[192476] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Spitballing IoT Security

daemon@ATHENA.MIT.EDU (bzs@TheWorld.com)
Sat Oct 29 01:15:00 2016

X-Original-To: nanog@nanog.org
Date: Sat, 29 Oct 2016 01:14:34 -0400
From: bzs@TheWorld.com
To: Jim Hickstein <jxh@jxh.com>
In-Reply-To: <161d4b6d-5529-a537-3153-27db58ce5e8e@jxh.com>
Cc: nanog@nanog.org
Errors-To: nanog-bounces@nanog.org


On October 28, 2016 at 00:07 jxh@jxh.com (Jim Hickstein) wrote:
 > On 10/27/16 22:59, bzs@TheWorld.com wrote:
 > > What would the manufacturers' response be if this virus had instead
 > > just shut down, possibly in some cases physically damaged the devices
 > > or otherwise caused them to cease functioning ever again (wiped all
 > > their software or broke their bootability), rather than just hijacked
 > > them for a while?
 > 
 > A virus that kills its host (too much of the time) is not successful.

Hmm. So now we assume we are dealing with rational actors?

I suppose one can find some rational motives in bringing down Dyn but
I don't see that it's all that different from bricking half a million
(for starters) IoT devices.

Thus far the goal just seems to be mayhem.

-- 
        -Barry Shein

Software Tool & Die    | bzs@TheWorld.com             | http://www.TheWorld.com
Purveyors to the Trade | Voice: +1 617-STD-WRLD       | 800-THE-WRLD
The World: Since 1989  | A Public Information Utility | *oo*

home help back first fref pref prev next nref lref last post