As technology marches on, some people get trapped using decades-old software and devices. Here's a look inside the strange, stubborn world of obsolete Windows machines.
This is short-sighted. It also reeks of “Fuck you, I got mine!” I know that’s not your intention. I just think you haven’t thought super hard about it. I was the same with privacy concerns.
So let me throw some edge cases at you.
You remember the network time protocol vulnerability that was used to power botnets for a little bit? Well, until everyone upgraded their shit, service providers had to just block IP ranges of compromised machines until enough machines in that block stopped DDoS’ing them.
So what happens when some script kiddy pays for time on the botnet, which includes your box, to smash Wizards while you’re trying to look things up? Or what if someone uses your box as a jump box to go attack some giant corporation, and shit gets traced back to you? Or what if someone decides you’re the unlucky one where their whole goal is to dominate your entire home network, and they get your phone when it’s on your home wifi?
This is short-sighted. It also reeks of “Fuck you, I got mine!” I know that’s not your intention. I just think you haven’t thought super hard about it. I was the same with privacy concerns.
So let me throw some edge cases at you.
You remember the network time protocol vulnerability that was used to power botnets for a little bit? Well, until everyone upgraded their shit, service providers had to just block IP ranges of compromised machines until enough machines in that block stopped DDoS’ing them.
So what happens when some script kiddy pays for time on the botnet, which includes your box, to smash Wizards while you’re trying to look things up? Or what if someone uses your box as a jump box to go attack some giant corporation, and shit gets traced back to you? Or what if someone decides you’re the unlucky one where their whole goal is to dominate your entire home network, and they get your phone when it’s on your home wifi?