When the AI device 'Rabbit R1' was jailbroken, it was discovered that it 'sent user location information without permission' and 'violated open source licenses'



The AI device '

Rabbit R1 ' is equipped with ' RabbitOS ' as the basic system software. Software engineer David Buchanan reported that when he jailbroken RabbitOS, it saved location information, Wi-Fi network names, and other data in a text file on the storage.

Jailbreaking RabbitOS: Uncovering Secret Logs, and GPL Violations | Blog
https://www.da.vidbuchanan.co.uk/blog/r1-jailbreak.html



The AI device 'Rabbit R1' developed by technology startup Rabbit was expected to be an AI assistant device that could play music and order food just by talking to it, but in reality it only runs Android apps using off-the-shelf APIs, and many users have criticized it for its disappointing functionality and performance.

Report that the AI device 'rabbit r1' was a fraudulent product that repeatedly said 'that function is in preparation' when purchased - GIGAZINE



After getting his hands on the Rabbit R1, Buchanan performed a jailbreak that replaces the data on the Rabbit R1 with data he prepared the moment it boots up, and analyzed the operation of RabbitOS. Buchanan has named his jailbreak method ' Carroot ' and has also released a demo video of Carroot in action.

carroot: rabbitOS tethered jailbreak demo - YouTube


When Buchanan actually jailbroken and analyzed RabbitOS, he found that all data logs acquired by RabbitOS were stored in text files in the internal storage.

In addition, the data logs included 'the user's precise location,' 'the name of the Wi-Fi network used by the user,' 'the IDs of nearby cell towers,' 'the user's IP address,' 'a user identification token used by the device to authenticate with Rabbit's backend AIP,' and 'all voice input from the user to the Rabbit R1, along with a text transcript.' According to Buchanan, the location information and cell tower IDs were sent to Rabbit's servers even when no SIM card was inserted.

'There's no need to log this much data,' Buchanan said. 'It's scary to think what Rabbit, on the back end, is using this data for.' 'The Rabbit R1 doesn't have a way for users to reset the device to factory settings, so the logs are being collected in perpetuity. If a Rabbit R1 were to end up on the second-hand market, users' personal information could be exposed to the public.'



In addition, Rabbit has added

a factory reset option in RabbitOS v0.8.112.

Furthermore, Buchanan points out that some of the open source RabbitOS uses closed source drivers. Specifically, closed source drivers for scroll wheel sensing and camera rotation stepper motor control are linked to a kernel image that is open source licensed under the GNU General Public License (GPL). 'Rabbit is violating the GPL license,' Buchanan says.

Buchanan asked Rabbit about the information it had gained from the jailbreak and whether it planned to comply with the GPL license, but as of July 17, 2024, he had not received a response from Rabbit.



It has been discovered that Rabbit R1 has a critical security issue in that the API key is written directly into the source code. It has been pointed out that by using this API key, it is possible to 'view all replies that R1 has ever made to users, including personal information,' 'brick all R1s,' 'change all R1 responses,' and 'change the voice of all R1s.'

AI device 'Rabbit R1' has security issues that could cause user data to leak - GIGAZINE



Buchanan has also published a website where you can run Carroot.

carroot: rabbitOS tethered jailbreak
https://retr0.id/stuff/r1_jailbreak/

in Software,   Hardware, Posted by log1r_ut