Inside the Internet of Things - Bryon Moyer Blog
[From the last episode: we looked at ways that hackers can try to break into hardware to find a key – and ways that designers are trying to protect against that.] Today we’re going to look at yet another consumer IoT product – for a number of reasons. It’s not […]
Read More[From the last episode: we looked at trusted execution environments and how they can help with security.] It’s amazing the lengths people will go to if there’s something that they really, really want badly. Wondering who’s saying what in that phone conversation in the office next door? Listen through a […]
Read More[From the last episode: we looked at security at many levels of the communications stack.] We’ve talked a lot about security in communications and stored data. But what about when computing? A processor brings instructions and data in from memory, and, done in a sloppy fashion, unwelcome viewers might get […]
Read More[From the last episode: We saw how the UK was approaching the need for better IoT security.] We’ve looked at some important security concepts, and we’ve looked at some of the different ways in which security can be implemented – and even thwarted. But you might think that secure communications […]
Read More[From the last episode: We saw how IoT technology was helping shippers and insurance companies to figure out who’s responsible for breaches.] OK, so we’ve been talking a lot about security and how it works. But that’s of no use if IoT device makers don’t use that technology and build […]
Read More