I love IoT

    image
    I am a big fan of the “new future”. Since the appearance of the first robotic coffee houses and shops without service personnel, every day I see as realized dreams of a convenient and comfortable world. For a long time we went to the possibility of driving a car, a house, our life from the telephone. There were many crashes, hacks, leaks of personal data and ships, but now the future has come. And I'm thrilled.

    I leave the office, with one voice command I order myself a coffee, which will be ready exactly by the time I get to the machine with a large iron hand. No communication with the barista, questions about syrup and flavoring. Everything is as simple as possible: I press the button, say that I want to order, the coffee machine determines my location, calculates how soon I will be in place, decrypts my message, and - lo and behold! - Prepares exactly the coffee that I ask. I can only go to the machine, provide a QR code and pick up the drink from an iron hand. We had problems with these machines, cunning loafers staged whole floods due to flaws in the software. The problem was known back in 2015, but everyone was in no hurry to fix it until the losses from the attackers exceeded the cost of fixing the vulnerability. The essence of hacking a coffee shop was that the attacker took control of the machine and sent out constant requests for coffee. Each time a new coffee river arose, a bunch of passers-by shot video and posted a story. So in some ways it was an advertisement.

    Spilled coffee fades on the background of free gasoline. We mainly use electric cars, but classic gas stations are still found. Especially in old cities. And the columns there did not change at least eternity! Just imagine, back in 2018, all sorts of tricks could make the column give out gas for free to everyone. The main problem was that the pump was disconnected from the terminal and the equipment worked offline. Now it’s not so easy to crank, but the craftsmen are still there. And the cost of such services is space. It is much easier to order hacking a hoverboard.

    Why hack a hoverboard? You are not from this century, honestly! When not everyone knew about the vulnerability, this was a great way to fine-tune an accident. Here is a happy businessman. He rides himself calmly on a hoverboard from the gym to the office. And then at some point the control is intercepted, and the right piece of iron takes the businessman right under the wheels of the car. The police puzzled for a long time what could have happened to a healthy and adult person to rush under the wheels of a car like this. Mystical deaths would go on for a long time, until the researchers found vulnerability in hovercraft. This “hole” was written back in 2017. An attacker could easily connect to the gyroscope via Bluetooth by entering a normal password of 4 zeros, fill in his software and take control of the device. But then the news did not cause a resonance, and everything was forgotten. And the vulnerability traveled from model to model. Only the deaths of the "young and successful" have attracted enough attention to the problem, and most gyro scooters are now considered safe.

    In general, a death that has occurred motivates manufacturers to patch up holes much faster than their perceived risk. For example, to solve problems with gyro scooters it took about 16 cases with a fatal outcome. When one medical corporation producing pacemakers was advised to take care of the safety of their devices, representatives reacted rather coolly. Just think about it, since 2018, there has been a vulnerability in devices that allows you to take control of a device and literally stop a sick heart. These guys from the medical center did not move until 7 deaths were recorded due to the vulnerability of the pacemaker, which violated the frequency of electrical discharges. And so, after a month and a half, all the “holes” were closed, which is extremely efficient, by our standards.
    I look forward to when hackers can turn the floor into lava, so that they pay attention to the problem with remote temperature changes in the rooms. But it is rather a dream. Now everyone is extremely passionate about collecting personal information. Even thermometers, honestly.

    The first time I drew attention to this when I saw an advertisement for a "therapist at home" a couple of minutes later, when I measured the temperature with a "smart" thermometer. He showed 40 °, I estimated how much work would have to be entrusted to colleagues, a cheerful advertisement of the medical center played on the screen. I did not immediately connect these two events. A week later, as I began to recover, the screen was already showing an advertisement for strengthening vitamins. I admit honestly, I acquired the whole complex without hesitation. And only then I realized that the thermometer here was the connecting link between me and the advertisers. I don’t remember signing any papers to transfer data to third parties. In general, vitamins helped me, so I don’t hold much evil on a “smart spy”.

    A real chill ran down my back when I saw a baby stroller advertisement. The point is not in the advertisement itself. Baby carriages are wonderful, they have so many cool features, almost a children's car. The fact is that after the advertisement played, and the broadcast of the match returned to the screen, my wife came up to me with the newfangled and most accurate pregnancy test. With two stripes. It seemed to me the ghosts of the past. Yes, the tests broke in 2019 or 2020. And there were massive leaks. But so that now such information is transmitted to the cloud and so easily used - I was shocked, but said nothing.

    After about 8 months, our entire broadcast was filled with advertisements for children's toys and girls' dolls. It seemed to my wife that this was an incredible coincidence, and we simply must buy a talking bear in a three-piece suit. It seemed to me that the "big marketing brother" knows too much. But the bear was glorious, and I respect the classics. It’s even scary to think what a mistake it was.

    Our daughter constantly spent time with the bear. With it, you could send messages to her remotely and listen to her answer. She said the first words to this bear when I wished her good night, while on a business trip. And she obeyed the bear much more often. Only he could make her put away the toys and eat up the porridge. The bear had a camera in his eye so that at any moment we could see what was happening with the child. And, unfortunately, not only we used this function. There was an "animal" that invited the girl to play. Collect all your mother’s beautiful jewelry and father’s watches, put them in a box and leave them in the yard. In the evening, elves will come and in exchange for a box they will make a bear alive. Apparently, the attacker was sitting in the toy for a very long time and knew how everything was arranged with us. And he knew about the unconditional trust in the bear. Everything worked out: we noticed the box in the courtyard until it was empty. The game could be worse, for example, setting fire to all the books in order to summon the fairies of fire. It seemed to me that vulnerabilities in children's toys were finished in 2014, well, maybe in 2018. So many vulnerabilities and scandals were associated with this. Robot nannies who scared children at night, hackers who examined apartments with cameras in children's dolls. But the "holes" are still there. We disconnected the bear from the Internet, without it it became much more difficult to maintain communication with my daughter, for a long time she could not get used to the fact that the toy no longer speaks. After some time, the bear was replaced by a smart watch with cubs. This is the latest model, and the developers swear that everything is as safe as possible. We'll wait and see, but so far there is no reason not to trust them. until it is empty. The game could be worse, for example, setting fire to all the books in order to summon the fairies of fire. It seemed to me that vulnerabilities in children's toys were finished in 2014, well, maybe in 2018. So many vulnerabilities and scandals were associated with this. Robot nannies who scared children at night, hackers who examined apartments with cameras in children's dolls. But the "holes" are still there. We disconnected the bear from the Internet, without it it became much more difficult to maintain communication with my daughter, for a long time she could not get used to the fact that the toy no longer speaks. After some time, the bear was replaced by a smart watch with cubs. This is the latest model, and the developers swear that everything is as safe as possible. We'll wait and see, but so far there is no reason not to trust them. until it is empty. The game could be worse, for example, setting fire to all the books in order to summon the fairies of fire. It seemed to me that vulnerabilities in children's toys were finished in 2014, well, maybe in 2018. So many vulnerabilities and scandals were associated with this. Robot nannies who scared children at night, hackers who examined apartments with cameras in children's dolls. But the "holes" are still there. We disconnected the bear from the Internet, without it it became much more difficult to maintain communication with my daughter, for a long time she could not get used to the fact that the toy no longer speaks. After some time, the bear was replaced by a smart watch with cubs. This is the latest model, and the developers swear that everything is as safe as possible. We'll wait and see, but so far there is no reason not to trust them. to summon fire fairies. It seemed to me that vulnerabilities in children's toys were finished in 2014, well, maybe in 2018. So many vulnerabilities and scandals were associated with this. Robot nannies who scared children at night, hackers who examined apartments with cameras in children's dolls. But the "holes" are still there. We disconnected the bear from the Internet, without it it became much more difficult to maintain communication with my daughter, for a long time she could not get used to the fact that the toy no longer speaks. After some time, the bear was replaced by a smart watch with cubs. This is the latest model, and the developers swear that everything is as safe as possible. We'll wait and see, but so far there is no reason not to trust them. to summon fire fairies. It seemed to me that vulnerabilities in children's toys were finished in 2014, well, maybe in 2018. So many vulnerabilities and scandals were associated with this. Robot nannies who scared children at night, hackers who examined apartments with cameras in children's dolls. But the "holes" are still there. We disconnected the bear from the Internet, without it it became much more difficult to maintain communication with my daughter, for a long time she could not get used to the fact that the toy no longer speaks. After some time, the bear was replaced by a smart watch with cubs. This is the latest model, and the developers swear that everything is as safe as possible. We'll wait and see, but so far there is no reason not to trust them. Robot nannies who scared children at night, hackers who examined apartments with cameras in children's dolls. But the "holes" are still there. We disconnected the bear from the Internet, without it it became much more difficult to maintain communication with my daughter, for a long time she could not get used to the fact that the toy no longer speaks. After some time, the bear was replaced by a smart watch with cubs. This is the latest model, and the developers swear that everything is as safe as possible. We'll wait and see, but so far there is no reason not to trust them. Robot nannies who scared children at night, hackers who examined apartments with cameras in children's dolls. But the "holes" are still there. We disconnected the bear from the Internet, without it it became much more difficult to maintain communication with my daughter, for a long time she could not get used to the fact that the toy no longer speaks. After some time, the bear was replaced by a smart watch with cubs. This is the latest model, and the developers swear that everything is as safe as possible. We'll wait and see, but so far there is no reason not to trust them. After some time, the bear was replaced by a smart watch with cubs. This is the latest model, and the developers swear that everything is as safe as possible. We'll wait and see, but so far there is no reason not to trust them. After some time, the bear was replaced by a smart watch with cubs. This is the latest model, and the developers swear that everything is as safe as possible. We'll wait and see, but so far there is no reason not to trust them.

    Yes, the world knows everything about me. But I agree to this convenience fee. In the end, the future is wonderful.

    Also popular now: