Skip to content
This repository has been archived by the owner on May 12, 2022. It is now read-only.

1.3.2. PiHome Dummy Core

jarodium edited this page Aug 13, 2017 · 2 revisions

PiHome Dummy Core

The Dummy Core does what the name says. It should mirror the Core's actions, and replicates them, but does nothing than replying the way the Core do.

On suspicion of invasion, the Security Pack reroutes all requests from the ataccker or attackers to the dummy core and let it be hacked. Of course the Dummy Core should try to fight back attackers, but in a fashion that can be distracting enough of the true Security Pack rerouting and defense mechanisms.

Once the Dummy Core is taken over, the Core should deny any outside connections even from the Dummy, Sec Pack and the Device Hub, or simply shutdown all network interfaces. That means also trusted devices are left out, and the recovery will be made by the Manufacturer only.

Clone this wiki locally