[tor-dev] Onioncat and Prop224
Evan d'Entremont
evan at evandentremont.com
Wed Oct 5 17:36:33 UTC 2016
to be more clear, those devices can currently be surveilled passively. If
they were encrypted they couldn't be.
On Wed, Oct 5, 2016 at 2:31 PM Evan d'Entremont <evan at evandentremont.com>
wrote:
> > Changing the subject a bit, isn't The Internet of Things
> going to lead to a situation where there are even more NSA, GCHQ, BND
> remotely controlled computers with microphones and other sensors all
> around us
>
> They didn't say anything about exploits.
>
> I just have several gateways on my desk and none of them use any kind of
> encryption, from the device to backend, or from the backend to user.
>
> On Tue, Oct 4, 2016 at 12:07 PM Tim Kuijsten <info at netsend.nl> wrote:
>
> Op 04-10-16 om 16:59 schreef Tim Kuijsten:
> > Op 03-10-16 om 19:43 schreef Evan d'Entremont:
> >> Not if IoT dev's start encrypting things.
> >
> > How would encryption help against exploited IoT devices?
>
> sorry, i meant to ask how would encryption help against *exploiting* IoT
> devices.
> _______________________________________________
> tor-dev mailing list
> tor-dev at lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.torproject.org/pipermail/tor-dev/attachments/20161005/3bb230ac/attachment.html>
More information about the tor-dev
mailing list