Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Then you can adjust your Pi to spoof a known device. That's not too difficult.

The only solution is layered security. (And to be clear, banning unknown devices barely qualifies as a layer.)



Yay for 802.1X.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: