Has anyone stopped to consider what a gift these hackers gave all of us? They exposed their capabilities and nobody got hurt. We all had a notion as to what sort of attacks were possible in theory. Now we have reality. Business being what it is, customers may not be interested in others' security, but IoT being what it is, they might be interested in their own: in this instance, as I understand it, cameras were involved. If a camera could be used to attack someone else, it could be used to invade the privacy of the owner. If consumers come to see that as a threat, that'd be a good first step to internalizing what was an externality. At that point you can sell something. Big if, though. Eliot On 9/25/16 7:00 PM, John Kristoff wrote:
On Sun, 25 Sep 2016 14:36:18 +0000 Ca By <cb.list6@gmail.com> wrote:
As long as their is one spoof capable network on the net, the problem will not be solved. This is not strictly true. If it could be determined where a large bulk of the spoofing came from, public pressure could be applied. This may not have been the issue in this case, but in many amplification and reflection attacks, the originating spoof-enabled networks were from a limited set of networks. De-peering, service termination, shaming, etc could have an effect.
John