The challenge with an open system is that security features can be added - which is great - but they can also be disabled or recoded to be non-functional. How would an employer confirm that the intended security features are all installed and intact as employees entered the facility?
you know android is linux, right? adding such features to any linux box merely demonstrates basic understanding of how *nix works, not some kind of breakthrough or heroic act of uber-coding.
also what is this about "trumping" android? the title implies a trap (trojan?) that overmatches (breaks into?) android. which if anything is the opposite of the article...
Battar: good idea. I believe that all these security issues are being, and will be, addressed by DOD and contractors. What I'm curious about is how do the security issues translate to the commercial world, in medical, and industrial applications. Any ideas?
Heres an idea - certain defence contractors do not allow cameras in their facilities, and employees must use cell-phones without cameras. A contractor could give their employees smartphones and automatically disable the camera when they swipe the badge at the entry gate.
What are the engineering and design challenges in creating successful IoT devices? These devices are usually small, resource-constrained electronics designed to sense, collect, send, and/or interpret data. Some of the devices need to be smart enough to act upon data in real time, 24/7. Are the design challenges the same as with embedded systems, but with a little developer- and IT-skills added in? What do engineers need to know? Rick Merritt talks with two experts about the tools and best options for designing IoT devices in 2016. Specifically the guests will discuss sensors, security, and lessons from IoT deployments.