Reverse engineering Bambu Connect: Difference between revisions
examples for what key cannot be used for |
|||
Line 86: | Line 86: | ||
Since the private key has already been leaked, however, third-party software can now regain access to the lost functionality, and it is clear that the overall security characteristics have neither improved nor worsened compared to previous updates. | Since the private key has already been leaked, however, third-party software can now regain access to the lost functionality, and it is clear that the overall security characteristics have neither improved nor worsened compared to previous updates. | ||
What the key '''cannot''' be used for, contrary to many false claims on the internet: | |||
* Decrypting HTTPS traffic to the cloud | |||
* Decrypting any MQTTS or FTPS or video feed traffic | |||
* Bypassing cloud user authentication | |||
* Bypassing local authentication (LAN access code) | |||
* Getting access to other printers | |||
* Signing custom firmware | |||
* Signing custom filament NFC tags | |||
* Jailbreaking | |||
===Purpose of the certificates=== | ===Purpose of the certificates=== |