[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-dev] Onioncat and Prop224



to be more clear, those devices can currently be surveilled passively. If they were encrypted they couldn't be.

On Wed, Oct 5, 2016 at 2:31 PM Evan d'Entremont <evan@xxxxxxxxxxxxxxxxxx> wrote:
Changing the subject a bit, isn't The Internet of Things
going to lead to a situation where there are even more NSA, GCHQ, BND
remotely controlled computers with microphones and other sensors all around us

They didn't say anything about exploits. 

I just have several gateways on my desk and none of them use any kind of encryption, from the device to backend, or from the backend to user.

On Tue, Oct 4, 2016 at 12:07 PM Tim Kuijsten <info@xxxxxxxxxx> wrote:
Op 04-10-16 om 16:59 schreef Tim Kuijsten:
> Op 03-10-16 om 19:43 schreef Evan d'Entremont:
>> Not if IoT dev's start encrypting things.
>
> How would encryption help against exploited IoT devices?

sorry, i meant to ask how would encryption help against *exploiting* IoT
devices.
_______________________________________________
tor-dev mailing list
tor-dev@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
_______________________________________________
tor-dev mailing list
tor-dev@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev