Little boxes on the seaside. Fundamental enabling technology for botnets is mass production, and re-use of defensive patterns that turn out to have zero-day holes in them. It came up in an interview the other day; joking that a reason to use Forth on an IoT device is that few would be able to figure out how to get into it. But that's a security from obscurity, which never works in the long run. Defense in depth is needed. Add to mass production a pervasive network, and globally active adversaries, and the consequences are obvious. IoT businesses would be wise to seek their returns as early as possible, before the product falls to a botnet, then phoenix-like arise from the ashes under a new name. Businesses that trade on their name should be somewhat more careful and conservative. --=20 James Cameron http://quozl.netrek.org/ --=20 http://www.piclist.com/techref/piclist PIC/SX FAQ & list archive View/change your membership options at http://mailman.mit.edu/mailman/listinfo/piclist .