Quote:
Originally Posted by Yourcat
I also think that one is quite save even if the hotspot is hacked. We don't have keys to sign firmware images - an evil hacker could have them. There are enough job offers at lab126 so they may have already hired a hacker.
|
Again, just like you are more vulnerable to hacked computers on your own network, you are also vulnerable to hackers at the vendor's company. Both ends of the encrypted "pipe" are open. It is only intermediate computers on the TCP/IP route where encryption fully protects you (other than weak PRNG problems and 0-days the NSA knows about) from Man-In-The-Middle (MITM) attacks. The endpoints are not encrypted. These are risks we take with companies and products and networks and services that we choose to trust, hopefully with an informed decision. The price of convenience. Technology is a double-edged sword.
But hacking and spying can go both ways. Kindle hackers (of lesser ethics) can tunnel traffic of all kinds through the kindle proxy by pretending to be normal kindle web browser traffic, exploiting corkscrew and "clicks to google". We do not support nor condone such things at this website. I only mentioned it to demonstrate that trust must go both ways. The service provider is also vulnerable as well.