@Sunny That's...not entirely accurate, either.
Were someone skilled and malicious were so inclined, having your name and email address provides a vector for an entirely different set of attacks. It provides a location for email information to pen test, your name and surname which could be used to affect family or other contacts gleamed through a successful pen test against your email. Background checks are cheap. In some cases this is how elderly family members are identified as targets for phone scams. Facebook runs this risk, too.
With decent network protection, your IP could still be backtraced for attempts on your router, but could be blocked and your devices kept safe. Howeeeeeeever. Default telnet use isnt just dangerous because of sniffing. It's also a port that you have told your system is an acceptable pipe in and out of your device.
Telnet is insecure because with some know-how (and mushes aren't tokenized), a spoofed signal with port information that you have approved could be used as an attack vector, as well. At that point it's approved communication through your router, so could potentially go unnoticed. At that point any virus or malware software would be your last line of defense.
In the end, it all comes down to:
- How much information you're willing to share over an insecure protocol
- Your level of trust in the mushing community as a whole that some RANDO wolf with some knowledge and capability doesn't feel like being a motherfucker
Not tryin' to scare, but thems facts.