DJI faces a community dedicated to hacking its drones

DJI

DJI is one of those companies that has taken very seriously not allowing anyone to use their drones in war zones, for this it launched a firmware update of their machines where they could control that their models did not fly in certain areas. Something that not only affected conflict zones, where it has been shown that they are modified, sometimes in a very rudimentary way, to be used as weapons, but also the fact of not being able to fly in restricted areas such as airports.

Unfortunately, despite the fact that a large part of the community has seen this necessary restriction, the truth is that there are many developers who have taken this restriction as something very negative, largely hiding from the fact that acquiring a product it must allow them to do whatever they want with it.  One of the reasons is that the manufacturer should not design any type of restriction but rather that these, if there are any, should be imposed by governments at the local level.

Today you can remove restricted areas from a DJI drone just by installing a exploit available on Github

With all this in mind, today I want to talk to you for example about the work done Kevin Finisterre, a developer who is very fond of drones who has been able to publish on Github, a public repository for code, a exploit that anyone can download and install on their DJI drone that disables exclusion zones.

Of course, on the other hand to DJI this is not too funny and they have not taken long, the truth is that they have been busy for several weeks, in starting to develop software and launch firmware updates for their models in which everyone is looking for the media, plug all kinds of security holes that allow their drones to be hacked.


Be the first to comment

Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: Miguel Ángel Gatón
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.