Can you trust your eyes?

classic Classic list List threaded Threaded
3 messages Options
Reply | Threaded
Open this post in threaded view
|

Can you trust your eyes?

Jerome King-2
WANT TO SKIP THE BELOW?  JUST PAY CAREFUL ATTENTION TO WHO SUPPLIES YOUR VIDEO ISPLAY (WHETHER "TV" OR "COMPUTER")
Jerry


A good friend sent me this link
and asked my thoughts.  My first reaction while viewing was "what me worry Charlie Brown". But then I realized that there was something there. Pat had shared a "proof of concept" video which is the trigger point where security people wake up.

Back in my computer formative days the peripherals (printer, modems, keyboards, and displays) were "DUMB". The computer had to provide almost all control signals. Eventualy, IC computers became smaller, cheaper and could be "dedicated" to specific activity.

This meant that peripherals received messages, decoded the message and performed the task. The computer could do more work and everyone was better off.

While originally the code that the peripheral internal computer was "hard wired" (couldn't be changed) the technology evolved so that the program was stored in flash memory so it could be changed if problems arose OR a new function was to added.  Have you updated your Router with new "firmware" over the Internet for better performance or solve a problem?  Of course you have.  

The IC industry continued to evolve and now the display internal computer probably has wiFi ability. There are TV sets promoting their Smart TV functionality
Unfortunately the manufacturers of these internal IC computers (or the end product manufacturers  like a cell phone controlled front door lock) probably can't spell SEKURITY. Let alone care

After "proof of concept" comes the exploit phase.  I don't think this has happened yet

But if I was in the market for a new display for my computer I would
  • Bias my decision to those manufacturers that have shown concern about security 

  • Stay away from manufacturers (several TV examples) that have not protected their customers from Internet hacking


Jerry





____________TidBITS Talk Participation Guidelines____________
Post only when you have something substantive to contribute.
Be polite and constructive, and comment on posts, not people.
Quote sparingly, if at all. We all read the previous message.
Start threads with a new message to [hidden email].
Read archives at: http://tidbits.com/pipermail/tidbits-talk/
Unsubscribe at: http://tidbits.com/mailman/options/tidbits-talk
____Mailing List Manners: http://tidbits.com/series/1141 ____
Reply | Threaded
Open this post in threaded view
|

Re: Can you trust your eyes?

John Burt
Problems with your post.

On Sun, Jan 7, 2018 at 1:22 PM, Jerome King <[hidden email]> wrote:
WANT TO SKIP THE BELOW?  JUST PAY CAREFUL ATTENTION TO WHO SUPPLIES YOUR VIDEO ISPLAY (WHETHER "TV" OR "COMPUTER")
Jerry


​What's VIDEO ISPLAY? and how do we tell who's supplying it?

A good friend sent me this link
and asked my thoughts.  My first reaction while viewing was "what me worry Charlie Brown". But then I realized that there was something there. Pat had shared a "proof of concept" video which is the trigger point where security people wake up.

Back in my computer formative days the peripherals (printer, modems, keyboards, and displays) were "DUMB". The computer had to provide almost all control signals. Eventualy, IC computers became smaller, cheaper and could be "dedicated" to specific activity.

This meant that peripherals received messages, decoded the message and performed the task. The computer could do more work and everyone was better off.

While originally the code that the peripheral internal computer was "hard wired" (couldn't be changed) the technology evolved so that the program was stored in flash memory so it could be changed if problems arose OR a new function was to added.  Have you updated your Router with new "firmware" over the Internet for better performance or solve a problem?  Of course you have.  

The IC industry continued to evolve and now the display internal computer probably has wiFi ability. There are TV sets promoting their Smart TV functionality
Unfortunately the manufacturers of these internal IC computers (or the end product manufacturers  like a cell phone controlled front door lock) probably can't spell SEKURITY. Let alone care

After "proof of concept" comes the exploit phase.  I don't think this has happened yet

But if I was in the market for a new display for my computer I would
  • Bias my decision to those manufacturers that have shown concern about security
 
  • Stay away from manufacturers (several TV examples) that have not protected their customers from Internet hacking

​And how do we know who those are or which displays are bad for that matter?

​Now I will search on VIDEO ISPLAY out of curiosity to see if the definition is available.​




____________TidBITS Talk Participation Guidelines____________
Post only when you have something substantive to contribute.
Be polite and constructive, and comment on posts, not people.
Quote sparingly, if at all. We all read the previous message.
Start threads with a new message to [hidden email].
Read archives at: http://tidbits.com/pipermail/tidbits-talk/
Unsubscribe at: http://tidbits.com/mailman/options/tidbits-talk
____Mailing List Manners: http://tidbits.com/series/1141 ____
Reply | Threaded
Open this post in threaded view
|

Re: Can you trust your eyes?

Bob Dahl-3
ISPLAY <—> REplay  ??
Auto OVER-correct.
— 
Bob Dahl



On Jan 7, 2018, at 20:04, SciFiOneA . <[hidden email]> wrote:

Problems with your post.

On Sun, Jan 7, 2018 at 1:22 PM, Jerome King <[hidden email]> wrote:
WANT TO SKIP THE BELOW?  JUST PAY CAREFUL ATTENTION TO WHO SUPPLIES YOUR VIDEO ISPLAY (WHETHER "TV" OR "COMPUTER")
Jerry


​What's VIDEO ISPLAY? and how do we tell who's supplying it?

A good friend sent me this link
and asked my thoughts.  My first reaction while viewing was "what me worry Charlie Brown". But then I realized that there was something there. Pat had shared a "proof of concept" video which is the trigger point where security people wake up.

Back in my computer formative days the peripherals (printer, modems, keyboards, and displays) were "DUMB". The computer had to provide almost all control signals. Eventualy, IC computers became smaller, cheaper and could be "dedicated" to specific activity.

This meant that peripherals received messages, decoded the message and performed the task. The computer could do more work and everyone was better off.

While originally the code that the peripheral internal computer was "hard wired" (couldn't be changed) the technology evolved so that the program was stored in flash memory so it could be changed if problems arose OR a new function was to added.  Have you updated your Router with new "firmware" over the Internet for better performance or solve a problem?  Of course you have.  

The IC industry continued to evolve and now the display internal computer probably has wiFi ability. There are TV sets promoting their Smart TV functionality
Unfortunately the manufacturers of these internal IC computers (or the end product manufacturers  like a cell phone controlled front door lock) probably can't spell SEKURITY. Let alone care

After "proof of concept" comes the exploit phase.  I don't think this has happened yet

But if I was in the market for a new display for my computer I would
  • Bias my decision to those manufacturers that have shown concern about security 
 
  • Stay away from manufacturers (several TV examples) that have not protected their customers from Internet hacking

​And how do we know who those are or which displays are bad for that matter?

​Now I will search on VIDEO ISPLAY out of curiosity to see if the definition is available.​



____________TidBITS Talk Participation Guidelines____________
Post only when you have something substantive to contribute.
Be polite and constructive, and comment on posts, not people.
Quote sparingly, if at all. We all read the previous message.
Start threads with a new message to [hidden email].
Read archives at: http://tidbits.com/pipermail/tidbits-talk/
Unsubscribe at: http://tidbits.com/mailman/options/tidbits-talk
____Mailing List Manners: http://tidbits.com/series/1141 ____




____________TidBITS Talk Participation Guidelines____________
Post only when you have something substantive to contribute.
Be polite and constructive, and comment on posts, not people.
Quote sparingly, if at all. We all read the previous message.
Start threads with a new message to [hidden email].
Read archives at: http://tidbits.com/pipermail/tidbits-talk/
Unsubscribe at: http://tidbits.com/mailman/options/tidbits-talk
____Mailing List Manners: http://tidbits.com/series/1141 ____