Bryon Moyer

  • Keyword Search

  • Post Date Range

iot security

Security Review and Summary

By Bryon Moyer | July 26, 2019 | 0 Comments

[From the last episode: We looked at some state-level laws regulating IoT security.] OK, wow, we’ve come a long way without coming up for air. Let’s review what we’ve discussed since our last review. We started by looking at another IoT application: a new idea for a glucose tester. We […]

Read More
Security laws

State IoT Security Laws

By Bryon Moyer | July 19, 2019 | 0 Comments

[From the last episode: We looked at Amazon and the various pros and cons associated with such a product.] We’ve been talking a lot about security, but that discussion has been about security technology and how it works. And we’ve blithely said that security is important and good. File that […]

Read More
Amazon Key

IoT Pros and Cons: Amazon Key

By Bryon Moyer | July 12, 2019 | 0 Comments

[From the last episode: we looked at ways that hackers can try to break into hardware to find a key – and ways that designers are trying to protect against that.] Today we’re going to look at yet another consumer IoT product – for a number of reasons. It’s not […]

Read More
key protection

Hiding the Goods

By Bryon Moyer | July 5, 2019 | 0 Comments

[From the last episode: we looked at trusted execution environments and how they can help with security.] It’s amazing the lengths people will go to if there’s something that they really, really want badly. Wondering who’s saying what in that phone conversation in the office next door? Listen through a […]

Read More
Hardware trust

Hardware You Can Trust

By Bryon Moyer | June 28, 2019 | 0 Comments

[From the last episode: we looked at security at many levels of the communications stack.] We’ve talked a lot about security in communications and stored data. But what about when computing? A processor brings instructions and data in from memory, and, done in a sloppy fashion, unwelcome viewers might get […]

Read More
Site by Consistent Image Web Design