The Null Device
The Trojan clothes iron
What happens when computers get cheap enough to be effectively disposable? Well, criminals start embedding penetration servers into dumb electrical goods like irons and kettles
. The low-powered machines (which could consist of an exotic embedded OS running on something tiny, though these days, it could just as easily be a Linux distribution running on an ARM or MIPS system-on-a-chip, kitted out with standard Linux hax0r tools) then attempt to connect to any machines within range by WiFi or Bluetooth, find security holes and take them over. Which is the sort of thing you'd expect first-tier intelligence agencies to attempt to try on high-value targets, but it now seems to be in the hands of ordinary criminals.
There are 1 comments on "The Trojan clothes iron":
Please keep comments on topic and to the point. Inappropriate comments may be deleted.
Note that markup is stripped from comments; URLs will be automatically converted into links.