Date: 2016-02-25 08:00 am (UTC)
From: [personal profile] mjg59
There's an amazing set of opportunities around this kind of technology, but there's the implementations range from fine to OH MY GOD WHAT WERE YOU THINKING, and there's almost inevitably going to be a backlash against the latter that will drive consumers against the entire field. We need to do better at figuring out technological mechanisms for making these devices more trustworthy, and also ways we can help regular people differentiate between secure devices and devices that will send their credit cards to the dark net.
Identity URL: 
Account name:
If you don't have an account you can create one now.
HTML doesn't work in the subject.


If you are unable to use this captcha for any reason, please contact us by email at

Notice: This account is set to log the IP addresses of everyone who comments.
Links will be displayed as unclickable URLs to help prevent spam.


Matthew Garrett

About Matthew

Power management, mobile and firmware developer on Linux. Security developer at Google. Ex-biologist. @mjg59 on Twitter. Content here should not be interpreted as the opinion of my employer.

Expand Cut Tags

No cut tags