torstein
Senior Member
I'm just curious, how exactly does a smart lock, or a light bulb or a smart kitchen appliance pose a threat? If you have your router properly set-up, disabled UPnP, enabled the firewall and no port forwarding, then there's no way some remote hacker can enter my home network through a security hole in any given smart device / appliance, right? They would first have to breach my firewall to get to the IoT smart device in the first place, or am I missing something?
I know I can always just have a different vlan, or put all the smart thingies on the guest network, that's not the problem here. I'm just curious how hackers go about exploiting these never-updated-since-manufacture-date devices full of security holes get hacked. Do they have to have physical access, and do packet-sniffing from the wifi-signal / bluetooth signal, or is it remotely over the internet?
Sorry if this has been posted before, I tried searching, and googling, but found nothing here on snbforums, and google only found run-of-the-mill shallow answers from various tech-sites written in a shallow way either because the author doesn't understand the topic or to make it as understandable as possible for its non-tech readers. Nonetheless, it provided no answers that I was looking for. Hoping you fine folks have some answers
I know I can always just have a different vlan, or put all the smart thingies on the guest network, that's not the problem here. I'm just curious how hackers go about exploiting these never-updated-since-manufacture-date devices full of security holes get hacked. Do they have to have physical access, and do packet-sniffing from the wifi-signal / bluetooth signal, or is it remotely over the internet?
Sorry if this has been posted before, I tried searching, and googling, but found nothing here on snbforums, and google only found run-of-the-mill shallow answers from various tech-sites written in a shallow way either because the author doesn't understand the topic or to make it as understandable as possible for its non-tech readers. Nonetheless, it provided no answers that I was looking for. Hoping you fine folks have some answers