If device is not legitimate for any reason (as answer by Sergejs implies), then I’d be worried about security of the device.
Cloud is Mikrotik’s service and they can decide who can use it.
Downloading of ROS updates is anonymous service and it’s possible to fetch them using any hardware, any OS and any http client as long as it speaks decently standard HTTP. Cloud is not anonymous due to nature of service …
The only way I think someone who isn’t a MikroTik EE could know that is for you to post high-res pictures of both sides of the PCB, then hope someone else here with the same device — which you should identify explicitly, rather than make us guess — is interested enough to open their copy and make some comparisons.
Even then, the clone might be good enough that visual inspection is insufficient. Plenty of companies have had their Chinese manufacturer rip the device off directly, having gotten the original design files from their customer.
MT should verify the chap paid for the device on amazon, and if so then unlock the block.
Do agree the user should netinstall the device just to make sure he can etc…
This is very interesting! I have never seen counterfeit Mikrotik device yet… so, what actually happened here, if it’s completely different HW inside that runs ROS? Or perhaps hacked license on official Mikrotik board? It all seems like a lot of effort someone would go to actually make a compatible hardware and possibly still have some margin to make money on all of this…?
And what device we are even talking about? AP? Router? Something else? Photos of internals would be great.