Who Owns Your Device?

We live in an amazing era of technology. The Internet has opened doors that have been dreamed of for years. By adding computing technology to everyday devices, like televisions, thermostats, appliances, and others, we’ve been able to automate many aspects of our daily life. The ideal experience might look something like this 50s ‘futurist’ promotional film entitled “Design For Dreaming”.

The idea of technology being embedded in every object around you is called The Internet of Things, and is one of the fastest growing areas of emerging technology. These days, manufacturers are adding Internet connection to all types of devices around you. One of the most famous examples is the Nest Thermostat [LINK]. This thermostat allows the user to adjust the temperature throughout the day, and eventually learns the user’s patterns, thereafter adjusting the temperature without intervention.

But there’s a dark side to this kind of technology, one that is becoming more visible as the technology goes through growing pains. In this article, we will discuss some of the major issues with putting a computer in every device you own (or don’t really own, as the case may be). We focus on the domestic space, rather than the industrial space, which has its own challenges and benefits. We discuss both the value and problems with adding an internet connection to a device that previously never needed an internet connection, including the reliance on a company to provide updates, security and privacy concerns, and finally judging the value that these additions provide.

Continue reading

How to Hack a Sketchy e-voting System

The quintessence of an e-voting transaction is to be secure. In the e-voting context, security issues are very subtle. This is because there are features that clash with each other. For example, guaranteeing anonymity makes it harder to track election fraud. In addition, security in e-voting is highly related to the type of the technology used during the process. In distance e-voting, the voter can cast his vote from his personal computer by sending it to a central server via the Internet. The electronic, network-based nature of the latter makes it susceptible to a wide range of attacks. Continue reading