• About
  • Advertise
  • Contact
Sunday, December 14, 2025
No Result
View All Result
NEWSLETTER
iotwashington
  • Home
  • Internet of Things
  • Security
  • WAN
  • Cloud Computing
  • Data Centers
  • Mobile
  • Networking
  • Software
  • Home
  • Internet of Things
  • Security
  • WAN
  • Cloud Computing
  • Data Centers
  • Mobile
  • Networking
  • Software
No Result
View All Result
iotwashington
No Result
View All Result
Home Internet of Things

IoT: We’re serfs and pawns

in Internet of Things
0
SHARES
7
VIEWS
Share on FacebookShare on Twitter

There is a huge problem with the ugly Internet of Things (IoT). Many IoT thingies have the security of wet tissue paper, and they’re being used in large swarms and masses to wreak havoc.

A colleague of mine, Stephen Satchell, says misbehaving IoT devices should bear the full front of the Consumer Product Safety Commission and be recalled, every last one of them.

Recalled.

Why won’t this happen? Let me speculate.

It’s because our own government, that is to say the more covert parts of the U.S. government, has its own cadre of botnets and control vectors that allows them interesting windows into foreign lands.

+ Also on Network World:The IoT is uranium +

That’s right—the U.S. uses them for its own nefarious programs, and to stanch them would close their own windows into all of the lands where Internet of Thingies are deployed as hapless listening points across the entire planet.

The U.S. doesn’t need any of those expensive stinking satellites that can track armadillos in Brazil. It doesn’t need those radiation-savvy eyes in the sky. It doesn’t need spooky guys in cafés in Munich. It can simply use a road cam in Kiev, Moscow, Guanzhou, Kowloon, or perhaps near The Long Bar in Singapore.

If you think about it, IoT is actually the perfect set of soldiers—fueled by someone else’s power, deployed in every country the planet—and people will unwittingly keep deploying our spy soldiers with weak embedded security certificates, easily documented and cracked backdoors, fully capable of just listening and reporting, like good spies should—and with absolutely zero costs of deployment.

Using “big data” sorting techniques, all of that phone-home bot data becomes the crux of just sorting for interesting traffic, vectoring the source and focusing on the interesting targets. If Edward Snowden taught us anything, it’s that powerful software is available to sift through the mega-haystacks to find the needles of importance.

And that, gentle reader, is why this Pandora’s Box of IoT devices isn’t going to be quickly stanched or recalled by the U.S. government, or so is my estimation.

Yes, we are tools, and also perhaps—fools.

Join the Network World communities on Facebook and LinkedIn to comment on topics that are top of mind.
Premium WordPress Themes Download
Download Nulled WordPress Themes
Download Best WordPress Themes Free Download
Download WordPress Themes
free download udemy paid course
download intex firmware
Download WordPress Themes Free
udemy free download
Tags: IoT: We're serfs and pawns
Next Post

No IoT project is an island. Oracle connects IoT to mainstream enterprise apps

Recommended

Google launches ‘cookie choices’ site to let Europeans know how they’re being tracked

Right-to-repair smartphone ruling loosens restrictions on industrial, farm IoT

Facebook Twitter Youtube RSS

Newsletter

Subscribe our Newsletter for latest updates.

Loading

Category

  • AI
  • Careers
  • Cloud Computing
  • Connected Cars
  • Connected Vehicles
  • Data & Analytics
  • Data Center
  • Data Centers
  • Databases
  • Development
  • Enterprise
  • Hardware
  • Healthcare
  • IIoT
  • Infrastructure
  • Internet of Things
  • IoT
  • IT Leadership
  • Manufacturing
  • Mobile
  • Networking
  • Oil & Gas
  • Open Source
  • Security
  • Smart Cities
  • Smart Homes
  • Software
  • Software Development
  • Standards
  • Technology Industry
  • Uncategorized
  • Unified Communications
  • Virtualization
  • WAN
  • Wearables

About Us

Advance IOT information site of Washington USA

© 2024 iotwashington.com.

No Result
View All Result
  • Home
  • Internet of Things
  • Security
  • WAN
  • IoT
  • Cloud Computing
  • Data Centers
  • Mobile
  • Networking
  • Software

© 2024 iotwashington.com.

Login to your account below

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In