#righttorepair

8 posts · Last used 1h

Back to Timeline
Boosted by hypebot @hypebot@goingdark.social
@threatresearch@infosec.exchange · 4h ago
Hi folks. It's Andrew with another update on our battle over the "wrong to repair" bill that continues to move through the Colorado legislature, SB26-090. I am asking anyone, but especially those with a background as a cybersecurity practitioner, to please consider submitting written or live/virtual testimony TODAY to the committee who will be hearing this bill, starting at 1:30pm mountain time. This afternoon, in a little under four hours, a House committee will be hearing testimony on the bill. If you have been waiting for your moment, this might be the last chance you have this session to weigh in and express your support for this critical right we may lose in the next few days. Opponents of Colorado's right to repair law, which only came into effect on January 1, include companies like IBM and Cisco Systems. They are making outrageous and counterfactual claims about the right to repair in order to pressure lawmakers into accepting this bill that would exclude any technology classified as "critical infrastructure" as exempt from the right to repair law. One of the most egregiously wrong claims they have repeatedly made is that a "right to repair" items like a firewall somehow makes the products Cisco and IBM sell less safe from a cybersecurity perspective. After the committee hearing last month, I spoke in the hallway with the government affairs person from Cisco. I asked him to explain it to me, a cybersecurity professional, why being able to fix a broken firewall presents a cybersecurity risk. He could not explain it, simply repeating that giving people access to internal schematics in order to let them repair parts in a network edge device somehow presents a risk that adversaries would then be able to more easily reverse-engineer the product. The cybersecurity folks know where this is leading: They are claiming that the obscurity of their documentation about their products is the cybersecurity feature that protects them from attack. Those of us who are practitioners in this space know that obscurity provides no security whatsoever in the long term, and that giving people the ability to replace broken parts, like power supplies, does not threaten the cybersecurity of a router or firewall any more than replacing a power cord. After all, data centers have tight security about who is allowed in or out, and engage with cyber- and physical pentesters to routinely check the security of their facilities. The reality is that the west's biggest adversary, China, already has every model of every firewall on earth in its possession, and has thrown brigades of bodies at them to perform the reverse engineering Cisco claims they want to prevent. That cat is out of the bag. This bill will not provide any cybersecurity protection to any Cisco firewall. As I said to the Cisco lobbyist, if an adversary already has physical access to the device, it's game over. Adversaries don't swap out broken hard drives or power supplies. Beyond that specious argument, there is a secondary problem with the bill: It never defines with any necessary level of detail what comprises "critical infrastructure" - which means that, if a regular, commercial TV set you can buy at Costco is being used as a monitor in a SOC, it's possible that those commercial products will end up lumped into the category of "critical infrastructure." We all know that what makes electronic infrastructure critical is not what it is - phones, laptops, desktops, printers, scanners, even desk lamps - but how and where, and for what purpose it is used What this bill appears to be about, and why Cisco and IBM are fighting to advance it so hard, is that it enables the rent-seeking behavior of companies who want to lock their customers in to expensive annual support contracts, and lock third-party support companies out of the equation. That's literally all this is, a way to defend an ongoing revenue stream. Any arguments other than that make no sense. If you can, please consider testifying in person: The lobbyists have seemingly infinite time and access to these legislators, and have been steamrolling the entire process through, using ridiculous lies and arguments that make no sense to anyone with background as a practitioner. we want to focus on three core messages: This bill is ridiculously broad and would sweep up most IT equipment, limiting repair options for everyone from Fortune 500 companies to small mom-and-pop businesses, schools, hospitals, libraries, universities, local governments, law enforcement agencies and more. It is a false premise to claim that repair tools are a security risk and limiting those tools to the manufacturer's repairers is safer. This bill allows manufacturers to lock out repair competition and monopolize repair for their products; that drives up costs, reduces quality, and can undermine the secondary market. If you can share your personal background and experience and speak to how limiting access to repair tools will not make products safer would be great. You don't need to be a Colorado resident, or even based in the US. Here's how you do it: sign up to testify here: https://sites.coleg.gov/public-testimony/sign-up-to-testify/step-1 Search for SB26-090 Select the bill when it pops up Fill in your details including whether you are testifying in-person or remotely. Please select "Oppose" for your position. Enter your information Show up and, when called, give your two (or three, depending on how many/few sign up) minutes of testimony, and be prepared to answer questions The people pushing this bill are counting on the fact that this is happening in the middle of a workday, when we're all trying to wreck hackers. But this is a case where we, as a community, need to stand up for what's right. Not doing so will make all of our jobs harder in the future. I hope to see you there. #COpolitics #RightToRepair #activism #hackers #cybersecurity #cybersicherheit #cyberseguridad
28
0
94
@tog@mastodon.ie · 5d ago
Not everything with a cracked plastic case is destined for the bin. This Flymo came into TOG with a badly damaged outer shell. Our member Ambrose repaired it with a plastic welder, melting the plastic and embedding metal staples across the break from the inside to reinforce it. That is one of the joys of a hackerspace: shared tools, shared knowledge, and people willing to give things a second life. Blog post here: https://www.tog.ie/2026/04/bringing-a-cracked-flymo-back-to-life/ #Repair #CircularEconomy #RightToRepair #Hackerspace
93
0
75
Boosted by SuperDicq @SuperDicq@minidisc.tokyo
@codemonkeymike@fosstodon.org · Apr 15, 2026
Another reason to hate #Apple We're seeing more 2018+ MacBook Pro/Air donations — but Apple's T2 chip means even after iCloud sign-out and reset, the firmware stays locked to the original account. Without donor contact, these machines are useless. :( I've upcycled ~1,000 older Macs, but T2 era machines will end that. It's controlling, creates e-waste, and will only get worse. #righttorepair matters — Apple couldn't care less.
1163
78
1320
@diegopds@bolha.us · Mar 07, 2026
Right to repair no contexto jurídico brasileiro e proteção dos stakeholders | Direito & TI (Marina Giovanetti Lili Lucena) "Resumo O presente artigo visa discutir e analisar sobre o right to repair ou direito a executar reparos. Tal direito vem se desenvolvendo nos últimos anos em alguns países ao redor do mundo, mas o debate ainda é introdutório no Brasil. O objetivo principal será compreender se o right to repair tem sua existência possibilitada no Brasil, partindo-se de direitos e princípios já consolidados no ordenamento brasileiro. Além disso, busca-se compreender se o right to repair é instrumento hábil a realizar a proteção dos stakehoders. Assim, o trabalho irá analisar a definição do right to repair, bem como explicitar os conflitos relacionados a esse direito. Normalmente o debate ocorre entre dois lados: os proprietários de bens que buscam realizar reparos independentes e as sociedades empresárias que objetivam deter o monopólio sobre peças e informações essenciais dos bens. Um momento histórico mundial e recente que demonstrou a necessidade da discussão e a utilidade de aplicação desse direito foi a pandemia de covid-19 [...]". https://direitoeti.com.br/direitoeti/article/view/129 #RightToRepair
0
0
0
@nikhotmsk@vmst.io · Mar 01, 2026
This is a public service announcement from Norway, it is also a good comedy sketch on internet enshittification and right to repair. https://youtu.be/T4Upf_B9RLQ #righttorepair #enshittification #norway #internet
0
0
0
In reply to
@thousandleaves@universeodon.com · Feb 19, 2026
My daily driver for nearly 10 years, this MacBook Pro from 2015 has a swollen battery. This repair was much easier. Only four components to remove before getting to the battery, which went straight to the hazardous waste drop-off. Again, thanks to @iFixit@mastodon.social for parts and an excellent guide. Who knows, maybe I’ll get another ten years out of it. #ifixit #diy #righttorepair #macbookpro
0
0
0
@evergreensewing@pdx.social · Feb 05, 2026
It's shameful that a gallery such as this needs to exist, but we're grateful someone's put it together. https://pirg.org/edfund/resources/electronic-waste-graveyard/ "This database lists more than 100 tech products that have stopped working after manufacturers dropped support. It calculates the total weight of all these dead devices which have joined the 68 million tons of electronic waste disposed of each year." #RightToRepair #Mending
15
0
14
@Pollinators@epicure.social · Jan 29, 2026
@patrickleavy@mastodon.social @pluralistic@mamot.fr Offering best wishes teaching Canadians to jailbreak the DMCA anti circumvention law. And soon please. Local right to repair is a good thing. #johndeere, #hpprinters, #righttorepair, #repaircafe
21
0
18

You've seen all posts