linuxkidd said:D_Tshudy said:RPA said:I originally thought the app/wifi link was purely for camera control but now the app has ground station functionality this opens a whole new can of worms.
I can cope with someone wiping my camera card or buggering about with camera settings but taking control of my phantom.......
Or have I misunderstood?
Has this tipped the encrypt or not scales further towards doing it?
I'm not sure yet but your instincts are spot on. The new ground station functionality certainly seems to imply that there's a control path in the Wifi link. I have a hunch as to how it's done but won't post hunches. Keep your head up and watch the boards. Other's more skilled at hacking these things are surely hard at work.
I've just conducted a packet capture and am in the middle of analyzing it...
The good news is that all of the control traffic appears to be going over a ser2net connection on TCP port 2001. Further, TCP port 2001 won't accept but 1 connection at a time. This means that as long as *YOU* have your DJI App running, no foreign influence can connect and muck w/ things.
This still won't prevent someone from wiping your wifi config and turning your P2V+ into an equivalent P2 w/ GoPro (since you can start a record on the ground via the camera button)... So, IMO.. either encrypting your wifi or changing your root password would still be advised based on this..
Still looking into the protocol...
LK
Well that's somewhat reassuring.
It's so ridiculously unlikely where I currently fly that someone would a) be there watching b) know what make/model I was flying c) have the knowledge to deliberately screw things up for me.
So I really don't think I need to worry but it's good to know that once I'm hooked up, no one else can.