Remember when NASA conducted the SETI project? Millions of volunteers allowed NASA to install a tiny client on their personal computing device, that would churn away bits and pieces of a space signal, to figure out what it meant.
Now we have billions and billions of internet-connected devices, over which we have no control. Who's to say those aren't abused into a botnet that happily and quietly breaks encryption algorithms?
Conversation
Notices
-
André E. Veltstra (aeveltstra@mastodon.social)'s status on Monday, 22-Jul-2019 00:59:43 UTC André E. Veltstra -
André E. Veltstra (aeveltstra@mastodon.social)'s status on Monday, 22-Jul-2019 01:02:35 UTC André E. Veltstra And there's millions of web browsers "infected" with bitcoin-mining javascripts, delivered via unsuspecting web sites using advertisments. That's bad only because it uses CPU, memory, and battery. But what's stopping the makers of such botnets from reusing their infrastucture for decoding or brute-forcing password hashes?
-