It's an unverified binary. Claim what you like, but we only have your word for it. Who knows what back-doors have been written in. You might do, but we only have your word for it.
That's bullshit, he did not have access, he just knew the SSH password which was there to enable support over Teamviewer. Anyone outside the local network
cannot access the controller, just reading what you said already made me a bit dumber. Btw as I said earlier, SSH is disabled now.
It's an UNVERIFIED binary! There CAN be back-doors coded in and no-one would know! How do you think anyone compromises any machines on local networks? Almost all machines are on local networks! I can make a system that is easily compromised and put it on my local network. Then ship the binary without any verification. There is no way for us to know if what you are saying is true.
If your reasoning is that because its on a local network it's secure, then that's just laughable. I literally don't know what to say to you.
I never claimed that, I was talking about an outside party trying to access the LightningAsic controller, not the firmware itself being malicious as you are pointing out. Anyway I'm done here, do as you wish.