Stories
Slash Boxes
Comments

SoylentNews is people

posted by martyb on Thursday March 29 2018, @04:44PM   Printer-friendly
from the Protecting-the-product-or-the-public? dept.

The U.S. Consumer Product Safety Commission is conducting a public hearing on the safety of internet-connected consumer products, and is requesting comments.

The Commission hearing will begin at 10 a.m., on May 16, 2018, and will conclude the same day. The Commission hearing will also be available through a webcast, but viewers will not be able to interact with the panels and presenters through the webcast.
...
The growth of IoT-related products is a challenge for all CPSC stakeholders to address. Regulators, standards organizations, and business and consumer advocates must work collaboratively to develop a framework for best practices. To that end, the Commission will hold a public hearing for all interested parties on consumer product safety issues related to IoT.

Although this explicitly does not cover data security and privacy it covers many of the other issues seen with IoT devices.

Comments can be submitted to the commission through the web portal:

You may submit written comments, identified by Docket No. CPSC-2018-0007
...
Electronic Submissions: Submit electronic comments to the Federal eRulemaking Portal at: www.regulations.gov. Follow the instructions for submitting comments.

Seen through the Internet Of Shit twitter feed.


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2, Interesting) by Anonymous Coward on Thursday March 29 2018, @07:20PM

    by Anonymous Coward on Thursday March 29 2018, @07:20PM (#660142)
    • Nobody said the ISP should be watching your packets specifically.

      Yet, you cannot have an ISP that doesn't watch packets in general—that's what they do; they transport and manage packets.

      A botnet that is used for DDoS attacks results in a huge amount of packets being sent to a particular party; those packets could indeed be traced back to the originators after the fact.

    • A nutcase flying to a destination is not at all equivalent; that's a normal use of the airline—as you point out, it's indistinguishable from any other person using the airline.

      In contrast, a DDoS attack is like the airline flying a whole plane of nutcases who are toting guns and talking loudly about the damage they're going to do when they land.

    Starting Score:    0  points
    Moderation   +2  
       Insightful=1, Interesting=1, Total=2
    Extra 'Interesting' Modifier   0  

    Total Score:   2