
Sign up to save your podcasts
Or


This is a description of cyberwar that sounds quite realistic to me, and it's based around the thousand-cuts idea. Ring Doorbells have a vulnerability that allows one to capture clear-text videos and other data from the cameras if you can get on the wireless network that the camera is using. An independent security researcher found the Dow Jones Watchlist database sitting open on the internet. Schneier talks here about how easy it is to influence people in sensitive positions, similar to my post on China building a database on us.…
Become a Member: https://danielmiessler.com/upgrade
See omnystudio.com/listener for privacy information.
By Daniel Miessler4.6
135135 ratings
This is a description of cyberwar that sounds quite realistic to me, and it's based around the thousand-cuts idea. Ring Doorbells have a vulnerability that allows one to capture clear-text videos and other data from the cameras if you can get on the wireless network that the camera is using. An independent security researcher found the Dow Jones Watchlist database sitting open on the internet. Schneier talks here about how easy it is to influence people in sensitive positions, similar to my post on China building a database on us.…
Become a Member: https://danielmiessler.com/upgrade
See omnystudio.com/listener for privacy information.

184 Listeners

2,005 Listeners

372 Listeners

651 Listeners

1,029 Listeners

320 Listeners

419 Listeners

8,083 Listeners

178 Listeners

316 Listeners

200 Listeners

207 Listeners

95 Listeners

139 Listeners

587 Listeners