'We're Not Being Paranoid': U.S. Warns Of Spy Dangers Of Chinese-Made Drones
Drones have become an increasingly popular tool for industry and government. Electric utilities use them to inspect transmission lines. Oil companies fly them over pipelines. The Interior Department even deployed them to track lava flows at Hawaii's Kilauea volcano.
But the Department of Homeland Security is warning that drones manufactured by Chinese companies could pose security risks, including that the data they gather could be stolen.
The department sent out an alert on the subject on May 20, and a video on its website notes that drones in general pose multiple threats, including "their potential use for terrorism, mass casualty incidents, interference with air traffic, as well as corporate espionage and invasions of privacy." "We're not being paranoid," the video's narrator adds.
Related: Department of Homeland Security Terror Bulletin Warns of "Weaponized Drones"
(Score: 4, Interesting) by edIII on Wednesday May 29 2019, @11:46PM (7 children)
I'm of the opinion now that I don't give a fuck where the electronics come from. I care more about the environmental impact of making them in the first place, long term plans for recycling and disposal, and security.
If Huawai can show me a blob/binary free high end processor (without that speculative execution crap), on a quality motherboard that is likewise blob/binary free, with fully open designs allowing for robust pentesting, they get my money. They will definitely get my money if they can show a blob/binary free TPM, or security and management module that I can fully and utterly control. Not that absolute disaster that was Intel's no-security management chips.
I'm not interested in boycotting them just to prop up Intel and AMD's intellectual property. That always translates into the little guys suffering so rich people's wealth and assets can be protected, and fuck that noise.
If you're products can survive serious pentesting, then I'll be interested in using them. Trade war politics be damned.
Technically, lunchtime is at any moment. It's just a wave function.
(Score: 2) by takyon on Wednesday May 29 2019, @11:59PM
AMD is sharing intellectual property with China:
https://en.wikichip.org/wiki/thatic [wikichip.org]
[SIG] 10/28/2017: Soylent Upgrade v14 [soylentnews.org]
(Score: 2) by MostCynical on Thursday May 30 2019, @03:14AM (5 children)
So, do you insist that all your devices are blob free/open?
Your car, television, computers, toys... or just some phones made in China?
"I guess once you start doubting, there's no end to it." -Batou, Ghost in the Shell: Stand Alone Complex
(Score: 2) by edIII on Thursday May 30 2019, @03:41AM (4 children)
All. Thats why i have a burner phone. No tablets, or IoTs crap either. Dont yet have a fully free setup, but moving towards it.
Technically, lunchtime is at any moment. It's just a wave function.
(Score: 2) by takyon on Thursday May 30 2019, @04:47AM (1 child)
What is your main SN browsing computer, and when are you moving to RISC-V?
Does this laptop meet your standards? [soylentnews.org]
[SIG] 10/28/2017: Soylent Upgrade v14 [soylentnews.org]
(Score: 2) by edIII on Friday May 31 2019, @07:34PM
I'm still stuck on Intel, but this will be my last one. I'm going for something Libre next, or RISC-V.
The Pine64 does look interesting, but is it blob/binary free? I'm real serious about that because I'm absolutely convinced that any serious level of security must start from the bottom. Pentesting can never stop because it hit proprietary code that it can't inspect.
Technically, lunchtime is at any moment. It's just a wave function.
(Score: 0) by Anonymous Coward on Thursday May 30 2019, @08:34AM (1 child)
What's the environmental impact of using burner phones?
If you really care about security and you're using a burner phone for long periods you're probably doing it wrong.
(Score: 2) by edIII on Friday May 31 2019, @07:36PM
There are compromises, that is true. I give burner phones away every so often to homeless people that need it.
Until I have a fully libre phone that I can prevent being used for surveillance, I have to rely on Bayesian poisoning.
Technically, lunchtime is at any moment. It's just a wave function.