Friday, January 13, 2023

Cat Exploits: Raspberry Pi War Drive's & IP Theft

If anything/everything can be breached, then what is the proper protocol to prevent "Cat Exploits"? i.e. Raspberry Pi War Drive's breaking through encryption, stealing data, and transmitting it to their servers, and fellow criminal threat acting gangs?Is the solution Faraday Curtains plus direct ethernet connection?
Something different?

(You know these groups of hackers are all over the US. Likely in greater numbers in select cities; but traveling 2020-2022, I have hundreds of gigs of images of this type of activity, in many places. They are organized crime, attempting to profit from stolen data.)

"Under Germany’s “Störerhaftung” third-party liability law, Wi-Fi owners can be punished for illegal activities conducted on their networks, meaning that cafe owners can be held responsible for patrons who steal music, hotels can face charges if travelers torrent TV shows during their stay, and private home owners can find themselves in hot water if someone downloads copyrighted material via a server."

What do you think?