my RF network is my thermostat. But not only do I get alerts for out of range conditions, the beauty of the local attacker model is most types of attacks become silly: The thermostat has a predefined range of relatively normal temperatures, so the only way to really cause damage is turning it off.

You could bring a custom-programmed RF transceiver and plant it on my property for the job, or you could use a $5 wrench to shut off my natural gas and pull the power shutoff on my AC condenser.

I think the latter is infinitely more likely.

godelski 7 hours ago

  > But for now, you can presume the Netflix button on your TV remote can't be configured to point to an alternative API if Netflix goes away. :)
It is HackerNews, so your statement is true UNLESS you're willing to hack your TV. (But this shouldn't be a thing people _have_ to do... ):

Warning, I haven't personally tried this

https://askanydifference.com/how-to-root-samsung-tv/

https://wiki.samygo.tv/index.php?title=SamyGO_for_DUMMIES

TeMPOraL 18 hours ago
The software update angle has already been commented on, but I'm not sure this one is a good idea either:

> the device requires users to authenticate

kube-system 8 hours ago
No, it is a good idea. If someone is operating or changing settings on your baby monitor, doorbell camera, garage door opener, smart switch, light bulb, etc -- the developer should check to make sure that the actor doing so is authorized to do it.

Why in the world would anyone want unauthenticated access to these devices?

ndriscoll 7 hours ago
All of those things might have a authentication-free use-case for e.g. a babysitter (maybe not to change settings, but to use). For personal networks, being on your local LAN is in practice a decent form of authentication given the tradeoffs of otherwise having to manage credentials.
kube-system 4 hours ago
That seems a bit contrived. I would expect my babysitter to be observing a child in-person, not remotely.

Regardless, the commonly expected use case for IoT devices is for people to be able to access them from their mobile device, on the internet (thus the 'I' in IoT). IoT devices, as their name implies, are on the internet, and need authentication because of this.

The problem is that this use case is real, and people are buying these devices, and so, how do we make them better? "Just don't do that" doesn't address the problem, it's a dismissal of it.

ndriscoll 4 hours ago
We use a camera in our daughter's nursery to see whether she's going to fall asleep (if protesting a nap/bed time after laying her down) or whether she's standing in her crib/too wound up. We also use it to keep track of whether she's woken up if we're out in the yard. I do actually have the ability to access it over the Internet through wireguard, but that's something I never need. LAN access suffices.

IoT is a marketing term. Networked devices don't necessarily need to use the Internet, and indeed most of the time there isn't even a use-case. You're going to open your garage while you're at the store?

Honestly I don't see the use-case for almost any IoT thing though. It mostly seems like gimmicks (color changing/dimming lights) or adding unnecessary complications that make it less secure and more failure prone so that someone can sell you a service (a cloud app for your garage instead of a remote/keypad, an app for your door instead of a key).

kube-system 3 hours ago
Glad it works for you with your use case. But you have to recognize that you are much more knowledgable than most in this realm. The majority of people expect these smart devices to be accessible from the internet, and do not have the ability or knowledge to configure remote access VPNs.

> You're going to open your garage while you're at the store?

One would mostly likely want to close it then :)

But really, I have an IoT garage door opener so that I can check to make sure it is closed if I forget. This is a common use case. Also, opening it for others when you are away.

> Honestly I don't see the use-case for almost any IoT thing though.

Okay, here's a few: Cameras are useful to see when people are at your house, when packages arrive, etc. Security sensors (or the aforementioned cameras) are also useful to check on the security of your home while you are away and respond if something unordinary happens. People like automatic pet feeders and automatic vacuums to perform tasks while they are away. People like thermostats that can be changed to more economical settings while away, and returned to comfortable settings when (or shortly before) they arrive. AirBnB hosts like being able to change the door code on their properties between visitors, and to monitor and secure their property while not physically there.

If you want some more, just read the reviews of these devices on a site like Amazon, and you'll see what people use them for.

People buy them because they find them useful. That doesn't mean you have to like them or want them. But an initiative to encourage manufacturers to implement basic best-practices is a good idea for other people regardless of whether you personally want them or not.

ndriscoll 2 hours ago
Don't automatic pet feeders run on timers? And vacuums run on a timer + sensors? And thermostats run on a timer + sensors? I'm not seeing why any of those would be on a network, much less the Internet. In order to put them on a network in the first place, you'd need to have a way to configure it locally (e.g. bluetooth), so why wouldn't you just set schedules there? The whole point of automation is that you set it up once (like when you open it) and then never touch it again. Again, best practice would be to never connect it to a network at all.

The AirBnB use-case seems fair enough. I'll still maintain that having devices connect to hostile C&C servers (which is the current status quo) is not a basic best-practice or an incremental improvement. The recent story about inverters being bricked by a distributor demonstrates why. Literally damaging electrical infrastructure (which is what happened) is one of the the boogeymen used to push for better security, and can put people's lives at risk. That attack should have never been possible.

kube-system 2 hours ago
> Don't automatic pet feeders run on timers? And vacuums run on a timer + sensors? And thermostats run on a timer + sensors? I'm not seeing why any of those would be on a network, much less the Internet.

The ones that are on the internet also allow you to trigger them remotely, monitor status, trigger automatically based on geo-location, etc.

Are you trying to say that people could do things another way? Of course they could. But they aren't. They are buying IoT devices, because they like the features.

Personally, I like to set my turn my thermostat off of the eco temperatures before I go home, which is not at the same time every day. I don't think this is a strange use case.

Also, I like to trigger my vacuum remotely when I'm already out of the house. I don't leave the house at the same time every day, so I don't have it set on a timer. I could turn it on before I leave, but I don't really want it trying to roll out the door or bump into me while I'm putting my coat and shoes on.

Again, your critique here seems to be your own person dismissal of these features, which really isn't relevant. Other people buy and use them.

ndriscoll 1 hour ago
It's more that if you are at all concerned about security, then by far your biggest threat to worry about is the provider of cloud services, so that needs to be your starting point. In practice, any home network in the last 20 years is behind a firewall that blocks incoming connections unless you go out of your way to open the firewall/forward ports, and will be secure from other attackers by default. There's no point in discussing security if your threat model is completely wrong.

It's not random hackers in Russia that rendered people's solar setups inoperable. It's the inverter company using their backdoor. Ubiquitous backdoors and pre-bundled malware are the top security problems in the industry.

kube-system 44 minutes ago
> It's more that if you are at all concerned about security, then by far your biggest threat to worry about is the provider of cloud services, so that needs to be your starting point.

I don't necessarily agree with that. The most widespread and issues to hit people in the US in recent years are not malicious cloud providers, but credential stuffing attacks against otherwise legitimate and reputable services.

> In practice, any home network in the last 20 years is behind a firewall that blocks incoming connections unless you go out of your way to open the firewall/forward ports, and will be secure from other attackers by default.

Right, the instructions with those legacy IP cameras instructed users to open ports to access them remotely.

> It's not random hackers in Russia that rendered people's solar setups inoperable. It's the inverter company using their backdoor.

Yeah, that's a problem. But probably not addressable through this program. There's nothing a voluntarily labelling program can do to protect you from a vendor that wants to fuck you over. One would presume a bad actor would simply: not volunteer to give up their ability to be bad.

Protecting customers from vendor abuses is not just a cybersecurity problem, it's a warranty and contract problem (or criminal fraud problem), and is probably better handled that way.

saltminer 1 day ago
> But for now, you can presume the Netflix button on your TV remote can't be configured to point to an alternative API if Netflix goes away. :)

At least for Android TV devices, Button Mapper works for some.

https://play.google.com/store/apps/details?id=flar2.homebutt...

vessenes 1 day ago
Oh, I'm with you 100%. The labels for my list will all be like black with a big X through them. But I propose consumer behavior has a better shot of changing with labels.
toddmorey 11 hours ago
The device doesn’t ship with a known, unchangeable admin password. The device doesn’t needlessly require Wi-Fi access for basic local functionality. [my wish list]
drdaeman 1 day ago
> If that data is certified as end to end encrypted

This needs better and more detailed clarification. I've reverse engineered a camera-equipped pet feeder, and videos sent to a cloud (or my emulating server in my case) were partially encrypted - I-frames were, P-frames were NOT. Someone ticked a checkbox "videos are encrypted", and still left the thing glaring open.

Then, of course, it's also a matter of ciphers and modes, authentication, key generation, transmission and storage, etc etc.

Feels like encrypted storage and transmission features alone require a full whole label, like the FCC's broadband facts label, or FDA's nutritional facts label, which outlines what data exists in the system, where the data is stored, how it's encrypted, how it's authenticated, and so on.

Which is probably not happening until cryptography 101 becomes a part of general school curriculum and layman people start to understand the basics. Without people asking real questions and refusing to purchase products from sloppy engineering companies (aka voting with their wallets*), companies will always wave it away with tried-and-proven "military-grade security" bullshit.

___

*) That is, if there's even a competition. When no one does things right (because consumers don't know and thus don't ask for it), there's nothing to pick from.

ttyprintk 12 hours ago
2023 FDA labeling for networked medical devices is conscious that a nurse might need to use the device on a network he/she doesn’t trust.
simne 1 day ago
Some questions already answered in article - from gov't responsible NIST and FCC and from industry agreed to participate deputies from large companies, so now they will gather meetings and will create some documents.

So now, any interested subject (any human or entity, even "group of hackers") could ask to responsible. Or could talk with deputies, as their contacts should appear soon.

ok123456 11 hours ago
Can we add that it's self-repairable domestically?
dylan604 10 hours ago
What could we do to make something self-repairable domestically that would also make it not repairable otherwise? Like if you bought it here, but then took it with you internationally, would it suddenly not be repairable?
lcnPylGDnU4H9OF 8 hours ago
Curious if it would be possible for a manufacturer could do similar hardware attestation as what's done for iPhones while allowing for the hardware and its attestation key to be swapped for a different set only if one has a certain private encryption key.

I don't do hardware at all so this may be infeasible or misunderstood but I imagine a scheme whereby one needs the encryption key in order to properly change the key that the hardware attestation firmware is expecting. The attestation key is encrypted with a separate private key and is decrypted by the firmware with the corresponding public key.

Presuming that's feasible, it would only really work until that private key is leaked and our hostile trade partners pinky promise not to use it. Perhaps some licensing could be used to make the people who own the device to be responsible for repairing it at an approved repair shop but that still has to be enforced.

nimbius 10 hours ago
another question: how does this work with open-source technology? Banana Pi for example is often considered an IOT.
mystified5016 1 day ago
Seems to me that this would wholesale rule out projects like the ESP32 open WiFi driver. Or rather, in order to comply, espressif would have to retool their chips to make "unauthorized" aceess to the raw radio hardware impossible. Sort of how cellular modems are now.

Seems reasonable from the FCC's perspective, but I'm not sure how I'd feel about it.

JohnMakin 1 day ago
Cool, I'd rather have a stamp that indicates a company will support their product for X number of years, and if they don't, they will release the software as OSS so you can maintain yourself. I have an extremely expensive scale that came with wifi support and an app, only bought it 3 years ago, half the features already don't work because they nuked the app and stopped supporting the scale. did I need a smart scale? Absolutely not, and I don't really need any other "smart" devices the more I think about stuff like this, and now seek to buy "stupid" devices as much as possible. I'm not sure what such security stamps are supposed to provide other than false sense of security, as most things can be hacked eventually with enough determination or someone unknown zero day.
mxuribe 1 day ago
Yeah, nowadays i try to buy many things that are "not smart" in order to avoid what you experienced with the smart scale. That being said, i wonder if what you're asking for is more on the warranty side, rather than security/promise side? To clarify, i am 100% in agreement with you that after a company stops supporting a product, they should open source it (which could create a secondary ecosystem of techs who offer services to support said open source software if a person is not inclined to manage the OSS themselves, etc.)...However, technically wouldn't a company's "promise" to support software be more like a warranty? And in that case, whatever gov. agency who oversees warranties would need to nudge business to comply...nevertheless both this cybermark, a warranty on software lifecycle, and other things are the LEAST that shoild exist nowadays.
heresie-dabord 10 hours ago
> try to buy many things that are "not smart"

This is the best strategy, but let's be clear... consumers who make a purchase have a reasonable expectation of owning a durable product that does not increase the threat surface of consumers' lives.

This means that the product requirements should be clear and the supply chain must be secure.

Until a "trust label" can guarantee these principles, the proposal is just another prop in a grand security theatre.

rkagerer 22 hours ago
The real problem is very few vendors are inclined to spend the time and money to make their products truly stable & secure. Instead we churn out a firehouse of crap code for a sewage dump of cheap IoT products. I'm not sure how much a government-conceived seal will raise the bar of consumer expectations.

I'd still put my faith in other indicators like a company's track record, third party audits, robustness of open source library choices where applicable, my own analysis of their stack and engineering choices based on signs I can observe about their product / interface / etc (there are usually several present), my own testing and so forth.

I'd argue the generally accepted pace of consumer product development these days is reckless, and not sustainable if you want truly robust results.

I would have been glad to see this step in the right direction if I weren't convinced all it will likely amount to in practice is security theatre. Here's hoping my skepticism is unwarranted.

0xbadcafebee 22 hours ago
This is a bit scary. Knowing how software is developed, I know there's no government program that could actually ensure a device is secure. It's one thing to measure an electronic device's EMI or pump it full of power and see if it catches fire. But black box testing of software is itself a black art, as software security is a lot more complex than [typical] electronic design.

The scary bit is that this label is going to be found to be ineffective, and then consumers may lose trust in government-issued safety stamps.

cookiengineer 21 hours ago
In Germany we had something like this from the TUEV Süd, where they certified online shops and online banking websites for their security.

Suffice it to say, but the keywords are a google dork for finding easy to hack pentesting victims.

Now the BSI (German institute for cybersecurity, similar to CISA) also started to push out certifications for the BSI Grundschutz, which is an absolute meaningless certificate and literally tests the absolute bare minimum things.

The problem here is that there is no market, this cyber security crisis cannot be solved economically, because customers want a certificate without having to do further work. So they'll get it at whatever auditor that accepts their money.

This is how it's done, even for ISO 27001 and SOC2 certifications. Nobody gives a damn if a single working student has 20+ role descriptions laying on their table. Findings are always ignored and never corrected.

Cyber security policies and their effects over time need to be measurable first before there can be certification processes.

Additionally there needs to be legislation that cannot be interpreted. Things like "reasonably modern" cannot be used as a law text because it doesn't mean anything, and instead standardized practices have to be made mandatory requirements. Preferably by a committee that is not self controlling, maybe even something like the EFF, FSF, OWASP or Linux foundation.

est 19 hours ago
> I know there's no government program that could actually ensure a device is secure

Well, there's SELinux, TOR

LinuxBender 11 hours ago
I would be more specific than that. SELinux can be running and intentionally poorly written policies can allow absolutely anything to happen. The risk being, [X] Checkbox SELinux is technically running.
jzebedee 1 day ago
The combined requirements of govt purchasing must carry the mark and major US surveillance tech manufacturers like Amazon are leading the rollout, makes this seem less like a cybersecurity concern and more of a protectionist carve out.
readyplayernull 1 day ago
Laser safety glasses in Amazon are so fake anyone could come up with a conspiracy theory about some country trying to blind the population of another.
knowitnone 23 hours ago
cool. you get to sue Amazon for millions for the loss of one eye
SketchySeaBeast 9 hours ago
You mean get stuck in a legal battle which takes years where Amazon denies responsibility and pushes everything to the original vendor, who for some reason went out of business 15 minutes before the suit was filed?
deadbabe 1 day ago
[flagged]
Jtsummers 1 day ago
This has been in the works for a while now. This is not a last minute thing.
deadbabe 1 day ago
[flagged]
Jtsummers 1 day ago
At least as early as August 2023. Less than three quarters of the way through his presidency. Something that started at least 17 months ago can hardly be considered "last minute".

EDIT:

Found the answer for you since you can't be bothered (previously saw the date in some other doc reading about this):

https://www.fcc.gov/CyberTrustMark

> When was the U.S. Cyber Trust Mark program created?

>> In August 2023, the FCC sought public comment on how to create the Cyber Trust Mark program. In March 2024, based on public input, we adopted rules establishing the framework for the program.

kube-system 1 day ago
contextfree 1 day ago
crazygringo 1 day ago
I'm interested in the actual details here --

1) What are the requirements for the mark? E.g. no passwords stored in plaintext on servers, no blank/default passwords on devices for SSH or anything else, a process for security updates, etc.?

2) Who is inspecting the code, both server-side and device-side?

3) What are the processes for inspecting the code? How do we know it's actually being done and not just being rubber-stamped? After all, discovering that there's an accidental open port with a default password isn't easy.

kube-system 1 day ago
https://nvlpubs.nist.gov/nistpubs/ir/2022/NIST.IR.8425.pdf

Yep, pretty basic stuff, like 'require authentication', 'support software updates', etc

> 2) Who is inspecting the code, both server-side and device-side?

UL is administering the program and they're going to come up with the requirements

> UL Solutions will work with stakeholders to make recommendations to the FCC on a number of important program details, like applicable technical standards and testing procedures, post-market surveillance requirements, the product registry, and a consumer education campaign.

https://www.ul.com/insights/us-cyber-trust-mark

simne 1 day ago
Good questions. As I understand, they spent months to decide who will be responsible and who will pay (and how much). Announce happen after budget passed Parliament, so now could make manning table and hire people for next steps.
simne 1 day ago
Some questions already answered in article - from gov't responsible NIST and FCC and from industry agreed to participate deputies from large companies, so now they will gather meetings and will create some documents.

So now, any interested subject (any human or entity, even "group of hackers") could ask to responsible. Or could talk with deputies, as their contacts should appear soon.

bloomingkales 18 hours ago
Here are requirements if you follow the China-bad politics:

1) Don’t be select Chinese products

2) Be select American products

It’s not reaaaally 3d chess, but a relatively crude misnomer for the “Made in America” stamp or “Its American and definitely not Chinese”.

The security practices are probably the same across products, it’s just the wrong time wrong presidency for China.

beams_of_light 1 day ago
Things like this are useless, in my mind, because hackers are always going to innovate and find ways around protection mechanisms. Today's "locked down" IoT device could easily become tomorrow's "vulnerable to an easily exploitable pre-auth RCE".

What the government probably _should_ do is begin establishing a record of manufacturers/vendors which indicates how secure their products have been over a long period of time with an indication of how secure and consumer-friendly their products should be considered in the future. This would take the form of something like the existing travel advisories Homeland Security provides.

Should you go to the Bahamas? Well, there's a level 2 travel advisory stating that jet ski operators there get kinda rapey sometimes.

Should you buy Cisco products? Well, they have a track record of deciding to EOL stuff instead of fixing it when it's expensive or inconvenient to do the right thing.

Should you buy Lenovo products? Well, they're built in a country that regularly tries and succeeds in hacking our infrastructure and has a history of including rootkits in their laptops.

kube-system 1 day ago
NIST isn't a bunch of dummies that don't know this. The requirements posed are not micromanagement of device design; some address your concern exactly... like a requirement that developers provide contact information to report vulnerabilities and that devices makers just can't ignore authentication entirely.

But this is IoT stuff we're talking about here, not Lenovo/Cisco... but ReoLink/PETLIBRO/eufy/roborock/FOSCAM/Ring/iRobot/etc. Security (or the lack of it) in the IoT world is a whole different ball game. It isn't uncommon for IoT devices to be EOL on release date, or just lack authentication or encryption entirely.

timewizard 22 hours ago
> NIST isn't a bunch of dummies that don't know this

They've provided thorough definitions and a label that implies they've all been understood by the manufacturer. It doesn't mean that this solves any real world problem.

> Security (or the lack of it) in the IoT world is a whole different ball game.

Those can be described as IoT devices. They're more appropriately categorized as "consumer electronics" and often have a firmware update right out of the box. That's what makes this badging program an absurd idea with no meaningful outcome. This segment is not going to care.

This isn't "Energy Star" where the purchased product does not have additional functionality which can be exposed or exploited through software and no third party testing can be exhaustive enough to prevent the obvious exploit from occurring.

Even to the extent they can it then enforces a product design which cannot be upgraded or modified by the user under any circumstances. Worse the design frustrates the users ability to do their own verification of the device security.

It's a good idea applied to the wrong category of products and users.

kube-system 8 hours ago
> Those can be described as IoT devices. They're more appropriately categorized as "consumer electronics"

IoT devices are a subset of a much broader 'consumer electronics' category.

> and often have a firmware update right out of the box.

From major, established, mature companies, yes. Many device manufacturers in this category never issue firmware updates. Which is precisely why this is one of the requirements.

> This segment is not going to care.

Some may, some may not. The federal government will care, because they will be forced by law to comply.

> no third party testing can be exhaustive enough to prevent the obvious exploit from occurring.

Of course, no cybersecurity compliance plan can prevent exploits from occurring. If you try to address cybersecurity in that way, you will fail, anyway. The point is to place controls in place which are achievable, measurable, and help to mitigate risk.

> Even to the extent they can it then enforces a product design which cannot be upgraded or modified by the user under any circumstances.

NIST's requirements require the opposite of this.

timewizard 7 hours ago
> because they will be forced by law to comply.

Which means the program will have zero value outside of federal purchasing offices. They will not evaluate the criteria or care about the reality of the offering, they'll see the sticker, and know it's "default approved."

Is this a good outcome?

> mitigate risk

A sticker cannot do this.

kube-system 6 hours ago
> zero value outside of federal purchasing offices

I can’t guarantee much but I can guarantee a non zero number of non federal purchasers will consider the sticker.

>> mitigate risk

> A sticker cannot do this.

Correct. The sticker itself doesn’t mitigate the risk. The adherence to the requirements necessary to qualify for the sticker do.

svnt 1 day ago
Picking and choosing companies like that could work if it could somehow remain apolitical. This registry can work despite the tendency for these things to become political.

What you’ve described is maybe more possible if provided by a Consumer Reports-style org that consumers could subscribe to.

Greyfoscam 1 day ago
Wouldn't it be simpler to have a QR code below the symbol with anything relevant to make this work ?
ryandrake 1 day ago
When I buy technology today, I'm 10X more worried about the manufacturer deliberately changing, killing or nerfing the product after I bought it, than I am worried about hackers compromising it. This goes for connected hardware, IOT devices, and software.
elcritch 7 hours ago
Oddly "hackers" are the ones who often revive defunct hardware or give users back control over their devices. Things like DRM laws seem to only enhance corporate interests.
schnable 1 day ago
Probably overlaps with the EU RED Cybersecurity requirements for IoT devices that are supposed to go into effect this year: https://www.ul.com/services/ul-solutions-cybersecurity-advis...
floxy 1 day ago
Seems like good fodder for a tongue twister. Try saying it 10 times fast:

- Must the Cyber Truck (Musk) bear the Cyber Trust Mark?

motohagiography 6 hours ago
nice: Must Musk's Cyber Truck Bear the Cyber Trust Mark?

It's adding a standards and governance layer to tech, which creates a capacity for compliance management in regualted industries. annoying for sure, but the US has lost its unipolar superpower role because its critical infrastructure systems were made of garbage code and its population is effectively defenseless.

it doesn't solve it, but it improves the dynamic.

silisili 1 day ago
What's to stop the bad actors from just printing the logo on their gear anyways? Like they do with UL and N95?
Jtsummers 1 day ago
They describe it as being like EnergyStar which suggests they'll have a consumer accessible registry as described here:

https://www.ul.com/news/ul-solutions-named-lead-administrato...

> UL Solutions will also work with the FCC and program stakeholders to develop a national registry of certified products that consumers can access via QR code on the label. The registry will have more detailed information about each product. Additionally, UL Solutions will serve as liaison between the FCC and other CLAs, as well as other key stakeholders. [emphasis added]

and here:

https://www.fcc.gov/CyberTrustMark

> The logo will be accompanied by a QR code that consumers can scan, linking to a registry of information with easy-to-understand details about the security of the product, such as the support period for the product and whether software patches and security updates are automatic.

This doesn't block full-blown counterfeit products (recreating certified devices including the label), but does address non-compliant devices trying to pose as compliant.

likeabatterycar 1 day ago
> They describe it as being like EnergyStar which suggests they'll have a consumer accessible registry

I've seen Energy Star logos for 30 years and never knew there was a public database, never thought to verify, and I don't think anyone else has either. The only thing Energy Star has been useful for is extracting rebates from utility companies and buying shitty dishwashers which were certain to be worse than what they were replacing.

Verification is useless if no one knows about it, or if the data isn't actionable. I have verified UL mark numbers for questionable products, but they often resolve to some Chinese ODM you've never heard of like 'Xionshang Industrial Electric Company' whose name certainly doesn't match the product label. Do you know the components haven't been swapped out since certification was achieved? Was the product actually sourced from there or counterfeit? You have no way to verify any of that.

UL issues holographic stickers but I've seen those like 10% of the time and probably just as easily faked.

Jtsummers 1 day ago
https://www.energystar.gov/ - Here's the registry.

And I'm not saying this will be that useful, just that it's not going to be a sticker and nothing else. That would be truly useless and pretty much just make money for sticker makers.

timewizard 22 hours ago
"Find all the information you need to start shopping for ENERGY STAR certified products, including product details, rebates, and retailers near you."

So, the product search works like a shopping cart site, and has no historical products, only new ones, and helpfully lists the prices.

Who is this meant to benefit?

Bjartr 5 hours ago
You want the "Product Specifications & Partner Commitments Search"[0], not the "Product Finder"[1]. Both are available from the top level "Find Products" menu

[0] https://www.energystar.gov/products/spec

[1] https://www.energystar.gov/productfinder

timewizard 3 hours ago
That just shows specifications. I don't see a way to _confirm_ that the device I currently have in my hands, bearing the Energy Star logo, has actually earned it.
1 day ago
knowitnone 23 hours ago
how many people search the registries when they buy stuff? I've only done it once and the product(made in China) looked janky and as cheap as can be.
ehaskins 1 day ago
You have to have rules before you can enforce them...

It looks like part of the label [1] will include a QR or link to a public registry, so in theory you can easily confirm the device has actually been certified.

[1] https://docs.fcc.gov/public/attachments/FCC-23-65A1.pdf point 42

anotherhue 1 day ago
The vendor is supposed to check I think. Not that that makes sense in a comingling inventory world.
likeabatterycar 1 day ago
I'm sure Amazon - whose store is mostly generic Chinese schlock nowadays - will check.

Not that it matters, posters on this very site who claim to care will continue buying stuff off AliExpress, proud they got it for pennies on the dollar.

Look ma, a mini PC for $22! And they didn't even charge for the preinstalled malware!

Has anyone ever considered this junk is sold at a loss as a price of doing business, to expand a PRC-controlled botnet?

simne 1 day ago
Looks like you just have not deal with bad traders on platforms. I once found on local aggregator product too cheap to be good (unfortunately at that moment only two stores sell these product).

I stored their number in my notebook and going to my shopping, calling them from bus stop, and they answered me some nonsense.

I made my shopping, and some walk, then opened platform and these shops already disappear. Less than hour.

In other case I managed to make order and paid from card, and also shop disappeared. - In a week I received SMS from bank "your payment returned to your account".

likeabatterycar 1 day ago
Sorry my post was sarcasm. If English is a second language I can see where that could be lost in translation. I don't expect any of these vendors, especially Amazon 3rd party, to check.
simne 1 day ago
You are welcome! I just looking on these things very serious and trying to use my knowledge to make better products/services. And sometimes I'm really surprised in good way.
knowitnone 23 hours ago
assertion without proof is paranoia. not saying you are wrong but go get some proof first
simne 1 day ago
> What's to stop the bad actors from just printing the logo on their gear anyways?

This is federal offense, like document falsification.

So if somebody will be caught on doing it - could go to jail.

knowitnone 23 hours ago
except they are not in your country so how can to go to jail and why do they care about you laws?
simne 10 hours ago
Have you hear about customs?
ssl-3 7 hours ago
None of the electronic widgets I've bought stateside from overseas sources have ever shown any evidence that they've ever been actually-inspected by US Customs.

How would they know that an item is fraudulently marked if they never look?

simne 6 hours ago
For all things you buy in local shop, responsible owners of shop. If you buy anything abroad, this is your own problem and it is not relevant to subject.
ssl-3 4 hours ago
I note that none of these entities are the "customs" that I have heard about.
simne 3 hours ago
You just don't know, how work defense of internal market in typical country.

1. Organizations listed in subject (NIST, FCC, deputies from tech companies) constantly create or even invent methods to check products quality and to enforce penalties for offenders, and propose regulations to approve by parliament.

2. Parliament make juridical documents and approve budgets for 1 (and 3,4 when need).

3. Customs limit penetration of abroad subjects to internal market.

4. Police, courts, deal with internal offenders, or with abroad offenders managed to infiltrate through customs to internal market.

In real life, local shop become responsible when sell products from abroad, and regulations limited possibilities to create local shops for foreigners.

Unfortunately, life is constantly changed, technologies constantly grow, so old regulations eventually become obsolete, so all these things work in endless loop.

ngneer 20 hours ago
Who are these UL Solutions? They seem to have come out of nowhere and hit the jackpot, inserting themselves as arbiters for security. Smells a bit like how Common Criteria proffered independent certification labs, which were no panacea either.
amaterasu 20 hours ago
Underwriters Laboratories, UL. Look at the back of pretty much any mains powered device and you'll see their mark. They were founded 130 years ago, and test and warrant devices (typically high voltage) to be safe. Security is a new thing for them, but they're well suited to provide the services.
cesarb 8 hours ago
> Underwriters Laboratories, UL. Look at the back of pretty much any mains powered device and you'll see their mark.

I just looked at the closest mains powered device I have here (a fancy humidifier/fan), and only saw an Inmetro mark, there's no UL mark at all.

(My point is: plenty of people are not from the USA. I happen to have already heard that the UL is sort of the USA equivalent of our Inmetro, though like many things in the USA it's a private entity instead of a government entity, but the parent poster probably hadn't heard of that.)

glitchc 6 hours ago
mikewarot 21 hours ago
This is equivalent to requiring an Underwriters Laboratory (UL) approval on every electrical appliance before settling on requirements for fuses or circuit breakers.

No matter how good everyone in this trust mark program is, you're only one confused deputy[1] away from disaster.

[1] https://en.wikipedia.org/wiki/Confused_deputy_problem

netfortius 5 hours ago
I wonder how many of these latest "White House did X" are going to go away in two weeks...
Terr_ 1 day ago
Digging for more details, but a lot of the technical requirements (e.g. encryption, password handling, etc.) are still unclear.

https://www.fcc.gov/CyberTrustMark

krunck 1 day ago
"Which products will be included in the program? The program applies to consumer wireless IoT products.

Examples of eligible products include internet-connected home security cameras, voice-activated shopping devices, smart appliances, fitness trackers, garage door openers, and baby monitors."

Ok, nothing I use then. I hope this comes to home and SMB network gear.

fulafel 20 hours ago
Many countries have been doing this already (usually based on this ETSI spec: https://www.etsi.org/deliver/etsi_en/303600_303699/303645/03...)
MaxGripe 5 hours ago
"Pedobear Seal of Approval" with NSA stamp!
jmclnx 1 day ago
This is all well and good. You can have thousands of "mark of approvals", but is the most important item needed required ?

User upgradability if the Company Folds or Sunsets the product. When that happens, the user will need to buy a new device or live with comprised devices. Most will live with the comprised device.

So, IMO, the product should be fully open source and easily upgraded in order to get the Cyber Trust Mark.

duskwuff 1 day ago
> User upgradability if the Company Folds or Sunsets the product.

This isn't something which a company can meaningfully guarantee to consumers. Even if it's technically possible for users to install their own software on a device - for that matter, even if the company goes out of their way to support it by releasing documentation and source code - there simply isn't interest from developers to build and maintain custom software for those devices. And the same goes for devices which depend on online services - those services cost money to run, and the number of users capable and willing to run their own is miniscule.

devwastaken 10 hours ago
The FCC doesnt do testing themselves. they just trust submitted paperwork. tech gets the “good one” certified then changes the parts for cheaper.

there is no regulation in tech. they own the fed.

magic_smoke_ee 12 hours ago
NIST is involved (Dual_EC_DRBG).

Verdict: nope.

This is something that an independent, international cybersecurity nonprofit should be in-charge of, not a standards org that shills for what we think may have been the NSA (BULLRUN).

gibibit 1 day ago
I wonder how much this is going to add to the cost/effort of creating a new IOT product for startups/small businesses?
duskwuff 1 day ago
Based on the sorts of recommendations in [1], probably not to any meaningful degree, if at all. Much of what it's asking for is table-stakes functionality, along the lines of "have a factory reset feature", "use encryption when transmitting data", or "have a product support page" - things that any responsible developer should have been doing already.

[1]: https://nvlpubs.nist.gov/nistpubs/ir/2022/NIST.IR.8425.pdf

simne 1 day ago
I'm sure, it will depend on how large part of product is made abroad and in which country.

I wonder, how strict will be regulations on Chinese software parts. For EU/US/Australia/Korea originated should be less strict if could prove source.

mxuribe 1 day ago
I honestly don't know...but isn't this sort of like when toasters first came out? I don't know for sure, but i guess toasters maybe didn't have the UL symbol...and probably some accidents happened, maybe house fires and such? Fast forward to nowadays and toasters tend to be pretty safe - well, if used properly and purchased from a reputable manufacturer who has been tested via entities like UL, etc....So yeah, maybe a little extra cost...but wouldn't we want at least some modicum of a signal of quality assurances for IoT devices - like we have for things like toasters?
DeepYogurt 1 day ago
Interesting. This is probably a good thing to have around as a baseline for all the iot crap out there
mattmaroon 11 hours ago
It's as if the federal government doesn't realize nobody trusts it. Whether due to ineptitude or dishonesty, the only thing we can be sure about this is that we can't be sure about it.

We need a blue ribbon commission on transparency, honesty, and good governance desperately. Let's reduce any federal agencies that make any sort of direct-to-citizen recommendations by 100% and instead spend that on rooting out bad incentives, misinformation, etc.

trod1234 16 hours ago
This is doomed to failure.

Cybersecurity best practices are a point in time snapshot, the label will be dependent on at purchase time, how will that help people who have purchased second hand, or had products where items on shelves suddenly had a vulnerability discovered? You really think they are going to go through the cost of sending those back?

All software bugs can potentially be security bugs. This follows classic shock doctrine.

zcrossing 22 hours ago
[dead]
surfpel 1 day ago
Only Gov approved spyware included!
delfinom 12 hours ago
This is basically going to become a monopoly program. Stores and governments will start mandating it for sales like energy star. Then because UK is the administrator, the costs to certify will skyrocket. Basically this is going to ensure the only devices you can buy are those made by a select few megacorps.