I am just imagining a scenario where the hacker hijacks a high profile person and using the same technique of touch-to-access is able to generate that key to be able to reprogram the implants in a malicious way.
It could become a tool to get some ransom out of hijacking the high profile people!
The good doctor and her student told me that there is much concern that high-profile people could become targets of hackers because of the wide availability of wireless surveilance equipment. They are currently hawking their algorithm to makers of pacemakers, insulin pumps, defibrillators, neural implants, and drug delivery systems.
Beyond implants, since the heartbeat is being used as a random number generator, it is conceivable that the technique could be used in other forms ofr cryptography where the sender and receiver automatically generate the same secret key.
Kris, thanks for giving me the opportunity to point out one of the coolest aspects of our commenting system--you can actually go back and edit or even delete a previous post. Just click the Edit/Delete button below your post, change it as needed, then click the big Update button and you're done!
Similar to the car hacking article a few weeks ago. These devices should have some security, but it seems unlikely that anyone would go to the trouble to hack in to your pacemaker. Of course, with Obamacare, you probably won't be allowed to get one anyway.
My Mom the Radio Star Max MaxfieldPost a comment I've said it before and I'll say it again -- it's a funny old world when you come to think about it. Last Friday lunchtime, for example, I received an email from Tim Levell, the editor for ...
A Book For All Reasons Bernard Cole1 Comment Robert Oshana's recent book "Software Engineering for Embedded Systems (Newnes/Elsevier)," written and edited with Mark Kraeling, is a 'book for all reasons.' At almost 1,200 pages, it ...