{"id":17513,"date":"2018-10-30T13:21:00","date_gmt":"2018-10-30T13:21:00","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/right-to-repair-smartphone-ruling-loosens-restrictions-on-industrial-farm-iot\/"},"modified":"2018-10-30T13:21:00","modified_gmt":"2018-10-30T13:21:00","slug":"right-to-repair-smartphone-ruling-loosens-restrictions-on-industrial-farm-iot","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/right-to-repair-smartphone-ruling-loosens-restrictions-on-industrial-farm-iot\/","title":{"rendered":"Right-to-repair smartphone ruling loosens restrictions on industrial, farm IoT"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/images.techhive.com\/images\/article\/2016\/07\/farmer-tractor-100670292-primary.idge.jpg\" class=\"ff-og-image-inserted\"\/><\/div>\n<p>Last week, the tech press made a big deal out of a ruling by the Librarian of Congress and the U.S. Copyright Office to allow consumers to break vendors\u2019 digital rights management (DRM) schemes in order to fix their own smartphones and digital voice assistants. <a href=\"https:\/\/www.washingtonpost.com\/technology\/2018\/10\/26\/right-repair-advocates-claim-major-victory-new-smartphone-copyright-exemption\/?utm_term=.d56723ac527b\" rel=\"nofollow noopener\" target=\"_blank\">According to <em>The Washington Post<\/em><\/a>, for example, the <a href=\"https:\/\/www.gpo.gov\/fdsys\/pkg\/FR-2018-10-26\/pdf\/2018-23241.pdf\" rel=\"nofollow noopener\" target=\"_blank\">ruling<\/a> \u2014 which goes into effect Oct. 28 \u2014 was a big win for consumer right-to-repair advocates.\u00a0<\/p>\n<h2><strong>Big news for vehicles<\/strong><\/h2>\n<p>That promises to save millions of consumers some coin, but it may have a far bigger impact on a much smaller cohort: farmers, construction companies, fleet managers and other companies that now have legal permission to fix their motorized land vehicles (cars, tractors, and so on \u2014 owners of boats and airplanes are still out of luck).<\/p>\n<p>As I noted in a <a href=\"http:\/\/www.networkworld.com.convey.pro\/l\/XoppkZQ\" rel=\"noopener\" target=\"_blank\"><em>Network World<\/em> post earlier this year<\/a>, many farmers have been struggling to get full benefits of the IoT technology built into their tractors because of restrictions written into their end-user license agreements (EULA). That can limit their use of the information generated about their own farming practices and also keep them from repairing their own equipment without calling in the vendor, <a href=\"https:\/\/motherboard.vice.com\/en_us\/article\/a34pp4\/john-deere-tractor-hacking-big-data-surveillance\" rel=\"nofollow noopener\" target=\"_blank\">as noted by <em>Motherboard<\/em><\/a>. The most publicized issue comes from John Deere, which argued that letting farmers fix their own equipment could lead to music piracy (<a href=\"https:\/\/copyright.gov\/1201\/2015\/comments-032715\/class%2021\/John_Deere_Class21_1201_2014.pdf\" rel=\"nofollow noopener\" target=\"_blank\">no, not a joke<\/a>).<\/p>\n<aside id=\"fsb-2649\" class=\"fakesidebar fakesidebar-auto\"><strong>[ For more on IoT security, see <a href=\"https:\/\/www.networkworld.com\/article\/3269165\/internet-of-things\/a-corporate-guide-to-addressing-iot-security-concerns.html#nww-fsb\">our corporate guide to addressing IoT security concerns<\/a>. | Get regularly scheduled insights by <a href=\"https:\/\/www.networkworld.com\/newsletters\/signup.html#nww-fsb\">signing up for Network World newsletters<\/a>. ]<\/strong><\/aside>\n<p><strong>Also on Network World:<\/strong> <a href=\"http:\/\/www.networkworld.com.convey.pro\/l\/XoppkZQ\" rel=\"noopener\" target=\"_blank\">Big trouble down on the IoT farm<\/a><\/p>\n<p>The new ruling may not give farmers ownership of their farming data, but at least they now have the right to ignore the DRMs and fix their own machines \u2014 or to hire independent repair services to do the job \u2014 instead of paying \u201cdealer prices\u201d to the vendors\u2019 own repair crews.<\/p>\n<p><a href=\"https:\/\/motherboard.vice.com\/en_us\/article\/xw9bwd\/1201-exemptions-right-to-repair\" rel=\"nofollow noopener\" target=\"_blank\">Per <em>Motherboard<\/em><\/a>, the new ruling \u201callows breaking digital rights management (DRM) and embedded software locks for \u2018the maintenance of a device or system \u2026 in order to make it work in accordance with its original specifications\u2019 or for \u2018the repair of a device or system \u2026 to a state of working in accordance with its original specifications.\u2019\u201d<\/p>\n<aside class=\"nativo-promo nativo-promo-1 smartphone\" id=\"\"\/>\n<h2><strong>Only a partial victory in the war on DRM<\/strong><\/h2>\n<p>From my perspective, this is indeed a win, but far from a complete victory. Farmers still aren\u2019t allowed to hack into their own tractors to turn them into drag racers (that might be <a href=\"https:\/\/www.youtube.com\/watch?v=rUF2rV9rhsY\" rel=\"nofollow noopener\" target=\"_blank\">fun to watch<\/a>!), but at least they can do whatever they need to do in order to make sure the machines aren\u2019t falling down on the job.<\/p>\n<aside id=\"fsb-2599\" class=\"fakesidebar fakesidebar-auto fakesidebar-sponsored\"><strong>[ <a href=\"https:\/\/pluralsight.pxf.io\/c\/321564\/424552\/7490?u=https%3A%2F%2Fwww.pluralsight.com%2Fpaths%2Fcertified-information-systems-security-professional-cisspr\" rel=\"nofollow\">Prepare to become a Certified Information Security Systems Professional with this comprehensive online course from PluralSight. Now offering a 10-day free trial!<\/a> ]<\/strong><\/aside>\n<p>That\u2019s a good start, but it still doesn\u2019t make sense to restrict legitimate device and equipment owners from making full use of the products they\u2019ve paid for. As software and IoT capabilities worm their way into just about everything, antiquated rules like this \u2014 based on the widely reviled Digital Millennium Copyright Act of 1998 (<a href=\"https:\/\/en.wikipedia.org\/wiki\/Digital_Millennium_Copyright_Act\" rel=\"nofollow noopener\" target=\"_blank\">DMCA<\/a>) \u2014 reduce the value and utility of the products they encumber, sow (often justified) distrust of the vendors, and threaten to hobble the growth of the IoT market, all in service of maximizing short-term service revenue for a handful of vendors. DRM advocates \u2014 yes, they exist \u2014 claim that it helps stop IP theft and avoid compromising the equipment. But given silly arguments like John Deere\u2019s music-piracy shenanigans, that logic can strain credulity.<\/p>\n<aside class=\"nativo-promo nativo-promo-1 tablet desktop\" id=\"\"\/>\n<h2><strong>Legal, but not necessarily possible<\/strong><\/h2>\n<p>Perhaps even more important in the real world, this ruling doesn\u2019t necessarily make getting around DRM restrictions easy, or even possible. Many vendors work very hard to make it as difficult as possible for anyone but authorized repair services to work on their products. The ruling just makes it legal to try to hack through DRMs in order to conduct repairs \u2014 it doesn\u2019t guarantee that effort will be successful.<\/p>\n<p>This approach is dangerously shortsighted. Here\u2019s hoping that this Copyright Office ruling sparks a major rethink of the rights and obligations of equipment buyers and sellers and results in a legal framework that promotes innovation and industriousness, not restrictions and control. But I\u2019m not holding my breath.<\/p>\n<div class=\"end-note\">\n<div id=\"\" class=\"blx blxParticleendnote blxM2005 blox4_html blxC23909\">Join the Network World communities on <a href=\"https:\/\/www.facebook.com\/NetworkWorld\/\" target=\"_blank\">Facebook<\/a> and <a href=\"https:\/\/www.linkedin.com\/company\/network-world\" target=\"_blank\">LinkedIn<\/a> to comment on topics that are top of mind.<\/div>\n<\/div>\n<p>READ MORE <a href=\"https:\/\/www.networkworld.com\/article\/3317696\/internet-of-things\/the-recent-right-to-repair-smartphone-ruling-will-also-affect-farm-and-industrial-equipment.html#tk.rss_security\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\nLast week, the tech press made a big deal out of a ruling by the Librarian of Congress and the U.S. Copyright Office to allow consumers to break vendors\u2019 digital rights management (DRM) schemes in order to fix their own smartphones and digital voice assistants. According to The Washington Post, for example, the ruling \u2014 which goes into effect Oct. 28 \u2014 was a big win for consumer right-to-repair advocates.\u00a0To read this article in full, please click here READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":17514,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[738],"tags":[376,307,2120,4293],"class_list":["post-17513","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networkworld","tag-internet-of-things","tag-security","tag-smartphones","tag-telematics"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Right-to-repair smartphone ruling loosens restrictions on industrial, farm IoT 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/right-to-repair-smartphone-ruling-loosens-restrictions-on-industrial-farm-iot\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Right-to-repair smartphone ruling loosens restrictions on industrial, farm IoT 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/right-to-repair-smartphone-ruling-loosens-restrictions-on-industrial-farm-iot\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-10-30T13:21:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/right-to-repair-smartphone-ruling-loosens-restrictions-on-industrial-farm-iot.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"620\" \/>\n\t<meta property=\"og:image:height\" content=\"413\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/right-to-repair-smartphone-ruling-loosens-restrictions-on-industrial-farm-iot\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/right-to-repair-smartphone-ruling-loosens-restrictions-on-industrial-farm-iot\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Right-to-repair smartphone ruling loosens restrictions on industrial, farm IoT\",\"datePublished\":\"2018-10-30T13:21:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/right-to-repair-smartphone-ruling-loosens-restrictions-on-industrial-farm-iot\/\"},\"wordCount\":742,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/right-to-repair-smartphone-ruling-loosens-restrictions-on-industrial-farm-iot\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/right-to-repair-smartphone-ruling-loosens-restrictions-on-industrial-farm-iot.jpg\",\"keywords\":[\"Internet of Things\",\"Security\",\"Smartphones\",\"Telematics\"],\"articleSection\":[\"Networkworld\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/right-to-repair-smartphone-ruling-loosens-restrictions-on-industrial-farm-iot\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/right-to-repair-smartphone-ruling-loosens-restrictions-on-industrial-farm-iot\/\",\"name\":\"Right-to-repair smartphone ruling loosens restrictions on industrial, farm IoT 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/right-to-repair-smartphone-ruling-loosens-restrictions-on-industrial-farm-iot\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/right-to-repair-smartphone-ruling-loosens-restrictions-on-industrial-farm-iot\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/right-to-repair-smartphone-ruling-loosens-restrictions-on-industrial-farm-iot.jpg\",\"datePublished\":\"2018-10-30T13:21:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/right-to-repair-smartphone-ruling-loosens-restrictions-on-industrial-farm-iot\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/right-to-repair-smartphone-ruling-loosens-restrictions-on-industrial-farm-iot\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/right-to-repair-smartphone-ruling-loosens-restrictions-on-industrial-farm-iot\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/right-to-repair-smartphone-ruling-loosens-restrictions-on-industrial-farm-iot.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/right-to-repair-smartphone-ruling-loosens-restrictions-on-industrial-farm-iot.jpg\",\"width\":620,\"height\":413},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/right-to-repair-smartphone-ruling-loosens-restrictions-on-industrial-farm-iot\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Internet of Things\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/internet-of-things\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Right-to-repair smartphone ruling loosens restrictions on industrial, farm IoT\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Right-to-repair smartphone ruling loosens restrictions on industrial, farm IoT 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/right-to-repair-smartphone-ruling-loosens-restrictions-on-industrial-farm-iot\/","og_locale":"en_US","og_type":"article","og_title":"Right-to-repair smartphone ruling loosens restrictions on industrial, farm IoT 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/right-to-repair-smartphone-ruling-loosens-restrictions-on-industrial-farm-iot\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-10-30T13:21:00+00:00","og_image":[{"width":620,"height":413,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/right-to-repair-smartphone-ruling-loosens-restrictions-on-industrial-farm-iot.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/right-to-repair-smartphone-ruling-loosens-restrictions-on-industrial-farm-iot\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/right-to-repair-smartphone-ruling-loosens-restrictions-on-industrial-farm-iot\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Right-to-repair smartphone ruling loosens restrictions on industrial, farm IoT","datePublished":"2018-10-30T13:21:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/right-to-repair-smartphone-ruling-loosens-restrictions-on-industrial-farm-iot\/"},"wordCount":742,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/right-to-repair-smartphone-ruling-loosens-restrictions-on-industrial-farm-iot\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/right-to-repair-smartphone-ruling-loosens-restrictions-on-industrial-farm-iot.jpg","keywords":["Internet of Things","Security","Smartphones","Telematics"],"articleSection":["Networkworld"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/right-to-repair-smartphone-ruling-loosens-restrictions-on-industrial-farm-iot\/","url":"https:\/\/www.threatshub.org\/blog\/right-to-repair-smartphone-ruling-loosens-restrictions-on-industrial-farm-iot\/","name":"Right-to-repair smartphone ruling loosens restrictions on industrial, farm IoT 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/right-to-repair-smartphone-ruling-loosens-restrictions-on-industrial-farm-iot\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/right-to-repair-smartphone-ruling-loosens-restrictions-on-industrial-farm-iot\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/right-to-repair-smartphone-ruling-loosens-restrictions-on-industrial-farm-iot.jpg","datePublished":"2018-10-30T13:21:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/right-to-repair-smartphone-ruling-loosens-restrictions-on-industrial-farm-iot\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/right-to-repair-smartphone-ruling-loosens-restrictions-on-industrial-farm-iot\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/right-to-repair-smartphone-ruling-loosens-restrictions-on-industrial-farm-iot\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/right-to-repair-smartphone-ruling-loosens-restrictions-on-industrial-farm-iot.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/right-to-repair-smartphone-ruling-loosens-restrictions-on-industrial-farm-iot.jpg","width":620,"height":413},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/right-to-repair-smartphone-ruling-loosens-restrictions-on-industrial-farm-iot\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Internet of Things","item":"https:\/\/www.threatshub.org\/blog\/tag\/internet-of-things\/"},{"@type":"ListItem","position":3,"name":"Right-to-repair smartphone ruling loosens restrictions on industrial, farm IoT"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/17513","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=17513"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/17513\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/17514"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=17513"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=17513"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=17513"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}