
Sign up to save your podcasts
Or


This is a description of cyberwar that sounds quite realistic to me, and it's based around the thousand-cuts idea. Ring Doorbells have a vulnerability that allows one to capture clear-text videos and other data from the cameras if you can get on the wireless network that the camera is using. An independent security researcher found the Dow Jones Watchlist database sitting open on the internet. Schneier talks here about how easy it is to influence people in sensitive positions, similar to my post on China building a database on us.…
Become a Member: https://danielmiessler.com/upgrade
See omnystudio.com/listener for privacy information.
By Daniel Miessler4.6
136136 ratings
This is a description of cyberwar that sounds quite realistic to me, and it's based around the thousand-cuts idea. Ring Doorbells have a vulnerability that allows one to capture clear-text videos and other data from the cameras if you can get on the wireless network that the camera is using. An independent security researcher found the Dow Jones Watchlist database sitting open on the internet. Schneier talks here about how easy it is to influence people in sensitive positions, similar to my post on China building a database on us.…
Become a Member: https://danielmiessler.com/upgrade
See omnystudio.com/listener for privacy information.

1,105 Listeners

317 Listeners

8,077 Listeners

10,254 Listeners

551 Listeners

688 Listeners