Who is your Boox device talking to?
Based on Tools on Tech's video on YouTube. If you like this content, support the original creators by watching, liking and subscribing to their content.
All Boox network traffic was forced through a user-controlled Linux laptop hotspot so packet capture could be performed with Wireshark, reducing reliance on potentially untrustworthy on-device monitoring apps.
Briefing
Boox e-reader traffic can be monitored cleanly by routing the device through a Linux laptop hotspot and inspecting the resulting packets with Wireshark, and the observed “phoning home” looks largely consistent with normal app and cloud-sync behavior rather than suspicious data exfiltration. After filtering traffic by the device’s hotspot IP, the connections that appear during active use and during a half-hour idle period mostly map to expected services: Boox’s own cloud, Amazon endpoints, Google/Play services, Stack Storage sync, and routine time/health checks.
The core method matters because it avoids a common blind spot: installing a monitoring app on the device can be undermined if the device controls what that app can see. Instead, the setup forces all network traffic from the Boox device to pass through the user’s laptop, where packet capture is performed remotely over SSH. With Wireshark running on the laptop, the analyst filters by the Boox device’s source IP (assigned by the hotspot) and then examines both raw packet streams and higher-level “conversations” and “name resolution” summaries.
During active use—opening notes and launching apps—traffic spikes in a way that matches typical Android behavior: DNS lookups and connections to major services show up, including Amazon (expected for cloud-backed storage), EUR books.com (tied to Boox web services), and other cloud endpoints used for sync and analytics. When the device sits idle for about 30 minutes, the traffic becomes “boring”: Boox cloud pings continue, and small, low-volume checks appear. A notable example is NTP (network time protocol) traffic to DataDog-related endpoints, interpreted as monitoring/latency and time synchronization checks rather than bulk data transfer.
The most concerning category—unexpected third-party tracking—does show up, but in small volume. Even with no Facebook apps installed, connections to Facebook endpoints appear, described as likely commercial or tracking-related activity. Still, the amount is characterized as only a few kilobytes, far from the kind of sustained, high-volume upload that would suggest covert data dumping.
The analysis also highlights a key limitation: HTTPS prevents inspection of what’s inside encrypted connections, so packet capture can confirm who is contacted and roughly how much data moves, but not the exact payload content. To test behavior, the analyst changes a PDF and observes a jump to roughly megabyte-scale upload consistent with syncing a new document; afterward, traffic drops back to kilobyte-level updates, suggesting the device’s internal representation (e.g., pen strokes) and sync strategy are efficient.
Overall, the takeaway is practical: using the Boox device appears safe enough for the analyst’s use case, especially when notes are not highly sensitive and cloud sync is understood. The analyst adds that sync destinations may vary by region (European vs US servers), and for a “lock-in” alternative, the Boox ecosystem’s PDF generation and syncing relies on kync, which writes PDFs to user-controlled storage such as Google Drive or Dropbox. For those who want deeper assurance, the analyst recommends longer monitoring runs, but argues that suspicious background behavior would likely surface in shorter idle and active tests.
Cornell Notes
Routing the Boox device through a user-controlled Linux laptop hotspot enables direct packet inspection with Wireshark, avoiding the weakness of on-device monitoring apps. After filtering by the Boox device’s hotspot IP, observed connections during active use and during a ~30-minute idle period align with expected Android and cloud-sync behavior: Boox cloud pings, Amazon endpoints, Google/Play services, Stack Storage sync, and NTP/monitoring checks (including DataDog-related traffic). HTTPS encryption limits visibility into payload contents, but traffic volume patterns look normal—kilobytes for routine sync and larger uploads only when notes/PDFs change. A small amount of Facebook-related traffic appears even without Facebook apps installed, but it’s low-volume and not indicative of bulk exfiltration in the captured windows.
Why route the Boox through a laptop hotspot instead of installing a traffic-monitoring app on the device?
What does the analyst consider “normal” traffic during active use?
What changes when the device is left idle, and what does that imply?
How does HTTPS affect what can be concluded from packet capture?
What test was used to validate sync behavior when content changes?
Which unexpected third party appears, and how is it characterized?
Review Questions
- What specific advantage does hotspot-based packet capture provide over on-device monitoring apps?
- How do the analyst’s idle-period observations (destinations and data volumes) support the conclusion about “phoning home”?
- Given HTTPS encryption, what evidence types remain available (and what evidence types are unavailable) when assessing device security from network captures?
Key Points
- 1
All Boox network traffic was forced through a user-controlled Linux laptop hotspot so packet capture could be performed with Wireshark, reducing reliance on potentially untrustworthy on-device monitoring apps.
- 2
Filtering by the Boox device’s hotspot-assigned source IP made traffic analysis manageable and helped separate routine background activity from spikes caused by user actions.
- 3
During active use, observed destinations matched expected services such as Boox cloud endpoints, Amazon, and Google/Play services, with traffic volume rising when notes and apps were used.
- 4
During a ~30-minute idle window, traffic became low-volume and periodic, including Boox cloud pings and NTP/time-related checks interpreted as monitoring and synchronization.
- 5
HTTPS prevents inspecting what’s inside encrypted connections, so the assessment relies on who is contacted and how much data moves rather than payload content.
- 6
A small amount of Facebook-related traffic appeared even without Facebook apps installed, but it was characterized as low-volume rather than bulk exfiltration.
- 7
Sync behavior appears content-driven: changing a PDF triggered megabyte-scale uploads, while subsequent background updates returned to kilobyte-level synchronization.