Hi.
The problem these days, is not only if something is exposed to the www,
but even if it can only be "seen" by other nodes on the same LAN. Such
as the main shack PC, that probably can reach out to the WWW. Once
"something" gets into that PC (or your IoT lightbulbs!) It can at it's
leisure s
I apologize if we have created any confusion on this topic. (Yup - we have been
a little busy as of late with the K4 introduction ;-)
To be clear - we do not plan on granting open access to the main CPU or K4
internal operating system. That would be a impossible situation to support and
it wo
Sent from my Verizon Wireless 4GLTE smartphone
- Reply message -
From: "Lynn W. Taylor, WB6UUT"
To:
Subject: [Elecraft] K4 and Linux Infrastructure
Date: Mon, Jun 3, 2019 15:45
Seriously folks, think about the folks in Elecraft support and Service.
Imagine spending an ho
Well, all good discussion, but I advise that you do not hold your breath
for "open firm/software in the K4," or basically any access at all.
It's just beyond what any manufacturer can do. I suppose Eric, who is
noted for his business skills, could start up an "E-tunes" app store for
the K4, w
oads to deliver ransom ware or bitcoin miners, but
> >>> there are other known vectors, including various open ports found while
> >>> scanning. It may be the a router would be able to block access, but
> the
> >>> very peer-to-peer nature of the K4 (controlling o
robot army of IoT
>>> >>> devices.
>>> >>>
>>> >>> Thousands of hacked IoT devices are for rent on the dark web, for any
>>> >>> script kiddie that wants to attack a particular target.
>>> >>>
>>>
At this point I am pretty sure Elecraft is up to their neck getting a clean
basic radio out on schedule. Additional bells and whistles will probably take a
while.
Sent from my iPad
> On Jun 3, 2019, at 6:07 PM, Al Lorona wrote:
>
> You guys have now reached the scenario I was trying to ask a
ed by another K4 or PC, tablet, etc, means that routers would
need to allow certain inbound connections through the router or
firewall. These allow for interesting attack vectors, which will
certainly be exercised, if possible.
73,
-- Dave, N8SBE
Original Message --------
Subject: Re: [El
ertainly be exercised, if possible.
73,
-- Dave, N8SBE
Original Message ----
Subject: Re: [Elecraft] K4 and Linux Infrastructure
From: Paul Gacek
Date: Mon, June 03, 2019 4:00 pm
To: "Dave New, N8SBE"
Cc: Elecraft Reflector , Rick WA6NHC
Dave
DDOS is quite hard for an
You guys have now reached the scenario I was trying to ask about last week,
but obviously didn't make myself understood.
When I asked if the K4 would be able to 'talk to the outside world', I meant an
ability to initiate communications with a web site, a server, or something else.
Yes, allowing
The Elecraft guys might agree to this after a night of heavy drinking, but I
doubt that will happen. You’re right … if it isn’t locked down it would be a
nightmare for them, and one for the rest of us, too.
Grant NQ5T
K3 #2091 KX3 #8342
> On Jun 3, 2019, at 5:43 PM, Fred Jensen wrote:
>
> Je
Jeff: In addition to the nightmare for Elecraft you point out, can you
imagine the traffic load it would create on this list? "I loaded
WSJT-X, HRD, and N1MM+ and now the K4 doesn't work. What's wrong?" [:-)
73,
Fred ["Skip"] K6DGW
Sparks NV DM09dn
Washoe County
On 6/3/2019 2:19 PM, Jeff Sc
or PC, tablet, etc, means that routers would
>> need to allow certain inbound connections through the router or
>> firewall. These allow for interesting attack vectors, which will
>> certainly be exercised, if possible.
>>
>> 73,
>>
>> -- Dave, N8SBE
&
K4 or PC, tablet, etc, means that routers would
> need to allow certain inbound connections through the router or
> firewall. These allow for interesting attack vectors, which will
> certainly be exercised, if possible.
>
> 73,
>
> -- Dave, N8SBE
>
> Original Me
eresting attack vectors, which will
certainly be exercised, if possible.
73,
-- Dave, N8SBE
Original Message
Subject: Re: [Elecraft] K4 and Linux Infrastructure
From: Paul Gacek
Date: Mon, June 03, 2019 4:00 pm
To: "Dave New, N8SBE"
Cc: Elecraft Reflector , Rick WA6NHC
th the cyber security aspects of this new toy, and what plans you may
>> have for outside pen testing, etc. have been made.
>>
>> At the very least, you should be using authenticated boot and
>> authenticated flash, protected by a root certificate in an internal
>> hardware trust anchor.
h, protected by a root certificate in an internal
hardware trust anchor.
73,
-- Dave, N8SBE
-------- Original Message
Subject: Re: [Elecraft] K4 and Linux Infrastructure
From: Wayne Burdick
Date: Sun, June 02, 2019 11:52 am
To: Leroy Buller
Cc: Elecraft Reflector , Lee Buller
x8
ted by a root certificate in an internal
hardware trust anchor.
73,
-- Dave, N8SBE
Original Message ----
Subject: Re: [Elecraft] K4 and Linux Infrastructure
From: Wayne Burdick
Date: Sun, June 02, 2019 11:52 am
To: Leroy Buller
Cc: Elecraft Reflector , Lee Buller
x86, not PI
x86, not PI (ARM). It's the controller for internal/external displays and
streaming I/O, runs the server for remote clients, and serves as the
present/future app engine.
Additional details pending.
73,
Wayne
N6KR
> On Jun 1, 2019, at 2:18 PM, Leroy Buller wrote:
>
> So, K4 and the internal
So, K4 and the internal Linux system. What is it doing for the radio,
processor type, clock speed ram, any ssd, and version. I am assuming or
guessing it is a PI of some sort or tigally designed by Elecraft?
Will anyone know?
Lee K0WA
__
What is the Linux processor and stats in the K4?
Just curious like a nerd
Lee K0WA Nerd since 1950
__
Elecraft mailing list
Home: http://mailman.qth.net/mailman/listinfo/elecraft
Help: http://mailman.qth.net/mmfaq.htm
Post: mailto:Elecr
21 matches
Mail list logo