Every networked sensor package in your immediate vicinity can be used to spy on you unless it is well-designed and transparent to you and the wide community of security researchers. If that sounds paranoid, check out the video above, wherein some security researchers show that they can covertly operate WiFi-enabled personal cameras and turn them into bugs.
But, as proven by Daniel Mende and Pascal Turbing, security researchers with German-based IT consulting firm ERNW, these capabilities also have security flaws that can be easily exploited for turning these cameras into spying devices.
Mende and Turbing chose to compromise Canon's EOS-1D X DSLR camera an exploit each of the four ways it can communicate with a network. Not only have they been able to hijack the information sent from the camera, but have also managed to gain complete control of it.
In this presentation from Shmoocon 2013, they explained in detail how they managed to mount the attacks, and have also offered advice for users on how to secure their cameras and connections against these and similar attacks.
Stuff like this is why DRM and EULAs are so insidious. The existence of devices that attack their owners affects us all. It is a public health problem. Any time we pass a law that makes it illegal or legally perilous to point out flaws in technology, we make it harder to solve the public health problem, and we're all at risk.
Digital cameras easily turned into spying devices, researchers prove
Twitter user LDLDN posted this image of a racist National Front poster on a lamppost in Camden, a neighborhood in north London — a relatively affluent, diverse neighborhood dominated by a giant subculture market, two huge train stations (St Pancras and King’s Cross), a university, and the British Library.
The ACLU is suing to repeal parts of the Computer Fraud and Abuse Act (CFAA), a 1980s-vintage hacking law that makes it a felony to “exceed authorization” on a remote computer, and which companies and the US government have used to prosecute researchers who violated websites’ terms of service.
June’s Decentralized Web Summit at San Francisco’s Internet Archive was a ground-breaking, three-day combination of workshops, lectures, demos and a hackathon, all aimed at figuring out how to restore the decentralized character of the early internet — and keep it that way.
If you’ve got a coding career on your mind, few programming disciplines will take you farther than a commanding knowledge of the Python language, which is not to be mistaken for parseltongue. Its versatility and ease of use make it a go-to for any coding project…so master Python now with this all-inclusive all-level python programming course […]
The realm of web development is constantly evolving. New platforms, languages, and processes materialize all the time, so staying on top of all that innovation is a tall order.Whether you’re brushing up on new tricks, starting from scratch, or just looking to make your own website a little jazzier, Rob Percival’s new Complete Web Developer Course 2.0 (now […]
Folks used to rely on alarms to protect their home – and before that, the family dog. Now, anyone looking to guard their homes can choose from some high-tech options, including the Amaryllo iCamPRO FHD Home Security Camera (now just $219 in the Boing Boing Store).In fact, this 2015 CES “Best of Innovation” award-winner boasts so many features, it’s […]