Worth Reading: Internet of Terror

Worth Reading: Internet of Terror

Before we get to the question of encryption and key length, I would like to point out two things. An IoT device is nothing more than an embedded system with a TCP/IP stack. It is not a magical object that is somehow protected from attackers because of how cool, interesting, or colorful it is. Second, and I can’t believe I have to point this out to people who would read or write to KV, but the Internet has a lot of stuff on it, and it’s getting bigger every day. Once upon a time, there were fewer than 100 nodes on the Internet, and that time is long past. KV has three Internet-enabled devices within arm’s reach, and, if you think a billion users of the Internet aren’t scary, try multiplying that by 10 once every fridge, microwave, and hotel alarm clock can spew packets into the ether(net). Let’s get this straight: if you attach something to a network—any network—it had better be secured as well as possible, because I am quite tired of being awakened by the sound of the gnashing of teeth caused by each and every new network security breach. The Internet reaches everywhere, and if even one-tenth of one percent of the people on it are bad actors, then that’s one million potential attackers across the earth, and each one may be in control of far more than three devices! —ACM

2 Comments

  1. Dmitry 15 July 2017 at 1:52 pm

    Somehow the link to the article is not available

    • Russ 16 July 2017 at 10:00 am

      It should be working now — thanks for stopping by and commenting!

      🙂

      Russ

Comments are closed.