Log in or Sign up
Coin Talk
Home
Forums
>
Coin Forums
>
Coin Chat
>
State of the Hobby
>
Reply to Thread
Message:
<p>[QUOTE="Brett_in_Sacto, post: 2358868, member: 71510"]There's lots of technical details to this, but there are some that are capable - and of course once you do and you've accepted the EULA (end user license agreement) that says I agree to "whatever was in there" without reading it - you realize they have been recording it.</p><p><br /></p><p>You <b><u>DID</u></b> read the End User License Agreement, right? <img src="styles/default/xenforo/clear.png" class="mceSmilieSprite mceSmilie12" alt="o_O" unselectable="on" unselectable="on" /></p><p><br /></p><p>The bigger fear is that as more people find out how to exploit these technologies - you will have more viruses, spyware, malware, etc...</p><p><br /></p><p>You have installed a 2-way communications device with storage, connectivity, microphone and camera on the inside of your home network. It has a read/write operating system on it and the wireless network password stored on it as well. It's a real computer and should be secured as such.</p><p><br /></p><p>"It sees you when you're sleeping, it knows when you're awake" and it's very well enabled to capture information and broadcast it to the public internet.</p><p><br /></p><p>"It hears you calling Coin Vault and giving your credit card number and details to the operator for their basement slabbed and overpriced ASE's" <img src="styles/default/xenforo/clear.png" class="mceSmilieSprite mceSmilie1" alt=":)" unselectable="on" unselectable="on" /></p><p><br /></p><p>Without proper controls in place (that manufacturers rarely put in - or enable because they want everything to be easy for the consumer), you have another exploitable device in your home.</p><p><br /></p><p>I have a subnet between my entertainment network and "other" stuff in my house. I've got a little piece of tape across all cameras on all devices (phone, laptop, etc) and microphone controls disabled. </p><p><br /></p><p>Sorry for the big brother scare (and thread hijack) - but education and awareness are the best security tools available. I deal with this stuff every day for a living, and have for decades. I could write a book on exploits, both simple and sophisticated.</p><p><br /></p><p>Speaking of exploits, I will be attending a presentation by Kevin Mitnick next month. I wonder if the DOJ is still concerned about him whistling into pay phones. <img src="styles/default/xenforo/clear.png" class="mceSmilieSprite mceSmilie8" alt=":D" unselectable="on" unselectable="on" /> </p><p><br /></p><p>Now... Do you really need to link your TV to Farcebook, and your credit cards to your phone which is linked to your downloaded apps that spy on you?</p><p><br /></p><p>I'll close with some stark reality.</p><p><br /></p><p>The site software app is down now, but the informational part is still available.</p><p><br /></p><p><a href="http://www.pleaserobme.com" target="_blank" class="externalLink ProxyLink" data-proxy-href="http://www.pleaserobme.com" rel="nofollow">http://www.pleaserobme.com</a> </p><p><br /></p><p>It is a site that's designed to show how all of the social media tools can build a "predictability schedule" and map for the best time to rob your house - AS AN EXAMPLE... (yeah, it's real stuff)</p><p><br /></p><p>It used to integrate Farcebook, Four Square, Twitter and the "Follow Me" which gave your location data (because your phone is geo-aware). It builds a map and shows your habits, where you go, what times you leave and arrive. It looks for key words and data like Vacation, check-ins and all kinds of other data.</p><p><br /></p><p>It has algorithms built to identify the best time to rob your house. You put in "Hawaii Vacation for two weeks" on Farcebook, the geo-location of Follow-Me kicks in and shows you are at the airport - or your phone just sent out a beacon in Hawaii when you landed. You've "friended" all your neighbors so they can be tracked as well, and we even know who they are - so we can BS them "oh yeah, so and so mentioned you."</p><p><br /></p><p>Since we have all this info, and we've probably cloned your phone apps by now, we also have access to your Home Security app (you connected that to your phone with a cloud service - right?).</p><p><br /></p><p>We take our cloned phone apps, disable security and walk right into your house - knowing you're away and possibly knowing your neighbors are away too.</p><p><br /></p><p>This is not easy stuff mind you - but the ability is there for someone with technical knowledge and the right opportunity to exploit your over-sharing of information.</p><p><br /></p><p>And now to calm you down - a picture of a puppy!!! </p><p><br /></p><p><img src="http://www.golden-retriever.com/wp-content/uploads/2015/07/cute-baby-golden-retriever-puppiescute-puppy-golden-retrievers-photo-23976164-fanpop-pet-care-8teqauxk.jpg" class="bbCodeImage wysiwygImage" alt="" unselectable="on" />[/QUOTE]</p><p><br /></p>
[QUOTE="Brett_in_Sacto, post: 2358868, member: 71510"]There's lots of technical details to this, but there are some that are capable - and of course once you do and you've accepted the EULA (end user license agreement) that says I agree to "whatever was in there" without reading it - you realize they have been recording it. You [B][U]DID[/U][/B] read the End User License Agreement, right? o_O The bigger fear is that as more people find out how to exploit these technologies - you will have more viruses, spyware, malware, etc... You have installed a 2-way communications device with storage, connectivity, microphone and camera on the inside of your home network. It has a read/write operating system on it and the wireless network password stored on it as well. It's a real computer and should be secured as such. "It sees you when you're sleeping, it knows when you're awake" and it's very well enabled to capture information and broadcast it to the public internet. "It hears you calling Coin Vault and giving your credit card number and details to the operator for their basement slabbed and overpriced ASE's" :) Without proper controls in place (that manufacturers rarely put in - or enable because they want everything to be easy for the consumer), you have another exploitable device in your home. I have a subnet between my entertainment network and "other" stuff in my house. I've got a little piece of tape across all cameras on all devices (phone, laptop, etc) and microphone controls disabled. Sorry for the big brother scare (and thread hijack) - but education and awareness are the best security tools available. I deal with this stuff every day for a living, and have for decades. I could write a book on exploits, both simple and sophisticated. Speaking of exploits, I will be attending a presentation by Kevin Mitnick next month. I wonder if the DOJ is still concerned about him whistling into pay phones. :D Now... Do you really need to link your TV to Farcebook, and your credit cards to your phone which is linked to your downloaded apps that spy on you? I'll close with some stark reality. The site software app is down now, but the informational part is still available. [url]http://www.pleaserobme.com[/url] It is a site that's designed to show how all of the social media tools can build a "predictability schedule" and map for the best time to rob your house - AS AN EXAMPLE... (yeah, it's real stuff) It used to integrate Farcebook, Four Square, Twitter and the "Follow Me" which gave your location data (because your phone is geo-aware). It builds a map and shows your habits, where you go, what times you leave and arrive. It looks for key words and data like Vacation, check-ins and all kinds of other data. It has algorithms built to identify the best time to rob your house. You put in "Hawaii Vacation for two weeks" on Farcebook, the geo-location of Follow-Me kicks in and shows you are at the airport - or your phone just sent out a beacon in Hawaii when you landed. You've "friended" all your neighbors so they can be tracked as well, and we even know who they are - so we can BS them "oh yeah, so and so mentioned you." Since we have all this info, and we've probably cloned your phone apps by now, we also have access to your Home Security app (you connected that to your phone with a cloud service - right?). We take our cloned phone apps, disable security and walk right into your house - knowing you're away and possibly knowing your neighbors are away too. This is not easy stuff mind you - but the ability is there for someone with technical knowledge and the right opportunity to exploit your over-sharing of information. And now to calm you down - a picture of a puppy!!! [IMG]http://www.golden-retriever.com/wp-content/uploads/2015/07/cute-baby-golden-retriever-puppiescute-puppy-golden-retrievers-photo-23976164-fanpop-pet-care-8teqauxk.jpg[/IMG][/QUOTE]
Your name or email address:
Do you already have an account?
No, create an account now.
Yes, my password is:
Forgot your password?
Stay logged in
Coin Talk
Home
Forums
>
Coin Forums
>
Coin Chat
>
State of the Hobby
>
Home
Home
Quick Links
Search Forums
Recent Activity
Recent Posts
Forums
Forums
Quick Links
Search Forums
Recent Posts
Competitions
Competitions
Quick Links
Competition Index
Rules, Terms & Conditions
Gallery
Gallery
Quick Links
Search Media
New Media
Showcase
Showcase
Quick Links
Search Items
Most Active Members
New Items
Directory
Directory
Quick Links
Directory Home
New Listings
Members
Members
Quick Links
Notable Members
Current Visitors
Recent Activity
New Profile Posts
Sponsors
Menu
Search
Search titles only
Posted by Member:
Separate names with a comma.
Newer Than:
Search this thread only
Search this forum only
Display results as threads
Useful Searches
Recent Posts
More...