Jailbreaking RabbitOS: Uncovering secret logs, and GPL violations
The author shares a negative experience with the Rabbit R1 device, explores jailbreaking its firmware for customization, security insights, and hidden features, emphasizing the importance of maintaining original firmware integrity.
Read original articleThe blog post discusses the author's experience with the Rabbit R1 device, highlighting its poor performance and customer dissatisfaction. The author delves into the process of jailbreaking the RabbitOS firmware to gain root access without making permanent changes. They detail the boot process of the R1 device, including the MediaTek SoC used and the challenges faced in analyzing and modifying the firmware. The author explains their motivation for exploring the device, which stemmed from a desire to uncover hidden features and overcome obfuscation in subsequent app updates. By reverse-engineering the APK and developing a "tethered jailbreak," the author gained insights into the device's security measures and the potential for customization. The blog post also touches on the implications of modifying the bootloader and the importance of maintaining the integrity of the original firmware while gaining root access. The author's approach involves creating a custom boot image to bypass security checks and execute custom code in memory, without altering the device's storage.
Related
Rabbit data breach: all r1 responses ever given can be downloaded
A data breach at Rabbit Inc. exposed critical API keys for ElevenLabs, Azure, Yelp, and Google Maps, compromising personal information and enabling malicious actions. Rabbit Inc. has not addressed the issue, urging users to unlink Rabbithole connections.
Researchers Prove Rabbit AI Breach by Sending Email to Us as Admin
Researchers found a security flaw in Rabbit R1 AI assistant, exposing hardcoded API keys. Hackers could access sensitive data, impersonate the company, and send emails. Rabbitude group aims to improve security and functionality.
Hacking Amazon's Eero 6 (part 2)
The author describes extracting firmware data from an Amazon eero 6 device's eMMC flash chip. Despite challenges, they successfully read the chip in 4-bit transfer mode, dumped the firmware, and analyzed its 23 partitions.
R1 jailbreakers find security flaw in Rabbit's code
A group of R1 jailbreakers discovered a security flaw in Rabbit's code, exposing hardcoded API keys. Rabbit took action after a month, revoking most compromised keys. The breach complicates Rabbit's recovery from R1 AI gadget issues.
The Rabbit R1 has been logging users' chats – with no way to wipe them
The Rabbit R1 AI assistant device stored chat logs without deletion option. A recent update adds Factory Reset, enhances security, and prevents data access, addressing privacy concerns and a security breach.
- Privacy Concerns: Several comments highlight the extensive data logging by the Rabbit R1, including GPS locations, WiFi network names, and audio logs.
- Legal and Ethical Issues: Commenters discuss potential GPL violations by Rabbit Inc. and the company's lack of response to the author's inquiries.
- Company Criticism: Some users criticize Rabbit Inc. for poor software quality and questionable business practices, while others share personal negative experiences with the company.
- Device Potential: Despite the criticisms, a few commenters see potential in the device for custom applications and educational purposes.
- Clarifications and Context: Some users provide additional context about the Rabbit R1's functionality and the company's response to security issues.
GPL requires you to disclose the license and source code on request, but Truth Social got away with not disclosing the license until someone realized they were using AGPL code, and only then released the source. I wonder if Rabbit will slip by doing the same.
Your precise GPS locations (which are also sent to their servers). Your WiFi network name. The IDs of nearby cell towers (even with no SIM card inserted, also sent to their servers). Your internet-facing IP address. The user token used by the device to authenticate with Rabbit's back-end API. Base64-encoded MP3s of everything the Rabbit has ever spoken to you (and the text transcript thereof).
Nasty :0
> As of the end of July 15th, they have not responded.
Their lawyers are considering the options how to sue you.
> [...]
> But, we don't even need to use an exploit here. Both the brom and Preloader boot stages feature a USB bootloader mode, which in the r1's case will accept unsigned DA ("Download Agent") images over USB, and allow you to execute them from memory (from SRAM in the case of brom, and DRAM in the case of Preloader).
The RabbitOS developers can patch all of this by setting an efuse that instructs the bootrom to block bootloader access over USB. Moto did this a couple years ago with their MediaTek devices that were susceptible to bootrom attacks via this surface. If I remember correctly this efuse was set at the LK stage and was applied in a regular OTA firmware update.
The software looks garbage and the company doesn’t seem great either at this point.
But if it’s easy enough to run custom apps on (even/especially) in kiosk mode, I could imagine some pretty interesting use cases for this form factor.
Bonus points if you could just slap something together as a PWA too, as then it gets much quicker than programming an ESP32 + battery + screen, and in what looks like s pretty nice self contained unit.
Would be nice, ideally to be able to get it running more secure / without any Google services, something like GrapheneOS.
Having not looked at what’s out there (yet) does anyone know if people are using them in this way for custom single focus apps or have any pointers?
I hope TE chooses their clients better in the future. The guy behind Rabbit is a known grifter.
Maybe identifying who would buy the next Juicero, Multivitamins and “be your own boss” Multi-level-Marketing scheme?
>On July 12th, I asked Rabbit Inc. if they had any comments to make on the content of this article [...] As of the end of July 15th, they have not responded.
That *was* between zero and two working days, depending on how early on Friday the author asked them for comments and how late on Monday they waited for a response. It might've been better to wait a few more days. I doubt they would've responded even then, but it would've made the case of their incompetence stronger, and given them less ammo for a rebuttal should they choose to make one.
"The promise was simple. Speak into the device and it'll complete tasks for you thanks to Rabbit's “large action models”—call an Uber, reserve dinner plans via OpenTable, play a song through Spotify, or order some food on DoorDash. Just speak and it will handle it, just like if you handed your smartphone to a personal assistant and asked them to do something for you."
I don't understand why an app on the phone wouldn't do that, but maybe I'm not hype enough.
This is good.
He says he didn't bother reporting the issue at first (!) but then later criticizes Rabbit for not responding to his July 12th e-mail in less than 2 business days.
However, Rabbit had already fixed the issue and released a security advisory on July 11th, a day before he finally decided to contact them. You can see their security advisory on their website, dated July 11th ( https://www.rabbit.tech/security-advisory-071124 ) To be fair, the post does bury this at the very end of the article, but it spends most of the opening sections talking about how much it "sucks" and leans heavily on the logging issue and their lack of response before eventually admitting that it was already fixed.
> As of 11 July, we’ve made the following changes:
> Pairing data can no longer be used to read from rabbithole. It can only trigger actions.
> Pairing data is no longer logged to the device.
> We have reduced the amount of log data that gets stored on the device.
> The Factory Reset option is now available via the settings menu. Customers should use this option to erase ALL data from their r1 prior to transferring ownership.
I have been disappointed in its hackability; however, the joy I receive when watching my 10 year old dive into a topic of his choice with this neon orange LLM is worth far more to me than the $200 for my R1. During these summer months I let him stay up late with this as his only glowing screen and he basically uses it like I used Encyclopedia Brittanica, except much more deeply and with more interesting subjects. I think it's a great little piece of purpose-driven hardware.
I dropped my own ChatGPT subscription and use this if I need to do some heavy lifting. I know it won't last forever, but it will last until the company goes bottom-up -- and longer if we get more boottime control through tools like this.
Edit: nm, I commented before reading other comments. Anyone else confused should read jylam's comment explaining.
These types of logs are extremely useful for debugging, just by doing that doesn't mean it's doing it for the purpose of selling your data to evil corp.
Get a grip, people.
Related
Rabbit data breach: all r1 responses ever given can be downloaded
A data breach at Rabbit Inc. exposed critical API keys for ElevenLabs, Azure, Yelp, and Google Maps, compromising personal information and enabling malicious actions. Rabbit Inc. has not addressed the issue, urging users to unlink Rabbithole connections.
Researchers Prove Rabbit AI Breach by Sending Email to Us as Admin
Researchers found a security flaw in Rabbit R1 AI assistant, exposing hardcoded API keys. Hackers could access sensitive data, impersonate the company, and send emails. Rabbitude group aims to improve security and functionality.
Hacking Amazon's Eero 6 (part 2)
The author describes extracting firmware data from an Amazon eero 6 device's eMMC flash chip. Despite challenges, they successfully read the chip in 4-bit transfer mode, dumped the firmware, and analyzed its 23 partitions.
R1 jailbreakers find security flaw in Rabbit's code
A group of R1 jailbreakers discovered a security flaw in Rabbit's code, exposing hardcoded API keys. Rabbit took action after a month, revoking most compromised keys. The breach complicates Rabbit's recovery from R1 AI gadget issues.
The Rabbit R1 has been logging users' chats – with no way to wipe them
The Rabbit R1 AI assistant device stored chat logs without deletion option. A recent update adds Factory Reset, enhances security, and prevents data access, addressing privacy concerns and a security breach.