Hi All Here is your next challenge: Hacking an exoskeleton.
Great technology, but I only hope they build them with secure by design built in from the initial start and throughout.
Regards
Caute_cautim
I doubt I'll be able to live up to that challenge, but I'm pretty sure others will. ![]()
From my perspective, the system's vulnerability will depend on who uses it and for what : -
In both cases, entities may be inclined to introduce & overlook backdoors into the systems to 'play around with' --- but despite that, most people will appreciate the technology...