During installation, the router sent several data packets to an Amazon server in the US. These packets contained the configured SSID name and password in clear text, as well as some identification tokens for this network within a broader database and an access token for a user session that could potentially enable a MITM attack.

Linksys has refused to acknowledge/respond to the issue.

  • Max-P@lemmy.max-p.me
    link
    fedilink
    English
    arrow-up
    0
    ·
    2 months ago

    It’s like all the tech companies are actively working together to give us trust issues at this point. Used to flash things for fun because I can, more and more it feels like it’s a necessity just to get basic human rights respected.

    • ichbinjasokreativ@lemmy.world
      link
      fedilink
      English
      arrow-up
      0
      ·
      2 months ago

      Exacly. You basically need to flash something like grapheneos on your phone, install linux on your computer and run custom firmware on your router to even have any semblance of privacy

      • Noble Shift@lemmy.world
        link
        fedilink
        English
        arrow-up
        0
        ·
        2 months ago

        And a VPN, ad blocking / Pihole, custom DNS / SDNS, stingray detection, SNORT/ IPS/IDS, and better have your wifi and Bluetooth turned off your phone before you go to the market shopping because they’re fingerprinting your Mac addresses there too.

    • Admiral Patrick@dubvee.org
      link
      fedilink
      English
      arrow-up
      0
      ·
      2 months ago

      Yep.

      Every piece of networking gear in my house (except my ONT grrrrr) is running OpenWRT. Which also makes it nice since I can script any changes and push them out.