← Back to context

Comment by pjc50

13 hours ago

> Signed firmware and the sideloading ID requirements

Ending the last corner of actually free market in software is quite a cost for something that wouldn't prevent DDoS.

> sideloaded, unofficial, buggy, or poorly written apps? That's what IoT manufacturers will point to, and where most attacks historically come from

Is that actually true? What evidence do we have, vs. vulnerabilities in the OEM software (the more common case)?