Page 1 of 1

Re: Playing devils advocate

Posted: Mon Aug 29, 2011 11:22 am
by MDC
Could this device be used for malicious purposes for like for a bot net, by hackers or for many types of computer fraud?

I know anything can be malicous if put into the wrong hands but from a technical point of view it is kind of interesting.

Re: Playing devils advocate

Posted: Mon Aug 29, 2011 11:50 am
by vadsamoht
About the only thing I can see that the r-pi has going for it is the fact that is highly portable/concealable. Mast things you would do with malicious intent would either be exactly the same as on a desktop PC, or would not be possible due to the need of a faster CPU.

Re: Playing devils advocate

Posted: Mon Aug 29, 2011 11:56 am
by ShiftPlusOne
Everything has a potentially malicious application for it. As with everything, you look at the pros and cons. So... the risk of creating a few more Nigerian princes vs the possibility to get millions of people excited about programming and engineering... which outweighs which?

Re: Playing devils advocate

Posted: Mon Aug 29, 2011 12:00 pm
by vadsamoht
Quote from ShiftPlusOne on August 29, 2011, 12:56So... the risk of creating a few more Nigerian princes vs the possibility to get millions of people excited about programming and engineering... which outweighs which?

And what project wouldn't benefit from having royalty on their side anyway?

Re: Playing devils advocate

Posted: Mon Aug 29, 2011 12:12 pm
by Svartalf
Quote from MDC on August 29, 2011, 12:22
Could this device be used for malicious purposes for like for a bot net, by hackers or for many types of computer fraud?

Bot nets are only useful if you can steal someone else's resources, including computers and bandwidth.


I know anything can be malicous if put into the wrong hands but from a technical point of view it is kind of interesting.

You've already answered your question. For only slightly more money, though, you can hack something like a RokuXS and accomplish the same sorts of things- so it's not like this is going to magically make it "inexpensive". There's things that you could do with this device that would be "malicious"- but it's not going to be as useful for that purpose than other devices, really.

Re: Playing devils advocate

Posted: Mon Aug 29, 2011 3:16 pm
by Lob0426
I don't know: I guess I could build a ADSL modem and attach a RasPi inside my neighbors phone access box and use wireless to hijack his Internet. Send threats, porn and such under his account name.

Hey that's not a bad idea I have a PCI based ADSL modem here someplace! a little hacking and,

Aw dang it, that won't work, I like my neighbor!

Re: Playing devils advocate

Posted: Mon Aug 29, 2011 3:19 pm
by liz
Locking this one down. Sorry, guys - it *is* interesting, but we need to negotiate with partners who may be helping us fund the charity, and I don't want to give them the impression that we are trying to outfit an army of script kiddies with weapons of mass digital destruction. Because we aren't. :)

(Although, in closing, I would like to note that I can put any tool to malicious use. Right now I'm thinking about a dinner fork, and the soft parts of everyone who took part in this thread.)