The Solution That Keeps the HDMI Port Safe: HDMI Firewall

It is possible to hack any device with a chip or connection protocol. Sometimes, you may encounter security vulnerabilities and hacking types that you may not even think of. An open-source electronics project aims to help consumers and businesses protect themselves from an often forgotten attack vector.

The solution, called HDMI Firewall, is a physical dongle that can be connected directly to the HDMI port you want to secure. The main logic of this firewall is to provide protection by blocking all data not related to video and audio streaming. But for protection, it is necessary to plug a dongle into the port.

HDMI Baglanti Noktasini Guvende Tutan Cozum HDMI Firewall

Although we think of HDMI connectors as units that communicate audio and video, there are a number of parallel protocols that transmit more information than we expected. The most important of these is HDCP (High-bandwidth Digital Content Protection) protocol, which is a DRM (Digital Rights Management) solution that prevents the transmitted data from being copied while reaching the destination.

However, there are measures such as HPD (Hot-Plug Detection) and CEC (Consumer Electronics Control), which are among the important HDMI features that are not related to video and audio. CEC is a feature that lets you control HDMI devices via your remote.

HDMI Baglanti Noktasini Guvende Tutan Cozum HDMI Firewall2

HDMI Firewall needs to be programmed according to the device it is installed on. Persons using the solution must copy the Extended Display Identification Data (EDID) information of the equipment to be protected, which includes information such as supported resolutions. Copied data can be read from the device using the I2C-based Image Data Channel (DDC) interface. This EDID data is then written to the HDMI Firewall’s EEPROM. If you need to move the device to a new device, you can disable the write protection again by placing a block of solder on the two pads. His electronic project CuVoodoo has been uploaded to git and you can access it via this link.

Related Posts

Leave a Reply

Your email address will not be published. Required fields are marked *