<div><div dir="auto">Have a cruise through this. <div><a href="https://github.com/awesome-selfhosted/awesome-selfhosted/blob/master/README.md">https://github.com/awesome-selfhosted/awesome-selfhosted/blob/master/README.md</a></div></div></div><div><br><div class="gmail_quote"><div dir="ltr" class="gmail_attr">On Fri, Feb 21, 2020 at 6:03 PM Andrew Kohlsmith (mailing lists account) <<a href="mailto:aklists@mixdown.ca">aklists@mixdown.ca</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div style="word-wrap:break-word;line-break:after-white-space">Good evening, Doug,<br><div><br><blockquote type="cite"><div>On Feb 21, 2020, at 12:07 PM, Doug Moen <<a href="mailto:doug@moens.org" target="_blank">doug@moens.org</a>> wrote:</div><div><div style="font-family:Helvetica;font-size:12px;font-style:normal;font-variant-caps:normal;font-weight:normal;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;text-decoration:none">Unless you are using a trendy IoT whiteboard, your whiteboard should not have any remote vulnerabilities. Sure, there are local vulnerabilities, if the hacker has direct physical access to the hardware, but not much is proof against that.<br></div></div></blockquote><br></div><div>May I suggest a loyal, well-trained watch dog? :-)</div></div><div style="word-wrap:break-word;line-break:after-white-space"><div><br></div><div>-A.</div><div><br></div></div>_______________________________________________<br>
kwlug-disc mailing list<br>
<a href="mailto:kwlug-disc@kwlug.org" target="_blank">kwlug-disc@kwlug.org</a><br>
<a href="https://kwlug.org/mailman/listinfo/kwlug-disc_kwlug.org" rel="noreferrer" target="_blank">https://kwlug.org/mailman/listinfo/kwlug-disc_kwlug.org</a><br>
</blockquote></div></div>