> On Aug 8, 2019, at 12:21 PM, Adam Thornton via cctalk <cctalk@classiccmp.org> 
> wrote:
> 
> Yeah, you might be able to DOS my Raspberry Pi.  Maybe you could break out
> of simh and start using the Pi itself to mine bitcoins.

I know you’re joking around, but IoT gadgets and other small devices are being 
exploited right now to great effectiveness as attack amplifiers or penetration 
aids. They won’t mine coins on your Pi, or attack you directly, but they _will_ 
use your Pi as a means to attack others - for which you can be held legally 
liable in some jurisdictions. And it won’t be a human who makes the call, it 
will be an automated attack bot that will slam every port it can attempting to 
find something its masters can abuse to make money. I ran public instances of 
TOPS-20 and ITS for years, and eventually had to give up due to lack of 
interest by anyone except chinese bots using up all the TCP connections with 
(usually Cisco) exploit attempts.

This is, after all, The Internet, and The Internet ruins all things as quickly 
as possible. This is why we can’t have nice things.


Reply via email to