H
HN HRCB top | past | comments | ask | show | jobs | articles | domains | dashboard | seldon | network | factions | velocity | about hrcb
home / item 37392676
+0.44 Ask HN: I’m an FCC Commissioner proposing regulation of IoT security updates
3387 points by SimingtonFCC 904 days ago | 925 comments on HN | Moderate positive Editorial · v3.7 · 2026-02-26
Summary Digital Security & Consumer Protection Advocates
This Hacker News AMA features FCC Commissioner Nathan Simington advocating for a cybersecurity labeling program that would require manufacturers to disclose security update support periods for IoT devices. The content directly engages with multiple UDHR rights, particularly freedom of expression (Article 19), participation in governance (Article 21), privacy (Article 12), and fair access to remedies (Article 8). By framing device security as a consumer and public interest issue and inviting broad participation in FCC rulemaking, the content champions rights-based governance and democratic participation, though with limited explicit engagement with systemic inequality or accessibility barriers.
Article Heatmap
Preamble: +0.65 — Preamble P Article 1: +0.40 — Freedom, Equality, Brotherhood 1 Article 2: +0.12 — Non-Discrimination 2 Article 3: +0.45 — Life, Liberty, Security 3 Article 4: ND — No Slavery Article 4: No Data — No Slavery 4 Article 5: ND — No Torture Article 5: No Data — No Torture 5 Article 6: ND — Legal Personhood Article 6: No Data — Legal Personhood 6 Article 7: +0.35 — Equality Before Law 7 Article 8: +0.50 — Right to Remedy 8 Article 9: ND — No Arbitrary Detention Article 9: No Data — No Arbitrary Detention 9 Article 10: +0.40 — Fair Hearing 10 Article 11: +0.35 — Presumption of Innocence 11 Article 12: +0.30 — Privacy 12 Article 13: +0.49 — Freedom of Movement 13 Article 14: ND — Asylum Article 14: No Data — Asylum 14 Article 15: ND — Nationality Article 15: No Data — Nationality 15 Article 16: ND — Marriage & Family Article 16: No Data — Marriage & Family 16 Article 17: +0.45 — Property 17 Article 18: +0.46 — Freedom of Thought 18 Article 19: +0.80 — Freedom of Expression 19 Article 20: +0.41 — Assembly & Association 20 Article 21: +0.56 — Political Participation 21 Article 22: +0.35 — Social Security 22 Article 23: ND — Work & Equal Pay Article 23: No Data — Work & Equal Pay 23 Article 24: ND — Rest & Leisure Article 24: No Data — Rest & Leisure 24 Article 25: +0.13 — Standard of Living 25 Article 26: +0.35 — Education 26 Article 27: +0.50 — Cultural Participation 27 Article 28: +0.55 — Social & International Order 28 Article 29: +0.25 — Duties to Community 29 Article 30: +0.35 — No Destruction of Rights 30
Negative Neutral Positive No Data
Aggregates
Weighted Mean +0.44 Unweighted Mean +0.42
Max +0.80 Article 19 Min +0.12 Article 2
Signal 22 No Data 9
Confidence 48% Volatility 0.15 (Medium)
Negative 0 Channels E: 0.6 S: 0.4
SETL +0.37 Editorial-dominant
FW Ratio 55% 55 facts · 45 inferences
Evidence: High: 7 Medium: 12 Low: 3 No Data: 9
Theme Radar
Foundation Security Legal Privacy & Movement Personal Expression Economic & Social Cultural Order & Duties Foundation: 0.39 (3 articles) Security: 0.45 (1 articles) Legal: 0.40 (4 articles) Privacy & Movement: 0.40 (2 articles) Personal: 0.46 (2 articles) Expression: 0.59 (3 articles) Economic & Social: 0.24 (2 articles) Cultural: 0.42 (2 articles) Order & Duties: 0.38 (3 articles)
HN Discussion 20 top-level · 30 replies
ilamont 2023-09-05 15:22 UTC link
commitments on this label (including the support period) will be legally enforceable in contract and tort lawsuits and under other laws.

When it comes to U.S. laws that touch technology, enforceability is a mess. Spyware, spam, fraud, misleading labels, etc. are already governed by various state and federal laws, yet enforcement efforts are whack-a-mole at best.

For IoT devices, having the proposed requirements sounds good in theory but I fear it is practically unenforceable, particularly for consumer-grade devices manufactured overseas.

However, if powerful IoT platforms are also tied into the new regs - with Google, Amazon, Apple, Microsoft, PTC, HPE, etc. required to audit supposedly qualified devices and ban those that don't meet the standards, with escalating penalties for failing to do so - that might shift the needle.

My 2 cents.

trelane 2023-09-05 15:24 UTC link
How about requiring devices to accept alternate, Free Software firmware, from the upstream provider?

At the very least, it should be possible after some time period of no updates or insecurity, but a blanket requirement is less susceptible to games.

Probably the best thing to happen to wireless routers is OpenWRT and the other descendents of the WRT firmware.

user3939382 2023-09-05 15:26 UTC link
We’ve seen manufacturers abuse ongoing access to devices to turn off features the device came with at the time of purchase or convert one-time-fee features into subscriptions. One of my concerns is that security updates are strictly defined in a way that prevents this type of regulation from being used as cover for these shenanigans.
hannob 2023-09-05 15:26 UTC link
> The FCC recently issued a Notice of Proposed Rulemaking [2] for a cybersecurity labeling program for connected devices.

That appears to me to be the wrong way to go about this, and it has specifically to do with how IoT security is a problem.

The most severe case of IoT security problems we have seen were things like mass botnets, where plenty of devices of the same type were hacked and then used for things like DoS attacks. Notable cases include the DoS attacks against Brian Krebs for some of his reporting.

The important thing to understand here is that the device owner is not the primary victim. That's a third party.

This is not about consumer choice, because consumers by and large do not care, because they are not the people being affected by this. An optional security label tries to adress it as a consumer choice problem, which it isn't.

coldpie 2023-09-05 15:30 UTC link
FWIW, seeing a security compliance label on an IoT product wouldn't mean anything to me as a consumer. There is no such thing as computer security in 2023, and there are no hints that security will exist at any point on the horizon. Even the biggest names in the field cannot put out secure products. Products from well-meaning manufacturers are going to be absolutely riddled with security problems, and putting a sticker on the box won't change that. It is literally impossible to put out a software product with anything resembling security today. It'd be like putting a "secure against bricks" sticker on a window. Our industry is a joke. Building secure software products can't be done without completely rearchitecting how our industry operates, which isn't going to happen.
doitLP 2023-09-05 15:41 UTC link
There’s some great recommendations in this thread but I just want to thank you for engaging with this community to solicit opinions from the trenches.

This is really meaningful to most of us who see the regulations in our lives as something far away that we can’t influence.

Another reminder for everyone that while you likely can’t influence something like a presidential election on your own, you can influence many other spheres with your knowledge and time that are closer to home and probably affect you more immediately.

atomicfiredoll 2023-09-05 15:57 UTC link
Has much consideration been given to labeling when a third party cloud or paid service is required to use the device? As somebody who uses IoT devices "locally" on my private network, I want to know my data will stay local and protected. The recent issues with Eufy doorbells claiming to be under local control [and encrypting data], but actually sending data to the cloud stands out to me as an example where labeling and enforcement could help.

[0] https://arstechnica.com/gadgets/2022/11/eufys-no-clouds-came...

distract8901 2023-09-05 15:58 UTC link
I think that IOT device manufacturers should be required to support their device for some minimum period of time AND be obligated to release the full source code for the device once they decide to end support. This also requires releasing the keys to any firmware signing mechanism or publishing a firmware update that removes such checks.

The core problem is that without control of the firmware, consumers don't really own these devices. The company can unilaterally decide one day to brick your device and force you to buy a new one. It should be obvious that this behavior is egregiously anti-consumer and anti-competitive.

dtaht 2023-09-05 16:29 UTC link
Thank you for engaging with the community in this way. Many years ago, in a fight to preserve individuals ability to flash their own routers, Vint Cerf, and I, and a coalition of many others, filed this report:

http://www.taht.net/~d/fcc_saner_software_practices.pdf

(retaining the ability to reflash our own routers, allowed my research project to continue, and the resulting algorithm, fq_codel (rfc8290), now runs on a few billion devices) The Linux and OpenWrt development process continues innovating and is very responsive to bugs and CVEs. It is a constant irritation that many products exist downstream from that that are 5 or more years out of date, and not maintained!

Key bullets from that fcc filing are on page 12-13.

vinay_ys 2023-09-05 16:29 UTC link
IoT devices need regulatory standardization w.r.t a few things:

1. software stack – big fat "firmware" should not exist. Entire stack should be upgradable safely, securely and frequently during its official supported lifetime and should be open-sourced for owner's own upgrades past end of life. For this, the hardware stack needs some amount of standards compliance.

2. Vendor should clearly declare/advertise the period for which they will support the device. During this period the device vulnerabilities should make them liable. After this period, they should mandatorily open-source the device drivers and unlock the boot loaders to enable free software alternatives to work on them. For certain class of devices, there should be mandatory minimum period of support.

3. Networking capabilities should be legally standardized and verified/certified before being released to market and checked for continued compliance and fined if out of compliance.

3.1 Use of latest mainstream TLS with valid certificates should be mandated for all communication.

3.2 If there is outbound communication from the device, it should make it clear to which domains it will communicate with so that it is easy to allow only that through firewall and keep everything else locked.

3.3 IoT should not accept inbound communication without authentication.

3.4 Follow best practices w.r.t rollback resistant cryptographically verified secure and brick-safe software upgrades.

jjguy 2023-09-05 16:53 UTC link
For those of you unfamiliar with the specific challenges IoT patching brings, here is a blog post from just last week on one aspect of the topic: http://tomalrichblog.blogspot.com/2023/08/british-cuisine-de...

FTA:

> I assumed that device manufacturers update the software in their device about every month...he said they do it annually.

Those devices are at least _getting_ updates - there is a long tail of devices whose operational lifecycle [far] exceeds the vendor's support timeframe - in other words, they don't get patches at all N months after release.

The solution to these problems is straightforward - we've been managing it in software for a long time. EOL OSes, Long Term Support (LTS) OS releases, etc - but the device manufacturers are not as mature, and have not been making natural progress to do so.

And since this is HN - there is a startup hidden in the midst of all of this: an enterprise-grade IoT OS that "does security right." Sell to the device manufacturers, allow them to market it as "enterprise-ready" or some such. If the FCC guidelines here are approved, there will be a suddenly increased demand!

ryukoposting 2023-09-05 18:18 UTC link
As a firmware engineer, I'm one of the people who actually writes the code that goes inside the IoT devices. I'm very interested in what the FCC might be able to do here.

How does the FCC define a security flaw? Would updates only be distributed when there is a flaw that needs fixing?

Remote update mechanisms can themselves present security problems in some domains. Thus, some devices should only be updatable if the owner has physical access to the device. Will the manufacturer be liable for damages caused by attacks on vulnerable devices that were not sufficiently updated by their owners?

IoT is making its way into defense and enterprise environments where reliability is a matter of national security. An update nearly always results in some downtime for the device, even if it's just a couple seconds. Sometimes, it may be in the best interest of a device's owner to defer an update indefinitely, until that device's continuous operation is no longer mission-critical. Even if the owner can't control exactly what is in an update, they absolutely MUST be able to control when an update occurs.

iandanforth 2023-09-05 18:21 UTC link
I think the most valuable security feature for IoT devices is being able to work without contact with a central service.

If the value of a device is tied to opening a connection to and occasionally retrieving code from a third party it is inherently insecure. All I have to do is buy the company that owns the central server (or compromise it in some other less visible way) and I now have the ability to introduce malicious code to all devices that are receiving 'security updates.' You won't be able to make a rule to prevent asset transfer (correct me if I'm wrong) so you won't be able to close this hole. And this assumes the manufacturer isn't malicious in the first place.

For people to be able to protect themselves and to protect the value of the property they have purchased (e.g. the company tanks and the central service is lost) a rule should exist mandating minimum useful functionality in a disconnected and/or self-managed environment.

arkitectual 2023-09-05 19:01 UTC link
I really appreciate you directly going to the community for feedback.

As someone who writes software for IoT devices and has worked in the past on security in the IoT space this is sorely needed. By far the biggest issue in my view is that manufacturers are not motivated to take device security seriously since they are largely isolated from any fallout. Device manufacturers already have to pass certification for RF emissions and safety among other things and should have to pass certification for at least a basic security audit on the device and the services the device connects to. Even self-certification would improve the current situation.

For many device types there exists some form of open source OTA update software or a commercial offering. In the last few years there has been significant maturing of the tooling in this space but the security aspect is often left as optional even though the tooling often makes it fairly easy to add. At this point I think the industry just needs a little push to make secure OTA updates the standard.

dang 2023-09-05 19:23 UTC link
All: To read the entire thread, you'll need to click More at the bottom of the page, or like this:

https://news.ycombinator.com/item?id=37392676&p=2

https://news.ycombinator.com/item?id=37392676&p=3

vkaku 2023-09-05 19:43 UTC link
I've dealt with this multiple times, so let me give my perspective.

- It is hard for manufacturers to do this with small teams. Mostly because they do not always have good CI/CD or platforms available to keep being on top of vulnerabilities and so on and so forth.

- Not all manufacturers write their own software and often contract it out to other experts in the field. This includes firmware and app developers.

- If a manufacturer goes out of business or their website is hacked or whatever, the devices are going to send information to someone else, this is a big risk.

- A lot of blast damage can be contained if home devices use local / MDNS based service discovery as opposed to Internet based services. Many services could then either choose to reply locally or sometimes relay to the Internet if users policies allow. Unless people want other people unlocking their doors through the Internet, and they explicitly say it, Internet connection can not be mandated.

- If a producer goes out of business they should be forced to give out a signed firmware that disables the key checking, then they must put up their source code for any users who wish to build and flash it themselves.

- Some of these will not be practical to get manufacturers to agree on. IP issues will arise. Following decent open protocols for firmware upgrade and sharing platform specific specs can alleviate this. One should be able to re implement open firmware for their bulbs if everything else shuts down.

simne 2023-09-05 20:20 UTC link
Greetings from Ukraine, European country with real Great war just now.

I must say, we see extreme grow of cyber-crime as part of modern war. I think, in nearest future, cold war will guaranteed have huge cyber-crime part.

And, hacking of IoT devices has very significant share of cyber-crime now. For real war it is question of life and death, because hacked devices with radio emission, are used by hostile intelligence, to find targets for attacks of heavy weapon, but also, we seen cyber attacks on electric-energy infrastructure, indented to make blackout (fortunately for us, unsuccessful).

Chinese IoT devices are very special part of question, in many cases are connected to Chinese clouds, and this is also extremely dangerous, not only because potential unfriendly Chinese moves, but also because their security is not good enough, so in many cases, cyber-crime could intercept communications and interfere operation of device or even hijack control.

For example, exists smart door locks with camera and I hear hackers hacked them and used them to observe work of air defense, so enemy could tune their air attacks to make more harm.

In civilian life without war, videos from hacked door locks (or other IoT cameras) could be used for illegal surveillance, to coordinate riots, etc.

convivialdingo 2023-09-05 20:26 UTC link
As a developer and a consumer, what I'd really like to see is:

- Manufacturer voluntary guarantee of 1/3/5 years security updates with an expiration date.

- Separation of functionality and security updates.

- The ability to "turn off" connectivity and retain full local functionality.

- An industry security certification like UL.

- A single point way of identifying and validating devices.

As it is, I avoid using IoT mostly for security reasons. Having worked in security for many years I have seen the best and the worst. Having security isn't a panacea either - it needs an ongoing management & reporting infrastructure.

SimingtonFCC 2023-09-05 20:31 UTC link
Thank you so much everyone for the interesting, high-quality discussion so far. My team and I are looking forward to continuing to engage with you for at least a few more hours.

Just a reminder: As fun as discussing this in here with you is, the best way to influence what the FCC ends up doing is to file an official comment by September 25th at https://www.fcc.gov/ecfs/search/docket-detail/23-239 . Click to file either an ‘express’ comment (type into a textbox) or a ‘standard’ comment (upload a PDF). The FCC is required to address your arguments when it issues its final rules. All options are on the table, so don’t hold back, but do make your arguments as clear as possible so even lawyers can understand them. If you have a qualification (line of work, special degree, years of experience, etc.) that would bolster the credibility of your official comment, be sure to mention that, but the only necessary qualification is being an interested member of the public.

Finally, I'd like to extend a special thanks to dang and the rest of the HN team for their help putting this together. They have been a pleasure to work with.

WaitWaitWha 2023-09-06 03:06 UTC link
Thanks for reaching out to the community.

Instead of mandatory updates, there are lower hanging fruits you can win, and will have just as much, if not more positive security impact.

1. No default password, one must be set at initial configuration

2. Devices must function without public internet connection (unless it is one of the device's primary function to transmit out)

3. Devices must function without centralized host

4. Explicit disclosure of all "phone home" destination hosts, and ability to change or disable this

5. Explicit disclosure what information is transmitted out, and ability to disable this

I think the above five can be implemented relatively easily, requires no continued maintenance from the manufacturers, and improves the CIA triad of IoTs.

the4anoni 2023-09-05 15:28 UTC link
As far as I remember FCC about 8 years ago didn't liked OpenWRT, and even enforced on TP Link to lock it.
hannob 2023-09-05 15:29 UTC link
I am all for alternative free software firmware. But I don't think it adresses IoT security in any meaningful way.
AnimalMuppet 2023-09-05 15:37 UTC link
Hmm, yeah. Just as fraud telemarketers set up a new shell run by the same principals when the legal bills come due for their old one, so we're likely to see new labels for a new shell company slapped on the same old insecure IoT box.

So I'm not sure "escalating penalties" is going to cut it. It's still whack-a-mole. You need a way to kill the mole, not just drive it to pop up a new hole.

You need a way to get to the principals. They're the mole.

You need to either make them personally liable financially, or you need to jail them. Nothing else is going to stop serial fraud-behind-a-shell-company.

I'm not sure I have an answer. But whatever answer there is needs to be applied not only to fraud telemarketers (please), but also to fraud IoT manufacturers/resellers.

staticautomatic 2023-09-05 15:38 UTC link
If there’s a private right of action you can bet the class action lawyers will do the enforcing.
jtbayly 2023-09-05 15:38 UTC link
That’s only one aspect of the problem.

Lots of people have been bitten by suddenly unsupported devices.

I think it could do some good.

cosmojg 2023-09-05 15:39 UTC link
Exactly. I don't see the situation improving until either the owner or, preferably, the manufacturer of a device that participates in a DoS attack is held partially accountable for said attack.
atomicfiredoll 2023-09-05 15:42 UTC link
I just want to reaffirm the importance of this point. I've used an open source solution named Home Assistant[0] to manage my own network of IoT devices that I don't expose to the internet. I want to stay local because of the risks involved with the internet and with trusting companies to protect such private data.

As such, I look to purchase relativity open devices. But, companies want to keep trying to inject themselves as a middleman, sometimes after the fact. In that case I'm let with a device that becomes e-waste. I don't know what other actions are being taken in regards to subscriptions, but it's a problem here.

[0] https://www.home-assistant.io/

SimingtonFCC 2023-09-05 15:42 UTC link
Your point about buyers at scale is really important. The current effort is focused on sellers, but we think that if sellers have to define their security commitments, buyers will pay attention and their risk management people will insist on high standards.

I fear it is practically unenforceable, particularly for consumer-grade devices manufactured overseas

Also a good point. The way we handle this for RF interference is to look at distributors and importers, not just manufacturers, but there will probably always be an untrustworthy product tier out there.

SimingtonFCC 2023-09-05 15:45 UTC link
Thanks! I am thrilled that so many people are participating. The FCC is going to need a lot of this community's input over the next few years as more and more devices go online.
hliyan 2023-09-05 15:46 UTC link
I'm not a US citizen, but I too would cosign the idea of not using security updates as a vector for pushing monetization "features".
entropyie 2023-09-05 15:47 UTC link
This is also a key point to fighting ewaste and making devices last longer. I have appliances from the 70s including a rotary telephone, that I still use regularly. If you combined mandatory OSS support with repair cafes, you would have a model for sustainable reuse and better security. You may even start a commercial aftermarket in reflashing older devices!
MarcoPerazaFCC 2023-09-05 15:57 UTC link
Thanks for this great observation. I encourage you to share it in an official comment. In a final rulemaking, perhaps we could make it clear that the purpose of the label is not only to protect the purchaser of the product but also anyone who might be injured by way of a compromised device. In an FCC enforcement proceeding, we have broad discretion in assessing damages. In contract, the third-party beneficiary doctrine could allow victims of such attacks to enforce label commitments. And in tort, statutory duties apply to anyone who is within the class of people that the law seeks to protect. So the law is flexible here, but it depends on what exactly our final rules say.
eru 2023-09-05 15:59 UTC link
> It'd be like putting a "secure against bricks" sticker on a window.

I lived in a house that had such secure windows. I even witnessed someone trying and failing to smash a window with a brick.

eru 2023-09-05 16:01 UTC link
> One of my concerns is that security updates are strictly defined in a way that prevents this type of regulation from being used as cover for these shenanigans.

And then as a manufacturer you need to pay someone to certify that, or otherwise risk a class action lawsuit?

What about hardware that uses third party software? (Either because it's a genuine third party, eg when you put open source on your router, or because the manufacturer split into two companies to exploit a legal loophole?) Can open source software only make releases that update automatically after getting certified, or risk getting sued otherwise?

ChrisCinelli 2023-09-05 16:03 UTC link
Making "x years of security updates" mandatory is likely to end up in a warning disclaimer every time you turn on the TV after x years: "This device does not receive any more security updates. You may be at risk."

That will either make a large part of consumers paranoid or annoyed. So they will replace a TV that is in perfectly working conditions with a new TV.

Samsung, LG and the consumerist economy would love that!

planb 2023-09-05 16:04 UTC link
I think you are underestimating how a well known „secure“ label (or lack thereof) could influence customer behavior. It’s not that they don’t care - they (understandably) lack deeper knowledge and therefore don’t base their purchasing decisions on how long they will get updates. „If sticker X is not on the package I will get hacked“ is much easier to grasp.
NegativeK 2023-09-05 16:15 UTC link
> There is no such thing as computer security in 2023

This is absurd.

Even the passive basics like relying on your free email provider's filtering and running Windows Defender is going to stop a huge number of attacks.

If you're expecting perfect security, you'll be disappointed -- but we can't declare complete bankruptcy.

SimingtonFCC 2023-09-05 16:17 UTC link
Right now, the actual requirements for a label are totally up for grabs. This would make for a good public comment, in my opinion.
callalex 2023-09-05 16:18 UTC link
This take is simply not based in reality. Compare what it took to gain root access to a computer 20 years ago to a modern iPhone and tell me again that there is absolutely no point in caring about security.
SimingtonFCC 2023-09-05 16:24 UTC link
I understand your skepticism. That's why I want to see the label functioning as something like an enforceable representation to consumers. If someone wants to sell brick-proof glass, and get a sticker from the US Government saying so, it better be brick-proof.
kijin 2023-09-05 16:28 UTC link
There's also the problem that electronic devices last a long time -- often much longer than any manufacturer wants to admit.

Vehicles, PCs, printers, and routers can easily last 10 years. Refrigerators and HVAC units can last 20 years or more. And now we're putting "smart" stuff into electric circuits that should last the lifetime of the house. The manufacturer will probably go out of business long before those devices go out of service, and there's no guarantee that there will be anyone to push one final firmware update or release the source code in the hectic last few days of an imploding business.

treyd 2023-09-05 16:37 UTC link
> 3.3 IoT should not accept inbound communication without authentication.

Ideally the user should have to specifically consent to inbound communication on an instance-by-instance basis, even from the manufacturer. There's many cases where forced updates are triggered that change/limit functionality unexpectedly. There's numerous anecdotes of people's devices being required to update to be used while they have some pressing need to use it.

MattPalmer1086 2023-09-05 16:41 UTC link
I completely agree that it is meaningless to assert that something is "secure". Even very well secured things have been hacked, and the smallest of mistakes can have huge impact.

What would be meaningful is an assertion that some basic set of secure practices have been or are followed. For example, that there are no default passwords on a device, that security updates will be provided on some defined schedule, that network protocols meet some reasonable standard of security, etc.

wolverine876 2023-09-05 16:48 UTC link
Agreed. Thank you Commissioner Simington for reaching out to us. It makes all the difference in the world.

> while you likely can’t influence something like a presidential election on your own

In fact, there is almost nothing of significance you can accomplish (or influence) on your own. We always do and always have needed to work together - and the results are astonishing: almost everything that's ever been accomplished.

MarcoPerazaFCC 2023-09-05 17:04 UTC link
These could be great suggestions for the criteria a product must meet to quality for a label. I encourage you to file an official comment with your thoughts.
MarcoPerazaFCC 2023-09-05 17:10 UTC link
>And since this is HN - there is a startup hidden in the midst of all of this: an enterprise-grade IoT OS that "does security right." Sell to the device manufacturers, allow them to market it as "enterprise-ready" or some such. If the FCC guidelines here are approved, there will be a suddenly increased demand!

Agreed. Building an automatic firmware update system from scratch would be burdensome for many IoT makers, but as it becomes necessary or encouraged, we would expect the market to provide a packaged solution/framework that manufacturers could fold into their products. It would be really helpful have to discussion of this on the record. How generalizable do you think such a solution could be? We are aware of the Uptane project, an OTA firmware update framework being jointly worked on by several car manufacturers, but would love to hear more about the feasibility of a solution for IoT devices generally, or particular classes of IoT devices.

Gormo 2023-09-05 17:10 UTC link
They're proposing an opt-in labeling program that essentially amounts for to the FCC underwriting certain attestations that vendors are choosing to make about their products.

This means that someone applying the label without meeting the standards the label indicates would be guilty of exactly the sort of fraudulent advertising you're describing, and contract and tort law are the relevant mechanisms of enforcement for this.

I'm not sure what you mean by enforcement efforts being "whack-a-mole at best", but if you're expecting some sort of preemptive regulatory barrier to be enforced by a bureaucratic agency in advance, that's just not the way this sort of thing works or is intended to work, and the FCC certainly wouldn't have the legal authority to implement such a regime.

Legal actions for fraud, false advertising, trademark infringement (in the case of trademarked standards certification badges, e.g. UL) are frequently used mechanisms for this sort of thing, and seem to work well enough to ensure that vendors are deterred from fraudulently applying certification labels to their products.

MarcoPerazaFCC 2023-09-05 17:32 UTC link
Maybe the presence or absence of this capability could be something disclosed on the label? It's an idea worth thinking about. I encourage you to file a comment with your thoughts on the matter. You probably want to focus on how this information could help a security-concerned consumer/business make a better purchasing decision. Or if you're arguing that this be a hard-requirement for the label, why a device should not be considered secure without this capability.
basch 2023-09-05 17:36 UTC link
I wrote elsewhere, but a standard/compatible requirement for a rolled up management dashboard. https://news.ycombinator.com/item?id=37395102

I dont want 30 semi/unmaintained apps to manage each manufacturers security settings.

SimingtonFCC 2023-09-05 17:37 UTC link
High-quality comment. Thanks very much! I'll read your filing and think about it. But also, it's a great example of impactful public FCC commentary. I hope your work inspires others to make their mark in the record.
Editorial Channel
What the content says
+0.80
Article 19 Freedom of Expression
High Advocacy Framing Practice
Editorial
+0.80
SETL
+0.40

Content is fundamentally an exercise in freedom of expression and information-seeking. Simington uses his platform to advocate for policies and explicitly invites public discourse. The FCC rulemaking process is framed as an avenue for collective expression on a matter of public importance.

+0.70
Article 12 Privacy
High Advocacy Framing
Editorial
+0.70
SETL
+0.75

Content directly advocates for privacy protection by advocating for security measures that prevent exposure of 'private keys' and other sensitive data embedded in IoT devices. The proposal frames disclosure of update policies as protecting users from privacy violations.

+0.65
Preamble Preamble
High Advocacy Framing
Editorial
+0.65
SETL
ND

Content directly addresses the dignity and rights framework implicit in the Preamble by advocating for consumer protection through security labeling and mandatory disclosure. The text emphasizes 'freedom from fear' (implicit security/safety) and empowerment of individuals against powerful manufacturers.

+0.60
Article 21 Political Participation
High Advocacy Practice
Editorial
+0.60
SETL
+0.24

Content directly advocates for participation in governance by inviting the public to participate in FCC rulemaking. Simington explicitly states that public comment is necessary for the FCC to hear consumer perspectives and make informed policy.

+0.55
Article 13 Freedom of Movement
High Advocacy Framing
Editorial
+0.55
SETL
+0.29

Content advocates for freedom of movement by ensuring that security vulnerabilities in connected IoT devices do not restrict user mobility or autonomy. Secure devices support users' freedom to move without fear of exploitation or surveillance.

+0.55
Article 28 Social & International Order
High Advocacy
Editorial
+0.55
SETL
ND

Content directly advocates for a social and international order that protects the rights outlined in the UDHR. The FCC rulemaking and labeling program are proposed as institutional mechanisms to create such an order.

+0.50
Article 8 Right to Remedy
Medium Advocacy Practice
Editorial
+0.50
SETL
ND

Content advocates for effective remedy by proposing that consumers have recourse through contract and tort law if manufacturers violate security update commitments on the label. This addresses access to justice for those harmed by security failures.

+0.50
Article 18 Freedom of Thought
High Advocacy Framing
Editorial
+0.50
SETL
+0.22

Content directly advocates for freedom of thought and conscience by inviting diverse public participation in regulatory proceedings without ideological gatekeeping. The text explicitly states 'I'm open to incorporating your ideas (and even being convinced I'm wrong),' demonstrating openness to diverse perspectives.

+0.50
Article 27 Cultural Participation
Medium Advocacy
Editorial
+0.50
SETL
ND

Content addresses participation in cultural and scientific advancement by advocating for policy that supports the security of connected devices. As technology becomes integrated into cultural and scientific work, secure infrastructure is essential.

+0.45
Article 3 Life, Liberty, Security
Medium Advocacy
Editorial
+0.45
SETL
ND

Content implicitly addresses right to life and security by framing IoT security as a matter affecting user safety and the integrity of systems that may affect health and wellbeing (devices connected to homes, medical systems, etc.).

+0.45
Article 17 Property
Medium Advocacy
Editorial
+0.45
SETL
ND

Content addresses property rights by framing security updates as essential to protecting the integrity and utility of devices consumers own. Vulnerabilities that persist after purchase effectively diminish the value and security of owned property.

+0.45
Article 20 Assembly & Association
Medium Advocacy
Editorial
+0.45
SETL
+0.21

Content explicitly invites and supports freedom of association by framing the FCC comment process as collective action. The text states 'If infosec doesn't make this an issue, the general public will continue falsely assuming that everything is fine,' implying a need for coordinated collective voice.

+0.40
Article 1 Freedom, Equality, Brotherhood
Medium Advocacy
Editorial
+0.40
SETL
ND

Content addresses equality by framing consumer protection as a public interest issue and acknowledging that manufacturers have disproportionate power. The proposal seeks to level the information asymmetry between corporations and individual consumers.

+0.40
Article 10 Fair Hearing
Medium Advocacy
Editorial
+0.40
SETL
ND

Content implicitly addresses fair and public hearing by advocating that manufacturers not monopolize the regulatory process. The call for public participation in FCC rulemaking ensures that consumer voices are heard in a formal proceeding.

+0.40
Article 25 Standard of Living
Medium Advocacy
Editorial
+0.40
SETL
+0.44

Content addresses adequate standard of living by framing security as essential to the reliable use of technology in daily life. Vulnerable devices that lack security support undermine users' ability to maintain a secure home and communication environment.

+0.35
Article 7 Equality Before Law
Medium Advocacy
Editorial
+0.35
SETL
ND

Content addresses equal protection under law by proposing that all manufacturers and consumers be subject to the same labeling and disclosure requirements, implying equal application of regulatory standards.

+0.35
Article 11 Presumption of Innocence
Medium Advocacy
Editorial
+0.35
SETL
ND

Content addresses presumption of innocence and due process by proposing that manufacturers disclose security support periods upfront, allowing consumers to make informed choices. It frames disclosure as a protection against hidden liability.

+0.35
Article 22 Social Security
Low Advocacy
Editorial
+0.35
SETL
ND

Content implicitly addresses social security and welfare by framing device security as part of the broader social infrastructure that enables safe participation in technology-dependent services (health, finance, etc.).

+0.35
Article 26 Education
Medium Advocacy
Editorial
+0.35
SETL
ND

Content implicitly addresses education by positioning the FCC labeling program as an information-based tool that educates consumers about security. Disclosure of update policies 'arms consumers with better information.'

+0.35
Article 30 No Destruction of Rights
Low Framing
Editorial
+0.35
SETL
ND

Content does not appear to misuse rights language to suppress rights. However, it does not explicitly protect against misuse of the labeling program or propose safeguards against regulatory capture.

+0.30
Article 2 Non-Discrimination
Medium Advocacy Framing
Editorial
+0.30
SETL
+0.37

Editorial content advocates for non-discrimination through security labeling that applies universally to all devices and manufacturers, implying equal treatment. However, the proposal does not explicitly address discriminatory access to devices or technology.

+0.25
Article 29 Duties to Community
Low Framing
Editorial
+0.25
SETL
ND

Content implicitly addresses duties and limitations by acknowledging that manufacturers have responsibilities toward consumers and that those responsibilities should be enforceable. However, the focus is on rights rather than duties.

ND
Article 4 No Slavery

No observable engagement with slavery or forced labor.

ND
Article 5 No Torture

No observable engagement with torture or cruel treatment.

ND
Article 6 Legal Personhood

No observable engagement with personhood or recognition before law.

ND
Article 9 No Arbitrary Detention

No observable engagement with arbitrary arrest or detention.

ND
Article 14 Asylum

No observable engagement with asylum or refuge.

ND
Article 15 Nationality

No observable engagement with nationality or right to change nationality.

ND
Article 16 Marriage & Family

No observable engagement with marriage or family rights.

ND
Article 23 Work & Equal Pay

No observable engagement with work and employment rights.

ND
Article 24 Rest & Leisure

No observable engagement with rest and leisure.

Structural Channel
What the site does
Domain Context Profile
Element Modifier Affects Note
Privacy -0.05
Article 12
Hacker News allows pseudonymous participation but retains IP logs and user data; modest privacy protections present but not explicitly highlighted in transparency policies.
Terms of Service 0.00
Standard community guidelines prohibit harassment and illegal content; neutral stance toward human rights.
Accessibility -0.08
Article 2 Article 25
Platform lacks WCAG accessibility features (alt text, screenreader optimization); plain-text interface moderately accessible but no structured accommodations.
Mission 0.00
Platform mission is information sharing and community discussion; no explicit human rights commitments.
Editorial Code 0.00
No formal editorial code; community-moderated content governance.
Ownership 0.00
Privately held by YCombinator; no direct human rights implications at platform level.
Access Model +0.08
Article 2 Article 19
Free, open access to read; low barriers to participation; supports global reach and free expression.
Ad/Tracking -0.03
Article 12
Minimal ad tracking; privacy-respecting ad model relative to commercial platforms.
+0.60
Article 19 Freedom of Expression
High Advocacy Framing Practice
Structural
+0.60
Context Modifier
+0.08
SETL
+0.40

Hacker News is designed as a free-speech discussion platform with minimal content filters (beyond illegal/harassing content). The AMA format (Ask Me Anything) provides direct voice to a government official, supporting public information access. The linked FCC system is a public comment mechanism designed to facilitate expression.

+0.50
Article 21 Political Participation
High Advocacy Practice
Structural
+0.50
Context Modifier
0.00
SETL
+0.24

Hacker News and the FCC comment system both provide mechanisms for public participation, though with different barriers to entry. Hacker News is open access; FCC commenting requires navigating a government portal.

+0.40
Article 13 Freedom of Movement
High Advocacy Framing
Structural
+0.40
Context Modifier
0.00
SETL
+0.29

Hacker News provides global access to the discussion (no geographic restrictions), supporting freedom of movement and participation across borders. The FCC comment system is US-centric but accessible to non-US parties.

+0.40
Article 18 Freedom of Thought
High Advocacy Framing
Structural
+0.40
Context Modifier
0.00
SETL
+0.22

Hacker News allows anonymous and pseudonymous participation, supporting freedom of expression without mandatory identification. Comments are moderated but not filtered for ideological conformity.

+0.35
Article 20 Assembly & Association
Medium Advocacy
Structural
+0.35
Context Modifier
0.00
SETL
+0.21

Hacker News is designed as a community space where users can collectively discuss issues. The comment thread itself facilitates association around the topic of IoT security.

-0.08
Article 25 Standard of Living
Medium Advocacy
Structural
-0.08
Context Modifier
-0.08
SETL
+0.44

Hacker News lacks full WCAG accessibility (no alt text, limited screenreader support), which limits access to the discussion for users with disabilities. This creates a barrier to participation in the conversation about digital welfare.

-0.10
Article 12 Privacy
High Advocacy Framing
Structural
-0.10
Context Modifier
-0.08
SETL
+0.75

Hacker News retains user IP logs and behavioral data; while privacy policies exist, the platform does not prominently disclose data retention practices or offer granular privacy controls.

-0.15
Article 2 Non-Discrimination
Medium Advocacy Framing
Structural
-0.15
Context Modifier
0.00
SETL
+0.37

The Hacker News platform itself has modest accessibility barriers (no WCAG compliance noted), limiting access for disabled users to participate in the discussion. The external FCC filing system (linked) may have similar limitations.

ND
Preamble Preamble
High Advocacy Framing

Content directly addresses the dignity and rights framework implicit in the Preamble by advocating for consumer protection through security labeling and mandatory disclosure. The text emphasizes 'freedom from fear' (implicit security/safety) and empowerment of individuals against powerful manufacturers.

ND
Article 1 Freedom, Equality, Brotherhood
Medium Advocacy

Content addresses equality by framing consumer protection as a public interest issue and acknowledging that manufacturers have disproportionate power. The proposal seeks to level the information asymmetry between corporations and individual consumers.

ND
Article 3 Life, Liberty, Security
Medium Advocacy

Content implicitly addresses right to life and security by framing IoT security as a matter affecting user safety and the integrity of systems that may affect health and wellbeing (devices connected to homes, medical systems, etc.).

ND
Article 4 No Slavery

No observable engagement with slavery or forced labor.

ND
Article 5 No Torture

No observable engagement with torture or cruel treatment.

ND
Article 6 Legal Personhood

No observable engagement with personhood or recognition before law.

ND
Article 7 Equality Before Law
Medium Advocacy

Content addresses equal protection under law by proposing that all manufacturers and consumers be subject to the same labeling and disclosure requirements, implying equal application of regulatory standards.

ND
Article 8 Right to Remedy
Medium Advocacy Practice

Content advocates for effective remedy by proposing that consumers have recourse through contract and tort law if manufacturers violate security update commitments on the label. This addresses access to justice for those harmed by security failures.

ND
Article 9 No Arbitrary Detention

No observable engagement with arbitrary arrest or detention.

ND
Article 10 Fair Hearing
Medium Advocacy

Content implicitly addresses fair and public hearing by advocating that manufacturers not monopolize the regulatory process. The call for public participation in FCC rulemaking ensures that consumer voices are heard in a formal proceeding.

ND
Article 11 Presumption of Innocence
Medium Advocacy

Content addresses presumption of innocence and due process by proposing that manufacturers disclose security support periods upfront, allowing consumers to make informed choices. It frames disclosure as a protection against hidden liability.

ND
Article 14 Asylum

No observable engagement with asylum or refuge.

ND
Article 15 Nationality

No observable engagement with nationality or right to change nationality.

ND
Article 16 Marriage & Family

No observable engagement with marriage or family rights.

ND
Article 17 Property
Medium Advocacy

Content addresses property rights by framing security updates as essential to protecting the integrity and utility of devices consumers own. Vulnerabilities that persist after purchase effectively diminish the value and security of owned property.

ND
Article 22 Social Security
Low Advocacy

Content implicitly addresses social security and welfare by framing device security as part of the broader social infrastructure that enables safe participation in technology-dependent services (health, finance, etc.).

ND
Article 23 Work & Equal Pay

No observable engagement with work and employment rights.

ND
Article 24 Rest & Leisure

No observable engagement with rest and leisure.

ND
Article 26 Education
Medium Advocacy

Content implicitly addresses education by positioning the FCC labeling program as an information-based tool that educates consumers about security. Disclosure of update policies 'arms consumers with better information.'

ND
Article 27 Cultural Participation
Medium Advocacy

Content addresses participation in cultural and scientific advancement by advocating for policy that supports the security of connected devices. As technology becomes integrated into cultural and scientific work, secure infrastructure is essential.

ND
Article 28 Social & International Order
High Advocacy

Content directly advocates for a social and international order that protects the rights outlined in the UDHR. The FCC rulemaking and labeling program are proposed as institutional mechanisms to create such an order.

ND
Article 29 Duties to Community
Low Framing

Content implicitly addresses duties and limitations by acknowledging that manufacturers have responsibilities toward consumers and that those responsibilities should be enforceable. However, the focus is on rights rather than duties.

ND
Article 30 No Destruction of Rights
Low Framing

Content does not appear to misuse rights language to suppress rights. However, it does not explicitly protect against misuse of the labeling program or propose safeguards against regulatory capture.

Supplementary Signals
Epistemic Quality
0.73 medium claims
Sources
0.8
Evidence
0.7
Uncertainty
0.7
Purpose
0.8
Propaganda Flags
2 techniques detected
appeal to authority
Simington establishes credibility as an FCC Commissioner and mentions his legal advisor as a 'security-focused software engineer turned cybersecurity lawyer,' leveraging official authority to support the proposal.
appeal to fear
'serious vulnerabilities are common in IoT' and 'insecure protocols, exposed private keys' frame security risks as widespread dangers requiring immediate action.
Solution Orientation
0.72 solution oriented
Reader Agency
0.8
Emotional Tone
urgent
Valence
+0.3
Arousal
0.7
Dominance
0.6
Stakeholder Voice
0.50 4 perspectives
Speaks: governmentinstitutionindividuals
About: corporationindividualsconsumers
Temporal Framing
prospective short term
Geographic Scope
national
United States
Complexity
moderate medium jargon general
Transparency
0.50
✓ Author ✗ Conflicts
Event Timeline 20 events
2026-02-26 06:23 dlq Dead-lettered after 1 attempts: Ask HN: I’m an FCC Commissioner proposing regulation of IoT security updates - -
2026-02-26 06:16 dlq Dead-lettered after 1 attempts: Ask HN: I’m an FCC Commissioner proposing regulation of IoT security updates - -
2026-02-26 06:08 dlq Dead-lettered after 1 attempts: Ask HN: I’m an FCC Commissioner proposing regulation of IoT security updates - -
2026-02-26 06:03 credit_exhausted Credit balance too low, retrying in 333s - -
2026-02-26 06:00 dlq Dead-lettered after 1 attempts: Ask HN: I’m an FCC Commissioner proposing regulation of IoT security updates - -
2026-02-26 05:59 credit_exhausted Credit balance too low, retrying in 296s - -
2026-02-26 05:57 dlq Dead-lettered after 1 attempts: Ask HN: I’m an FCC Commissioner proposing regulation of IoT security updates - -
2026-02-26 05:56 credit_exhausted Credit balance too low, retrying in 333s - -
2026-02-26 05:53 dlq Dead-lettered after 1 attempts: Ask HN: I’m an FCC Commissioner proposing regulation of IoT security updates - -
2026-02-26 05:50 credit_exhausted Credit balance too low, retrying in 272s - -
2026-02-26 05:50 dlq Dead-lettered after 1 attempts: Ask HN: I’m an FCC Commissioner proposing regulation of IoT security updates - -
2026-02-26 05:47 dlq Dead-lettered after 1 attempts: Ask HN: I’m an FCC Commissioner proposing regulation of IoT security updates - -
2026-02-26 05:47 dlq Dead-lettered after 1 attempts: Ask HN: I’m an FCC Commissioner proposing regulation of IoT security updates - -
2026-02-26 05:44 credit_exhausted Credit balance too low, retrying in 352s - -
2026-02-26 05:44 dlq Dead-lettered after 1 attempts: Ask HN: I’m an FCC Commissioner proposing regulation of IoT security updates - -
2026-02-26 05:39 dlq Dead-lettered after 1 attempts: Ask HN: I’m an FCC Commissioner proposing regulation of IoT security updates - -
2026-02-26 05:37 credit_exhausted Credit balance too low, retrying in 268s - -
2026-02-26 05:35 credit_exhausted Credit balance too low, retrying in 330s - -
2026-02-26 05:34 credit_exhausted Credit balance too low, retrying in 262s - -
2026-02-26 05:31 dlq Dead-lettered after 1 attempts: Ask HN: I’m an FCC Commissioner proposing regulation of IoT security updates - -
About HRCB | By Right | HN Guidelines | HN FAQ | Source | UDHR | RSS
build 1686d6e+nio6 · deployed 2026-02-26 06:45 UTC · evaluated 2026-02-26 06:43:03 UTC