The folks at Freedom-to-Tinker have been studying the software
used to remotely control those laptops:

        School's Laptop Spying Software Exploitable from Anywhere
        
http://www.freedom-to-tinker.com/blog/jhalderm/schools-laptop-spying-software-exploitable-anywhere

Among other things, the crypto key is hardcoded, so as the comment on
Boing Boing that pointed to this noted, once you've gotten into one,
you've gotten into all of them.

---Rsk
_______________________________________________
Fun and Misc security discussion for OT posts.
https://linuxbox.org/cgi-bin/mailman/listinfo/funsec
Note: funsec is a public and open mailing list.

Reply via email to