Event JSON
{
"id": "9d2a71486be14e511f851d923b83f7c73f59e21ee541867fb9cc6738417a55ba",
"pubkey": "14ef91be93dec761b82ea32ac9d9e2f7198a6de4be9f240b765f3dccfbef8b45",
"created_at": 1776209991,
"kind": 1,
"tags": [
[
"t",
"infosec"
],
[
"t",
"homeinternet"
],
[
"proxy",
"https://federate.social/@jik/116405698003147593",
"web"
],
[
"t",
"router"
],
[
"t",
"netgear"
],
[
"t",
"r9000"
],
[
"proxy",
"https://federate.social/users/jik/statuses/116405698003147593",
"activitypub"
],
[
"L",
"pink.momostr"
],
[
"l",
"pink.momostr.activitypub:https://federate.social/users/jik/statuses/116405698003147593",
"pink.momostr"
],
[
"-"
]
],
"content": "I have an old #Netgear #R9000 WiFi #router acting as an access point. This router is end-of-life and supposedly no longer receives firmware updates; there was a security update last September, so it isn't _too_ stale.\nBecause it's serving as an access point it has no public IP address, though obviously a sufficiently dedicated attacker could literally sit outside our house and talk to it over WiFi.\nIf you were in my shoes, what would you do with this router?\n#infosec #homeInternet",
"sig": "eae60b88291b9a89d3f83bc40de942cff2ce4024a0911e76a565a99f0e740c874875bac39799d3ab716bc2d28f430ca5bd752a087626cd26ddd08dd250606dc5"
}