[prev in list] [next in list] [prev in thread] [next in thread]
List: cryptography
Subject: Re: [Cryptography] Schneier's Internet Security Agency - bad idea because we don't know what it will
From: Tom Mitchell <mitch () niftyegg ! com>
Date: 2017-02-28 21:57:54
Message-ID: CAAMy4USB-E3L36O_kce+jpk=0WAAYea1BkRzigG45GZmXP8OJg () mail ! gmail ! com
[Download RAW message or body]
[Attachment #2 (multipart/alternative)]
On Tue, Feb 28, 2017 at 7:09 AM, Henry Baker <hbaker1@pipeline.com> wrote:
> At 04:35 PM 2/27/2017, Kevin W. Wall wrote:
> >On Mon, Feb 27, 2017 at 4:14 PM, Henry Baker <hbaker1@pipeline.com>
> wrote: ...<big snip>...
> >> How hard is it for a wifi device to search for all SSID's (including
> hidden
....
> So it wouldn't be hard for a sleazy Vizio to make deals with these even
> sleazier ISP's for easy/legal access to the Internet.
This is an interesting risk.
If the key used by a Vizio like company was to become public a million
"secure" hot spots
would become universal untraceable access to anyone: good, bad, frugal,
cheap.
If the TLAs are serious about national security this should be tested for
as well as be made
illegal to import including software updates.
As convenient setup goes little prevents a device from setting up a mesh
network of nearest neighbors
and then hop their way to a connection.
Automatic updates with bad services might precede a heavy handed larger
attack.
Like sleeper cells but not people.
--
T o m M i t c h e l l
[Attachment #5 (text/html)]
<div dir="ltr"><div class="gmail_extra"><div class="gmail_quote">On Tue, Feb 28, 2017 \
at 7:09 AM, Henry Baker <span dir="ltr"><<a href="mailto:hbaker1@pipeline.com" \
target="_blank">hbaker1@pipeline.com</a>></span> wrote:<br><blockquote \
class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc \
solid;padding-left:1ex"><span class="">At 04:35 PM 2/27/2017, Kevin W. Wall \
wrote:<br> >On Mon, Feb 27, 2017 at 4:14 PM, Henry Baker <<a \
href="mailto:hbaker1@pipeline.com">hbaker1@pipeline.com</a>> wrote: ...<big \
snip>...<br> </span><span class="">>> How hard is it for a wifi device to \
search for all SSID's (including hidden</span></blockquote><div>.... \
</div><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc \
solid;padding-left:1ex"> So it wouldn't be hard for a sleazy Vizio to make deals \
with these even sleazier ISP's for easy/legal access to the \
Internet.</blockquote><div><br>This is an interesting risk. <br>If the key used by a \
Vizio like company was to become public a million "secure" hot \
spots<br>would become universal untraceable access to anyone: good, bad, frugal, \
cheap.<br><br>If the TLAs are serious about national security this should be tested \
for as well as be made</div><div>illegal to import including software updates. \
<br><br>As convenient setup goes little prevents a device from setting up a mesh \
network of nearest neighbors</div><div>and then hop their way to a connection. \
<br><br>Automatic updates with bad services might precede a heavy handed larger \
attack.<br>Like sleeper cells but not people.<br><br></div></div><div><br></div>-- \
<br><div class="gmail_signature" data-smartmail="gmail_signature"><div dir="ltr"> T \
o m M i t c h e l l</div></div> </div></div>
[Attachment #6 (text/plain)]
_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic