Close Menu
TechTost
  • AI
  • Apps
  • Crypto
  • Fintech
  • Hardware
  • Media & Entertainment
  • Security
  • Startups
  • Transportation
  • Venture
  • Recommended Essentials
What's Hot

Hackers steal student data during breach at education tech giant Instructure

Nuro gets driverless test license ahead of Uber’s robotaxi service launch

ElevenLabs lists BlackRock, Jamie Foxx and Eva Longoria as new investors

Facebook X (Twitter) Instagram
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer
Facebook X (Twitter) Instagram
TechTost
Subscribe Now
  • AI

    SAP bets $1.16 billion on 18-month-old German AI lab and says yes to NemoClaw

    6 May 2026

    ElevenLabs lists BlackRock, Jamie Foxx and Longoria as new investors

    5 May 2026

    OpenAI host Cerebras is on track for a major IPO

    5 May 2026

    In Harvard study, AI provided more accurate emergency room diagnoses than two human doctors

    4 May 2026

    ‘That’s cool’ creator says AI startup stole his art

    4 May 2026
  • Apps

    Bumble’s paying users are slipping as it bets on an overhaul later this year

    6 May 2026

    Meta will use artificial intelligence to analyze height and bone structure to detect whether users are underage

    5 May 2026

    Image AI models are now driving app development, surpassing chatbot upgrades

    5 May 2026

    5 days to get 50% off a second Disrupt 2026 pass

    4 May 2026

    The Jack Dorsey-backed Vine reboot goes public

    4 May 2026
  • Crypto

    As crypto cools, a16z crypto raises $2.2 billion in capital

    6 May 2026

    Coinbase to lay off 14% of staff as part of broader restructuring

    5 May 2026

    British cryptographer Adam Back denies NYT report that he is Bitcoin creator Satoshi Nakamoto

    9 April 2026

    Hackers stole over $2.7 billion in crypto in 2025, data shows

    23 December 2025

    New report examines how David Sachs may benefit from Trump administration role

    1 December 2025
  • Fintech

    PayPal says it’s “becoming a tech company again” — that’s AI

    6 May 2026

    Stripe introduces Link, a digital wallet that autonomous AI agents can also use

    1 May 2026

    Y Combinator alum Skio sells for $105 million in cash, raised only $8 million, founder says

    1 May 2026

    Amazon, Meta join the fight to end Google Pay and PhonePe’s dominance in India

    30 April 2026

    Steve Ballmer slams founder he backed, who pleaded guilty to fraud: ‘I was cheated and I feel stupid’

    25 April 2026
  • Hardware

    Altara secures $7 million to bridge the data gap slowing the natural sciences

    6 May 2026

    This tiny, magnetic e-reader could keep you from doomscrolling

    4 May 2026

    Apple surprised by AI-driven demand for Macs

    1 May 2026

    As Tim Cook departs, Apple hits record sales — but chip shortage looms

    1 May 2026

    More Gemini features are coming to Google TV

    30 April 2026
  • Media & Entertainment

    Netflix delays Greta Gerwig’s ‘Narnia’ for big theatrical push to 2027

    2 May 2026

    Roku’s $3 streaming service Howdy hits 1 million subscribers, per recent report

    29 April 2026

    Australia forces Big Tech companies to pay for news or face 2.25% tax.

    28 April 2026

    India’s app market is booming — but global platforms are raking in most of the profits

    23 April 2026

    YouTube extends its AI similarity detection technology to celebrities

    21 April 2026
  • Security

    Hackers steal student data during breach at education tech giant Instructure

    6 May 2026

    Kaspersky Suspects Chinese Hackers Put Backdoor in Daemon Tools in ‘Broad’ Attack

    5 May 2026

    The US government is warning of a serious CopyFail bug affecting major versions of Linux

    5 May 2026

    Hackers are still exploiting the cPanel bug to gain control of thousands of websites

    4 May 2026

    Ubuntu services were affected by outages after the DDoS attack

    1 May 2026
  • Startups

    India’s first GenAI unicorn shifts to cloud services as AI model ambitions face reality

    5 May 2026

    FDA Approval, Fundraising and the Reality of Building Healthcare According to BioticsAI Founder

    1 May 2026

    Legal AI startup Legora hits $5.6 billion valuation, and its battle with Harvey just got hotter

    1 May 2026

    Bill Gurley, Jack Altman back startup Pursuit, which helps companies sell to the government

    30 April 2026

    BCI startup Neurable wants to license ‘mind reading’ technology to wearable consumer devices

    29 April 2026
  • Transportation

    Nuro gets driverless test license ahead of Uber’s robotaxi service launch

    6 May 2026

    Moment Energy raises $40M to meet ‘infinite energy demand’ with EV batteries

    5 May 2026

    Ouster’s new color lidar is coming to replace cameras

    4 May 2026

    TechCrunch Mobility: How do you ticket a robotaxi?

    4 May 2026

    Uber taps Hertz to clean, charge and fix Lucid Motors’ robotaxi

    3 May 2026
  • Venture

    ElevenLabs lists BlackRock, Jamie Foxx and Eva Longoria as new investors

    6 May 2026

    Get 50% off a second Disrupt 2026 pass to bid more, faster

    5 May 2026

    Nicolas Sauvage bets on the boring parts of AI

    4 May 2026

    Musely secures $360 million from General Catalyst without giving up equity

    2 May 2026

    The climate tech IPO window could finally open

    30 April 2026
  • Recommended Essentials
TechTost
You are at:Home»Security»The way in which your solar terrace became a matter of national security
Security

The way in which your solar terrace became a matter of national security

techtost.comBy techtost.com16 August 202507 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Email
The Way In Which Your Solar Terrace Became A Matter
Share
Facebook Twitter LinkedIn Pinterest Email

James Showalter describes a pretty specific, if not completely unlikely nightmare scenario. Someone drives your home, breaks the Wi-Fi password and then begins to confuse the solar converter placed next to your garage-this unobtrusive gray box that converts the immediate stream from the panels of the top floor on your alternate stream.

“You have to have a solar stalker” to play this scenario, says the showalter, describing the kind of person who should naturally appear on your way with both technical know -how and motivation to lose the energy system in your home.

Showalter, its chief executive EG4 ElectronicsA company based in Sulfur Springs, Texas, does not particularly consider this sequence of events. Still, this is why his company last week was in the spotlight when Cybersecurity’s CISA service Published consulting Security vulnerability details of EG4 solar converters. The defects, as Cisa noted, could allow an invader to access the same network as an influenced converter and its serial number for data tracking, install malicious firmware or understand control of the entire system.

For the about 55,000 customers with the EG4 Inverter model, the episode probably felt like a worrying introduction to a device that does not understand little. What they are learning is that modern solar inverters are no longer mere power inverters. They now serve as the backbone of energy facilities at home, watched the performance, communicating with utilities and, when excessive power, supplying it back to the network.

Many of them happened without people observing. “No one knew what the solar inverter was five years ago,” observes Justin Pascale, a main adviser to Dragos, a cyberspace company specializing in industrial systems. “Now we’re talking about it at national and international level.”

Safety deficiencies and customer complaints

Some of the numbers emphasize the extent to which individual houses in the US become tiny power stations. According to US Energy Information Administration, small-scale solar installations-mostly inhabited-increased More than five times Between 2014 and 2022. What was once the province of climate supporters and the first adopted became more common due to the decline of costs, government incentives and increasing awareness of climate change.

Each solar installation adds another node to an expanding network of interconnected devices, each who contributes to energy independence, but also to become a potential entry point for someone with malicious intent.

TechCrunch event

Francisco
|
27-29 October 2025

When pressed on his company’s security standards, Showalter recognizes his weaknesses, but also diverts. “This is not an eg4 problem,” he says. “This is a problem throughout the industry.” Over a zoom call and later, to this author’s inbox, produced a 14 -page report Flood 88 Solar Energy vulnerability notifications in commercial and residential applications since 2019.

Not all of its customers – some of whom Got on Reddit To protest – they are sympathetic, especially as CISA’s counseling revealed fundamental design defects: Communication between follow -up and converter applications appeared in non -encrypted simple text, firmware updates that had no integrity controls and elementary controls.

“These were fundamental security,” says one company customer who asked to speak anonymously. “Adding an injury to injury,” this person continues, “EG4 didn’t even bother to alert me or offer proposed measurements.”

Asked why EG4 did not immediately alert customers when Cisa arrived at the company, Showalter calls it a moment “alive and learning”.

‘Because we are so close [to addressing CISA’s concerns] And it’s such a positive relationship with Cisa, we were going to get the “project” button and then advise people, so we’re not in the middle of the cake that is baked, “the showalter says.

TechCrunch arrived at Cisa earlier this week for more information. The organization has not answered. In his advice on EG4, CISA states that “no well -known public exploitation specifically aimed at these vulnerabilities has been mentioned in CISA at the moment”.

Connections with China cause security concerns

While not related, the timetable of the EG4 public relations crisis coincides with wider concerns about the safety of the supply chain of renewable energy equipment.

Earlier this year, US energy officials began re -evaluating the dangers created by devices made in China after discovering unexplained communication equipment within some converters and batteries. According to Reuters surveyCell radios without paper and other communication devices were found in equipment by many Chinese suppliers – accessories that had not appeared on official material lists.

This reported discovery bears a certain weight, given China’s sovereignty in solar production. Reuters’s same story noted that Huawei is the largest supplier in the world, representing 29% of missions worldwide in 2022, followed by Chinese classmates Sungrow and Ginlong Solis. Some 200 GW of European solar energy capacity It is associated with converters manufactured in China, which is about equivalent to more than 200 nuclear stations.

The geopolitical consequences have not escaped the notice. Lithuania passed a law Excluding remote Chinese access to solar, wind and battery installations over 100 kW, effectively limiting the use of Chinese converters. Showalter says his company responds to customer concerns, starting to move away from Chinese suppliers and to components made by companies elsewhere, including Germany.

However, the vulnerabilities described in the EG4 systems raise questions that extend beyond the practices of the single company or where its ingredients go. The US Standard Service NIST warns That “if you control a fairly large number of solar home converters and you are doing something bad, this could have a devastating impact on the network for a prolonged period of time.”

The good news (if any) is that while theoretically possible, this scenario faces many practical restrictions.

Pascale, who works with utility -scale solar facilities, notes that household inverters mainly serve two functions: converting power from directly to alternating current and facilitating the connection back to the network. A mass attack would at the same time require the huge number of individual houses. (These attacks are not impossible, but they are more likely to entail the targeting of the manufacturers themselves, some of whom have remote access to their customers’ solar converters, proved by security researchers last year.)

The regulatory framework governing the larger facilities is now not expanding to residential systems. The Standards of Critical Infrastructure of North America Electric Reliability power Only in larger facilities that produce 75 megawatts or more, such as solar farms.

Because housing facilities fall so much below these thresholds, they operate in a regulatory gray zone where cyberspace standards remain proposals rather than demands.

But the end result is that the safety of thousands of small facilities depends largely on the discretion of individual manufacturers operating in a regulatory gap.

On the issue of non -encrypted data transmission, for example, which is one reason that EG4 has received that the CISA slap, Pascale notes that in functional utility environments, simple text transmission is common and sometimes encouraged for network monitoring purposes.

“When you look at encryption in a business environment, it is not allowed,” he explains. “But when you look at a business environment, most things are transmitted to simple text.”

In another way, real concern is not an immediate threat to individual homeowners. Instead it is linked to the total vulnerability of a rapidly growing network. As the energy grid is increasingly distributed, with the power flowing from millions of small sources and not dozens of large, the attack surface is expanding. Each inverter represents a potential pressure point in a system that was never designed to accommodate this level of complexity.

Showalter has embraced CISA’s intervention as what he calls “upgrade of trust” – an opportunity to differentiate his company in a full market. He says that since June, the EG4 has worked with the organization to cope with the defined vulnerabilities, reducing an initial list of 10 concerns in three remaining elements that the company expects to resolve by October. The process included updating the firmware transmission protocols, the application of identity verification for technical support calls and the redesign of authentication processes.

But for those who like an anonymous EG4 client who spoke with frustration about the company’s response, the episode highlights the strange position that solar adoptors are.

cyberspace matter National National security security solar terrace
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleKyte, who was invoiced as “Hertz’s best competitor”, closes
Next Article Apple Blood Oxygen Watch Returns to Apple’s Last Watches
bhanuprakash.cg
techtost.com
  • Website

Related Posts

Hackers steal student data during breach at education tech giant Instructure

6 May 2026

Kaspersky Suspects Chinese Hackers Put Backdoor in Daemon Tools in ‘Broad’ Attack

5 May 2026

The US government is warning of a serious CopyFail bug affecting major versions of Linux

5 May 2026
Add A Comment

Leave A Reply Cancel Reply

Don't Miss

Hackers steal student data during breach at education tech giant Instructure

6 May 2026

Nuro gets driverless test license ahead of Uber’s robotaxi service launch

6 May 2026

ElevenLabs lists BlackRock, Jamie Foxx and Eva Longoria as new investors

6 May 2026
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Fintech

PayPal says it’s “becoming a tech company again” — that’s AI

6 May 2026

Stripe introduces Link, a digital wallet that autonomous AI agents can also use

1 May 2026

Y Combinator alum Skio sells for $105 million in cash, raised only $8 million, founder says

1 May 2026
Startups

India’s first GenAI unicorn shifts to cloud services as AI model ambitions face reality

FDA Approval, Fundraising and the Reality of Building Healthcare According to BioticsAI Founder

Legal AI startup Legora hits $5.6 billion valuation, and its battle with Harvey just got hotter

© 2026 TechTost. All Rights Reserved
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer

Type above and press Enter to search. Press Esc to cancel.