The Internet of Things is already proliferating a number of connected devices into our lives. But as these devices increasingly become abandoned, they turn into security liabilities. The panel discusses the causes, implications, and solutions for IoT Abandonware.
It’s easy to be dismissive of the humble Raspberry Pi. In many ways it’s painfully limited by slow I/O, meager compute and a reliance on an microSD card to boot. But despite these shortcoming, and perhaps because of its bargain basement price, the board has found a hoard of devotees. Keith Townsend looks at how the Pi could find a home in the data center. He makes a good point, despite being low power, the compute on it comes like my favorite pizza, “cheap and deep”.
Dan Goodin at Ars Technica gives an overview of the implications of the recently exposed telnet vulnerability disclosed by WikiLeaks. I’m not surprised the CIA had something like that, however morally dubious I may find it. As an intelligence organization it’s in their interest to have this kind of access. For me, this goes beyond Cisco.
The Internet of Things in a technological hypebeast, being both clearly defined and a marketing ploy at the same time. Cisco has clearly defined what they think IoT is all about: adding connectivity to devices. Using LoRaWAN, Cisco has a compelling technical solution to making connectivity possible on a mass scale.
At Mobile World Congress in Barcelona, Nokia is set to launch its Worldwide IoT Network Grid (WING, get it). Basically, they want to make managing IoT networking into a service, allowing enterprises to just let Nokia deal with the wide world of service providers to keep all of their devices playing nice no matter where they are.
It’s time for Gestalt News once again! This week in servers:
– DR Troopers: Quorum onQ 4.0
– AMD: The Last Decade
Plus Sysadmin Chatbots, The “Why” of HCI, API’s, privacy, and patent trolls!
I think the biggest problem with IoT security is proper visualization. Many consumers setup devices within their homes, with no real idea of what happens to the data collected. Most people just want to do the initial configuration, and as long as they see it working, there’s no issue. The challenge here becomes how do you simply show consumers what devices are on their network, and how those devices are accessing the wider Internet.
I’m heartened by Google’s promotion of Project Brillo into the more official but awkwardly named “Android Things”. Lazy naming aside, it should provide a reasonably secure, updatable and transparent network communication fabric for IoT device. The problem still is that it currently only supports platform boards, Intel Edison, NXP Pico, and the Raspberry Pi 3. Still, a player with Google’s clout goes a long way to pushing a standard.
Dennis Sellers shares some of the news on the Bluetooth 5 specification. Bluetooth is the TGI Friday’s of technology: there’s generally not a lot genuinely bad, but there’s nothing to really entice me to use it, other than availability.
Nothing like realizing you’re already surrounded by Internet of Things devices while reading about profound insecurity in the still nascent ecosystem!