He argues we're now in a strange lull before entering an unrecognizable world where major new breakthroughs in areas like A.I., robotics, smart homes, and augmented reality lead to "ambient computing", where technology itself fades into the background. And he uses his final weekly column to warn that "if we are really going to turn over our homes, our cars, our health and more to private tech companies, on a scale never imagined, we need much, much stronger standards for security and privacy than now exist. Especially in the U.S., it's time to stop dancing around the privacy and security issues and pass real, binding laws."
In addition, the article notes, "Separating recorded network traffic into packet streams and associating each stream with an IoT device is not that hard."
I've thought about buying a small box like a Zotac and trying to replace the hard drive with a battery -- but does anything like this already exist...? Also, are there any systems like this with decent specs? Most stuff I see like the Intel Compute Stick are horribly underpowered compared to a decent laptop.
The original submission drew some interesting discussion. Another option is "a good x86/x64 tablet that I can install Linux on" -- especially with a decent processor -- or "laptop-like systems that got rid of the screen entirely... I just need the travel CPU part without the added weight of a second keyboard and monitor." So leave your best suggestions in the comments. Is there a good, lightweight computer that's battery-powered without a screen or a keyboard?
The plane will conserve power by slowly gliding down from the high altitudes at night -- without ever touching the ground. In comparison a solar plane (partially funded by Google) already circled the earth last year -- but it took 22 days, and made 17 different stops.
The first is called "program interference," and takes place when an attacker manages to write data with a certain pattern to a target's SSD. Writing this data repeatedly and at high speeds causes errors in the SSD, which then corrupts data stored on nearby cells. This attack is similar to the infamous Rowhammer attack on RAM chips.
The second attack is called "read disturb" and in this scenario, an attacker's exploit code causes the SSD to perform a large number of read operations in a very short time, which causes a phenomenon of "read disturb errors," that alters the SSD ability to read data from nearby cells, even long after the attack stops.