What am I talking about? The first Turris Omnia routers, of course! By this moment, the first routers should be unpacked and pleasing their new owners. Not many of our projects in CZ.NIC brought us as much joy and as many troubles at the same time. The joy came right at the beginning. First prototypes were finished in record time. Tests showed that despite the great performance and a significant number of connectors we managed to maintain a very compact size and reasonable consumption. Naturally, the main joy came when during our Indiegogo campaign, we collected the required amount of USD 100,000 in less than 24 hours (the total amount as of today is almost twelvefold). The reception in the world media was also great.
Telnet is not dead – at least not on ‘smart’ devices
Depending on your age, you either might or might not have used Telnet to connect to remote computers in the past. But regardless of your age, you would probably not consider Telnet for anything you currently use. SSH has become the de facto standard when it comes to remote shell connection as it offers higher security, data encryption and much more besides.
Turris Omnia campaign enters a new phase
It is hard to believe, but it is almost half a year since the Omnia campaign started on Indiegogo. In that time, much has changed. Most importantly, we now know that there is a place on the market for a high-end open-source router – we have one million US dollars to prove it :).
Turris Omnia and openSUSE
About two weeks ago I was on the annual openSUSE Board face to face meeting. It was great and you can read reports of what was going on in there on openSUSE project mailing list. In this post I would like to focus on my other agenda I had while coming to Nuremberg. Nuremberg is among other things SUSE HQ and therefore there is a high concentration of skilled engineers and I wanted to take an advantage of that…
The hottest gadget on Indiegogo is… a router?
The title, which I took the liberty to borrow from the German site MacLife.de, quite nicely captures the pleasant surprise we experienced during the campaign for Turris Omnia. I admit that the amount of collected money came as a bit of a surprise even to us. Just by the way, in our guessing competition among the team members, the most daring guess was USD 560 thousand, almost USD 300 thousand less than was eventually collected. We perceived this campaign only as a test, whether there is any interest in the market. And now we know there is, especially when we remind ourselves that certainly not everyone would contribute to the crowdfunding. Sending money to some of such campaigns means that the person prefers a pig in a poke to the bird in the hand. It already happened many times that a promising-looking project simply wasn’t finished or that the result didn’t live up to the original promises. Another problem is that businesses do not usually purchase through such campaigns, as it is not simple for them in terms of accounting. This also makes the collected amount a great promise for future.
Turris Omnia crowdfunding campaign in figures and images
A crowdfunding campaign for the Turris Omnia router on the portal Indiegogo.com ended after two months collecting 858 thousand dollars, which exceeded the original goal more than eight times. In this post, we’ll look closer at the progress of the campaign with the help of charts and tables.
Metal or not metal? That is the question!
This Hamletesque question has haunted our team in connection with Omnia for a few months. Turris Omnia was introduced as a home router in a nicely shaped plastic case and for a long time we did not even think of other options. 5 GHz Wi-Fi connection was intended to be provided by three outside antennas and the “older” Wi-Fi at the 2.4 GHz frequency was supposed to be broadcast, sort of obligatorily, with two internal antennas, more or less for backwards compatibility with older devices.
The “rom-0” vulnerability one year later
In previous blogposts on the “rom-0” bug in 2014 and earlier this year, I first explained its nature and gave instructions on its patching.
How we let a router get “cracked”
In the previous two blog posts about project Turris, we described how a telnet “minipot” helped us to uncover a possible botnet consisting mainly of home routers from ASUS (1, 2). In this article, we will describe one possible way how these devices might have been compromised.
More about the honeypot for Telnet and botnets
Three weeks ago we published preliminary results of data analysis of the honeypot for the Telnet protocol, which we have launched in test mode. Today we will look at the situation change after we installed the tool on all the Turris routers.