On Wed, Feb 08, 2017 at 08:30:15AM -0800, Damian Menscher wrote: > The devices are trivially compromised (just log in with the default root > password). So here's a modest proposal: log in as root and brick the > device.
No. It's never a good idea to respond to abuse with abuse. Not only is it unethical and probably illegal (IANAL, this is not legal advice) but it won't take more than a day for someone to figure out that this is happening and use some variety of misdirection to cause third parties to target devices that aren't actually part of the problem. ---rsk