My chum Aubrey Kagan (a.k.a. Antedeluvian) just sent me a link to this amazing video of a guy called Tom Thum who — in his own words — says “I use my mouth in strange ways in exchange for cash.” Yes, of course, you've got it in one; Tom pushes the limits of the human voice to create impossible beats and phenomenal sounds.
This is actually a TED (Technology, Entertainment, Design) talk, and these are invariably interesting. Anyway, I left this running in the background while I was writing this column pondering the pros and cons of performing experiments on family members.
The problem with YouTube is that — much like munching on a crisp rasher of bacon — it's hard to stop at just one. A few seconds after the first video had run its course, YouTube automatically started to roll this video. As soon as I heard the word “Hacker” my ears pricked up. Do you think your wireless systems and other technologies are safe? Well, in this video, a hacker shows how nearly every “secure system” is actually riddled with security holes.
The more I learn about this stuff, the more insecure I feel. Thank goodness we have the Embedded Systems Conference (ESC) to teach us all about this stuff, because “forewarned is forearmed,” as they say. For example, we have three hot security-related sessions planned for ESC Boston, which will take place May 6-7, 2015:
- Network Insecurity: Simple Hacks of ARM Cortex-M Devices
- Reverse Engineering Backdoors in Real Time Operating Systems
- Best Practices for Designing IoT Security from the Ground Up
But wait, there's more, because we're going to have all sorts of security-related “stuff” at ESC Silicon Valley, which is coming our way July 20-22, 2015. In fact, we have an entire Embedded Security Summit, and I'm particularly looking forward to seeing a live onstage hack of an embedded system.
Hopefully I'll see you at one or both of the Boston and Silicon Valley ESC events — and/or at ESC Minneapolis in November — always assuming that we are all still masters of our own identities and we still control all of our data by then (cue ominous music).
Join over 2,000 technical professionals and embedded systems hardware, software, and firmware developers at ESC Boston May 6-7, 2015, and learn about the latest techniques and tips for reducing time, cost, and complexity in the development process.
Passes for the ESC Boston 2015 Technical Conference are available at the conference's official site, with discounted advance pricing until May 1, 2015. Make sure to follow updates about ESC Boston's talks, programs, and announcements via the Destination ESC blog on Embedded.com and social media accounts Twitter, Facebook, LinkedIn, and Google+.
The Embedded Systems Conference, EE Times, and Embedded.com are owned by UBM Canon.