Follow

A very interesting and relevant article by the The New York Times. But I'm not super informed about the state of politics in other countries. What do you think? Cyber Security students? UT and TUD researchers? People active in politics? Feel free to reply.

nytimes.com/2019/04/24/technol

@jerry



@Erik @jerry Consider any ('cheap') surveillance camera part of the China connection. Even rebranded or enclosed (expensive) devices contain the same electronics as the 'of the shelf' devices commonly found in webshops . It will take some hardware hacking (like my colleagues do) to find out if a device might be vulnerable. Without a decent audit, consider it weak.

Sign in to participate in the conversation
Mastodon U. Twente

A social network for the U. Twente community. Anyone with an @utwente.nl or @*.utwente.nl email address can create an account here and participate in the global fediverse with millions of other users. Content does not reflect the opinions or policies of the University of Twente.
-
We support \( \LaTeX \) formulas: Use \( and \) for inline LaTeX formulas, and \[ and \] for display mode.