Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

>safe

In 99% of cases these devices are exploited using vulnerabilities in the software or configuration added by the vendor (such as telnet access with root:root), not bugs in Linux.

>open source

How exactly would a permissively licensed kernel get vendors to disclose the source code?



Consider applying for YC's Winter 2026 batch! Applications are open till Nov 10

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: