0

I have a IoT device that works with BLE and uses a smartphone as a bridge to connect to a digital platform (cloud). The communication between the IoT device and the platform is based in PKI. The IoT device has only few privileges and services to with the platform such as status communication, public key sharing and other few status messages.

If this IoT device is hacked, could it be used as a backdoor to access or change critical information in the platform?

What can a hacker do with a hacked IoT device to threat the platform data?

The hacker will not be able to access any other data than the one allowed by the platform to that device, correct?

LazyTurtle
  • 93
  • 5

0 Answers0