I’m really tired of explaining that hacking into an individual device in a complex physical process does not in most cases equate to successfully and meaningfully tampering with the process.
(Especially when it’s done on a table in a Village. Even though the research done there is incredibly important and meaningful.)
Anyway I have seen this for years when people gleefully found insecure HMIs on Shodan and now when people are drawing equivalence between voting machine vulnerabilities and successful election fraud.
This isn't like meant to be scathing subtweet criticism. Lots of really great infosec people don't know this because it's not their niche. It's impossible to know every area of infosec, and physical process security is certainly it's own.
You can follow @hacks4pancakes.
Tip: mention @twtextapp on a Twitter thread with the keyword “unroll” to get a link to it.

Latest Threads Unrolled:

By continuing to use the site, you are consenting to the use of cookies as explained in our Cookie Policy to improve your experience.