Reverse engineering Bambu Connect: Difference between revisions
m rewording Tags: Mobile edit Mobile web edit Visual edit |
Additional security measures |
||
Line 88: | Line 88: | ||
The private key corresponds to the public key contained in the app's certificate. This certificate is sent to the printer, allowing it to verify the authenticity of the digital signature using the public key. | The private key corresponds to the public key contained in the app's certificate. This certificate is sent to the printer, allowing it to verify the authenticity of the digital signature using the public key. | ||
==== Additional security measures ==== | |||
Bambu Connect also encrypts G-code commands and file paths of print operations using the printer's public key. This ensures that only the intended printer can decrypt the data, adding another layer of security. | Bambu Connect also encrypts G-code commands and file paths of print operations using the printer's public key. This ensures that only the intended printer can decrypt the data, adding another layer of security. | ||
However, the potential security benefits are diminished because the encrypted commands still include the plaintext G-code command or file path, likely due to negligence or the need for backwards compatibility. | However, the potential security benefits are diminished because the encrypted commands still include the plaintext G-code command or file path, likely due to negligence or the need for backwards compatibility. | ||
Note that network traffic is encrypted via TLS regardless of this, ensuring that no middleman can decrypt it. | |||
==References== | ==References== |