<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Anyone feel like hacking an exoskeleton? in Tech Talk</title>
    <link>https://community.isc2.org/t5/Tech-Talk/Anyone-feel-like-hacking-an-exoskeleton/m-p/18083#M823</link>
    <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I doubt I'll be able to live up to that challenge, but I'm pretty sure others will.&amp;nbsp;&amp;nbsp;&lt;img id="manwink" class="emoticon emoticon-manwink" src="https://community.isc2.org/i/smilies/16x16_man-wink.png" alt="Man Wink" title="Man Wink" /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From my perspective, the system's vulnerability will depend on who uses it and for what : -&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;A government using it for military or similar operations will likely take ample measures to ensure that it's designed with security in mind.&lt;/LI&gt;&lt;LI&gt;A private organization using it to cater to public requirements isn't likely to prioritize security --- unless there are stringent government regulations dictating requirements &amp;amp; penalizing vendors / manufacturers for non-compliance.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In both cases, entities may be inclined to introduce &amp;amp; overlook backdoors into the systems to 'play around with' --- but despite that, most people will appreciate the technology...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 21 Jan 2019 23:52:27 GMT</pubDate>
    <dc:creator>Shannon</dc:creator>
    <dc:date>2019-01-21T23:52:27Z</dc:date>
    <item>
      <title>Anyone feel like hacking an exoskeleton?</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Anyone-feel-like-hacking-an-exoskeleton/m-p/17996#M809</link>
      <description>&lt;P&gt;Hi All&amp;nbsp; Here is your next challenge:&amp;nbsp; Hacking an exoskeleton.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.techworld.com/tech-innovation/most-exciting-ways-exoskeletons-are-being-used-today-3690509/?no1x1&amp;amp;utm_source=Daily&amp;amp;utm_medium=email&amp;amp;utm_term=image&amp;amp;utm_content=image&amp;amp;utm_campaign=Daily1601&amp;amp;elqTrack=true&amp;amp;bt_ee=fECJIxeK%2BgSyS38kv3gKEXNuzAH35Nuz6ge41be5kyBnbs31oGOR1WXZw9JH6CL5&amp;amp;bt_ts=1547654831451" target="_blank"&gt;https://www.techworld.com/tech-innovation/most-exciting-ways-exoskeletons-are-being-used-today-3690509/?no1x1&amp;amp;utm_source=Daily&amp;amp;utm_medium=email&amp;amp;utm_term=image&amp;amp;utm_content=image&amp;amp;utm_campaign=Daily1601&amp;amp;elqTrack=true&amp;amp;bt_ee=fECJIxeK%2BgSyS38kv3gKEXNuzAH35Nuz6ge41be5kyBnbs31oGOR1WXZw9JH6CL5&amp;amp;bt_ts=1547654831451&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Great technology, but I only hope they build them with secure by design built in from the initial start and throughout.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;</description>
      <pubDate>Wed, 16 Jan 2019 19:52:59 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Anyone-feel-like-hacking-an-exoskeleton/m-p/17996#M809</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2019-01-16T19:52:59Z</dc:date>
    </item>
    <item>
      <title>Re: Anyone feel like hacking an exoskeleton?</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Anyone-feel-like-hacking-an-exoskeleton/m-p/18083#M823</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I doubt I'll be able to live up to that challenge, but I'm pretty sure others will.&amp;nbsp;&amp;nbsp;&lt;img id="manwink" class="emoticon emoticon-manwink" src="https://community.isc2.org/i/smilies/16x16_man-wink.png" alt="Man Wink" title="Man Wink" /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From my perspective, the system's vulnerability will depend on who uses it and for what : -&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;A government using it for military or similar operations will likely take ample measures to ensure that it's designed with security in mind.&lt;/LI&gt;&lt;LI&gt;A private organization using it to cater to public requirements isn't likely to prioritize security --- unless there are stringent government regulations dictating requirements &amp;amp; penalizing vendors / manufacturers for non-compliance.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In both cases, entities may be inclined to introduce &amp;amp; overlook backdoors into the systems to 'play around with' --- but despite that, most people will appreciate the technology...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 21 Jan 2019 23:52:27 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Anyone-feel-like-hacking-an-exoskeleton/m-p/18083#M823</guid>
      <dc:creator>Shannon</dc:creator>
      <dc:date>2019-01-21T23:52:27Z</dc:date>
    </item>
  </channel>
</rss>

