Matt Brown
Matt Brown
  • 77
  • 3 536 514
US Government to BanTP-Link Devices - Live Hacking of a Chinese WiFi Router
Forbes TP-Link article:
www.forbes.com/sites/larsdaniel/2024/12/18/us-considers-ban-on-chinese-made-tp-link-routers-heres-why/
Hacking Team Hack Writeup:
gist.github.com/jaredsburrows/9e121d2e5f1147ab12a696cf548b90b0
Minipro Repo:
gitlab.com/DavidGriffith/minipro
Need IoT pentesting or reverse engineering services?
Please consider Brown Fine Security:
brownfinesecurity.com/
IoT Hackers Hangout Community Discord Invite:
discord.com/invite/vgAcxYdJ7A
🛠️ Stuff I Use 🛠️
🪛 Tools:
Raspberry PI Pico: amzn.to/3XVMS3K
XGecu Universal Programmer: amzn.to/4dIhNWy
Multimeter: amzn.to/4b9cUUG
Power Supply: amzn.to/3QBNSpb
Oscilloscope: amzn.to/3UzoAZM
Logic Analyzer: amzn.to/4a9IfFu
USB UART Adapter: amzn.to/4h4G7DD
iFixit Toolkit: amzn.to/44tTjMB
🫠 Soldering & Hot Air Rework Tools:
Soldering Station: amzn.to/4dygJEv
Microsoldering Pencil: amzn.to/4dxPHwY
Microsoldering Tips: amzn.to/3QyKhrT
Rework Station: amzn.to/3JOPV5x
Air Extraction: amzn.to/3QB28yx
🔬 Microscope Setup:
Microscope: amzn.to/4abMMao
Microscope 0.7X Lens: amzn.to/3wrV1S8
Microscope LED Ring Light: amzn.to/4btqiTm
Microscope Camera: amzn.to/3QXSXsb
About Me:
My name is Matt Brown and I'm an Hardware Security Researcher and Bug Bounty Hunter. This channel is a place where I share my knowledge and experience finding vulnerabilities in IoT systems.
- Soli Deo Gloria
💻 Social:
website: brownfinesecurity.com/
twitter: nmatt0
linkedin: www.linkedin.com/in/mattbrwn/
github: github.com/nmatt0/
#hacking #iot #cybersecurity
Переглядів: 852 030

Відео

In-Circuit Firmware Extraction with the CH341A - The Poor Man’s Flash Programmer
Переглядів 21 тис.16 годин тому
CH341A Flash Programmer: amzn.to/3VEJbxe Software: wiki.flashrom.org/Flashrom Need IoT pentesting or reverse engineering services? Please consider Brown Fine Security: brownfinesecurity.com/ IoT Hackers Hangout Community Discord Invite: discord.com/invite/vgAcxYdJ7A 🛠️ Stuff I Use 🛠️ 🪛 Tools: Raspberry PI Pico: amzn.to/3XVMS3K XGecu Universal Programmer: amzn.to/4dIhNWy Multimeter: amzn.to/4b9c...
Firmware Extraction and Hardcoded Password Discovery - Hacking the Mercusys MB110
Переглядів 29 тис.День тому
Minipro software: gitlab.com/DavidGriffith/minipro Need IoT pentesting or reverse engineering services? Please consider Brown Fine Security: brownfinesecurity.com/ IoT Hackers Hangout Community Discord Invite: discord.com/invite/vgAcxYdJ7A 🛠️ Stuff I Use 🛠️ 🪛 Tools: Raspberry PI Pico: amzn.to/3XVMS3K XGecu Universal Programmer: amzn.to/4dIhNWy Multimeter: amzn.to/4b9cUUG Power Supply: amzn.to/3...
Accessing UART Console on 4G LTE Router - Hacking the Mercusys MB110
Переглядів 18 тис.День тому
Previous glitching video: ua-cam.com/video/F-G-7-qo7Xg/v-deo.html Need IoT pentesting or reverse engineering services? Please consider Brown Fine Security: brownfinesecurity.com/ IoT Hackers Hangout Community Discord Invite: discord.com/invite/vgAcxYdJ7A 🛠️ Stuff I Use 🛠️ 🪛 Tools: Raspberry PI Pico: amzn.to/3XVMS3K XGecu Universal Programmer: amzn.to/4dIhNWy Multimeter: amzn.to/4b9cUUG Power Su...
Persistent Shells and SSL Decryption - Raw Look at TP-Link Camera Hacking
Переглядів 14 тис.14 днів тому
Need IoT pentesting or reverse engineering services? Please consider Brown Fine Security: brownfinesecurity.com/ IoT Hackers Hangout Community Discord Invite: discord.com/invite/vgAcxYdJ7A 🛠️ Stuff I Use 🛠️ 🪛 Tools: Raspberry PI Pico: amzn.to/3XVMS3K XGecu Universal Programmer: amzn.to/4dIhNWy Multimeter: amzn.to/4b9cUUG Power Supply: amzn.to/3QBNSpb Oscilloscope: amzn.to/3UzoAZM Logic Analyzer...
Hardware Hacking Travel Loadout
Переглядів 10 тис.28 днів тому
What HW hacking gear do you take on short trips? Need IoT pentesting or reverse engineering services? Please consider Brown Fine Security: brownfinesecurity.com/ IoT Hackers Hangout Community Discord Invite: discord.com/invite/vgAcxYdJ7A 🛠️ Stuff I Use 🛠️ 🪛 Tools: Raspberry PI Pico: amzn.to/3XVMS3K XGecu Universal Programmer: amzn.to/4dIhNWy Multimeter: amzn.to/4b9cUUG Power Supply: amzn.to/3QB...
Persistent Root Shell via IoT Firmware Modification - Rooting a TP-Link Security Camera
Переглядів 20 тис.Місяць тому
Minipro repo: gitlab.com/DavidGriffith/minipro Need IoT pentesting or reverse engineering services? Please consider Brown Fine Security: brownfinesecurity.com/ IoT Hackers Hangout Community Discord Invite: discord.com/invite/vgAcxYdJ7A 🛠️ Stuff I Use 🛠️ 🪛 Tools: Raspberry PI Pico: amzn.to/3XVMS3K XGecu Universal Programmer: amzn.to/4dIhNWy Multimeter: amzn.to/4b9cUUG Power Supply: amzn.to/3QBNS...
Glitching Linux Bootloader for Shells and Freedom - Rooting a TP-Link Security Camera
Переглядів 37 тис.Місяць тому
Hack the Planet!!! Need IoT pentesting or reverse engineering services? Please consider Brown Fine Security: brownfinesecurity.com/ IoT Hackers Hangout Community Discord Invite: discord.com/invite/vgAcxYdJ7A 🛠️ Stuff I Use 🛠️ 🪛 Tools: Raspberry PI Pico: amzn.to/3XVMS3K XGecu Universal Programmer: amzn.to/4dIhNWy Multimeter: amzn.to/4b9cUUG Power Supply: amzn.to/3QBNSpb Oscilloscope: amzn.to/3Uz...
Open Source Flash Programmer Software - minipro FTW
Переглядів 13 тис.Місяць тому
minipro repo: gitlab.com/DavidGriffith/minipro algorithm.xml archive: brownfinesecurity.com/algorithm.xml Need IoT pentesting or reverse engineering services? Please consider Brown Fine Security: brownfinesecurity.com/ IoT Hackers Hangout Community Discord Invite: discord.com/invite/vgAcxYdJ7A 🛠️ Stuff I Use 🛠️ 🪛 Tools: Raspberry PI Pico: amzn.to/3XVMS3K XGecu Universal Programmer: amzn.to/4dIh...
Hacking Time - Discussing the Bug Class that Earned Me 5-Figures
Переглядів 9 тис.Місяць тому
ArchAngelDDay's Nahamsec Talk: ua-cam.com/video/G1RHa7l1Ys4/v-deo.html NTP mitm Demo: github.com/nmatt0/ntp-mitm-demo Need IoT pentesting or reverse engineering services? Please consider Brown Fine Security: brownfinesecurity.com/ IoT Hackers Hangout Community Discord Invite: discord.com/invite/vgAcxYdJ7A 🛠️ Stuff I Use 🛠️ 🪛 Tools: Raspberry PI Pico: amzn.to/3XVMS3K XGecu Universal Programmer: ...
Chip Off Firmware Extraction - Hacking the Totolink WiFi Router
Переглядів 44 тис.2 місяці тому
Need IoT pentesting or reverse engineering services? Please consider Brown Fine Security: brownfinesecurity.com/ IoT Hackers Hangout Community Discord Invite: discord.com/invite/vgAcxYdJ7A 🛠️ Stuff I Use 🛠️ 🪛 Tools: Raspberry PI Pico: amzn.to/3XVMS3K XGecu Universal Programmer: amzn.to/4dIhNWy Multimeter: amzn.to/4b9cUUG Power Supply: amzn.to/3QBNSpb Oscilloscope: amzn.to/3UzoAZM Logic Analyzer...
Top 5 Tools for IoT Hacking Beginners
Переглядів 19 тис.2 місяці тому
Check out the blog post related to this video! brownfinesecurity.com/blog/hardware-hacking-tools-beginners-guide/ Amazon Items from the Video: WiFi Router: amzn.to/3YqjjqH iFixit Toolkit: amzn.to/408Kfwr Multimeter: amzn.to/4hn6Z27 UART Adapter: amzn.to/4h4G7DD Jumper Wire: amzn.to/4eOrZgk PINECIL Soldering Iron: amzn.to/48cxNxD Solder: amzn.to/3UdhISN Wire Strippers: amzn.to/4eMUYkv Need IoT p...
Make Binwalk Fast Again - Rust Rewrite of Binwalk is in Beta
Переглядів 14 тис.2 місяці тому
Check out V3 of binwalk! github.com/ReFirmLabs/binwalk/tree/binwalkv3 Need IoT pentesting or reverse engineering services? Please consider Brown Fine Security: brownfinesecurity.com/ IoT Hackers Hangout Community Discord Invite: discord.com/invite/vgAcxYdJ7A 🛠️ Stuff I Use 🛠️ 🪛 Tools: Raspberry PI Pico: amzn.to/3XVMS3K XGecu Universal Programmer: amzn.to/4dIhNWy Multimeter: amzn.to/4b9cUUG Powe...
Discovering Backdoor in Chinese Router Firmware Update Server - Hacking the Totolink WiFi Router
Переглядів 36 тис.2 місяці тому
Discovering Backdoor in Chinese Router Firmware Update Server - Hacking the Totolink WiFi Router
UART Root Shell on Linux Router - Hacking the Totolink WiFi Router
Переглядів 20 тис.2 місяці тому
UART Root Shell on Linux Router - Hacking the Totolink WiFi Router
Wireshark Basics for IoT Hacking
Переглядів 17 тис.3 місяці тому
Wireshark Basics for IoT Hacking
Using Linux to Intercept IoT Device Traffic
Переглядів 16 тис.3 місяці тому
Using Linux to Intercept IoT Device Traffic
Hacking a Chinese Medical Device via Bluetooth - iHealth Nexus Pro Scale
Переглядів 21 тис.3 місяці тому
Hacking a Chinese Medical Device via Bluetooth - iHealth Nexus Pro Scale
Intercepting Mobile Traffic with Caido and Frida - iHealth Nexus Pro Scale
Переглядів 15 тис.4 місяці тому
Intercepting Mobile Traffic with Caido and Frida - iHealth Nexus Pro Scale
Siglent SDM3045X Multimeter - with Custom OBS Overlay
Переглядів 6 тис.4 місяці тому
Siglent SDM3045X Multimeter - with Custom OBS Overlay
Statistical Attacks on Proprietary Encryption - Hacking the VStarcam CB73 Security Camera
Переглядів 18 тис.4 місяці тому
Statistical Attacks on Proprietary Encryption - Hacking the VStarcam CB73 Security Camera
Breaking a Proprietary Chinese Encryption Protocol - Hacking the VStarcam CB73 Security Camera
Переглядів 107 тис.4 місяці тому
Breaking a Proprietary Chinese Encryption Protocol - Hacking the VStarcam CB73 Security Camera
Decrypting SSL to Chinese Cloud Servers - Hacking the VStarcam CB73 Security Camera
Переглядів 331 тис.4 місяці тому
Decrypting SSL to Chinese Cloud Servers - Hacking the VStarcam CB73 Security Camera
JFFS2 Firmware Modification - IoT Pentesting Tips and Tricks
Переглядів 12 тис.4 місяці тому
JFFS2 Firmware Modification - IoT Pentesting Tips and Tricks
Discovering a Hardcoded Root Password - Hacking the VStarcam CB73 Security Camera
Переглядів 159 тис.5 місяців тому
Discovering a Hardcoded Root Password - Hacking the VStarcam CB73 Security Camera
Hacking a Tiny Security Camera - VStarcam CB73 Firmware Extraction
Переглядів 41 тис.5 місяців тому
Hacking a Tiny Security Camera - VStarcam CB73 Firmware Extraction
UFS/eMMC Firmware Extraction - UFI Box
Переглядів 13 тис.5 місяців тому
UFS/eMMC Firmware Extraction - UFI Box
Hacking a Knockoff Google Chromecast - Firmware Extraction
Переглядів 109 тис.5 місяців тому
Hacking a Knockoff Google Chromecast - Firmware Extraction
blueTag - A Raspberry PI Pico JTAGulator Alternative
Переглядів 10 тис.5 місяців тому
blueTag - A Raspberry PI Pico JTAGulator Alternative
Hacking a WiFi Fireworks Firing System - The FireFly Plus
Переглядів 15 тис.5 місяців тому
Hacking a WiFi Fireworks Firing System - The FireFly Plus

КОМЕНТАРІ

  • @julianjoseph1243
    @julianjoseph1243 11 хвилин тому

    bdinfo doesnt provide the flash start and size info. Any ideas on how to proceed?

  • @MichaelChanslor
    @MichaelChanslor 17 хвилин тому

    Thanks for another great video! Merry Christmas!

  • @macsoyyo
    @macsoyyo 26 хвилин тому

    Awesome. I’ve really enjoyed this video . Congrats!

  • @user-pl8tp1fu9z
    @user-pl8tp1fu9z 39 хвилин тому

    Banning. a sign of insecurity from the big brother

  • @footloose1187
    @footloose1187 Годину тому

    On national security ground??? Lolz

  • @Codenameprofessor
    @Codenameprofessor Годину тому

    These chinese aren't trust worthy. Cheap character and curse to man kind

  • @jaycahow4667
    @jaycahow4667 Годину тому

    For all that you did to get a default ID and Password I an still confused to exactly what was accomplished. You have to reach the actual router to do anything with it from the Internet. In looking at the manual for this specific router Remote Access from the Internet is turned off by default. Even if it is deliberately turned on you still have the option to limit access to specific remote IP addresses. Now from the manual it says the first time you access the local router Web page you have to enter a password which then becomes the admin password for subsequent accesses. Since the router you found was accessible from the Internet someone had to have accessed the router locally already at least once to enable that remote access feature (off by default). So the router has an admin password setup locally by the time you located it with remote access enabled (or you would not have located it in the first place). We do not know if they limited remote access to specific remote IP addresses (which would be smart). Since you made no effort to actually login remotely we do not know if you would have succeeded or not.. There may be a backdoor that always allows the ID and Password you located in the firmware to login (that would be bad). The password you located may be negated once the first local access is done and a new password created (which we know was done). The router may be limiting remote access by IP address (when they enabled with remote access) even with a valid password but maybe your password bypasses that check with a back door. So the router actually seems to have pretty good access security by default. It forces you to setup a new admin password upon first local access. Remote Access is not enabled by default by the time you enable it you have a new admin password. Then it allows you to setup only specific remote IP addresses that can remote access from the Internet which if used drastically limits remote access capabilities. Now it it possible that the ID and Password you located is an unpublished backdoor that gets around the new admin password that was already set and any potential IP limitations. In actually reaching the 111.70.20.247 router Web page that you located the password 1234 that you located does not actually work showing that a new default password or remote IP limitations are in place. So unless I am missing something (and if I am please point it out if I am) everything you did will not get any access to the remotely located router you found or any other identical router model from the same vendor. From what I have read the TP-Link router hacking involves people using USB drives that unknowingly contain malware that access the router locally updating the file structure/files on the router allowing unauthorized remote access. This is a completely different method that was you are doing and can largely be stopped by having a decent Anti Virus setup that scans all inserted USB drives for known malware files.

  • @zemerdon
    @zemerdon 2 години тому

    Accidently stumbled across this delightful video and what a very pleasurable watch. By no means do i hack or have any interest in obtaining unauthorized access but more interestingly was the firmware extraction. I already do microsoldering so learning about the UART interface and chip readers is very delightful.

  • @antneg-1776
    @antneg-1776 2 години тому

    No-one safe these days. When big company's get hacked and your info is in their system your identity is compromised anyway.

  • @vogel2280
    @vogel2280 3 години тому

    So (as an analogy) you just spend a lot of time figuring out how exactly a door lock works....and then went out to check thousands of doors to find one door where the lock was disabled by the owner.

  • @ShayanAboutalebi
    @ShayanAboutalebi 3 години тому

    hit it with me analyser and that adapter for ch or the k usb wire

  • @leonard5268
    @leonard5268 4 години тому

    Rs485 terminal... Not only tp-link has it, other brands also provide this.😂

  • @yajnalgibno6536
    @yajnalgibno6536 4 години тому

    LMAO rip to all folks who invested to hundreds or thousands of money investing to DECO and OMADA

  • @mccardelz
    @mccardelz 5 годин тому

    If you ban the sale of new devices, that leaves millions already deployed and a vendor with no reason to ever issue security updates for those.

  • @migbri3022
    @migbri3022 6 годин тому

    Good evening, have the possibility to add Motorola chips like the 4L91N (SC515854DGCP) for the playback and programming of it, thanks for the video

  • @ioannispallis7258
    @ioannispallis7258 6 годин тому

    Nice Job. I always disable debug Interface and console in Release Version of my Firmware 😂

  • @antronx7
    @antronx7 6 годин тому

    try to edit your videos to reduce clutter and save viewers time

  • @greglallerstedt6492
    @greglallerstedt6492 6 годин тому

    So is there really any kind of secure routers, hubs or switches that are secure?

  • @MRelemint
    @MRelemint 7 годин тому

    Many years ago I owned a tplink indoors camera which was compromised by a hacker. Sitting in the living room watching tv one night when I heart a man’s voice coming from the camera on the table the tv was on. I immediately went into the app and rebooted the camera and then ran over and unplugged it and tossed it in the trash. Before rebooting the hacker was trying to speak directly to my wife by means of inappropriate sexualized comments about her body. From that day going forward I stop by cheap security cameras or products that don’t invest in security.

  • @SGCSmith
    @SGCSmith 8 годин тому

    On the topic of zero days. In the past, I was able to utilize security vulnerabilities in the consumer-grade routers provided to businesses by ISPs to obtain network secrets (RIPv2 keys, Authentication certificates, Static IP Allocations) by using some JavaScript calls in the developer console while the router's web interface was open. Now, the exploit worked by logging in using default credentials which no one changes (!) but the information revealed wasn't visible to any account except the ISP's service account in the GUI. I used this as a reason to tell people to never use that ISP's equipment, and to never use them for Static IPs because there is little security on the network end to prevent things like IP Address space hijacking. Even the ISP's techs have indicated they've had problems with CPE that didn't get reset at the warehouse causing routing problems at new installs for them. Hardware like consumer routers are often horribly insecure because they rely on proprietary binaries for the SoC and radio drivers, and they are often built to work on older kernels and libraries. Consumer routers are lucky to see more than a few firmware updates in their lifetime. If the firmware and drivers were open for the community to develop and commit improvements to, we would have better security for these products, and better lifetime. Not for the ban, but I am open for rules on open firmware requirements and better security/update commitments.

  • @jeffintx
    @jeffintx 8 годин тому

    I think they are going after TP Link because it has about 65% of the router market according to one source I read. Although the action they are contemplating might be a short term "fix", they should really go after the root cause and address all exposed IOT's.

  • @blynktest8398
    @blynktest8398 9 годин тому

    Matt, .look for ground on electrolitic capacitor ;-)

  • @cinchstik
    @cinchstik 9 годин тому

    TP-Link can only do what the CCP mandates.

  • @frank8534
    @frank8534 10 годин тому

    Ppl that understand all this stuff are truly the most dangerous ppl. The understanding for technology is astonishing.

  • @poncho6784
    @poncho6784 10 годин тому

    Not an IT person here. But WTF is US government doing by not setting and enforcing security standards in the IOT space? I don’t trust US companies much more that Chinese companies to produce secure products. Only way that will happen is if they are required to as a condition of selling here. Would like to know HOW users of TP Link devices can protect from this? Is it as simple as changing the password from factory default?

  • @rancillinmontgomery2480
    @rancillinmontgomery2480 11 годин тому

    I have a tp-link AX23 wifi6 router is it too vulnerable ? And why is my iPhone saying privacy warning in WiFi settings?

  • @HorCsa
    @HorCsa 11 годин тому

    So... The US Government bans the T-Plink IoT devices because of they have a default password? :D Putting your IoT devices on the internet without any protection is your fault, not the manufacturer's. lol. If you are not familiar how to setup your router, don't buy it, use router of your ISP, or call a professional.

  • @DavideMazzetti
    @DavideMazzetti 11 годин тому

    As of 4 days ago, the US Government is CONSIDERING banning TP-Link devices. Your title is misleading.

  • @LabelsAreMeaningless
    @LabelsAreMeaningless 12 годин тому

    This ban is purely political/geopolitical and has little to do with them wanting to keep us safe. If it was about safety then every router/networking company would be on the chopping block or being pressured to find a way to block these exploits.

  • @fuckyougeorgebush
    @fuckyougeorgebush 12 годин тому

    Foreign governments pose the same threat today as they always have, and that is none. Every government spends 99% of its efforts controlling its own citizens, since they're the ones doing the work that keeps the parasites in government afloat.

  • @petergoogins2089
    @petergoogins2089 12 годин тому

    Whats the best router to replace it?

  • @RandomMoves923
    @RandomMoves923 12 годин тому

    man you are good

  • @TheBlueScarecrow
    @TheBlueScarecrow 12 годин тому

    Should ban anything Chinese. If Matt can easily crack it, the Chinese can too; and they have an agenda which ain't good. Think Trojan Horse. They want our secrets; what better way.

    • @fuckyougeorgebush
      @fuckyougeorgebush 12 годин тому

      You need to turn off CNN/Fox News/MSNBC/whatever your propaganda of choice is.

  • @doost6233
    @doost6233 12 годин тому

    Very good all devices like this must be banned.

  • @johnwehunt4305
    @johnwehunt4305 13 годин тому

    Your video really got me concerned about network weakness. Never knew it to be so open.

  • @ShaneS071
    @ShaneS071 13 годин тому

    is the security of China accessing your network the issue or only issue or is it that they will not give the US the capability to spy on you through their devices?

  • @garyhgaryh
    @garyhgaryh 13 годин тому

    The reasoning for banning tplink can be used to ban other router or iot makers. Why tplink? Its more of a financial concern than a national security one. Same reason for us trying to ban dji (they own the market).

  • @AintBigAintClever
    @AintBigAintClever 14 годин тому

    Probably less likely to be banned because the Chinese have backdoors, more because TP-Link won't provide the US government any. Same goes for Huawei and Hikvision. Who was it who had to come up with an explanation why there was an account called "nsalogin" on their hardware inventory application, and have had multiple NSA-related exploits which required patching when exposed? San Fran... something wasn't it?

  • @colcal5275
    @colcal5275 14 годин тому

    I can see you love what you do - good energy - I enjoy your technical insight.

  • @robertbaindourov134
    @robertbaindourov134 15 годин тому

    Why do you even need ground pin for UART? What happens if you don't connect it?

  • @zeenaullahkhan12
    @zeenaullahkhan12 16 годин тому

    Every device got some how vulnerable so what it means US Device should be ban by world as well??

  • @LinuxLoader1287
    @LinuxLoader1287 16 годин тому

    The voltmeter in the top left corner constantly running covering the console is just plain annoying

  • @MultiOutdoorman
    @MultiOutdoorman 17 годин тому

    My concern is that most ordinary folk don't know about these vulnerabilities, and i feel there should be properly certificated hardware approvals in place before these devices are sold to the public. Ignorance is bliss.

  • @dimasbimonugroho6061
    @dimasbimonugroho6061 17 годин тому

    20 minute to find admin 1234. Love it. 😂

  • @MultiOutdoorman
    @MultiOutdoorman 17 годин тому

    U.A.R.T = Universal Asynchronous Receiver Transmitter

  • @angryktulhu
    @angryktulhu 17 годин тому

    US putting backdoors into every possible piece of hardware and software: “okay” Others misconfiguring their devices: “how dare you?!!! Ban ban ban”

  • @simbad909
    @simbad909 18 годин тому

    Just hv firmware changed 🤣😜 updated .. 😬 waits for the thrown empty beer cans to hit

  • @saurabhkatiyar842
    @saurabhkatiyar842 18 годин тому

    What about the Home Assistant? Do they have same security loop holes?

  • @ekubek
    @ekubek 19 годин тому

    Just politic by politician.

  • @dickkkkkkkkssss
    @dickkkkkkkkssss 19 годин тому

    Who cares