Episode 288: New devices and new threats

This week’s show covers device launches from Amazon last week and Google this week. We also talk about connected coffee machines getting hacked, Amazon letting people pay with their palm, and Apple’s smart home patents. After that, we switch to developer news with Twilio’s new IoT platform and ARM’s chip designs for autonomous robots and cars. Vodafone added a new feature to its IoT modules, Yale has a smart package box for your business or home, and Swarm’s IoT module is out and somewhat pricey. In this week’s IoT Podcast hotline segment, we take a tip from a listener about pausing your 5GHz Wi-Fi when adding certain types of connected devices.

Amazon wants to let people pay with their palms.

Our guest this week is Emily Anthes, a science journalist, and the author of The Great Indoors, a book that covers how we live now. Anthes talks about how the smart home is turning into a medical device to meet the needs of the elderly and how important people still are in figuring out what to do with connected device data. She then talks about how employers are using sensors in the workplace to help boost health and productivity. However, boosting productivity can be benign or almost totalitarian depending on the employer so we discuss surveillance and how to ensure people’s rights aren’t trampled in the process of making workplaces smarter. You’ll enjoy the show.

Hosts: Stacey Higginbotham and Kevin Tofel
Guest: Emily Anthes, author The Great Indoors
Sponsors: Perceive and Ayla Networks

 

Published by

Stacey Higginbotham

I am a journalist who has covered technology for over a decade at publications such as Fortune, PCMag, Gigaom, The Deal and BusinessWeek.

One thought on “Episode 288: New devices and new threats”

  1. Your comments about the security of the ESP8266 and ESP32 are very inaccurate and misleading. The Espressif SDK had some security issues in the past and have been fixed. All software has bugs but your attack on Espressif, related to the coffee maker, was not correct.

    Did you read the article you linked to? None of the vulnerability had anything to do with Espressif. “update happens over an unencrypted network” “spoof the firmware version” The problems were all choices the coffee maker software developers made.

Leave a Reply

Your email address will not be published.

This site uses Akismet to reduce spam. Learn how your comment data is processed.