One of our roaming partners raised a concern regaring the security of our hotspot implementation based on the following articles.
http://www.irongeek.com/i.php?page=secu ... rf-example
http://www.gnucitizen.org/blog/persiste ... r-wag54gs/
Is the concern valid that similar "malicious commands" can be issued to ROS via the hotspot service? I don't believe it is, but it will be good to get an answer from MT why similar commands will not be a threat to ROS.
Thank you,
Nico