a thoughtful web.
Good ideas and conversation. No ads, no tracking.   Login or Take a Tour!
comment by Doctor_Whom

I'm quite surprised that this sort of thing isn't more widely known. All devices use the same basic protocol structure so if it gets connected to the internet or accepts wireless signals, someone can get into it. The only way to completely secure a device is to leave it offline, then you need physical access to it.