even your PI is not safe

Discussion in 'RFinderPi - Open Source radio interface based on R' started by KK4NSF, Mar 7, 2017.

ad: L-HROutlet
ad: l-rl
ad: MessiPaoloni-1
ad: Left-2
ad: Left-3
ad: HRDLLC-2
ad: L-MFJ
ad: abrind-2
ad: L-Geochron
  1. KK4NSF

    KK4NSF Ham Member QRZ Page

    yikes! in the Wikileaks / CIA Hacking docs, there is even a tool in place to take control of one's Raspberry PI!


    Of course I'm not sure why one would want to control my Pi.... but it still bothers me. It's MY PI dammit!
  2. KK5JY

    KK5JY Ham Member QRZ Page

    I'm pretty sure every publicly-available OS has had exploit code written for it by state actors. Given that most are based on Linux, Windows, Mac-whatever, or some combination, it's just too easy to port one to another.

    When you look at how Pi is used in many industrial processes, having an exploit for the Pi is actually a valuable tool for a state actor, because it makes targeting infrastructure easier.

Share This Page

ad: w5yi