Lovense: The Company That Lies to Security Researchers
40 points
12 hours ago
| 8 comments
| bobdahacker.com
| HN
chmod775
3 hours ago
[-]
Am I crazy or does all of that look ridiculously over engineered for what they actually provide? It looks like the 4-5 devs wanted to build something fancy like the big boys would, without having the manpower to deal with the overhead.

These kinds of issues usually arise because complex technologies are introduced, mostly by following some basic tutorials and light googling, without anyone actually understanding what that random NPM package (speaking a protocol of which they have at best a rudimentary understanding) actually does to communicate with the rust crate the other guy pulled.

I don't doubt their entire service could be a monolithic, small, and easily comprehensible node app running on some consumer PC hardware at the company HQ. You're never going to outgrow that in their business. It'd likely run off a macbook with some engineering discipline.

Instead it's probably a confusing mess of microservices in a Kubernetes cluster, each running in its own Docker container for "isolation", glued together with some YAML magic and a few bash scripts, tunneling XMPP over gRPC "because it's faster", behind an Istio mesh someone half-configured, talking to a bunch of managed cloud services across AWS and GCP "for redundancy", with Redis caches scattered around "just in case", logs streaming into three different observability tools (none of them fully set up), CI/CD powered by GitHub Actions triggering Terraform deployments through a Slack bot, autoscaling turned on "with default settings", and of course there's a blockchain component for audit logs - though no one remembers why - and a colocated 96-core fifteen-thousand dollar server running a cron job that updates a config file in S3 every hour "to keep things in sync".

Too bad the entire thing relies on those JIDs containing PII now, which everyone is afraid of changing. The solution? Slap another micro-service in front that translates them to something else. Devs have been unsuccessfully trying to get exactly that deployed for weeks now. But cut them some slack: getting shit done is hard when you're overqualified for your job.

reply
dizhn
5 hours ago
[-]
Like the author I would expect a lot more attention to privacy and security from a remote operated vibrating dong company.
reply
graemep
3 hours ago
[-]
I genuinely do not know whether you are being serious or sarcastic.
reply
noboostforyou
5 hours ago
[-]
Assuming everything you reported is true (I'm not doubting you, I just don't have the time to test everything myself atm) this is actually insane behavior from the company.
reply
breakingcups
8 hours ago
[-]
This is crazy bad, malpractice-level bad if this were a regulated profession.
reply
cwmoore
6 hours ago
[-]
"State-licensed teledildonicist."
reply
dannykwells
4 hours ago
[-]
This is what I come here for.
reply
ykonstant
11 hours ago
[-]
That is beyond bad; some models using lovense have high privacy needs and probably don't know their equipment is so insecure. Even leaving account takeover aside, it is hard enough to fend off stalkers without them having your email.
reply
cwmoore
2 hours ago
[-]
Gotta honor high-profile privacy needs.
reply
jterrys
4 hours ago
[-]
reply
JohnMakin
5 hours ago
[-]
Why even have a bounty system in the first place if you're going to do this kind of thing?
reply
tristor
5 hours ago
[-]
This type of behavior should honestly get the leaders of the company criminally charged, this is willful negligence. Assuming this is true (and it the blog post has enough receipts to assume that it is), this company should be forcibly dissolved by the government and the leadership criminally charged. This is absolutely ridiculous behavior in response to a security report.
reply
dmitrygr
4 hours ago
[-]

  What are you in for?

  Murder 1. You?

  Didn't secure someones's buttplug properly

  Duuuude... you're a monster
reply