![]() Most IoT devices collect your email account, external IP address, GPS location (yes, your home address!), SSID and password, etc. IoT connected devices can be hijacked to serve as bridges into your network which can then open your network completely: Consider the consequences if your IoT vendor was located in a country that became hostile to your own. Once there, they could monitor your network for user ids, passwords, account numbers, etc, to access your accounts or steal your identity. While these devices should only make only outgoing connections to their cloud service, a malicious developer could use that open path as a gateway into your network. Often developers put "back doors" on their products. Many free wifi services are also unencrypted so whatever you do is there for anyone to see.Ī second concern is the origin of the devices. Anyone sniffing the data streams will be able to discover both, the risk of being monitored increases with the value of whatever you are protecting. Worse than that, they may not support SSL so that your password and/or security system passcode are often transmitted in the clear without encryption. While some may use passwords (Custom MPP devices protect firmware access with a password), they can still be vulnerable. Internet Of Things (IoT) devices often provide very little if any protection from the wilds of the internet. Turning off remote access generally prevents you alone from accessing them they still make remote calls out to their home servers so that TP Link can still reach and control them. More reason to be scared - in addition to calling into AWS where TP Link hosts it's servers, TP Link smart switches, configured to deny remote access, still continued making calls to all over the world. ![]() Once you open it up your home intranet can be accessed from anywhere in the world. ![]() There is too much computing power available to too many idle hands. I think you'll find the results alarming. ![]() Monitor the number of hack attempts to crack into it and note the countries where they originate. Set up an SSH server and expose port 22 outside of your router and firewall. It's not paranoia if someone really is out to get you. 'Smart' home devices used as weapons in website attack - the trojan horse threat from IoT is very real. ![]()
0 Comments
Leave a Reply. |