|
Message-ID: <1454093476.3461.19.camel@gmail.com>
Date: Fri, 29 Jan 2016 13:51:16 -0500
From: Daniel Micay <danielmicay@...il.com>
To: oss-security@...ts.openwall.com
Subject: Re: shodan.io actively infiltrating ntp.org IPv6
pools for scanning purposes
On Fri, 2016-01-29 at 17:45 +0000, Scott Herbert wrote:
> That would be nice sure, but given that IoT vendors are rushing so
> fast to market that their doing things like sending login credentials
> via http, I think we're a long way from having them secure their
> products from scanning let alone anything else.
Many of them are going to be using the Android-based Brillo so there's a
central point to make changes like this (AOSP).
Download attachment "signature.asc" of type "application/pgp-signature" (820 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.