Deals Still On This Weekend! A huge number of the Amazon deals are still going! This includes the Garmin Epix for just $459, and the Fenix 8 for $150 off. The Apple Watch Series 10 for $279, the GoPro Hero 13 Black for $329, smart trainers, drones, action cams, and plenty more! Go check out the full list here!
I’m DC RAINMAKER…
I swim, bike and run. Then, I come here and write about my adventures. It’s as simple as that. Most of the time. If you’re new around these parts, here’s the long version of my story.
You'll support the site, and get ad-free DCR! Plus, you'll be more awesome. Click above for all the details. Oh, and you can sign-up for the newsletter here!
Here’s how to save!
Wanna save some cash and support the site? These companies help support the site! With Backcountry.com or Competitive Cyclist with either the coupon code DCRAINMAKER for first time users saving 15% on applicable products.
You can also pick-up tons of gear at REI via these links, which is a long-time supporter as well:Alternatively, for everything else on the planet, simply buy your goods from Amazon via the link below and I get a tiny bit back as an Amazon Associate. No cost to you, easy as pie!
You can use the above link for any Amazon country and it (should) automatically redirect to your local Amazon site.While I don't partner with many companies, there's a few that I love, and support the site. Full details!
Want to compare the features of each product, down to the nitty-gritty? No problem, the product comparison data is constantly updated with new products and new features added to old products!
Wanna create comparison chart graphs just like I do for GPS, heart rate, power meters and more? No problem, here's the platform I use - you can too!
Think my written reviews are deep? You should check out my videos. I take things to a whole new level of interactive depth!
Smart Trainers Buyers Guide: Looking at a smart trainer this winter? I cover all the units to buy (and avoid) for indoor training. The good, the bad, and the ugly.
-
Check out my weekly podcast - with DesFit, which is packed with both gadget and non-gadget goodness!
Get all your awesome DC Rainmaker gear here!
FAQ’s
I have built an extensive list of my most frequently asked questions. Below are the most popular.
- Do you have a privacy policy posted?
- Why haven’t you yet released a review for XYZ product you mentioned months ago?
- Will you test our product before release?
- Are you willing to review or test beta products?
- Which trainer should I buy?
- Which GPS watch should I buy?
- I’m headed to Paris – what do you recommend for training or sightseeing?
- I’m headed to Washington DC – what do you recommend for training?
- I’m from out of the country and will be visiting the US, what’s the best triathlon shop in city XYZ?
- What kind of camera do you use?
-
5 Easy Steps To The Site
In Depth Product Reviews
You probably stumbled upon here looking for a review of a sports gadget. If you’re trying to decide which unit to buy – check out my in-depth reviews section. Some reviews are over 60 pages long when printed out, with hundreds of photos! I aim to leave no stone unturned.
Read My Sports Gadget Recommendations.
Here’s my most recent GPS watch guide here, and cycling GPS computers here. Plus there are smart trainers here, all in these guides cover almost every category of sports gadgets out there. Looking for the equipment I use day-to-day? I also just put together my complete ‘Gear I Use’ equipment list, from swim to bike to run and everything in between (plus a few extra things). And to compliment that, here’s The Girl’s (my wife’s) list. Enjoy, and thanks for stopping by!
Have some fun in the travel section.
I travel a fair bit, both for work and for fun. Here’s a bunch of random trip reports and daily trip-logs that I’ve put together and posted. I’ve sorted it all by world geography, in an attempt to make it easy to figure out where I’ve been.
My Photography Gear: The Cameras/Drones/Action Cams I Use Daily
The most common question I receive outside of the “what’s the best GPS watch for me” variant, are photography-esq based. So in efforts to combat the amount of emails I need to sort through on a daily basis, I’ve complied this “My Photography Gear” post for your curious minds (including drones & action cams!)! It’s a nice break from the day-to-day sports-tech talk, and I hope you get something out of it!
The Swim/Bike/Run Gear I Use List
Many readers stumble into my website in search of information on the latest and greatest sports tech products. But at the end of the day, you might just be wondering “What does Ray use when not testing new products?”. So here is the most up to date list of products I like and fit the bill for me and my training needs best! DC Rainmaker 2024 swim, bike, run, and general gear list. But wait, are you a female and feel like these things might not apply to you? If that’s the case (but certainly not saying my choices aren’t good for women), and you just want to see a different gear junkies “picks”, check out The Girl’s Gear Guide too.
As a COROS fan and a software developer…this is an embarrassing response to a zero day.
I use my sports watch for sports and I don’t care so much if some idiot steals my heart rate values.
It’s easy to dismiss privacy concerns with a thought like, “My heart rate data? So what?” However, these security flaws extend well beyond that. Imagine devices crashing at major events, or a malicious actor secretly accessing your messages and notifications. While sharing sports data might seem harmless, I believe most of us would be very concerned if our private messages were being monitored.
What other information is in your Coros account? Your emergency contact person’s details? Your email address and phone number? Where you live, from your activity profile? The fact that you’re away from home at present? What time you go for a run every morning? I could go on. The only saving grace here is that you need Bluetooth proximity to carry out this hack, but unless you plan on avoiding every bar, tram, bus, public park etc., you’re a sitting duck.
Additionally, this would include potentially a copy of all messages sent to your watch (via your phone). e.g. text messages, smartphone notifications, etc…
For most people, that’s likely the bigger security concern.
Garmin manages to reset millions of watches to factory settings without hacking. See the magic GPS triangle a few months ago
I follow you. Just the idea that someone knows things about you or is even tracking you without your knowledge is reason enough.
I don’t care about my heart rate, my pace, my power data, or my elevation gains. That stuff, as far as I’m concerned, can be public.
What I DO care about is my location data. Most notably, my home address (and, to a lesser extent, my work address.) Knowing that I’m a long distance triathlete, that my home address is this specific spot in this specific city, and that I’m generally out for an hour or more doing (swimming|cycling|running) at this specific time of the day – that’s gold for thieves.
This is a Big Bloody Deal, even if you don’t think it is.
Anecdata: one of my friends didn’t conceal his home region on Strava. Somebody – a complete stranger to him – swung by and asked him, “Are you ?” They’d tracked down his home from where he tended to start and stop his long rides. The implications are deeply, deeply profound, and they only get more serious the more you think about it.
(As a side note, I’m still annoyed that Garmin takes an “all or nothing” approach to data. I’m happy for them to gather and collate the cumulative load, sleep data, and similar; what I don’t want is all of my GPS data to go with it. But there’s no way to say “pass through GPS activities to TrainingPeaks [my coach has a definite need to know exactly what I’ve been doing], but don’t store it; everything else is fine to store and collate across my devices.”)
OK, but how about if your sports watch, which is connected to your phone, which is connected to your banking/government identification/personal email/password manager/etc gets hacked? Care then?
To be clear, it’s not clear to me that any of that can happen based on this disclosure. But how do we know there haven’t been other disclosures to Coros where that *is* a possibility? It’s not so much this vulnerability in particular, but rather Coros’ culture towards disclosed vulnerabilities as a whole.
@Stuart: That recent Wired article “Anyone Can Buy Data Tracking US Soldiers and Spies to Nuclear Vaults and Brothels in Germany” should be ringing major alarm bells for anyone wearing a smartwatch and connecting to apps with location services enabled. I’m with you, I don’t mind the data in motion across Garmin/Strava’s servers. It’s the data at rest afterwards that can be massively correlated that scares me.
One possible vector of attack: stalking
Second possible vector of attack: stealing all important data from Coros-sponsored professional athletes (imagine obtaining this data from someone like Pogacar or Vingegaard?)
Third possible vector of attack: stealing 2-auth codes from the messages you receive
It’s not just that data might be stolen. In certain countries (well, one mainly) it could very well end with some people being denied medical insurance. A bunch of health and personal data will identify you very specifically and could include enough evidence of preexisting conditions that insurance would become an issue.
This data is worth a lot more to legitimate businesses than it is on the “dark web”. In Europe it’s not an issue so much as GDPR would require an explanation as to where the data came from, but other countries have gone in the opposite direction so the data could easily be used without question.
“If the mobile phone or COROS app does not enforce pairing and bonding, the BLE communication on its physical layer is not encrypted and can be sniffed.”
That is crazy
I still remember what happened when a major brand was down for several days and to this day I’m still not sure how safe my data was or what really happened. Also was not informed of it. As a EU user, poor handling of the problem. It seems like the other brands don’t care either.
I believe that the “major brand” had a crypto locker malware attack and this encrypted the data on their servers. This revealed likely a lack of network segmentation or “physical” barriers between engineering or business users and the operational data center. Also the entire system is clearly based on Windows for servers which is not the architecture for a contemporary scalable highly resilient web service.
Is the data from Suunto, Garmin and Polar based in the EU you think?
Crees que el hecho de que Coros mantenga la obsesión de tener BT siempre activo, está relacionado con esto?
No entiendo por otro lado porque no escuchan a aquellas personas que no queremos dormir con el BT conectado. Nunca permitieron modo avión, y yo devolví mi Coros por esa “absurda” razon
I am shutting down my Coros Pace 2 immediately and not turning it back on until fixes are implemented, at which point I’m likely to sell it. It is a decent watch, but the company’s attitude is too reckless given how sensitive the data is.
I am in no way saying this is okay, but it does seem for a recreational runner that has never used notifications on a watch there is little concern out there. Especially if I do not do many races. Western States being this last weekend and having so so many Coros’ in the field that would have seemed to be the perfect time to do something if someone was going to do it.
The part I did not understand is does the bad actor have to be physically present to exploit the issue or can they be launched remotely?
I know we live in very interesing times, but I am not sure babys and bathwater are the answer. As previously stated, the response is pathetic and is about how their support works in the real world. It is really bad and very unresponsive to any concerns.
I think Ray says it best, this is a before and after moment.
It’s not so much the bugs themselves, but rather how the company handles them. It’s like calling your plumber to say a pipe has burst and your basement is flooding, and they reply: “I’ll definitely try to come by before the end of the year.” Also, did you received a message from Coros (if you have one)? I didn’t. It’s only by the work of Ray we know this.
Does this have cvss tracking or scores. Curious how this would rate on that scale
in this article following the link to SySS publication, at the bottom
Hey all, I wanted to comment here to add some additional information from the COROS side, and most importantly what we are doing to fix the issues reported and better manage similar reports like this in the future.
The vulnerabilities flagged were responsibly disclosed to us earlier this year as Ray noted, and we’ve been actively working on fixes since then (mid-March). We have a responsibility to our users to handle these issues with the utmost urgency and we acknowledge that we should have been quicker to fix these vulnerabilities from their discovery.
Some of the issues like improving how devices pair and authenticate, are already being patched this month and will be released in an update within the next couple few weeks with an app/firmware update when testing is complete. Others, which require deeper changes to how Bluetooth communication is encrypted during use, will be resolved by the end of August across all COROS devices.
While these issues documented in the report are difficult to exploit in the real world, we’re treating them seriously and rolling out updates as fast as we can without compromising performance or stability.
We appreciate the community holding us to a high standard, and we’re committed to learning from this, assigning a higher priority to all security vulnerabilities in the future, and we will do better in the future.
If your watch is up to date, there’s nothing you need to do immediately. When our next software updates are available in July and August, please be sure to update your watch which will fix the vulnerabilities mentioned. As always, if you have any questions, we’re here to help.
— Darian
Darian, I appreciate your willingness to try to scrape off some of the egg that is on Coros’s face. However, this is not a “high standard,” this goes back to bare minimum security responses. DCR is correct; most working in the security field would find the “fix two months from now” response AFTER the vulnerability is disclosed WILD in comparison to the response most companies have to serious vulnerability disclosures.
I’m not intimate with Coros’ inner workings to know how large the teams are, but it would seem that the opportunity to fix this PR issue was BEFORE the disclosure period ended, not a hastily back-pedaled response to the community after the vulnerability was disclosed responsibly and then nothing was done.
Totally reasonable to have security vulnerabilities – every company has one and if they don’t then they aren’t making interesting products. However, this response is garbage.
> While these issues documented in the report are difficult to exploit in the real world
I would like to point out the security researcher blog post literally contains source code to get an Android phone with COROS app installed to leak the COROS account API key and example code for other attack vectors too. Somebody surely must have Android somewhere, even as a test device? Right?
Well, sorry, but it is not as if we were in the 90s and exploitation of online security deficits was almost unheard of. Coros runs a multi million dollar business that involves people‘s personal data. Mistakes happen nevertheless but you have to manage them accordingly. I am quite happy, that I don’t have the Coros problem myself. And probably never will.
That’s the way Lewis works. Half ass ideas and then backtrack when it bites him in the ass. Then Darian is left to clean up the mess (and that’s not a compliment).
This comment feels like such an empty response. A properly functioning engineering team would provide a way or instructions for users to protect themselves from these exploits even if that might be a detriment to the UX (can I just turn off Bluetooth?).
Additionally, with how poorly this has gone a public post mortem would be a very reasonable expectation from users. How is Coros going to prevent issues like this? Even after this was prioritized why is the fix taking so long? Is the engineering team properly resourced to support such a large user base? Is there a security team at Coros? Who is the engineering and security leadership? Was this security researcher compensated? There are so many questions unanswered and for a vulnerability like this transparency is very important
At least Polar should be, as that is a finnish company and should adhere to EU Law. I’m REALLY glad that Cyber Resilience Act is coming to catch sloppy programmers and hold them accountable for lack of using the brain.
Good job Ray.
My personal moment was ShellShock, and having millions of vulnerable devices in people’s homes.
We patched the issue within 3 days and rolled out new firmware with a streamlined release process.
After that, security had a higher profile, and subsequent vulnerabilities got more attention and fixed faster.
Super, super disappointed. I was ready to jump from the increasingly overpriced, wackadoodle cost of Garmin to Coros. I’ve been on Garmin since a FR 305! But the laissez-faire response from Coros? They are dead to me. Really, these obvious vulnerabilities should never have exposed consumers in the first place. Blatant disregard for security = no interest from me.
This absence of basic wire encryption stuff is truly embarrassing amateur hour.
The fuzzing crashing the device… well I am fairly confident that Garmin OS for the fenix 8 could not survive that either.
They have most definitely messed up more than once.
This isn’t their first vulnerability link to zhouhanc.com
Seeing this I was curious what the engineering org at Coros looked like (and if they were hiring to expedite these fixes) and noticed a severe lack of information. I couldn’t find many software engineers working at Coros nor any signs of engineering leadership on LinkedIn or otherwise.
I kind of assumed that most of these wearable companies were structured similarly to Whoop which has a large engineering organization but it seems that assumption is wrong. Definitely something I need to pay more attention to when I purchase technology. Certainly a well functioning engineering org with strong leadership would have identified the severity and urgency of this issue and would have expedited the fixes at the very least. As a software engineer I understand the complexity of a fix like this but at the same time it feels like they are not investing enough into the engineering function at Coros and I will definitely consider switching to a more engineering focused company for my wearables in the future.
All their engineers are based in China. I’m not sure that’s even very trustworthy.
Products from Chinese IT companies have always been suspected of security issues. They have been suspected of intentionally leaking users’ information, not by mistake. To be honest, pure Chinese companies cannot be trusted. They are under the strong control of the Chinese government.
So Polar and Garmin are the only ones left?
We must not forget that Huawei products from China were sold in the United States with hidden backdoors.
don’t be overconfident in any countries, particularly USA ;-)
link to spyscape.com
I’d like to see the results of the software audit conducted by an external company. Is COROS planning to carry out such an audit?
Garmin did it, but they weren’t WhiteHat guys :-)
link to bleepingcomputer.com
From what I’ve read it’s not possible to turn off BT on Coros? If that’s true, then introducing that feature could have been a short-term patch, at least for some situations.
No expert on this but maybe, keeping the Bluetooth on saves batterij instead of always the need to search for a connection. Maybe that is what they focus on to get good battery results