Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment Re:Lol, sure (Score 1) 66

That's presuming that NO ONE in the public at large works for a power company. Which, as we all know, is nonsense.

You realise you can actually inform the power company without informing the public at large?

However, that's not the point - putting a vulnerability out in the open forces the people who use those systems to fix them ASAP, rather than just ignoring the problem until after someone exploits it.

The problem is, you can't just fix these things instantly. This isn't like your web browser, as I said. You don't just push out a quick bug fix and install it. These things run terrible ancient legacy code that you don't even know if anyone knows any more. Fixing them can be a very long process. During all that time, you'll be vulnerable, and can't do anything about it.

Comment Re:Monitor the Airwaves (Score 3, Informative) 137

Bluetooth is short range, and R/C uses audible signals on CB channel 14 or so.

Generally, these days RC uses the same 2.4 GHz band as Bluetooth, but not at Bluetooth energy levels or protocols. They tend to have a range of up to a few kilometers. Can probably easily be extended if needed.

But as others pointed out, these things are often quite autonomous and don't need a control signal anyway.

Comment Re:It's not bad security. (Score 2) 66

No - security through obscurity does not work. You are better off fixing security holes and making it public, preferably with open source so that everyone can see that its fixed and look for other weaknesses.

That works for you chat program or web browser.

Doesn't quite work that way for your power grid infrastructure.

Slashdot Top Deals

An Ada exception is when a routine gets in trouble and says 'Beam me up, Scotty'.

Working...