this post was submitted on 24 Feb 2025
43 points (100.0% liked)

Hardware

3770 readers
181 users here now

All things related to technology hardware, with a focus on computing hardware.


Rules (Click to Expand):

  1. Follow the Lemmy.world Rules - https://mastodon.world/about

  2. Be kind. No bullying, harassment, racism, sexism etc. against other users.

  3. No Spam, illegal content, or NSFW content.

  4. Please stay on topic, adjacent topics (e.g. software) are fine if they are strongly relevant to technology hardware. Another example would be business news for hardware-focused companies.

  5. Please try and post original sources when possible (as opposed to summaries).

  6. If posting an archived version of the article, please include a URL link to the original article in the body of the post.


Some other hardware communities across Lemmy:

Icon by "icon lauk" under CC BY 3.0

founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] pelespirit@sh.itjust.works 2 points 6 months ago (12 children)

Does that mean if your laptop is on your network, they can control and access that?

Beyond the basics, what does access to a device on your home network grant them? Any other device connected to that home network - smart fridges, smart stoves, smart washing machines, laptops - is typically routable via your bed. The (in)security of those devices is now entrusted to random Eight Sleep engineers.

[–] wizardbeard@lemmy.dbzer0.com 4 points 6 months ago

What the article is saying is that they can use the bed as a back door into your home network. From there they operate at the same trust level as anything else on your local network, and anything on your lpcal network that would be vulnerable to an attacker on your local network would be vulnerable to them.

load more comments (11 replies)