Editing 1966: Smart Home Security
Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.
The edit can be undone.
Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 8: | Line 8: | ||
==Explanation== | ==Explanation== | ||
+ | {{incomplete|Created by ORGANIZED CRIME - Confirm that the graph means "the oldest the device, worst the best-case is".}} | ||
− | With the proliferation of smart appliances in recent years, there is a growing trend of hackers taking over smart "Internet of Things" devices and adding them to {{w|botnets}}. The hardware is then used for DDOS attacks, crypto mining etc. The " | + | With the proliferation of smart appliances in recent years, there is a growing trend of hackers taking over smart "Internet of Things" devices and adding them to {{w|botnets}}. The hardware is then used for DDOS attacks, crypto mining etc. The "Mirai" botnet made of over 500,000 compromised routers, refrigerators, tvs, DVRs, baby monitors, thermostats, and webcams was used in October 2016 to take down DynDNS, one of the core infrastructure providers for the internet in North America. |
− | With the | + | With the potential threat always looming, security updates must be constantly pushed, and exploits must be found by the original developers and "white hat" hackers (The faceless team of engineers [[Randall]] describes), before they could be found (and get used) by "black hat" hackers. At any time, these people could quit, leaving devices defenseless. |
− | The graph shows the various cases of how well things go on the y | + | The graph shows the various cases of how well things go on the y axis, compared to how long it has been owned on the x axis. The older a device/software is, the less likely it is to consistently receive security updates for protection, so they are more likely to be hacked, even in the best case. After 10 years, the device/software, is most likely outdated and is not being used anymore. Companies then no longer find it profitable to continually update the product, and then pull support out, even if people are still using it, leaving them vulnerable. The exact thing happened to many users, when Microsoft halted updates to Windows XP in 2014, even though many people still used the operating system. |
− | The title text suggests that | + | The title text suggests that being easy to hack may actually be a positive thing for an older device, because it means that criminals have a vested interest in providing system support to keep it operational after the manufacturer has stopped supporting it. |
==Transcript== | ==Transcript== |