Close Menu
TechTost
  • AI
  • Apps
  • Crypto
  • Fintech
  • Hardware
  • Media & Entertainment
  • Security
  • Startups
  • Transportation
  • Venture
  • Recommended Essentials
What's Hot

Meet the MacBook Neo, Apple’s colorful answer to the Chromebook, starting at $599

Decagon Completes First Auction at $4.5B Value

Anthropic CEO Dario Amodei calls OpenAI’s messages about military deal ‘outright lies’, report says

Facebook X (Twitter) Instagram
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer
Facebook X (Twitter) Instagram
TechTost
Subscribe Now
  • AI

    Anthropic CEO Dario Amodei calls OpenAI’s messages about military deal ‘outright lies’, report says

    5 March 2026

    Who needs data centers in space when they can float on the high seas?

    4 March 2026

    Why AI startups are selling the same capital at two different prices

    4 March 2026

    Users are abandoning ChatGPT for Claude — see how you can make the switch

    3 March 2026

    No one has a good plan for how AI companies should work with government

    3 March 2026
  • Apps

    Google settles with Epic Games, cuts Play Store commissions to 20%

    5 March 2026

    Android users can now share tracking tag information with airlines to help track lost luggage

    4 March 2026

    ChatGPT’s new GPT-5.3 Instant model will stop telling you to calm down

    4 March 2026

    X adds “Paid Partnership” tags so creators can skip hashtags

    3 March 2026

    ChatGPT uninstalls increased 295% after DoD settlement

    3 March 2026
  • Crypto

    Hackers stole over $2.7 billion in crypto in 2025, data shows

    23 December 2025

    New report examines how David Sachs may benefit from Trump administration role

    1 December 2025

    Why Benchmark Made a Rare Crypto Bet on Trading App Fomo, with $17M Series A

    6 November 2025

    Solana co-founder Anatoly Yakovenko is a big fan of agentic coding

    30 October 2025

    MoviePass opens Mogul fantasy league game to the public

    29 October 2025
  • Fintech

    X taps William Shatner to give invitations to his payment service, X Money

    4 March 2026

    Stripe wants to turn your AI costs into a profit center

    3 March 2026

    3 days left: Save up to $680 on your ticket to Disrupt 2026

    25 February 2026

    More startups surpass $10M ARR in 3 months than ever before

    24 February 2026

    Stripe, PayPal Ventures Bet on India’s Xflow to Fix Cross-Border B2B Payments

    24 February 2026
  • Hardware

    Meet the MacBook Neo, Apple’s colorful answer to the Chromebook, starting at $599

    5 March 2026

    MacBook Neo, iPhone 17e and everything else Apple announced this week

    4 March 2026

    Apple’s new Studio monitors come with Thunderbolt 5

    4 March 2026

    Apple unveils new MacBook Air and MacBook Pro with M5

    3 March 2026

    Apple is packing the smarts into its new $599 iPhone 17e

    3 March 2026
  • Media & Entertainment

    Audible launches cheaper ‘Standard’ subscription plan, challenging Spotify

    3 March 2026

    Paramount+ and HBO Max will merge into one streaming service after the WBD deal closes

    2 March 2026

    What you need to know about Warner Bros.’ landmark Discovery sale

    1 March 2026

    Apple and Netflix team up to stream Formula 1 Canadian Grand Prix

    27 February 2026

    Netflix pulls out of bid for Warner Bros. Discovery, giving studios, HBO and CNN to Ellison-owned Paramount

    27 February 2026
  • Security

    Hackers and internet outages hit Iran amid US airstrikes

    4 March 2026

    A suite of government hacking tools targeting iPhones is now being used by cybercriminals

    4 March 2026

    Hacked Traffic Cameras and Hacked TVs: How Cyber ​​Operations Supported the War on Iran

    3 March 2026

    A new app alerts you if someone nearby is wearing smart glasses

    3 March 2026

    Hacktivists claim to have breached Homeland Security to release ICE contract data

    2 March 2026
  • Startups

    Decagon Completes First Auction at $4.5B Value

    5 March 2026

    MyFitnessPal has acquired Cal AI, the calorie app built by teenagers

    4 March 2026

    Fig Security emerges from stealth with $38 million to help security teams deal with change

    4 March 2026

    A married founding duo’s company, 14.ai, is replacing customer support teams at startups

    3 March 2026

    India’s Pronto takes home help official as valuation grows 8x in less than a year

    3 March 2026
  • Transportation

    Self-driving truck startup Einride raises $113M PIPE ahead of public debut

    27 February 2026

    It’s time to pull the plug on plug-in hybrids

    26 February 2026

    Harbinger acquires self-driving company Phantom AI

    26 February 2026

    Waymo robotaxis are now operating in 10 US cities

    25 February 2026

    Self-driving tech startup Wayve raises $1.2 billion from Nvidia, Uber and three automakers

    25 February 2026
  • Venture

    The candidate that Silicon Valley built is now the one they want to tear down

    3 March 2026

    Parade’s Cami Tellez Announces New Creator Economy Marketing Platform, $4M Funding

    3 March 2026

    SaaS in, SaaS out: Here’s what’s driving the SaaSpocalypse

    2 March 2026

    Investors are shedding what they are no longer looking for in AI SaaS companies

    2 March 2026

    After Zomato, Deepinder Goyal is back with a $54 million brain-monitoring bet

    28 February 2026
  • Recommended Essentials
TechTost
You are at:Home»Security»The way in which your solar terrace became a matter of national security
Security

The way in which your solar terrace became a matter of national security

techtost.comBy techtost.com16 August 202507 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Email
The Way In Which Your Solar Terrace Became A Matter
Share
Facebook Twitter LinkedIn Pinterest Email

James Showalter describes a pretty specific, if not completely unlikely nightmare scenario. Someone drives your home, breaks the Wi-Fi password and then begins to confuse the solar converter placed next to your garage-this unobtrusive gray box that converts the immediate stream from the panels of the top floor on your alternate stream.

“You have to have a solar stalker” to play this scenario, says the showalter, describing the kind of person who should naturally appear on your way with both technical know -how and motivation to lose the energy system in your home.

Showalter, its chief executive EG4 ElectronicsA company based in Sulfur Springs, Texas, does not particularly consider this sequence of events. Still, this is why his company last week was in the spotlight when Cybersecurity’s CISA service Published consulting Security vulnerability details of EG4 solar converters. The defects, as Cisa noted, could allow an invader to access the same network as an influenced converter and its serial number for data tracking, install malicious firmware or understand control of the entire system.

For the about 55,000 customers with the EG4 Inverter model, the episode probably felt like a worrying introduction to a device that does not understand little. What they are learning is that modern solar inverters are no longer mere power inverters. They now serve as the backbone of energy facilities at home, watched the performance, communicating with utilities and, when excessive power, supplying it back to the network.

Many of them happened without people observing. “No one knew what the solar inverter was five years ago,” observes Justin Pascale, a main adviser to Dragos, a cyberspace company specializing in industrial systems. “Now we’re talking about it at national and international level.”

Safety deficiencies and customer complaints

Some of the numbers emphasize the extent to which individual houses in the US become tiny power stations. According to US Energy Information Administration, small-scale solar installations-mostly inhabited-increased More than five times Between 2014 and 2022. What was once the province of climate supporters and the first adopted became more common due to the decline of costs, government incentives and increasing awareness of climate change.

Each solar installation adds another node to an expanding network of interconnected devices, each who contributes to energy independence, but also to become a potential entry point for someone with malicious intent.

TechCrunch event

Francisco
|
27-29 October 2025

When pressed on his company’s security standards, Showalter recognizes his weaknesses, but also diverts. “This is not an eg4 problem,” he says. “This is a problem throughout the industry.” Over a zoom call and later, to this author’s inbox, produced a 14 -page report Flood 88 Solar Energy vulnerability notifications in commercial and residential applications since 2019.

Not all of its customers – some of whom Got on Reddit To protest – they are sympathetic, especially as CISA’s counseling revealed fundamental design defects: Communication between follow -up and converter applications appeared in non -encrypted simple text, firmware updates that had no integrity controls and elementary controls.

“These were fundamental security,” says one company customer who asked to speak anonymously. “Adding an injury to injury,” this person continues, “EG4 didn’t even bother to alert me or offer proposed measurements.”

Asked why EG4 did not immediately alert customers when Cisa arrived at the company, Showalter calls it a moment “alive and learning”.

‘Because we are so close [to addressing CISA’s concerns] And it’s such a positive relationship with Cisa, we were going to get the “project” button and then advise people, so we’re not in the middle of the cake that is baked, “the showalter says.

TechCrunch arrived at Cisa earlier this week for more information. The organization has not answered. In his advice on EG4, CISA states that “no well -known public exploitation specifically aimed at these vulnerabilities has been mentioned in CISA at the moment”.

Connections with China cause security concerns

While not related, the timetable of the EG4 public relations crisis coincides with wider concerns about the safety of the supply chain of renewable energy equipment.

Earlier this year, US energy officials began re -evaluating the dangers created by devices made in China after discovering unexplained communication equipment within some converters and batteries. According to Reuters surveyCell radios without paper and other communication devices were found in equipment by many Chinese suppliers – accessories that had not appeared on official material lists.

This reported discovery bears a certain weight, given China’s sovereignty in solar production. Reuters’s same story noted that Huawei is the largest supplier in the world, representing 29% of missions worldwide in 2022, followed by Chinese classmates Sungrow and Ginlong Solis. Some 200 GW of European solar energy capacity It is associated with converters manufactured in China, which is about equivalent to more than 200 nuclear stations.

The geopolitical consequences have not escaped the notice. Lithuania passed a law Excluding remote Chinese access to solar, wind and battery installations over 100 kW, effectively limiting the use of Chinese converters. Showalter says his company responds to customer concerns, starting to move away from Chinese suppliers and to components made by companies elsewhere, including Germany.

However, the vulnerabilities described in the EG4 systems raise questions that extend beyond the practices of the single company or where its ingredients go. The US Standard Service NIST warns That “if you control a fairly large number of solar home converters and you are doing something bad, this could have a devastating impact on the network for a prolonged period of time.”

The good news (if any) is that while theoretically possible, this scenario faces many practical restrictions.

Pascale, who works with utility -scale solar facilities, notes that household inverters mainly serve two functions: converting power from directly to alternating current and facilitating the connection back to the network. A mass attack would at the same time require the huge number of individual houses. (These attacks are not impossible, but they are more likely to entail the targeting of the manufacturers themselves, some of whom have remote access to their customers’ solar converters, proved by security researchers last year.)

The regulatory framework governing the larger facilities is now not expanding to residential systems. The Standards of Critical Infrastructure of North America Electric Reliability power Only in larger facilities that produce 75 megawatts or more, such as solar farms.

Because housing facilities fall so much below these thresholds, they operate in a regulatory gray zone where cyberspace standards remain proposals rather than demands.

But the end result is that the safety of thousands of small facilities depends largely on the discretion of individual manufacturers operating in a regulatory gap.

On the issue of non -encrypted data transmission, for example, which is one reason that EG4 has received that the CISA slap, Pascale notes that in functional utility environments, simple text transmission is common and sometimes encouraged for network monitoring purposes.

“When you look at encryption in a business environment, it is not allowed,” he explains. “But when you look at a business environment, most things are transmitted to simple text.”

In another way, real concern is not an immediate threat to individual homeowners. Instead it is linked to the total vulnerability of a rapidly growing network. As the energy grid is increasingly distributed, with the power flowing from millions of small sources and not dozens of large, the attack surface is expanding. Each inverter represents a potential pressure point in a system that was never designed to accommodate this level of complexity.

Showalter has embraced CISA’s intervention as what he calls “upgrade of trust” – an opportunity to differentiate his company in a full market. He says that since June, the EG4 has worked with the organization to cope with the defined vulnerabilities, reducing an initial list of 10 concerns in three remaining elements that the company expects to resolve by October. The process included updating the firmware transmission protocols, the application of identity verification for technical support calls and the redesign of authentication processes.

But for those who like an anonymous EG4 client who spoke with frustration about the company’s response, the episode highlights the strange position that solar adoptors are.

cyberspace matter National National security security solar terrace
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleKyte, who was invoiced as “Hertz’s best competitor”, closes
Next Article Apple Blood Oxygen Watch Returns to Apple’s Last Watches
bhanuprakash.cg
techtost.com
  • Website

Related Posts

Hackers and internet outages hit Iran amid US airstrikes

4 March 2026

A suite of government hacking tools targeting iPhones is now being used by cybercriminals

4 March 2026

Fig Security emerges from stealth with $38 million to help security teams deal with change

4 March 2026
Add A Comment

Leave A Reply Cancel Reply

Don't Miss

Meet the MacBook Neo, Apple’s colorful answer to the Chromebook, starting at $599

5 March 2026

Decagon Completes First Auction at $4.5B Value

5 March 2026

Anthropic CEO Dario Amodei calls OpenAI’s messages about military deal ‘outright lies’, report says

5 March 2026
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Fintech

X taps William Shatner to give invitations to his payment service, X Money

4 March 2026

Stripe wants to turn your AI costs into a profit center

3 March 2026

3 days left: Save up to $680 on your ticket to Disrupt 2026

25 February 2026
Startups

Decagon Completes First Auction at $4.5B Value

MyFitnessPal has acquired Cal AI, the calorie app built by teenagers

Fig Security emerges from stealth with $38 million to help security teams deal with change

© 2026 TechTost. All Rights Reserved
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer

Type above and press Enter to search. Press Esc to cancel.