Close Menu
TechTost
  • AI
  • Apps
  • Crypto
  • Fintech
  • Hardware
  • Media & Entertainment
  • Security
  • Startups
  • Transportation
  • Venture
  • Recommended Essentials
What's Hot

Anodot hack leaves over a dozen compromised companies facing extortion

Uber and Nuro begin testing premium robotaxi service in San Francisco

Vercel CEO Guillermo Rauch signals IPO readiness as AI agents drive revenue

Facebook X (Twitter) Instagram
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer
Facebook X (Twitter) Instagram
TechTost
Subscribe Now
  • AI

    OpenAI has acquired AI personal finance startup Hiro

    14 April 2026

    Largest orbital computing cluster is open for business

    13 April 2026

    Anthropic restricts Mythos traffic to protect the Internet — or does Anthropic?

    12 April 2026

    Sam Altman responds to ‘inflammatory’ New Yorker article after his home was attacked

    12 April 2026

    Stalking victim sues OpenAI, claims ChatGPT fueled her abuser’s delusions and ignored her warnings

    11 April 2026
  • Apps

    Avec’s Tinder-style email app lets you swipe through your inbox

    14 April 2026

    Roblox introduces ‘Kids’ and ‘Select’ accounts for age-appropriate access to games and chats

    13 April 2026

    You can now edit your comments on Instagram

    13 April 2026

    Meta AI app climbs to No. 5 in App Store after release of Muse Spark

    12 April 2026

    StubHub to pay $10 million to settle FTC claims of ‘deceptive’ ticket pricing

    12 April 2026
  • Crypto

    British cryptographer Adam Back denies NYT report that he is Bitcoin creator Satoshi Nakamoto

    9 April 2026

    Hackers stole over $2.7 billion in crypto in 2025, data shows

    23 December 2025

    New report examines how David Sachs may benefit from Trump administration role

    1 December 2025

    Why Benchmark Made a Rare Crypto Bet on Trading App Fomo, with $17M Series A

    6 November 2025

    Solana co-founder Anatoly Yakovenko is a big fan of agentic coding

    30 October 2025
  • Fintech

    Cash app launches ‘pay later’ feature for P2P transfers

    3 April 2026

    Doss raises $55 million for AI inventory management that connects to ERP

    24 March 2026

    Despite stiff competition, Kalshi, Polymarket CEOs back $35m VC fund projections

    23 March 2026

    Amid legal turmoil, Kalshi is temporarily banned in Nevada

    20 March 2026

    Nominations for the Startup Battlefield 200 are still open

    19 March 2026
  • Hardware

    Amazon is ending support for older Kindle devices

    9 April 2026

    Intel signs Elon Musk’s Terafab chip project

    8 April 2026

    The Xiaomi 17 Ultra has some impressive extras that make taking photos really fun

    6 April 2026

    In Japan, the robot doesn’t come for your job. fills the one no one wants

    6 April 2026

    Peter Thiel’s big bet on solar-powered cow collars

    5 April 2026
  • Media & Entertainment

    X says he’s reducing payouts to clickbait accounts

    12 April 2026

    TechCrunch is headed to Tokyo — and it’s bringing the Startup Battlefield with it

    10 April 2026

    Spotify now allows everyone to turn off videos in its app

    9 April 2026

    As YouTube expands into TV, it sees more interactive video across all formats

    9 April 2026

    Tubi is the first streamer to launch a native app on ChatGPT

    8 April 2026
  • Security

    Anodot hack leaves over a dozen compromised companies facing extortion

    14 April 2026

    Booking.com confirms that hackers accessed customer data

    13 April 2026

    Convicted spyware maker Bryan Fleming avoids jail time on conviction

    12 April 2026

    The Trump administration plans to cut the cybersecurity agency’s budget by $700 million

    11 April 2026

    Russian government hackers broke into thousands of home routers to steal passwords

    11 April 2026
  • Startups

    Walmart-owned Flipkart, Amazon are squeezing India’s e-commerce startups

    12 April 2026

    This founder helped build SpaceX’s most powerful rocket engine. Now he’s building a “fighter for orbit.”

    12 April 2026

    Sierra’s Bret Taylor says the era of button-clicking is over

    11 April 2026

    After the data breach, the $10 billion startup Mercor is one month old

    11 April 2026

    What founders can learn from Anjuna’s layoffs and recovery

    10 April 2026
  • Transportation

    Uber and Nuro begin testing premium robotaxi service in San Francisco

    14 April 2026

    Slate Auto raises $650 million to fund its affordable EV truck plans

    13 April 2026

    TechCrunch Mobility: Who’s chasing all the self-driving talent?

    13 April 2026

    Slate Auto: Everything you need to know about the Bezos-backed EV startup

    12 April 2026

    Battery recycling company Ascend Elements files for bankruptcy

    11 April 2026
  • Venture

    Vercel CEO Guillermo Rauch signals IPO readiness as AI agents drive revenue

    14 April 2026

    Nvidia-backed SiFive hits $3.65 billion valuation for open AI chips

    11 April 2026

    How to make the Startup Battlefield Top 20 — and what each company gets regardless

    10 April 2026

    Collide Capital Raises $95M to Back Future-of-Work Fintech Startups

    9 April 2026

    VC Eclipse has a new $1.3 billion fund to back — and build — “natural AI” startups

    8 April 2026
  • Recommended Essentials
TechTost
You are at:Home»Security»The way in which your solar terrace became a matter of national security
Security

The way in which your solar terrace became a matter of national security

techtost.comBy techtost.com16 August 202507 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Email
The Way In Which Your Solar Terrace Became A Matter
Share
Facebook Twitter LinkedIn Pinterest Email

James Showalter describes a pretty specific, if not completely unlikely nightmare scenario. Someone drives your home, breaks the Wi-Fi password and then begins to confuse the solar converter placed next to your garage-this unobtrusive gray box that converts the immediate stream from the panels of the top floor on your alternate stream.

“You have to have a solar stalker” to play this scenario, says the showalter, describing the kind of person who should naturally appear on your way with both technical know -how and motivation to lose the energy system in your home.

Showalter, its chief executive EG4 ElectronicsA company based in Sulfur Springs, Texas, does not particularly consider this sequence of events. Still, this is why his company last week was in the spotlight when Cybersecurity’s CISA service Published consulting Security vulnerability details of EG4 solar converters. The defects, as Cisa noted, could allow an invader to access the same network as an influenced converter and its serial number for data tracking, install malicious firmware or understand control of the entire system.

For the about 55,000 customers with the EG4 Inverter model, the episode probably felt like a worrying introduction to a device that does not understand little. What they are learning is that modern solar inverters are no longer mere power inverters. They now serve as the backbone of energy facilities at home, watched the performance, communicating with utilities and, when excessive power, supplying it back to the network.

Many of them happened without people observing. “No one knew what the solar inverter was five years ago,” observes Justin Pascale, a main adviser to Dragos, a cyberspace company specializing in industrial systems. “Now we’re talking about it at national and international level.”

Safety deficiencies and customer complaints

Some of the numbers emphasize the extent to which individual houses in the US become tiny power stations. According to US Energy Information Administration, small-scale solar installations-mostly inhabited-increased More than five times Between 2014 and 2022. What was once the province of climate supporters and the first adopted became more common due to the decline of costs, government incentives and increasing awareness of climate change.

Each solar installation adds another node to an expanding network of interconnected devices, each who contributes to energy independence, but also to become a potential entry point for someone with malicious intent.

TechCrunch event

Francisco
|
27-29 October 2025

When pressed on his company’s security standards, Showalter recognizes his weaknesses, but also diverts. “This is not an eg4 problem,” he says. “This is a problem throughout the industry.” Over a zoom call and later, to this author’s inbox, produced a 14 -page report Flood 88 Solar Energy vulnerability notifications in commercial and residential applications since 2019.

Not all of its customers – some of whom Got on Reddit To protest – they are sympathetic, especially as CISA’s counseling revealed fundamental design defects: Communication between follow -up and converter applications appeared in non -encrypted simple text, firmware updates that had no integrity controls and elementary controls.

“These were fundamental security,” says one company customer who asked to speak anonymously. “Adding an injury to injury,” this person continues, “EG4 didn’t even bother to alert me or offer proposed measurements.”

Asked why EG4 did not immediately alert customers when Cisa arrived at the company, Showalter calls it a moment “alive and learning”.

‘Because we are so close [to addressing CISA’s concerns] And it’s such a positive relationship with Cisa, we were going to get the “project” button and then advise people, so we’re not in the middle of the cake that is baked, “the showalter says.

TechCrunch arrived at Cisa earlier this week for more information. The organization has not answered. In his advice on EG4, CISA states that “no well -known public exploitation specifically aimed at these vulnerabilities has been mentioned in CISA at the moment”.

Connections with China cause security concerns

While not related, the timetable of the EG4 public relations crisis coincides with wider concerns about the safety of the supply chain of renewable energy equipment.

Earlier this year, US energy officials began re -evaluating the dangers created by devices made in China after discovering unexplained communication equipment within some converters and batteries. According to Reuters surveyCell radios without paper and other communication devices were found in equipment by many Chinese suppliers – accessories that had not appeared on official material lists.

This reported discovery bears a certain weight, given China’s sovereignty in solar production. Reuters’s same story noted that Huawei is the largest supplier in the world, representing 29% of missions worldwide in 2022, followed by Chinese classmates Sungrow and Ginlong Solis. Some 200 GW of European solar energy capacity It is associated with converters manufactured in China, which is about equivalent to more than 200 nuclear stations.

The geopolitical consequences have not escaped the notice. Lithuania passed a law Excluding remote Chinese access to solar, wind and battery installations over 100 kW, effectively limiting the use of Chinese converters. Showalter says his company responds to customer concerns, starting to move away from Chinese suppliers and to components made by companies elsewhere, including Germany.

However, the vulnerabilities described in the EG4 systems raise questions that extend beyond the practices of the single company or where its ingredients go. The US Standard Service NIST warns That “if you control a fairly large number of solar home converters and you are doing something bad, this could have a devastating impact on the network for a prolonged period of time.”

The good news (if any) is that while theoretically possible, this scenario faces many practical restrictions.

Pascale, who works with utility -scale solar facilities, notes that household inverters mainly serve two functions: converting power from directly to alternating current and facilitating the connection back to the network. A mass attack would at the same time require the huge number of individual houses. (These attacks are not impossible, but they are more likely to entail the targeting of the manufacturers themselves, some of whom have remote access to their customers’ solar converters, proved by security researchers last year.)

The regulatory framework governing the larger facilities is now not expanding to residential systems. The Standards of Critical Infrastructure of North America Electric Reliability power Only in larger facilities that produce 75 megawatts or more, such as solar farms.

Because housing facilities fall so much below these thresholds, they operate in a regulatory gray zone where cyberspace standards remain proposals rather than demands.

But the end result is that the safety of thousands of small facilities depends largely on the discretion of individual manufacturers operating in a regulatory gap.

On the issue of non -encrypted data transmission, for example, which is one reason that EG4 has received that the CISA slap, Pascale notes that in functional utility environments, simple text transmission is common and sometimes encouraged for network monitoring purposes.

“When you look at encryption in a business environment, it is not allowed,” he explains. “But when you look at a business environment, most things are transmitted to simple text.”

In another way, real concern is not an immediate threat to individual homeowners. Instead it is linked to the total vulnerability of a rapidly growing network. As the energy grid is increasingly distributed, with the power flowing from millions of small sources and not dozens of large, the attack surface is expanding. Each inverter represents a potential pressure point in a system that was never designed to accommodate this level of complexity.

Showalter has embraced CISA’s intervention as what he calls “upgrade of trust” – an opportunity to differentiate his company in a full market. He says that since June, the EG4 has worked with the organization to cope with the defined vulnerabilities, reducing an initial list of 10 concerns in three remaining elements that the company expects to resolve by October. The process included updating the firmware transmission protocols, the application of identity verification for technical support calls and the redesign of authentication processes.

But for those who like an anonymous EG4 client who spoke with frustration about the company’s response, the episode highlights the strange position that solar adoptors are.

cyberspace matter National National security security solar terrace
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleKyte, who was invoiced as “Hertz’s best competitor”, closes
Next Article Apple Blood Oxygen Watch Returns to Apple’s Last Watches
bhanuprakash.cg
techtost.com
  • Website

Related Posts

Anodot hack leaves over a dozen compromised companies facing extortion

14 April 2026

Booking.com confirms that hackers accessed customer data

13 April 2026

Convicted spyware maker Bryan Fleming avoids jail time on conviction

12 April 2026
Add A Comment

Leave A Reply Cancel Reply

Don't Miss

Anodot hack leaves over a dozen compromised companies facing extortion

14 April 2026

Uber and Nuro begin testing premium robotaxi service in San Francisco

14 April 2026

Vercel CEO Guillermo Rauch signals IPO readiness as AI agents drive revenue

14 April 2026
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Fintech

Cash app launches ‘pay later’ feature for P2P transfers

3 April 2026

Doss raises $55 million for AI inventory management that connects to ERP

24 March 2026

Despite stiff competition, Kalshi, Polymarket CEOs back $35m VC fund projections

23 March 2026
Startups

Walmart-owned Flipkart, Amazon are squeezing India’s e-commerce startups

This founder helped build SpaceX’s most powerful rocket engine. Now he’s building a “fighter for orbit.”

Sierra’s Bret Taylor says the era of button-clicking is over

© 2026 TechTost. All Rights Reserved
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer

Type above and press Enter to search. Press Esc to cancel.