LBRY Block Explorer

LBRY Claims • how-to-start-an-iot-webcam-baseline

b1b8557d235acd87e70899b2a25ac183909affed

Published By
Anonymous
Created On
6 Feb 2021 18:14:32 UTC
Transaction ID
Cost
Safe for Work
Free
Yes
How to Start an IOT/webcam Baseline
With the introduction of IOT (Internet of Things), never much of an interest in securing these devices. When devices were first introduced as ‘Internet Enabled’, they were portrayed as ‘time savers’ and convenient. No one thought security would be an issue, but then again, the same can be said for our smartphones.<br />I remember reading about the ‘Internet Fridge’ (<a href="https://en.wikipedia.org/wiki/Internet_refrigerator" target="_blank" rel="nofollow">https://en.wikipedia.org/wiki/Internet_refrigerator</a>). Tis revolutionary device will track and order whatever “a food item needs to be replenished”. Who wouldn’t want the burden of making shopping lists, finding parking and trying to figure out if you have 12 items or less? I have yet to see a successful implementation of this magical process and have instead seen fridges become digital note boards or shared calendars (<a href="http://www.news.com.au/technology/gadgets/ces-2016-samsung-unveils-a-new-fridge-you-can-order-groceries-from/news-story/59ab47aa5678d4643f30ff5efe4f86de" target="_blank" rel="nofollow">http://www.news.com.au/technology/gadgets/ces-2016-samsung-unveils-a-new-fridge-you-can-order-groceries-from/news-story/59ab47aa5678d4643f30ff5efe4f86de</a>). <br />In contrast, I’ve seen other devices appear that made the Internet Enabled feature more practical. Items such as webcams, home security, DVR, Slingbox, childrens toys, ebook readers, thermostats and remote computer access provided easy access without having to figure out the ‘port forwarding’ configuration dance. You simply configured the products to connect to your WiFi, registered them to your newly created account and magically accessed your device. More technical users could setup direct access to your equipment by leveraging the many Dynamic DNS services in combination with port forwarding.<br />As with all widely accepted technology, it can attract the attention of people who will find a way exploit it for their own purpose. In October 2016, we heard a lot about the Mirai Internet-of-Things botnet, which caused a DDoS attack against Dyn.<br /> <br />read the rest when its posted at networkcomputing.com<br />...<br /><a href="https://www.youtube.com/watch?v=VKVQCLBkyxc" target="_blank" rel="nofollow">https://www.youtube.com/watch?v=VKVQCLBkyxc</a>
Author
Content Type
Unspecified
video/mp4
Language
English
Open in LBRY