I am just imagining a scenario where the hacker hijacks a high profile person and using the same technique of touch-to-access is able to generate that key to be able to reprogram the implants in a malicious way.
It could become a tool to get some ransom out of hijacking the high profile people!
The good doctor and her student told me that there is much concern that high-profile people could become targets of hackers because of the wide availability of wireless surveilance equipment. They are currently hawking their algorithm to makers of pacemakers, insulin pumps, defibrillators, neural implants, and drug delivery systems.
Beyond implants, since the heartbeat is being used as a random number generator, it is conceivable that the technique could be used in other forms ofr cryptography where the sender and receiver automatically generate the same secret key.
Kris, thanks for giving me the opportunity to point out one of the coolest aspects of our commenting system--you can actually go back and edit or even delete a previous post. Just click the Edit/Delete button below your post, change it as needed, then click the big Update button and you're done!
Similar to the car hacking article a few weeks ago. These devices should have some security, but it seems unlikely that anyone would go to the trouble to hack in to your pacemaker. Of course, with Obamacare, you probably won't be allowed to get one anyway.
What are the engineering and design challenges in creating successful IoT devices? These devices are usually small, resource-constrained electronics designed to sense, collect, send, and/or interpret data. Some of the devices need to be smart enough to act upon data in real time, 24/7. Specifically the guests will discuss sensors, security, and lessons from IoT deployments.