• 0x0@programming.dev
      link
      fedilink
      English
      arrow-up
      9
      arrow-down
      1
      ·
      4 hours ago

      Or Facebook, fine too… and Instagram, X, Amazon, Microsoft, Google…

      • WhiteRabbit_33@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        ·
        1 hour ago

        Yep, we need broad sweeping data privacy laws and audits in every country for all software. Not just fear mongering over other country’s software.

    • lgmjon64@lemmy.world
      link
      fedilink
      English
      arrow-up
      6
      arrow-down
      1
      ·
      6 hours ago

      They connect to allow the vitals to be pulled into the EMR to allow continuous documentation of vitals for the anesthesia record or central patient monitoring. More and more frequently, the database is not onsite and is shared amongst several sites within a hospital system.

      • Onomatopoeia@lemmy.cafe
        link
        fedilink
        English
        arrow-up
        6
        ·
        edit-2
        5 hours ago

        But the device itself shouldn’t need internet connectivity for this. That networking should be handled by a local master device, the same way access control systems (e.g. Door badge readers, alarm monitoring, etc) work.

        Then this device would only use a local, isolated network to access the master device.

    • sunzu2@thebrainbin.org
      link
      fedilink
      arrow-up
      3
      arrow-down
      1
      ·
      7 hours ago

      Not sure. If true, prolly just generic data mining?

      Would fake news ever report if it was pinging mountain view?

      • IrateAnteater@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        4
        ·
        6 hours ago

        Might also not be this device that was specifically targeted. The backdoor could have been placed in component firmware for any generic components this device uses, or in some general software library that gets used all over the place.