A SECURITY researcher hacked a common Covid-19 test at home and altered his results to prove the tests could be exploited.
Network expert Ken Gannon found and exploited a vulnerability in Ellume’s nose picking test.
The security issue was disclosed by F-Secure, a security firm that Gannon advises on.
Ellume has now patched the vulnerability so it cannot be exploited by anyone else.
Gannon can intercept and modify Bluetooth traffic between the covid test device and the app.
He can change his results before it shows up in the app.
The hack was not easy to perform and involved mining and analyzing the test device’s data.
Gannon then figured out the data he needed to fake a positive result.
Most read on Phone & amp; Tool
He wrote two scenarios to change a negative outcome into a positive one.
He was then emailed false results by Ellume.
Gannon said to The Verge it was his goal “to see if a ‘normal person’ could fake a positive/negative COVID test.”
The researcher concluded that “someone with the right motivation and technical skills could have used these flaws to ensure that they or someone they were working with received a negative test every time.” they get tested.”
Technically, a hacker could have used an exploited test like this to travel.
Ellume is currently said to be working on a “verification portal”.
In other words, millions of women have target of deepfake revenge pornography, experts fear.
You should exit Facebook Messenger and use two other apps instead, a network expert has warned.
And, older phones can decommissioned in 2022 because 3G network will stop working.
https://www.the-sun.com/lifestyle/tech-old/4317136/i-hacked-my-at-home-covid-19-test/ I hacked my home Covid-19 test with Bluetooth and may have used it to travel – this could put everyone at risk