paint-brush
Where You Can Go In The Aftermath Of The LoRaWAN Hackby@patburns
892 reads
892 reads

Where You Can Go In The Aftermath Of The LoRaWAN Hack

by Patrick Burns4mFebruary 1st, 2020
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

IOActive released a vulnerability report for LoRaWAN. The report has been scooped by many of the usual suspects (ThreatPost, EEWeb). I don’t think these articles really give an idea about what the vulnerability is, exactly, or what can be done. There’s no real way to stop hacking other than to make physical ingress to the devices exceptionally difficult, AND to deploy traffic monitoring software on the application side, to try to infer when penetrations are occurring. The vulnerability can allow DDoS (distributed denial of service) as well as falsified data transmission.
featured image - Where You Can Go In The Aftermath Of The LoRaWAN Hack
Patrick Burns HackerNoon profile picture
Patrick Burns

Patrick Burns

@patburns

L O A D I N G
. . . comments & more!

About Author

Patrick Burns HackerNoon profile picture
Patrick Burns@patburns

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite