On Wed, Feb 08, 2017 at 08:30:15AM -0800, Damian Menscher wrote:
> The devices are trivially compromised (just log in with the default root
> password).  So here's a modest proposal: log in as root and brick the
> device.

No.  It's never a good idea to respond to abuse with abuse.  Not only
is it unethical and probably illegal (IANAL, this is not legal advice)
but it won't take more than a day for someone to figure out that this
is happening and use some variety of misdirection to cause third parties
to target devices that aren't actually part of the problem.

---rsk

Reply via email to