'We're Not Being Paranoid': U.S. Warns Of Spy Dangers Of Chinese-Made Drones
Drones have become an increasingly popular tool for industry and government. Electric utilities use them to inspect transmission lines. Oil companies fly them over pipelines. The Interior Department even deployed them to track lava flows at Hawaii's Kilauea volcano.
But the Department of Homeland Security is warning that drones manufactured by Chinese companies could pose security risks, including that the data they gather could be stolen.
The department sent out an alert on the subject on May 20, and a video on its website notes that drones in general pose multiple threats, including "their potential use for terrorism, mass casualty incidents, interference with air traffic, as well as corporate espionage and invasions of privacy." "We're not being paranoid," the video's narrator adds.
Related: Department of Homeland Security Terror Bulletin Warns of "Weaponized Drones"
(Score: 2) by MostCynical on Thursday May 30 2019, @03:14AM (5 children)
So, do you insist that all your devices are blob free/open?
Your car, television, computers, toys... or just some phones made in China?
"I guess once you start doubting, there's no end to it." -Batou, Ghost in the Shell: Stand Alone Complex
(Score: 2) by edIII on Thursday May 30 2019, @03:41AM (4 children)
All. Thats why i have a burner phone. No tablets, or IoTs crap either. Dont yet have a fully free setup, but moving towards it.
Technically, lunchtime is at any moment. It's just a wave function.
(Score: 2) by takyon on Thursday May 30 2019, @04:47AM (1 child)
What is your main SN browsing computer, and when are you moving to RISC-V?
Does this laptop meet your standards? [soylentnews.org]
[SIG] 10/28/2017: Soylent Upgrade v14 [soylentnews.org]
(Score: 2) by edIII on Friday May 31 2019, @07:34PM
I'm still stuck on Intel, but this will be my last one. I'm going for something Libre next, or RISC-V.
The Pine64 does look interesting, but is it blob/binary free? I'm real serious about that because I'm absolutely convinced that any serious level of security must start from the bottom. Pentesting can never stop because it hit proprietary code that it can't inspect.
Technically, lunchtime is at any moment. It's just a wave function.
(Score: 0) by Anonymous Coward on Thursday May 30 2019, @08:34AM (1 child)
What's the environmental impact of using burner phones?
If you really care about security and you're using a burner phone for long periods you're probably doing it wrong.
(Score: 2) by edIII on Friday May 31 2019, @07:36PM
There are compromises, that is true. I give burner phones away every so often to homeless people that need it.
Until I have a fully libre phone that I can prevent being used for surveillance, I have to rely on Bayesian poisoning.
Technically, lunchtime is at any moment. It's just a wave function.