return to table of content

Polish Hackers that repaired DRM trains threatened by train company

bell-cot
30 replies
1d2h

Eventually, the article discusses the murky legal status of such hacking in the EU.

It'd be nice to imagine that, for large industrial equipment, buyers could squeeze DRM-happy suppliers out of existence. Vs. in reality...

p_l
24 replies
1d2h

The manufacturer is trying to evoke "murky status".

But both national law states it's OK, and there is a ruling by Court of Justice of the European Union stating that Reverse Engineering done by owner even of a program license (EULA style) to make it work or fix errors is legal.

bell-cot
12 replies
1d1h

But in Europe, the legality of what Dragon Sector did is murkier. [...] Cory Doctorow explained in his excellent Pluralistic blog that Article 6 of Europe's 2001 Copyright and Information Society Directive is generally stricter on DRM circumvention than Section 1201 of the DMCA, and does not have a specific repair exemption. Because of this law, Doctorow told 404 Media that "there is now an extra layer of jeopardy for these researchers. They were brave to come forward..."

If the law is huge and complex, and a large company wants to make your life hell...

rjmunro
8 replies
1d1h

I don't think this is true. I think the legality of what they did is totally clear under article 5 & 6 of the EU Computer Programs Directive. https://eur-lex.europa.eu/legal-content/EN/ALL/?uri=CELEX:32...

Reverse Engineering (Decompiling) software that you own to fix errors and allow interoperability is explicitly allowed.

6510
4 replies
1d1h

I think this should be filled under sabotage of critical infrastructure.

It is either that or DRM means the OEM gets to remotely shut down entire train network whenever they like? Imagine the money one could make with such a service.

virtue3
1 replies
1d

yeah screw this. if they are claiming that they hacked their DRM they should absolutely counter sue that this DRM counts as sabotage and/or domestic terrorism. There was literally code in there that told the trains to stop working after X date if it sat still for X amount of time.

That's bonkers. And criminal.

p_l
0 replies
23h8m

Prosecution started working from statues that talk about crimes of preventing someone from operating, as well as manipulation or prevention of proper handling of data relevant to national security and/or transportation.

Neither cares about breaking DRM or IP, but third party (including vendor) manipulation.

nolist_policy
0 replies
1d

Yes, imagine if a individual did this and not a company. A individual would probably go to jail.

WesolyKubeczek
0 replies
1d

From what I gathered in Polish media, the Dragon Sector's attorney has implied they are eyeing exploring this possibility legally.

btilly
1 replies
1d

I don't think that you are reading that like a lawyer would.

For example article 6, part 2 (a) does not allow the information retrieved to be used for any purpose other than establishing interoperability. The hackers stepped over that line when they released some of what they discovered for the purpose of publicly criticizing the manufacturer.

p_l
0 replies
23h11m

There's ECH ruling that fixing errors is legit case of interoperability.

bell-cot
0 replies
1d1h

I hope that you are correct.

I fear that (allowing for the "someone with enough money and lawyers can make your life hell" effect) you are not.

kolinko
0 replies
22h39m

There was an EU ruling on the subject, this year, stating explicitly that you can decompile software to fix bugs, under certain restrictions.

https://www.traple.pl/legalna-dekompilacja-programu-komputer...

The article is in polish, but auto-translate should do it's job easily.

ginko
0 replies
23h39m

If the law is huge and complex, and a large company wants to make your life hell...

Newag's revenue is about $300 million. This isn't Siemens.

NoMoreNicksLeft
0 replies
1d

DRM is, generally, about whether or not you can copy the files, or how you use the software (whether it's licensed use).

This isn't DRM (though that's bad too). It's far worse. It's ransomware, they hijacked trains. Everyone involved should be locked in a dungeon for the better part of a century.

Avamander
5 replies
1d2h

In some EU countries it's also legal to reverse engineer computer programs fully when compatibility with other computer systems is the goal. Without the need from any authorisation of the copyright holder and it doesn't have to be buggy or broken.

8372049
4 replies
1d1h

That's EU-wide law, plus the EEA.

We also have this right:

The person having a right to use a copy of a computer program shall be entitled, without the authorisation of the rightholder, to observe, study or test the functioning of the program in order to determine the ideas and principles which underlie any element of the program if he does so while performing any of the acts of loading, displaying, running, transmitting or storing the program which he is entitled to do.

Article 5(3) and 6.

https://eur-lex.europa.eu/legal-content/EN/ALL/?uri=CELEX:32...

btilly
2 replies
1d

But those articles in no way gives one the right to harm the rightholder's business practices. For example by exposing them to public criticism. That potential limitation is implied in both 5.3 and 6.2.a.

I don't know what other provisions of EU law might apply here. But it is literally the job of the lawyers issuing the threats to find potential gotchas like that. I would assume that they are competent.

rasz
0 replies
8h12m

rightholder's business practice

you cant call breaking someone elses property a business practice

p_l
0 replies
23h7m

Similarly it's criminal to put undisclosed lockouts preventing owner of the device from using it.

Avamander
0 replies
1d

Oh, I didn't know it was an EU-wide directive. Estonian copyright law has contained that paragraph since 1992.

ferdek
4 replies
1d2h

Not only that, the article being from American media, even with the footnote, the commenters, miss the whole point about copyright being exclusively American concept and we don’t have this in EU. We have IP and authorship rights that work differently. See last part for explanation: https://thehftguy.com/2020/09/15/french-judge-rules-gpl-lice...

matkoniecz
1 replies
1d1h

since when copyright does not exist in Europe?

ferdek
0 replies
19h29m

For instance, in Poland (which is in Europe) you have all rights to create copies of software, music, movies, for your personal use after paying for the original copy. You cannot do this under copyright which strictly forbids you from creating copies of the original media. Copy-right, as a right to create copies.

In this meaning, copyright is not the same as authorship rights, which is a basis of intellectual property protection in Europe.

Similarly for software patents, they do not work in EU.

uKVZe85V
0 replies
20h50m

That was 2020. The case evolved in favor of the GPL, see e.g. https://www.april.org/violation-d-une-licence-libre-entr-ouv...

btilly
0 replies
23h51m

I suspect that the legal differences are less than claimed.

The first test of an open source license in court was https://en.wikipedia.org/wiki/Jacobsen_v._Katzer. It was initially lost on a somewhat similar argument. Namely that it was a contract, not a copyright license, and then was an unenforceable contract and therefore invalid. This decision was reversed on appeal.

I have no particular reason to believe that the first French judge to rule on an open source license did a better job than the first US judge to do the same. Both ruled against the license.

ginko
4 replies
1d

It's strange. Usually the competition for train contracts is quite fierce and train operators have a lot of power dictating terms.

This is not some david vs goliath thing.

p_l
1 replies
23h4m

European Railway Agency, through EU directives, secured unbundling of maintenance& repair operations from vendors. Vendors no longer are allowed to claim trade secrets or IP as reason for not providing complete and effective maintenance & repair documentation suitable for performing all levels of maintenance.

Since then, MRO is purchased through separate tender process - and NEWAG didn't win several times.

ginko
0 replies
22h54m

Yeah, the more I look into this the more dire this looks for Newag.

bee_rider
0 replies
23h59m

Trains are often, somehow or another, public infrastructure. (In Poland it looks like they are run by state-owned companies, mostly?) Countries should work in the interest of their populations, so really we hope David vs Goliath here, except Goliath is the good guy and also hopefully wins.

PeterisP
0 replies
23h57m

This is a consequence of the train operator winning a court judgement to permit them to use third parties for servicing the trains, followed by "technical measures" of the manufacturer to cripple the trains if this was actually done.

bluish29
19 replies
1d2h

The trains also had a GSM telemetry unit that was broadcasting lock conditions, and in some cases appeared to be able to lock the train remotely.

In what universe this is not sabotage?

e2le
15 replies
1d2h

I think it's fair to say the manufacturer is intentionally introducing vulnerabilities to a nation's critical infrastructure. Is it possible for a sufficiently motivated actor to shutdown trains in Poland remotely? I'm doubtful the engineers used best practices when implementing such a function.

WASDx
14 replies
1d1h

Hide a GPS spoofer (illegal) at a central train station to make all trains believe they are at the forbidden workshop location and make them brick themselves? Could it be that easy?

vincnetas
9 replies
1d1h

Is there such thing as GPS spoofer? I would guess only JAMMER is possible.

nicce
5 replies
1d1h

You can spoof GPS. It just needs be in the sky, and JAM at the same time. In theory it is possible?

e2le
4 replies
1d1h

It just needs be in the sky

The target doesn't need to be airborne for such an attack to work.

A "proof-of-concept" attack was successfully performed in June 2013, when the luxury yacht White Rose of Drachs was misdirected with spoofed GPS signals by a group of aerospace engineering students from the Cockrell School of Engineering at the University of Texas in Austin.

https://en.wikipedia.org/wiki/Spoofing_attack#GNSS_spoofing

nicce
3 replies
23h59m

The target doesn't need to be airborne for such an attack to work.

I mean, the spoofing signal needs to usually come from sky. You want to hinder the original signal and makes yours stronger. Of course, signal can be reflected and there are other means to reach this.

PeterisP
2 replies
23h49m

Can you elaborate on why you think that "the spoofing signal needs to usually come from sky"? As far as I understand, it literally never comes from the sky, in every single case it involved ground-based transmitters.

The GPS system doesn't use the direction to the GPS satellite for localization but rather only the distance i.e. timing, so spoofing GPS is based on accurate control of the time of the transmitted (or replayed!) signals.

nicce
1 replies
21h37m

The GPS system doesn't use the direction to the GPS satellite for localization but rather only the distance i.e. timing, so spoofing GPS is based on accurate control of the time of the transmitted (or replayed!) signals

GPS uses Signal-to-Noise ratio for determinating the signal quality and integrity. Horizontal signal will suffer pretty fast. Especially if your receiver is sophisticated and could actually detect the signal strength (power) outliers. If you want to spoof GPS signal very well, it should be also weak. But weak signal will quickly disappear with ground-based transmitters.

I used ”strength” incorrectly on the previous comment.

PeterisP
0 replies
21h2m

GPS spoofing is generally done at limited range and line of sight so the fact that "horizontal signal will suffer pretty fast" and having the range limited by terrain and curvature of the earth is not a problem but a feature that the spoofers generally want - affecting the target, but not affecting people 500 miles away; and sometimes even explicitly doing that from a pit so that spoofing or jamming affects airborne targets but not those on the ground.

And regarding "If you want to spoof GPS signal very well, it should be also weak" the scenarios I've seen (e.g. targeting drones in current conflicts) often explicitly target non-sophisticated commercial off-shelf GPS modules that don't attempt to detect spoofing and will gladly accept a signal that's 100 times louder than the actual satellites, so I think the spoofers often have no desire to do it "well" according to your criteria.

snake42
0 replies
20h6m

You can buy this bad boy and hook it up to a software defined radio and it will spoof away!

https://safran-navigation-timing.com/product/skydel-simulati...

e2le
0 replies
1d1h
baobrien
0 replies
1d1h

GPS C/A signals are pretty straightforward to generate and not authenticated.

LorenPechtel
2 replies
1d

It only bricks if they're there 10 days.

AntonyGarand
1 replies
22h29m

Hide a spoofer on the train itself, this way you can target any train anywhere

anticensor
0 replies
21h39m

Yeah, trains tend to have large cabinets inside, and not like those cabinets are opened and inspected every day.

BobaFloutist
0 replies
1d

I would imagine it only works while trying to service the train (or at least while the train thinks it's being serviced).

plagiarist
0 replies
1d1h

Any where the corporations have done successful regulatory capture of the legislation.

SV_BubbleTime
0 replies
1d1h

I bet the fine print on the sales contract is pretty darn small.

Nasrudith
0 replies
21h40m

If it was a documented anti-theft feature it could be legit. A state could theoretically have some use for the proverbial 'blow up your own bridges when you are invaded' sort of measures.

Ignoring the lack of disclosure of what should be a selling point and that there hasn't been a case of trains being stolen for later illicit reuse in recent memory.

hot_gril
16 replies
1d

I'm fine if DRM cuts both ways. Manufacturer is free to try locking things down as long as that's disclosed, I'm free to tamper with something I own. They own the trains.

pavel_lishin
12 replies
1d

DRM is not merely a technological issue; it's a legal one as well.

hot_gril
7 replies
1d

Yes, by "free to" I mean it's legal to.

wizzwizz4
6 replies
23h52m

It's only DRM if it's from the Article 11 region of the WIPO Copyright Treaty; otherwise, it's just sparkling obfuscation.

Contracting Parties shall provide adequate legal protection and effective legal remedies against the circumvention of effective technological measures that are used by authors in connection with the exercise of their rights under this Treaty or the Berne Convention and that restrict acts, in respect of their works, which are not authorized by the authors concerned or permitted by law.

(DRM's a silly name, anyway; it should be called "technological measures" or "technological protection measures" or something.)

hot_gril
5 replies
23h50m

I think it's meant as a derogatory term cause people hate DRM. Like, I don't feel entitled to pirate movies, but plenty of times DRM has gotten in the way of legally watching movies I paid for.

wizzwizz4
4 replies
23h47m

Digital Restrictions Management is a backronym popularised by the EFF, but DRM is the actual legal term used in the US, and doesn't necessarily carry a derogatory meaning.

rnk
1 replies
22h52m

I disagree, DRM actually is seen as an extremely negative thing. Perhaps people who work to create DRM don't think it's a negative but saying someone's work is DRM is actually a pejorative statement.

hot_gril
0 replies
22h35m

taking my BMW to the shop to do a DRM delete

chankstein38
1 replies
23h24m

I don't know, I've never happily acknowledged the existence of DRM. I'm from the US and, as far as I can tell, I and people in my periphery see it as a negative and use it as basically "This f-ing DRM is always preventing me from watching my movies in 4K even though I paid for 4K" kinds of situations

hot_gril
0 replies
23h7m

I used to never curse. Apple TV HDCP DRM was the first time.

grishka
2 replies
23h35m

In this particular case though, railway companies are usually part of the government which enacts and enforces those laws.

hot_gril
1 replies
22h44m

Right, they should just not purchase DRM'd trains. We're not hearing the part of the story where someone made that bad decision.

grishka
0 replies
22h6m

That, too. Independent repairability should've been part of the requirements in the purchase contract.

rockskon
0 replies
19h15m

One that challenges traditional notions of property rights when attempted to be enforced in this manner.

They might win in the short term but I can't imagine that would serve the train company well in the long term - lawmakers (who are typically octogenarians) often don't understand how software restrictions limit use of equipment traditionally enjoyed under property rights until they're interfered with. Like a train being geofenced.

Gigachad
2 replies
23h16m

I’m not actually ok with companies using DRM to brick public infrastructure.

The manufacturer should be put out of business.

e2le
1 replies
22h32m

Trains are critical infrastructure. Intentionally introducing vulnerabilities deserves the corporate death penalty and prison time for those involved. Best make an example out of them, lest the others get ideas.

zardo
0 replies
21h27m

If they really wanted to, they could certainly pursue criminal charges for sabotaging rail infrastructure. Possibly even capital charges.

prmoustache
12 replies
1d2h

I don't think Newagg stands a chance. The hackers didn't hack a third party IT network/system. They hacked a train that was owned by the railway company, not Newagg.

TomaszZielinski
4 replies
21h59m

Personally I object to calling it hacking (it the popular/mass media sense).

If a company hires me to inspect their systems, and it's not shady (i.e. everything seems legitimate), then I'm not hacking anything. It's really no different to working on a CRUD (well, it's more interesting :)).

There might be some legal provisions (DRM laws, some EULA, etc.) that muddy the water. But that doesn't change the fact, that I can't find any ethical problem with what the Dragon Sector folks did[1]. And for me hacking is something unethical--criminal aspect is secondary.

[1] based solely on the articles I read

mr_person
1 replies
20h42m

Given that the word "hacker" originated in the model railway world, I think its the perfect name here.

TomaszZielinski
0 replies
16h33m

Ha, I didn't know this (I'm serious!), thanks!

GuB-42
1 replies
21h4m

Ethical hacking is a thing. And it is definitely hacking in the sense that they did something someone attempted to prevent them to do, and from a technical standpoint, it is not much different to what criminals do. Hacking a train so that it accepts third party repairs and hacking a credit card reader to steal your money make use of the same techniques. And for me at least, hacking is about technique, not ethics.

The ethical distinction is between white hats and black hats. The people in the article are white hats, that is, they work legally, ethically, and they are open about their activities.

Note: I mean hacking as it is most commonly known now. Not MIT-style hacking.

TomaszZielinski
0 replies
16h36m

What I meant wasn't about HN, but about the "outside" world--I don't think "hacker" is a positive word among general public. And they did positive work--they helped train companies and revealed some Bad Stuff going on. If police takes someone's computers, then it's forensic investigation performed by forensic investigators, and not hackery performed by hackers.

But of course on technical forums like HN we call it hacking ("we" includes myself).

To address some of your points:

they did something someone attempted to prevent them to do

Well, Newag claims they didn't add any shady stuff to the firmware, i.e. they didn't prevent anyone from anything. Which means Dragon Sector didn't break any protection mechanism, they were just debugging potential glitches! :)

I've debugged a lot of software in my life and no one has ever called me "hacker" for finding that missing CSS class :)).

Hacking a train so that it accepts third party repairs and hacking a credit card reader to steal your money make use of the same techniques.

This is a very low level discussion ("low level" as in "assembler", and not intellectually, for the lack of a better word), but in this case there's one significant different--train firmware is supposed to be unchanged (according to Dragon Sector).

And credit card reader's fw has been modified.

So for me, again, they acted as forensic investigators/"debuggers".

The ethical distinction is between white hats and black hats. The people in the article are white hats, that is, they work legally, ethically, and they are open about their activities.

Yes, I agree. But I would still prefer if the non-tech world called them something like "forensic investigators", as white hats are still a kind of hackers.

rich_sasha
1 replies
23h57m

Isn't disassembly illegal in EU, because [something something] IP yada yada?

Still, to put such restrictions in code and threaten the people who found them with legal action... I'm not even sure how to describe it.

kolinko
0 replies
22h45m

Exactly opposite. EU high court ruled that you are free to decompile software to fix bugs etc. Also, in Poland at least, it used to be legal to even crack software that you own for the purpose of making backup copies etc (not sure how it is now)

https://www.traple.pl/legalna-dekompilacja-programu-komputer...

Article in polish, but you can auto-translate easily.

madaxe_again
1 replies
1d

They have deep pockets - all they have to do is grind them down, and they win by default. What’s legal or not is practically irrelevant when you’re dealing with individuals vs a corporation.

kragen
0 replies
23h1m

the railway company might also have deep pockets

p_l
0 replies
1d2h

Some railway specialist also noted that some of the trains that were publicly known to be part of this have explicit registrations that make the owners also fully in their right to decide about their maintenance.

justinclift
0 replies
22h26m

They hacked a train that was owned by the railway company ...

The article seems to say the hackers were hired by the maintenance place that the owner of the trains (Lower Silesian Railway) hired.

Newagg is the manufacturer of the trains which were bought, not the owner of them.

askvictor
0 replies
22h22m

The legal system may be quite different in Poland to whereever you are (assuming it's not Poland). Also many products these days have a licence/EULA that supposedly prevents you doing certain things.

6510
10 replies
1d1h

Janusz Cieszynski Former Minister of Digital Affairs

https://twitter.com/jciesz/status/1732411016221524070?s=20

translation: > The president of Newag contacted me. He claims that Newag fell victim to cybercriminals and it was not an intentional action by the company. The analysis I saw indicated something else, but for the sake of clarity, I will write about everything.

nabakin
3 replies
1d1h

What interest would cybercriminals have in bricking trains at only independent repair centers? This is a ridiculous claim.

matkoniecz
1 replies
1d1h

Black flag operation, by competition pretending to be Newagg? But that is plot-of-cartoon-villain level of nonsense.

justsomehnguy
0 replies
23h9m

Ah, thanks for the laughs.

postexitus
0 replies
1d

To bring Newag down if they don't pay the ransom, of course. Cue brainpower meme.

rjmunro
1 replies
1d1h

If their train software contains patches by cybercriminals that they were unable to detect but a third party hacking group without documentation were, how can we possibly believe that the train's software is safe? Surely the hackers could have put some other bugs in there.

jakub_g
0 replies
23h4m

Exactly. If they "fell victim to cybercriminals" who entered backdoors in the code (that they didn't know about for over 2 years!) then Newag should instantly recall all trains for inspection.

Contrarily, if they _knew_ about it, and didn't tell anyone, then it's even worse.

tester756
0 replies
21h57m

Hey, but what about that *physical* undocumented module that allowed to control the train?

Aint it at least the proof of something shady?

jakub_g
0 replies
23h9m

Of course they won't straight admit they've been screwing their customers, so they need a bullshit excuse.

It doesn't make any sense either: "falling victim to cybercriminals" who entered GPS coordinates of all competitors in the code, to make competitors-repaired only trains down - sounds legit! That's exactly what cybercriminals do!

Verdex
0 replies
1d

Executive 101: Blame the techies.

The moment I heard about this event, I knew that it was only a matter of time before the offending company executives would be blaming the developers. Interesting that their particular path forward is blaming malicious third party developers because the next thing that happens is someone interviews their devs and finds out that they in fact are the people who put this in. At the behest of middle management who behested at the behest of upper management.

My prediction is that we'll soon be hearing about how upper management would never have told a developer or middle manager to program this in and it's the lower level guys who have gone rogue which is why they blamed cybercriminals.

A lot of philosophy and poetics go into software engineering ethics that I find uncompelling at best. However, the pair of "why would you want to injure someone you don't even know" and "you will be the one blamed" feels to me to cover 95% of what software ethics claims to.

AnimalMuppet
0 replies
1d1h

But if that's true, then what ground does the train company have for threatening the hackers? If you got hacked, then we weren't breaking your stuff. We were just undoing damage that someone else did to you as well as to your customer.

zogrodea
9 replies
23h45m

"During the height of the pandemic, I wrote an article about how a Polish hacker had developed a dongle that was being used by American repair professionals to bypass DRM on ventilators needed to keep COVID-19 patients alive."

That's extremely evil. I'm not emotionally invested in right-to-repair like many others here are, but it's corrupt that DRM is causing/has caused difficulty in operating things necessary for people's survival. Shame on these companies.

Those who want to convince others of right-to-repair should point to cases like this because it's the #1 thing that makes me want to rally behind it too.

Retr0id
5 replies
22h30m

Am I correctly reading your implication that, although this is a strong point in favor of the right-to-repair movement, you remain personally unconvinced in it as a whole? If so, what's holding you back from being fully convinced?

fsckboy
3 replies
12h40m

I feel the opposite of him. I don't like DRM, I do like DRM circumvention--I like tech in genral--but if we have DRM to protect intellectual property and enforce licenses and contracts, I have no problem with ventilators also being DRMed.

If a person who decides to make pop music can DRM their work, why shouldn't a person who goes into life saving tech DRM theirs? "think of the children!" Hey, if you care so much about the children, pay your bills. Covid caused unforseen problems? you know what? they were unforeseen.

The person who created the life saving tech already saved a bunch of lives, those lives are still saved, and it seems a little ungrateful to claim they haven't done enough for you.

westmeal
1 replies
7h28m

Maybe there are more important things than a bottom line.

fsckboy
0 replies
7h12m

so, if I go into a frivolous profession, fashion say, I can work as little or as hard as I want? but if I go into a serious life-saving profession which you ostensibly value, my work product must belong to you as if I'm your slave? Maybe principles of individualism and autonomy are more important than the greed lust of the collectivist mob.

and btw, what you said is completely obvious to the point of dreary cliche, "things more important than the bottom line", like Phoebe's realization on Friends that she and her mother had a lot in common because turns out they both love pizza and puppies.

What I said was food for thought and unexpectedly (in an inside out sort of way) explanatory toward the question asked by the comment I was replying to.

maybe you could stop stopping and smelling the flowers on the road less taken for a minute and consider ideas with depth, it might make all the difference.

zogrodea
0 replies
1h23m

I don't know why your tone is so combative in the second paragraph, and in your further reply to another user down below. No one said anything here to warrant it.

I think you point to a real conflict of interests though where some may feel less motivated to work on life-saving tech if they aren't compensated for it. Here in the UK, the government launched a scheme called "Eat Out to Help Out" to help support businesses like takeaways which had understandably had low revenue during COVID. I would have been happy to see a subsidy (and pay a tax towards it) for companies manufacturing life-saving tech if it was the only sustainable solution.

zogrodea
0 replies
21h7m

I think it would be good for society if right-to-repair laws were passed but I just feel indifferent towards the topic and would rather spand time and energy caring about something that I feel (to me personally) is more important.

tim333
1 replies
2h10m

This is probably the thing https://hackaday.com/2020/07/15/diy-dongle-breathes-life-int...

It's not quite as bad as it sounds - the hack allowed people to buy second hand ventilators and fix them up which I guess is handy in an emergency but could create safety risks if the thing then fails when a patient is relying on it.

thomastjeffery
0 replies
1h27m

A opposed to it failing immediately, and the patient never being able to rely on it...

greycol
0 replies
14h59m

In that spirit of horrendous stories that make you want to support laws on your right to own the physical hardware you bought: have you heard about the airbag for bikers that is subscription only and doesn't activate if your subscription is not up to date.

https://jalopnik.com/this-dystopian-biker-airbag-crash-vest-...

gigel82
8 replies
1d2h

If they get in trouble for repairing a goddamn train, what chance do we have to keep the right to repair our phones?

I hate living in (techno)feudalism, I thought we moved past that...

vorticalbox
6 replies
1d2h

Newagg are probably more concerned about the knock on their reputation and future sales than actually caring what the hackers did.

noname120
3 replies
1d2h

Their bellicose behavior will only further tarnish their reputation. And the Barbara Streisand effect will ensure that everyone knows about it. Not a very wise move in a liberalized European market where news travel fast and competition is ruthless.

This time around corrupting the national politicians won't cut it to get the contracts — the European regulator is keeping a close eye on this and it's not known for being complacent with attempts to bypass its oversight.

yread
2 replies
1d1h

Well, I, for one, surely won't be buying any trains from them!

plagiarist
1 replies
1d

You jest, but the odds are rapidly increasing that they encounter someone in charge of the purchasing decision who won't work with them on principle.

UseStrict
0 replies
23h56m

I have friends who work indirectly in rail systems procurement in Canada. If they don't know about this already, they will soon from me.

quercusa
0 replies
1d2h

As well they should be.

jacquesm
0 replies
23h8m

They really should be concerned about knocks on their door at 4 am.

tempodox
0 replies
23h34m

I thought we moved past that...

We have barely even started.

t0bia_s
5 replies
22h54m

While I understand DRM problem, there should be concerns about safety indeed. Unauthorized access to operating system of public transport could be abused in many bad ways.

jeremyjh
4 replies
22h6m

There is no unauthorized access when the owner of a train hires a company to service it.

t0bia_s
3 replies
21h7m

If they bought it with knowing about DRM and they sign contract about it, it's technically "unauthorized".

Why buying DRM things in first place?

SSLy
1 replies
20h53m

If they bought it with knowing about DRM a

well, they didn't. No single word in manual about that. Also the locks are illegal vs. EU wide regulation about train maintenance.

t0bia_s
0 replies
20h35m

Then they should sue manufacturer for hiding technical details.

ozim
0 replies
20h49m

Trains did not have DRM in sticker price.

Companies bought trains with „full technical documentation and service instructions” - I put it in quotes because all the locks and „DRM” stuff was undocumented and producer is claiming they never put anything like that in the first place.

Sephr
4 replies
1d2h

This is sure to backfire and increase attention to NEWAG's own alleged criminal behavior.

NEWAG executives & those responsible should face criminal charges for conspiracy to defraud in addition to libel.

It's clear that NEWAG knowingly lied about alleged malfeasance from the third party repair shops, and took advantage of their sabotage to incentivize if not require their customer to pay for service at NEWAG's own repair shops.

plagiarist
1 replies
1d

I would love to see criminal charges on this one, especially if they come under a computer hacking law, as that might set a great precedent for consumer protections. Unfortunately it will probably be more like a fine if anything.

LorenPechtel
0 replies
1d

Hacking? No. This is simply sabotage for the purposes of extortion.

madaxe_again
1 replies
23h54m

That would be lovely, but it depends on how the media presents it (I can see the image of a hooded “hacker” being used and the story being “hackers intrude into trains, face criminal charges, government demands investigation and hardening of DRM to prevent future illegality which poses a risk to the public”), and on how much cash they’re willing to throw at it to crush the hackers with civil and criminal suits.

0cf8612b2e1e
0 replies
21h39m

The story I read said that the repair delays impacted train schedules (owing to fewer trains in operation). Potentially millions of people had their life disrupted because of corporate greed.

Seems like a slam dunk public outcry.

ChrisArchitect
1 replies
1d1h

Related:

original news story discussion just over a week ago: https://news.ycombinator.com/item?id=38530885

And the followup from the company

Polish train maker denies claims its software bricked competitor rolling stock https://news.ycombinator.com/item?id=38570654

More late quality from 404

dang
0 replies
23h51m

Thanks! Macroexpanded:

Polish train maker denies claims its software bricked competitor rolling stock - https://news.ycombinator.com/item?id=38570654 - Dec 2023 (2 comments)

Dieselgate, but for trains – some heavyweight hardware hacking - https://news.ycombinator.com/item?id=38567687 - Dec 2023 (289 comments)

Polish trains lock up when serviced in third-party workshops - https://news.ycombinator.com/item?id=38530885 - Dec 2023 (357 comments)

I think there may have been others?

wolpoli
0 replies
16h44m

The story is missing a lot of details. It says very little about the role of Lower Silesian Railway, the company that that purchased the train from NEWAG and hired SPS to repair the train. Did Lower Silesian Railway (LSR) know that NEWAG expects that the trains need to be repaired at NEWAG facilities? Did LSR know about the technological measures implemented by NEWAG? What was in the original procurement contract between LSR and NEWAG? What is in the repair contract between LSR and SPS? Why is NEWAG still providing updates/LSR installing NEWAG updates for trains that are no longer under NEWAG's maintenance?

tomaszs
0 replies
21h57m

The issue is complicated. So far there's no proof for Newag involvement. It's very different to how security researchers publish their results. All is based on hearsay.

tester756
0 replies
21h20m

Gynvael Coldwind - one of the guys from Dragon Sector (but probably not a member of the team that hacked those trains)

wrote an article about why company's line of defence that malicious code could be injected is flawed

https://gynvael.coldwind.pl/?id=777

It is mostly about reverse engineering, compilation process, how thing are laid out in the final binary -.text, .data sections, offsets and stuff like

https://en.wikipedia.org/wiki/Code_cave

https://en.wikipedia.org/wiki/Hooking

sim7c00
0 replies
21h39m

i think people should be allowed to tinker with stuff. why not. it is ok to.memif.that voids the warranty tho. fair enough.

its a bit funny in.this case the company first claims.it doesnt brick stuff, and subsequently threatens these guys.. did they lie first? that seems bordering criminal for a company to do... just admit it :/. 'yes we drm our crap and brick stuff with anti tamper detections'. how hard is it...

hope dragon sector doesnt get into trouble, they do amazing work!

ozim
0 replies
20h44m

I hate the article is using DRM as explanation. It has nothing to do with DRM or anything with preventing software from being tampered with.

It was parts of software included by producer to make 3rd party shops look incapable of servicing. Placed there in a sneaky way.

DRM makes it look like official documented tampering prevention - article itself is good. Use of DRM in title and in article is just wrong.

WesolyKubeczek
0 replies
1d

From the articles in relevant media, I gather they have got themselves a very good attorney. There's a possibility Newag might be in hot water, because sabotaging trains like this smells of criminal offense. Which is why they huff, puff, and try to employ scare tactics.

TomaszZielinski
0 replies
22h14m

Here's a direct link to the article with Dragon Sector answers to Newag's statement:

https://www.rynek-kolejowy.pl/wiadomosci/hakerzy-odpowiadaja...

Fasten your seatbeats, it seems there's a lot more details this time. For instance, the say they have a before/after Newag service diff of the firmware, and there are interesting changes there.

If that's true, then the "rogue hackers" must be sprinkled inside Newag :).

SenAnder
0 replies
1d

Holding the railway system hostage should make even the most short-sighted realize that DRM is an assault on national sovereignty.

Guvante
0 replies
1d

I will say my takeaway from this story is manufacturers screwing over their users to make more money isn't a "you are too small to fight back problem" but unmitigated greed.

1970-01-01
0 replies
23h52m

Jailbreaking your train should be legally protected, but I don't know anything about Polish circumvention laws.