Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I can kind of see a device that has no ports open on the local network, and just uses an always-on ssh tunnel to HQ to receive commands. That way it's not exposed to anything on the local network, and it's the company resources that would have to be hacked first.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: