Good stuff. On a panel as counter point (not that I can get to EIC) we
could show how using OAuth, Connect, UMA and TLS as examples of modern
protocols you could properly do device authentication to control the things
in your home. And by show I mean demonstrate it using low cost hardware,
leveraging open source, known home hardware and security devices. The
counter point is that we don't have to keep doing it in ways that
rightfully provokes people to point out how insecure most networked things
are. Could also talk about some of the interop stuff around security
devices in general.
From: dg-idot-bounces@kantarainitiative.org
[mailto:dg-idot-bounces@kantarainitiative.org] On Behalf Of Colin Wallis
Sent: Thursday, January 29, 2015 7:35 PM
To: Jeff Stollman; Ingo.Friese@telekom.de
Cc: dg-idot@kantarainitiative.org
Subject: Re: [DG-IDoT] EIC is asking for IDoT presentation(s)
Yea, I can see why that might appeal to them Jeff.
It plays in quite well with the Governance Risk Compliance overall theme
that EIC is famous for..
Cheers
Colin
_____
Date: Thu, 29 Jan 2015 17:49:30 +0530
From: stollman.j@gmail.com
To: Ingo.Friese@telekom.de
CC: dg-idot@kantarainitiative.org
Subject: Re: [DG-IDoT] EIC is asking for IDoT presentation(s)
Ingo,
One thought I had would be to present an update to the presentation I gave
last year in which I described some of the risks and threats of the IoT.
This could be done as a solo presentation or a panel. Given EICC's
preference for panels that might be best.
I have become increasingly concerned about the potential to create global
chaos by systematically compromising large numbers of IoT devices. This
could be done by either a criminal organization or a nation state.
I have attached the presentation for reference.
Jeff
On Thu, Jan 29, 2015 at 4:11 PM,