Skip to content
View in the app

A better way to browse. Learn more.

Security Installer Community

A full-screen app on your home screen with push notifications, badges and more.

To install this app on iOS and iPadOS
  1. Tap the Share icon in Safari
  2. Scroll the menu and tap Add to Home Screen.
  3. Tap Add in the top-right corner.
To install this app on Android
  1. Tap the 3-dot menu (⋮) in the top-right corner of the browser.
  2. Tap Add to Home screen or Install app.
  3. Confirm by tapping Install.

Hi-Res Picture Of Csl Dualcom Unit

Featured Replies

Id like to know how the popular units do. Ideally I guess youll be doing others. If you need me to send you anything let me know

securitywarehouse Security Supplies from Security Warehouse

Trade Members please contact us for your TSI vetted trade discount.

  • Replies 50
  • Views 6.2k
  • Created
  • Last Reply

http://blogs.computerworld.com/18776/mobile_phone_eavesdropping_made_easy_hackers_crack_gprs_encryption

 

Maybe there is something else on top, i don't know, but there must be another level of DualCom encryption, i would imagine linked to the Gemini servers?

Interestingly the connection from arc to Gemini relies totally on an IPSec von with a static key to encrypt the data. I found it a bit poor they require a VPN to the arcs network to provide a secure link and with a static key, I'd argue it wasn't immensely secure.

www.securitywarehouse.co.uk/catalog/

matt id like cg to delve into it all on the signalling platforms without you if im honest.

securitywarehouse Security Supplies from Security Warehouse

Trade Members please contact us for your TSI vetted trade discount.

matt id like cg to delve into it all on the signalling platforms without you if im honest.

I don't see how I could assist? He's way more brainy in that department than me.

www.securitywarehouse.co.uk/catalog/

  • Author

I think IPSEC with a static key isn't that bad as the key is used to set up a link with per-session key, so replays etc. are protected again.

I have a blog, some of which is about alarm security and reverse engineering:
http://cybergibbons.com/

 

 

 

  • Author

I guess this is going to be one of the issues with CSL Dualcom - because of the centralised Gemini platform, I'm not going to be able to look at a device in operation properly. I can probably spoof a server to respond in the way it expects.

I have a blog, some of which is about alarm security and reverse engineering:
http://cybergibbons.com/

 

 

 

I guess this is going to be one of the issues with CSL Dualcom - because of the centralised Gemini platform, I'm not going to be able to look at a device in operation properly. I can probably spoof a server to respond in the way it expects.

Someone could send you a live production unit

www.securitywarehouse.co.uk/catalog/

  • Author

Wouldn't CSL Dualcom have a fit if they knew that tampered with hardware was being connected to their network?

 

To start with I'm probably just going to change the interface to the M2M module so it connects to something I have control over, should be able to see a lot.

I have a blog, some of which is about alarm security and reverse engineering:
http://cybergibbons.com/

 

 

 

Wouldn't CSL Dualcom have a fit if they knew that tampered with hardware was being connected to their network?

 

To start with I'm probably just going to change the interface to the M2M module so it connects to something I have control over, should be able to see a lot.

That's an interesting question. The way I see it is if I have a production unit that I am paying for, is it any of dualcoms business if i monitor traffic on it? On my webway I do it all the time.

I had a similar discussion with Chiron. As I have access to all by databases I was very surprised when Chiron announced that I aren't allowed to see the data in my SQL database on my server on my network that iris uses. You seem to get a huge variety of responses to seeing under the hood depending on who the vendor is.

www.securitywarehouse.co.uk/catalog/

  • Author

I'm not sure, I guess it depends on the contract. Not even sure if you actually really "own" the unit as such?

 

What happens if there is a hole like in SIA-HS where you can masquerade as any other customer? Then it might cause real problems. They could interpret it as hacking as well.

 

No response from the email though, so not anyway of knowing for sure.

I have a blog, some of which is about alarm security and reverse engineering:
http://cybergibbons.com/

 

 

 

Archived

This topic is now archived and is closed to further replies.

Recently Browsing 0

  • No registered users viewing this page.

Important Information

By using this site, you agree to our Terms of Use.

Account

Navigation

Search

Search

Configure browser push notifications

Chrome (Android)
  1. Tap the lock icon next to the address bar.
  2. Tap Permissions → Notifications.
  3. Adjust your preference.
Chrome (Desktop)
  1. Click the padlock icon in the address bar.
  2. Select Site settings.
  3. Find Notifications and adjust your preference.