You could go half way between doing nothing and cutting off people from the internet.
Given that the first step in infecting vulnerable devices is a port scan, by default ISPs could block all incoming connections until the client explicitly requests that incoming connections should be unblocked.
The catch is I expect ISPs would completely fsck this up and it would be a pain to get things working properly if you know what you are doing.
No incoming connections by default
Given that the first step in infecting vulnerable devices is a port scan, by default ISPs could block all incoming connections until the client explicitly requests that incoming connections should be unblocked.
The catch is I expect ISPs would completely fsck this up and it would be a pain to get things working properly if you know what you are doing.