← Back to context

Comment by pjc50

1 day ago

> Signed firmware and the sideloading ID requirements

Ending the last corner of actually free market in software is quite a cost for something that wouldn't prevent DDoS.

> sideloaded, unofficial, buggy, or poorly written apps? That's what IoT manufacturers will point to, and where most attacks historically come from

Is that actually true? What evidence do we have, vs. vulnerabilities in the OEM software (the more common case)?