Jump to content

Shock collar: Difference between revisions

→‎Wireless security: Add some notes on wireless attacks
(→‎Wireless security: Add some notes on wireless attacks)
Line 28: Line 28:


=== Wireless security ===
=== Wireless security ===
In addition to health risks of the use of the shock collar, it is also important to consider that because shock collars use wireless communication, anyone in range with the proper tools and knowledge may be able to activate the collar, either by exploiting weaknesses in the protocol or simply recording and replaying the signal. In some cases, this may be able to bypass any safety systems that are built in to the shock collar module. More expensive name brand shock collar modules may provide some protection against these attacks.
In addition to health risks of the use of the shock collar, it is also important to consider that because shock collars use wireless communication, anyone in range with the proper tools and knowledge may be able to activate the collar, either by exploiting weaknesses in the protocol or simply recording and replaying the signal.<ref>{{Cite web |last=Kuester |first=Tim |title=DEFCON23 / WCTF: Shock Collar as a Service |url=https://gist.github.com/tkuester/67f2d8f5c03aee22c6d7 |access-date=2024-08-15 |website=GitHub Gist |language=en}}</ref> In some cases, this may be able to bypass any safety systems that are built in to the shock collar module. More expensive name brand shock collar modules may provide some protection against these attacks.


== Risk mitigation <!-- Describe the risk mitigation for this kink. --> ==
== Risk mitigation <!-- Describe the risk mitigation for this kink. --> ==
author
64

edits