Great write up. Be sure to verify your ssl certificate once you install it (ie http://www.ssltools.com/certificate_lookup/www.eetimes.com). And if you still have problems with installation, try SSLTools Manager - http://www.ssltools.com/manager
There are just too many ways in which a hacker can gain access to our private information. It scares me when I think of how unsecured the internet can bem even with some security measures involved. I just hope that trusted CA can remain unhacked.
Simon - http://www.idpro.co.uk
This is a good article as it simplifies a lot a process which in reality is very complex. The protocols to enable encryption of data are very important to guarantee a communication’s link with no leaks of information. Data signing offers yet an additional level of security. These two schemes are not only used in the big Internet world but also in the short range communications such as Bluetooth were one also find encryption and data signing.
What are the engineering and design challenges in creating successful IoT devices? These devices are usually small, resource-constrained electronics designed to sense, collect, send, and/or interpret data. Some of the devices need to be smart enough to act upon data in real time, 24/7. Are the design challenges the same as with embedded systems, but with a little developer- and IT-skills added in? What do engineers need to know? Rick Merritt talks with two experts about the tools and best options for designing IoT devices in 2016. Specifically the guests will discuss sensors, security, and lessons from IoT deployments.