It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
originally posted by: Tranceopticalinclined
The bigger thing to think about here is, are these really exploits or just hidden features being built in?
With all the breaches and security issues we see in the media, it's really hard to believe that these " Connected " devices are not being thought about in terms of who can access. The engineers are not idiots, they know these things are there and most likely brought them up in a meeting sometime, only to be told, " oh that's already known and being looked into " which is sidestep for " We know you dumbass, the CIA and such and such paid us to put that there ".
This isn't a wake up call for anyone, we've watched as the " digital age " has turned into the " 1984 age ", if you think these things are just companies being careless, you're a little too naive for this site, there's a data war going on people, and you're the prime target.
Doesn't matter if you don't think you have anything to hid, wouldn't like to be paid when you do work or someone uses your stuff for profit? Well that's EXACTLY what is done with your data, it's collected, organized and sold to marketers and other companies that create profiles on you all just to sell crap to you that you don't need but based on your profile will most likely be interested in buying.
Couple this with the recent genetic testing issue from politicians and companies on employees and I don't think even Phillip K Dick and George Orwell thought it would get this bad.
originally posted by: Tranceopticalinclined
a reply to: phicoder
I " get it " zero days are big money but both ways, they are left there for big money and they are highlighted for big money.
That part could of been left out I think.
There is always a way to hack something, that's what the word hack means, an alternative way of doing something not originally conceptualized.
These companies hire people to find zero days if they don't they have bounties available for that. I have friends who do nothing but pentesting for bounties, they are just as amazed as I am of the frequency of exploitable systems growing instead of decreasing. People don't learn is one issue another is these are LEFT THERE on purpose.
originally posted by: TheBadCabbie
I thought I should write another general reply to this thread as the subject of using electronic devices for spying has become a side topic here. The technology to use power lines as a transmission medium for data has been around as long as the internet (70's). I chanced to read an article about it back in the 90's that was published in a free newspaper in the San Fransisco bay area. I can't remember the name of the publication. It was printed on newsprint paper.
Supposedly they could send data on a carrier wave frequency through power lines. Unplugging your ethernet cable might not be enough, then. You might also want to unplug your device's power cord as well.