Inside the Internet of Things - Bryon Moyer Blog
[From the last episode: We looked at some state-level laws regulating IoT security.] OK, wow, we’ve come a long way without coming up for air. Let’s review what we’ve discussed since our last review. We started by looking at another IoT application: a new idea for a glucose tester. We […]
Read More[From the last episode: We looked at Amazon and the various pros and cons associated with such a product.] We’ve been talking a lot about security, but that discussion has been about security technology and how it works. And we’ve blithely said that security is important and good. File that […]
Read More[From the last episode: we looked at ways that hackers can try to break into hardware to find a key – and ways that designers are trying to protect against that.] Today we’re going to look at yet another consumer IoT product – for a number of reasons. It’s not […]
Read More[From the last episode: we looked at trusted execution environments and how they can help with security.] It’s amazing the lengths people will go to if there’s something that they really, really want badly. Wondering who’s saying what in that phone conversation in the office next door? Listen through a […]
Read More[From the last episode: we looked at security at many levels of the communications stack.] We’ve talked a lot about security in communications and stored data. But what about when computing? A processor brings instructions and data in from memory, and, done in a sloppy fashion, unwelcome viewers might get […]
Read More