You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on May 12, 2022. It is now read-only.
jarodium edited this page Aug 13, 2017
·
2 revisions
PiHome Dummy Core
The Dummy Core does what the name says.
It should mirror the Core's actions, and replicates them, but does nothing than replying the way the Core do.
On suspicion of invasion, the Security Pack reroutes all requests from the ataccker or attackers to the dummy core and let it be hacked. Of course the Dummy Core should try to fight back attackers, but in a fashion that can be distracting enough of the true Security Pack rerouting and defense mechanisms.
Once the Dummy Core is taken over, the Core should deny any outside connections even from the Dummy, Sec Pack and the Device Hub, or simply shutdown all network interfaces. That means also trusted devices are left out, and the recovery will be made by the Manufacturer only.