66
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
this post was submitted on 02 Sep 2023
66 points (97.1% liked)
Asklemmy
43822 readers
894 users here now
A loosely moderated place to ask open-ended questions
Search asklemmy ๐
If your post meets the following criteria, it's welcome here!
- Open-ended question
- Not offensive: at this point, we do not have the bandwidth to moderate overtly political discussions. Assume best intent and be excellent to each other.
- Not regarding using or support for Lemmy: context, see the list of support communities and tools for finding communities below
- Not ad nauseam inducing: please make sure it is a question that would be new to most members
- An actual topic of discussion
Looking for support?
Looking for a community?
- Lemmyverse: community search
- sub.rehab: maps old subreddits to fediverse options, marks official as such
- !lemmy411@lemmy.ca: a community for finding communities
~Icon~ ~by~ ~@Double_A@discuss.tchncs.de~
founded 5 years ago
MODERATORS
I would note that, because it's so old and out of support for everything, anything you got running on it would be full of security vulnerabilities.
Like, do not connect this to a network you care about kind of vulnerable.
I'd frankly just find a way to recycle it safely and learn to do that earlier with devices you're not using, so others can use them instead of just sitting in a closet. (It's not like I'm not guilty of the same thing.)
What makes his 13 year old iPad a target for hackers ?
Software vulnerabilities that aren't (and never will be) patched.
Anything with any computing power an internet connection can be a target. It will likely become a part of a bot net used to ddos, spam, or crack passwords. In addition, it'll give hackers access to any accounts you're logged in to, such as apple ID, email bank etc, so it could be further used to steal your identity or money.
Because it's so old and full of vulnerabilities, it makes it an easy target. If it gets hacked, it'll most likely be automatic process, without any intervention from the hacker, and there may be no signs that the device is infected.
Unethical Idea for OP: create a botnet to ddos, spam, mine crypto or hack passwords! Give life to your old iPad (and other people's too!)
Devices that are no longer supported and kept up to date with security updates contain known, but unpatched, vulnerabilities. Some of them are software based, but some are a function of the hardware itself. Connect these to a network, manage to do something that gets them compromised, and you've given bad actors a foothold on your network.
Because most networks, especially home networks, tend to be configured in a way that trusts local network traffic more than external traffic, such a foothold can further compromise your systems. Very few people have the resources, or technical know-how to properly segregate potentially dangerous or vulnerable devices on a network.
That's what.