this post was submitted on 07 Oct 2023
585 points (96.7% liked)

Technology

59148 readers
2721 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 7 points 1 year ago (1 children)

This is going to be such a nightmare as smart devices become the majority.

Didn't connect your TV to the Internet? Don't worry, it'll spy on you by connecting to the neighbor's tv. Or the built-in WiFi in the modem. Or the power company's smart meter via powerline-networking.

Products are going to be engineered to sell backdoor access at a hefty price, if they aren't already.

Things are going to get scary.

[–] [email protected] 1 points 1 year ago (1 children)

Just like anything with technology though, there will be people in the other side too. Does that magic TV with a mind of it's own have a USB port? If they take away the USB , they will have to add some way to maintenance it. There will always be a way to get at the kernel if you know what you're doing.

[–] [email protected] 2 points 1 year ago

It's going to become this horrible game of cat and mouse, for anyone who actually values privacy.

Sure, you could open the device up, remove any antennas. You could add powerline filtering. You could find the jtag or debug ports. You could find a way to hack it. Jam a signal. Make an ultrasonic white noise machine. Wrap the thing in foil. Cover the cameras.

The individual has to block every channel of "attack". The data miners only need to get lucky once.