Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

There are routers that can control how much data a given downstream device can transfer in a given time, shut them down entirely during certain times of day, etc.

But then I'd guess the crooks will just compromise the router itself.



And the average IOT user is unlikely to understand the security implications and correctly configure the router.




Consider applying for YC's Winter 2026 batch! Applications are open till Nov 10

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: