jebba 2022-01-28 08:32:01 -07:00
parent 0556b36b59
commit 6315cdbfad
1 changed files with 3 additions and 1 deletions

View File

@ -86,7 +86,9 @@ some as old as 2013.
Nature of attacks, once exploited.
* Device can be fed bogus data. For example, hack a competitor's device to
say there's no gold when there is gold. Nefarious company could EPA's device
say there's no gold when there is gold.
* Nefarious polluting company could root EPA's device
when they come inspect contaminated land, and make the device's readings
say everything is ok.