[192476] in North American Network Operators' Group
Re: Spitballing IoT Security
daemon@ATHENA.MIT.EDU (bzs@TheWorld.com)
Sat Oct 29 01:15:00 2016
X-Original-To: nanog@nanog.org
Date: Sat, 29 Oct 2016 01:14:34 -0400
From: bzs@TheWorld.com
To: Jim Hickstein <jxh@jxh.com>
In-Reply-To: <161d4b6d-5529-a537-3153-27db58ce5e8e@jxh.com>
Cc: nanog@nanog.org
Errors-To: nanog-bounces@nanog.org
On October 28, 2016 at 00:07 jxh@jxh.com (Jim Hickstein) wrote:
> On 10/27/16 22:59, bzs@TheWorld.com wrote:
> > What would the manufacturers' response be if this virus had instead
> > just shut down, possibly in some cases physically damaged the devices
> > or otherwise caused them to cease functioning ever again (wiped all
> > their software or broke their bootability), rather than just hijacked
> > them for a while?
>
> A virus that kills its host (too much of the time) is not successful.
Hmm. So now we assume we are dealing with rational actors?
I suppose one can find some rational motives in bringing down Dyn but
I don't see that it's all that different from bricking half a million
(for starters) IoT devices.
Thus far the goal just seems to be mayhem.
--
-Barry Shein
Software Tool & Die | bzs@TheWorld.com | http://www.TheWorld.com
Purveyors to the Trade | Voice: +1 617-STD-WRLD | 800-THE-WRLD
The World: Since 1989 | A Public Information Utility | *oo*