you are viewing a single comment's thread.

view the rest of the comments →

[–]LarrySwinger2 3 insightful - 1 fun3 insightful - 0 fun4 insightful - 1 fun -  (1 child)

He says he wants to make it safe, but the device interacts with smartphones. And when someone asked if spike detection is hardware and software updatable (at 24:21), the specialist ignores that part of the question and just gives general information about the implementation. If it's updatable, that'd make it vulnerable. I wonder if that's why he evaded the question.

[–][deleted] 2 insightful - 1 fun2 insightful - 0 fun3 insightful - 1 fun -  (0 children)

Of course. I knew of an authentication-without-identification technology (from DelSecur, inc.) that was ABSOLUTELY UNHACKABLE. As a startup company, the owner was very flattered that the JCOS were so interested in that technology as to send representatives of each of their separate branch of the military to investigate. The guy was courted by these military for years, and courted, and courted, and courted... Until the guy died (I think?) or went bankrupt.

The military themselves don't want unhackable systems. If there's a tech for that, they will simply make sure it gets forgotten or buried.