<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://www.explainxkcd.com/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=2600%3A387%3A4%3A803%3A0%3A0%3A0%3A36</id>
		<title>explain xkcd - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://www.explainxkcd.com/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=2600%3A387%3A4%3A803%3A0%3A0%3A0%3A36"/>
		<link rel="alternate" type="text/html" href="https://www.explainxkcd.com/wiki/index.php/Special:Contributions/2600:387:4:803:0:0:0:36"/>
		<updated>2026-05-22T19:01:05Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.30.0</generator>

	<entry>
		<id>https://www.explainxkcd.com/wiki/index.php?title=1966:_Smart_Home_Security&amp;diff=380662</id>
		<title>1966: Smart Home Security</title>
		<link rel="alternate" type="text/html" href="https://www.explainxkcd.com/wiki/index.php?title=1966:_Smart_Home_Security&amp;diff=380662"/>
				<updated>2025-06-30T19:58:09Z</updated>
		
		<summary type="html">&lt;p&gt;2600:387:4:803:0:0:0:36: /* Explanation */ similar - voting machines, dehumidifier&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{comic&lt;br /&gt;
| number    = 1966&lt;br /&gt;
| date      = March 12, 2018&lt;br /&gt;
| title     = Smart Home Security&lt;br /&gt;
| image     = smart_home_security.png&lt;br /&gt;
| titletext = If they're getting valuable enough stuff from you, at least the organized crime folks have an incentive to issue regular updates to keep the appliance working after the manufacturer discontinues support.&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==Explanation==&lt;br /&gt;
&lt;br /&gt;
With the proliferation of smart appliances in recent years, there is a growing trend of hackers taking over smart &amp;quot;Internet of Things&amp;quot; devices and adding them to {{w|botnets}}. The hardware is then used for DDOS attacks, crypto mining etc. The &amp;quot;{{w|Mirai (malware)|Mirai}}&amp;quot; botnet, for example, made of over 500,000 compromised routers, refrigerators, TVs, DVRs, baby monitors, thermostats, and webcams, was used in October 2016 to take down DynDNS, one of the core infrastructure providers for the internet in North America.&lt;br /&gt;
&lt;br /&gt;
With the constant potential threat, security updates must be constantly published, and vulnerabilities must be found by the original developers and &amp;quot;{{w|White hat (computer security)|white hat}}&amp;quot; hackers (the faceless team of engineers [[Randall]] describes), before they are found and exploited by &amp;quot;{{w|black hat}}&amp;quot; hackers (not to be confused with [[Black Hat]]). At any time, these defenders could step down from their jobs, leaving devices defenseless.&lt;br /&gt;
&lt;br /&gt;
The graph shows the various cases of how well things go on the y-axis, compared to how long it has been owned on the x-axis. The probability of compromise briefly dips (indicative of first rounds of security fix updates &amp;amp; the time window when you can easily exchange the product if you find out it's faulty) within the 1st year, then rises: the older a device/software is, the less likely it is to consistently receive security updates for protection, so they are more likely to be hacked, even in the best case. After 10 years, the device/software is most likely outdated and is not being used anymore. Companies then no longer find it profitable to continually update the product. Thus, they pull the support out, even if people are still using the device, leaving customers vulnerable.&lt;br /&gt;
&lt;br /&gt;
The title text suggests that there may be some silver lining to having your device controlled by organized crime professionals: they have a vested interest in keeping your device working well enough that you keep it plugged in. So, the more organized, pragmatic attackers will actually secure it against competing attackers, especially those of a more prankster-like mindset, who would cause more noticeably malicious changes. Advanced malware in the wild does frequently block and evict competing malware, so Randall is probably right. Some IOT malware may thus provide &amp;quot;regular security update services&amp;quot; after the original manufacturers give up, some at a conceivably acceptable cost of a few cents' worth of electrical usage for a crypto-miner. However, it could very easily go horribly wrong, for instance if that miner is hiding by letting a refrigerator run 2°C higher than its outputs allege and using the energy difference to max out the processor on mining operations.&lt;br /&gt;
&lt;br /&gt;
Similar issues are mentioned in [[463: Voting Machines]], and [[3109: Dehumidifier]].&lt;br /&gt;
&lt;br /&gt;
==Transcript==&lt;br /&gt;
:[A graph is shown inside a frame. There is one dotted line going from the middle of the left edge, then dipping slightly before rising slowly at first, then more rapid and finally slowing its ascend down as it nears the top right corner.]&lt;br /&gt;
&lt;br /&gt;
:[Above the frame is the title of the x-axis, and from each end of this text, there is a small line going out and then down, to indicate a time range, which is shown below with four times:]&lt;br /&gt;
:How long you've had your smart appliance&lt;br /&gt;
:6 months &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; 1 year &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; 5 years &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; 10 years&lt;br /&gt;
&lt;br /&gt;
:[Along the left part of the frame there runs a double arrow and at the top and bottom of these arrows there are legends at the top and bottom of the panels height:]&lt;br /&gt;
:Best-case&lt;br /&gt;
:Worst-case&lt;br /&gt;
&lt;br /&gt;
:[Inside the panel there is text above the dotted line to the left, and below the dotted line to the right:]&lt;br /&gt;
:You're constantly being rescued from peril by a faceless team of engineers who could wander away at any time&lt;br /&gt;
&lt;br /&gt;
:Your appliance is part of a botnet run by organized crime&lt;br /&gt;
&lt;br /&gt;
{{comic discussion}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Line graphs]]&lt;br /&gt;
[[Category:Virtual Assistants]]&lt;/div&gt;</summary>
		<author><name>2600:387:4:803:0:0:0:36</name></author>	</entry>

	<entry>
		<id>https://www.explainxkcd.com/wiki/index.php?title=3109:_Dehumidifier&amp;diff=380660</id>
		<title>3109: Dehumidifier</title>
		<link rel="alternate" type="text/html" href="https://www.explainxkcd.com/wiki/index.php?title=3109:_Dehumidifier&amp;diff=380660"/>
				<updated>2025-06-30T19:51:49Z</updated>
		
		<summary type="html">&lt;p&gt;2600:387:4:803:0:0:0:36: /* Explanation */ 1966: Smart Home Security, some of the useful things dehumidifiers can broadcast&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{comic&lt;br /&gt;
| number    = 3109&lt;br /&gt;
| date      = June 30, 2025&lt;br /&gt;
| title     = Dehumidifier&lt;br /&gt;
| image     = dehumidifier_2x.png&lt;br /&gt;
| imagesize = 295x327px&lt;br /&gt;
| noexpand  = true&lt;br /&gt;
| titletext = It's important for devices to have internet connectivity so the manufacturer can patch remote exploits.&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==Explanation==&lt;br /&gt;
{{incomplete|This page was created WITHOUT INTERNET ACCESS. Don't remove this notice too soon.}}&lt;br /&gt;
&lt;br /&gt;
In this comic, [[Randall]] mocks the recent trend of various appliances, such as stoves or juicers, that do not require an internet connection to work, being connected to the internet. A {{w|dehumidifier}} removes moisture from the air.  There are no obvious ways to improve dehumidifier operation without changes to its hardware, so it's unclear what benefit being able to receive updates via the internet would confer. [[Cueball]]'s sarcastic reply underlines the unlikeliness of a situation occurring where an update would be necessary. The implication is that many of these internet-connected devices are examples of over-engineering a solution to do things 'because we can' or because it makes it sound advanced to the customer, rather than because it offers any real added value.&lt;br /&gt;
&lt;br /&gt;
Dehumidifiers can provide information which it would be useful to access remotely.  For instance, the level of water in the storage tank, the percent of time the humidifier is paused for deicing, logging the humidity level, and whether the humidity exceeds a certain limit (which could indicate dehumidifier malfunction, or that the dehumidifier is inadequate to the conditions).  A local wireless network, like wifi, is a reasonable way to send this information to a user or to other local devices.  &lt;br /&gt;
&lt;br /&gt;
However, many devices like this now offer, or even require connections to a special app, or to the internet.  They typically connect to servers run by the device's manufacturer.  When that server goes away, often the devices stop working.&lt;br /&gt;
&lt;br /&gt;
The title text says that authorized internet access is required to patch remote exploits (i.e. harmful unauthorized access from the internet). If this is the only use case that requires internet access, it would be much simpler to remove the attack vector for remote exploits by not having it connected to the internet in the first place.  It is conceivably possible that remote access could be attained with a carefully crafted atmosphere, but seems unlikely.  But more particularly, the most likely source of remote access, even given a different case for internet access, would probably be the remote updater itself.&lt;br /&gt;
&lt;br /&gt;
A related device was previously referred to in [[3044: Humidifier Review]],   and the issue of possibly considering online protection of devices that (arguably) should not be so easily exploitable was looked at in [[463: Voting Machines]] and [[1966: Smart Home Security]].&lt;br /&gt;
&lt;br /&gt;
==Transcript==&lt;br /&gt;
{{incomplete transcript|Don't remove this notice too soon.}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
: [A salesman is showing Cueball a dehumidifier, with a &amp;quot;SALE&amp;quot; label on it.]&lt;br /&gt;
&lt;br /&gt;
: Salesman: This dehumidifier model features built-in WiFi for remote updates.&lt;br /&gt;
: Cueball: Great! That will be really useful if they discover a new kind of water.&lt;br /&gt;
&lt;br /&gt;
==Trivia==&lt;br /&gt;
&lt;br /&gt;
Technically, there are many different kinds of liquid water, based on the possible isotopes of hydrogen and oxygen atoms that its molecules are composed of. There are 3 naturally-occurring {{w|isotopes of hydrogen}}&amp;lt;!-- including one of 'trace' quantities--&amp;gt;, with 6 possible combinations for its two atoms in a water molecule, and 4 naturally-occurring {{w|isotopes of oxygen}}&amp;lt;!-- including one of 'trace' quantities--&amp;gt;. This gives 6 × 4 = 24 kinds of naturally-occurring water molecules, which could be present in liquid water in any proportions, although 99.7% of all such molecules&amp;lt;!-- based upon given prevalences --&amp;gt; will be the 'normal' version of water. (The isotopic ratios in &amp;quot;natural&amp;quot; water are relatively stable, so there's very little variation in water found in nature.) There are also synthetic isotopes of each, all radioactive, most having short half-lives&amp;lt;!-- as are the two 'trace' Hydrogen and Oxygen ones, so maybe it should be 2x3=6 kinds of stable water..?--&amp;gt;. How many of these could be used to constitute water would depend in part on one's definition of whether a molecule of water could be said to have been formed prior to the decay of its constituent atoms. Each isotopically-distinct version of water has very slightly different physical and chemical properties, though the differences are small and the versions hard to separate.  There are also 26 known {{w|phases of ice}} (solid water), each of which could be made from any combination of the isotopically-distinct versions of water in any proportions.&lt;br /&gt;
&lt;br /&gt;
{{comic discussion}}&amp;lt;noinclude&amp;gt;&lt;/div&gt;</summary>
		<author><name>2600:387:4:803:0:0:0:36</name></author>	</entry>

	</feed>