Category Archives: Security

The Versatility of Zadar Labs’ Radar Tech: From Drones to Smart TVs



In an era where smart technology is rapidly evolving, the integration of imaging radar systems presents a significant leap forward in the capabilities of various devices. The discussion with David Wu sheds light on the remarkable advancements made by Zadar Labs in the realm of imaging radar technology. This innovative approach utilizes radio waves to create high-resolution images of the environment, allowing for enhanced perception and interaction with the surroundings, which is crucial for the development of smarter, more autonomous systems.

Imaging Radar Enhances Smart Technology

Imaging radar operates fundamentally differently than traditional visual sensors such as cameras. While cameras provide a two-dimensional view of the environment, imaging radar offers a three-dimensional perspective, capturing the shape, position, and movement of objects within a specified range. This ability to scan the full area and provide depth perception makes imaging radar an ideal choice for various applications, particularly those involving robotics and automation. The technology is well-suited for automated tractors, drone navigation, and even home security systems, where conventional cameras may fall short due to limitations such as poor lighting or adverse weather conditions.

Zadar Technology is Versitile

One of the most compelling advantages of Zadar Labs’ imaging radar is its robustness in diverse environments. Unlike cameras that can struggle to detect objects in low light or inclement weather, imaging radar can function effectively in such conditions. This capability is particularly beneficial for home security applications, where the radar can monitor the perimeter of a house, detecting movement up to 1,000 meters away, regardless of whether it is raining or dark outside. This level of sensitivity and reliability enhances the safety and security of residential areas, providing homeowners with peace of mind.

Moreover, the integration of imaging radar into consumer products is poised to revolutionize everyday technology. There are potential applications in smart TVs, where radar could be embedded within the device to personalize audio experiences based on the viewer’s location. By detecting where individuals are sitting, the TV could direct sound to specific areas, creating a more immersive audio experience. This personalization extends beyond audio; imaging radar can also enhance video quality by adjusting lighting and contrast based on the viewer’s position. Such innovations illustrate how imaging radar can transform passive devices into intelligent systems that actively respond to user needs.

The flexibility of imaging radar technology allows it to be utilized in both indoor and outdoor settings, making it a versatile tool for various industries. Whether it is integrated into consumer electronics, automotive systems, or industrial applications, the potential for imaging radar to enhance smart technology is vast. The ability to provide detailed information about the environment while preserving user privacy is another significant benefit. For instance, while the radar can determine how many people are in a room and their movement patterns, it does not compromise individual privacy by revealing personal details. This balance between functionality and privacy is essential in today’s tech landscape, where consumer concerns about data security are paramount.

Conclusion: Enhanced Safety and Personalization and Increased Privacy

In conclusion, Zadar Labs’ imaging radar represents a transformative advancement in smart technology, offering unparalleled depth perception and environmental awareness. This technology not only enhances the functionality of various devices but also enables new applications that were previously unimaginable. By integrating imaging radar into everyday products, we are moving towards a future where technology is not only smarter but also more intuitive and responsive to our needs. The ongoing development and adoption of imaging radar will undoubtedly play a crucial role in shaping the next generation of smart technology, making our lives easier, safer, and more connected.

Interview by Don Baine, The Gadget Professor.

Sponsored by:
Get $5 to protect your credit card information online with Privacy.
Amazon Prime gives you more than just free shipping. Get free music, TV shows, movies, videogames and more.
The most flexible tools for podcasting. Get a 30 day free trial of storage and statistics.


How Akidaia is Changing the Game with Decentralized Access Control



In the fast-paced world of technology, the ability to innovate is often seen as the hallmark of success. However, innovation does not occur in a vacuum; it is frequently born from the challenges we face. The recent discussion with Gaël Lededantec, co-founder of Akidaia, underscores the significance of embracing challenges as a catalyst for innovation, particularly in the realm of security and access control.

The Traditional Model of Access Control

Historically, access control solutions have relied on a centralized model, where various forms of identification – be it badges, QR codes, or biometrics – are processed through a reader connected to a central database. This infrastructure-heavy approach presents several challenges: it is often expensive to install, vulnerable to cyber threats, and limited in deployment flexibility. The reliance on connectivity means that securing isolated or temporary locations becomes a logistical nightmare, often requiring the use of traditional keys and manual oversight.

The Decentralized Approach: A Paradigm Shift

Akidaia’s innovative solution disrupts this conventional model by decentralizing access rights. Instead of depending on a connected reader that communicates with a central database, Akidaia’s system operates as a “black box.” This reader functions independently, allowing for quick installation in just five minutes, even in remote locations. By removing the need for constant connectivity, the system is inherently more secure against cyber threats, as it operates offline and does not store user data.

The decentralized nature of Akidaia’s technology not only enhances security but also reduces installation costs and time. This is particularly beneficial for industries such as construction, where temporary sites frequently change and the investment in security infrastructure can often be wasted once a project concludes. With Akidaia’s solution, companies can simply unplug the reader from one site and move it to another, maximizing efficiency and resource allocation.

Applications Across Industries

The versatility of Akidaia’s decentralized access control system opens the door to a multitude of applications across various sectors. In construction, for instance, the ability to secure temporary sites without heavy investment in infrastructure is a game-changer. The system’s plug-and-play nature means that it can be deployed rapidly, allowing companies to focus on their core operations rather than on complex security logistics.

Moreover, the technology has garnered interest from high-security sectors, including the French army, which values the system’s resilience against cyber attacks. This speaks to the broader applicability of decentralized security solutions in environments where data integrity and access control are critical.

The Vision Behind Innovation

Lededantec’s journey into the realm of access control innovation was born from a recognition of the pain points within the industry. Drawing from previous experiences in creating digital keys for cars and other technological advancements, he and his team identified a significant opportunity to revolutionize access control. The immediate interest and willingness of potential clients to invest in their concept, even before a prototype was developed, underscore the pressing need for such innovations.

Conclusion: Decentralized Security is a Game Changer

The discussion with Gaël Lededantec highlights a pivotal shift in how we approach security and access control. By decentralizing the process, Akidaia not only simplifies installation and reduces costs but also enhances security in an increasingly connected world. As industries continue to evolve and the threat landscape expands, such innovative solutions will be crucial in safeguarding access to sensitive areas and information. The future of access control lies in decentralization, and Akidaia is at the forefront of this transformation, paving the way for a more secure and efficient approach to managing access rights.

Interview by Don Baine, The Gadget Professor.

Sponsored by:
Get $5 to protect your credit card information online with Privacy.
Amazon Prime gives you more than just free shipping. Get free music, TV shows, movies, videogames and more.
The most flexible tools for podcasting. Get a 30 day free trial of storage and statistics.


A Chat with Hypergate: Revolutionizing Enterprise Authentication



In today’s fast-paced digital landscape, businesses, especially large enterprises, face the pressing need to enhance their cybersecurity measures while ensuring seamless user experiences. One of the most significant advancements in this realm is the adoption of Hypergate’s mobile integration for authentication processes. The implementation of mobile authentication solutions not only simplifies the authentication process for end-users but also streamlines integration for IT teams, making it an attractive option for businesses looking to bolster their security without sacrificing efficiency.

A Safer Authentication Process

Traditional password-based authentication systems have long been a cornerstone of corporate security. However, they are fraught with inefficiencies and vulnerabilities that can expose organizations to cyber threats. Passwords can be forgotten, stolen, or compromised, leading to potential data breaches and significant financial losses. In contrast, mobile authentication solutions, such as those provided by Hypergate, offer a more secure and user-friendly alternative. By utilizing mobile devices – specifically smartphones – for authentication, businesses can eliminate many of the risks associated with traditional passwords.

An Easily Integrated and Robust Solution

The integration process for IT teams is remarkably straightforward, often requiring as little as 30 minutes for a complete setup. This simplicity is crucial for large organizations that may have thousands or even hundreds of thousands of users. The solution operates as a client-only application on mobile devices, meaning that there is no need for extensive external connections or complex setups. Once the initial configuration is completed, the system can seamlessly connect users’ devices to the organization’s Active Directory (AD) to retrieve credentials, enabling immediate access to necessary resources. This push-button deployment minimizes downtime and allows IT teams to focus on other critical tasks rather than getting bogged down in lengthy installation processes.

Moreover, this mobile integration is not just limited to Microsoft AD; Hypergate’s solution is designed to be open-ended, allowing for compatibility with various systems. This flexibility is essential for large enterprises that often utilize a diverse range of software and platforms. By providing a gateway for integration, businesses can ensure that their authentication processes are both secure and adaptable to their unique needs.

Simple and Intuitive to Use

The user experience is another critical aspect of mobile integration. The Hypergate technology allows the application to operate in the background, requiring minimal interaction from the end-user. This approach reduces friction and enhances productivity, as employees can access their work environments without the hassle of remembering and entering complex passwords. The ease of use is particularly beneficial in large organizations where employee turnover may lead to frequent changes in user access. With mobile authentication, new users can be onboarded quickly and securely, ensuring that they can begin contributing to the organization without delay.

Ultimately, the transition to mobile authentication solutions represents a significant advancement in the ongoing battle against cyber threats. As organizations increasingly recognize the limitations of traditional password systems, embracing innovative technologies that prioritize user experience and security is essential. By adopting easy mobile integration strategies, large enterprises can enhance their security posture while enabling employees to work more efficiently. This shift not only protects sensitive data but also positions businesses to thrive in an increasingly complex digital world, where agility and security are paramount.

Conclusion: Simplifying Authentication for Large Organizations

In conclusion, as the digital landscape continues to evolve, the integration of Hypergate’s mobile authentication solutions stands out as a vital step for large enterprises. By simplifying the authentication process for users and streamlining implementation for IT teams, businesses can effectively address the challenges posed by modern cybersecurity threats, ensuring a secure and efficient operational framework. For companies interested in exploring these mobile integration solutions, the podcast advises visiting the provider’s website for more information and the availability of trial licenses. This accessibility allows organizations to test the technology in their environments before committing to a full-scale rollout.

Interview by Scott Ertz of F5 Live: Refreshing Technology.

Sponsored by:
Get $5 to protect your credit card information online with Privacy.
Amazon Prime gives you more than just free shipping. Get free music, TV shows, movies, videogames and more.
The most flexible tools for podcasting. Get a 30 day free trial of storage and statistics.


SECURAM: From laser switches to biometric door locks @ CES 2024



SECURAM smarthome securitySECURAM, a leading company in the security industry, recently announced the launch of its new suite of smart switch products. The Director of Marketing, Steve Davidson, shared insights about the unique features of these products.

Smart security switch with beam

The suite includes three types of switches, each designed with a specific focus on security. One of the standout features is a laser sensor located on the front of the switch. This sensor, which is thin and measures no more than three millimeters, can detect motion up to 15 feet away in both dark and bright settings.

The laser sensor is designed to trigger alarms or turn on lights when motion is detected. It is positioned at a height that is unlikely to be triggered by pets or children, ensuring that any motion detected is intentional.

Added security for emergencies

One of the key features of the smart security switch is its ability to make phone calls in case of emergencies. This means that users can set it up to automatically call emergency services if they do not respond to a notification. While there is no information about whether this service will be subscription-based, the company is considering different options.

One of the standout features of the smart security switch is its ability to function even without an internet connection. While certain features may not be available without internet access, the switch can still communicate with other devices within the house. This is made possible through the switches’ ability to talk to each other, creating a network of communication within the home.

The smart security switch also has programmable features. Users can program the up and down buttons to control multiple switches in their home. This allows for convenient control of lights and other devices throughout the house.

Using the switches together

While it is not necessary to have multiple switches, SECURAM recommends grouping them for optimal security. The company offers a regular switch without the laser sensor, a dimmer switch, and a programmable version of the security switch. These switches can be used to secure common entry points for intruders, such as front and back doors or patio doors.

Davidson confirmed that the ideal setup would include a switch near each door, but the final decision depends on the individual’s home layout and needs.

The switches are controlled through the SecureAMGuard app, which allows users to group and manage all their switches in one place. The app offers various scenes, automations, and triggers that can be set. Users can even set up the switch to notify the police or a specific person if motion is detected.

Simple installation for everyone

The installation process for the smart security switch is straightforward and can be done by anyone who is comfortable installing a regular switch. The switch simply pinches the wires, making it easy to install. However, it is important to turn off the breaker before installation to ensure safety. The company provides an installation video on Amazon to guide users through the process.

Biometric door lock with app

Another security product in the family is the EOS lock. This is a biometric door lock that offers a high level of security. It features a fingerprint reader and a durable aluminum metal housing. Users can also enter a passcode to unlock the door. The EOS lock is available in both Wi-Fi and standalone models. The standalone model does not require an internet connection and operates mechanically.

The EOS lock can be connected to the Guard app, which allows users to remotely open and close the door. This feature is particularly useful for granting access to guests when the homeowner is not at home. The app also provides a history of when the door was opened and closed, as well as alerts for when the door is left open.

What sets the EOS apart?

While there are competitors in the market offering similar products, SECURAM differentiates itself through its extensive experience in the lock industry. With over 30 years of experience in the lock and safe lock industries, SECURAM has established a high standard of quality and reliability. This expertise gives users confidence in the security and durability of the EOS lock.

Overall, the biometric door lock with app offered by SECURAM provides a convenient and secure solution for enhancing home security. With its programmable features, remote access capabilities, and high-quality construction, it is a reliable choice for homeowners looking to protect their property.

Conclusion: Unique security in an expensive package

The pricing for the smart security switch is reasonable, with the regular switch priced at $24.95 and the dimmer switch priced at $59.95. This makes it an affordable option for enhancing home security. The MSRP for the smart EOS lock is $269.

In conclusion, SECURAM’s smart security switch with a beam is designed to enhance home security by detecting motion and triggering alarms or lights. It can be grouped with other switches and controlled through the SecureAMGuard app, which offers a range of customization options. The SECURAM smart lock is a reliable and convenient solution for enhancing home security. With its biometric capabilities, remote access features, and solid construction, it offers homeowners peace of mind and ease of use.

To learn more about SECURAM and its product offerings, check out their website or Amazon store.

Interview by Don Baine, The Gadget Professor.

Sponsored by:
Get $5 to protect your credit card information online with Privacy.
Amazon Prime gives you more than just free shipping. Get free music, TV shows, movies, videogames and more.
The most flexible tools for podcasting. Get a 30 day free trial of storage and statistics.


YubiKey keeps your online data safe in an easy way @ CES 2023



YubiKey multi0factor authenticationAs time goes on, the internet gets to be a more dangerous place. It seems like every day we read another story about another data breach or ransomware attack because simple safety precautions were not taken by users or network administrators. And while you may never be able to change someone else’s behaviors to make yourself safer, you can make changes to your own security to help prevent others from putting you in harm’s way. Our favorite tactic to protect ourselves is by using a YubiKey by Yubico.

What is multi-factor authentication?

Before we can discuss the YubiKey itself, we need to discuss what multi-factor authentication is. Multi-factor authentication (MFA) is a method of confirming someone’s identity by using two or more independent pieces of evidence. The most common type of MFA is something you know and something you have. Something you know would be a password or PIN number, while something you have can be your phone, biometric identifiers like fingerprints, or the YubiKey itself.

The benefit of MFA is that it makes it much harder for someone to gain access to your accounts and information, as they now need two pieces of evidence, rather than just one. This significantly reduces the chance of someone being able to access your accounts and data without your consent.

What is a YubiKey?

A YubiKey is a physical key fob or USB device that serves as a second factor of authentication. It contains an embedded secure element that generates and stores cryptographic secrets used to generate one-time passwords (OTPs). When inserted into the computer or scanned using near-field communication (NFC), it sends the OTPs to the authentication backend. It is designed to be a very quick, easy, and secure way of authenticating yourself on your accounts or accessing data.

When combined with traditional username and password login credentials, a YubiKey provides an additional layer of security that makes it much harder for unauthorized individuals to gain access to your accounts and data. This highly secure form of two-factor authentication is becoming more popular due to its convenience and effectiveness in protecting user accounts. By adding a YubiKey to your security arsenal, you can be sure that the data stored on your online accounts are safe and secure from malicious actors. It’s an easy and effective way to protect yourself and your data.

How YubiKey is protecting the web

In addition to personal uses for a YubiKey, there are a lot of other places where the device can be used. For example, a lot of the corporate hacks we see could have been prevented by a secure MFA system. Even if a company uses text-based MFA, a SIM can be cloned by a determined hacker and access can still be granted. In addition, it prevents the terrible new trend of “zero trust” in corporate IT where they always assume that you’ve died unless you verify otherwise, destroying computers simply because you forgot to log into the VPN or some other process.

The company also puts a focus on global concerns. For example, they have provided devices to the Ukrainian government to help secure their governmental infrastructure. There was no requirement for them to do this, but they felt it was important enough to the country and the world to do what they could to help out.

Summary

YubiKey devices are available now for various uses, including USB-A, USB-C, NFC, and more. To learn more about the product line, check out the company’s website.

Interview by Scott Ertz of F5 Live: Refreshing Technology.

Sponsored by:
Get $5 to protect your credit card information online with Privacy.
Amazon Prime gives you more than just free shipping. Get free music, TV shows, movies, videogames and more.
The most flexible tools for podcasting. Get a 30 day free trial of storage and statistics.


ADT pairs the power of Google Nest and monitored security @ CES 2023



ADT Smart Home SecurityHome security is a top focus for a lot of people. The problem is that creating a safe and secure home can be challenging. You can buy pre-fabbed kits with connected sensors, but you end up locked into their ecosystem, but you’re required to monitor and respond to the alerts yourself. The other option is to go with an installed and monitored system, but you’re usually locked into their proprietary hardware, so if you ever want to change, you’re pretty much out of luck. Luckily, ADT has found an excellent middle-ground for consumers.

Who is ADT?

ADT is one of the biggest names in monitored home security. The company helps people to protect their homes without having to worry about installation, monitoring, or managing a home security system. The biggest advantage of one of the company’s systems is that emergency response is 8 times faster when managed by ADT as opposed to other competitors or even self-monitoring.

For those who are interested in their own installation, either for privacy reasons or a DIY spirit, ADT offers self-setup systems. Even if you install a system yourself, you had the ability to use the company’s monitoring services to improve peace of mind.

ADT’s connected home

In the spirit of self-installation and expanded options, ADT has begun offering connected home options. The company’s monitoring system can now be integrated with Google’s Nest product line. This means that Nest Cams, Nest Doorbells, Nest Thermostats, and even Nest Wi-Fi can be connected to ADT monitoring. In fact, you can use these connected devices while also having professional setup from the company’s installers.

One of the benefits of using consumer smart devices as part of your professional security setup is that you get all of the benefits of a smarthome while also getting all of the benefits of an ADT system. Using the Nest product line means that you can connect to your cameras, thermostat, and more while you are away. So, if someone rings your doorbell, you can see who is at the door even if you are on vacation. But, if there is a problem, an agent is able to respond and call the authorities if needed.

In addition, by using regular consumer hardware, you have the ability to make a change to your setup if needed. A change in life circumstances might mean you need to discontinue active monitoring. In that event, you are able to still access your Nest devices on your own and maintain security for your home on your own. This gives some flexibility in the hardware you have installed, as opposed to being stuck installing hardware that only works with the service provider that installed it. This gives owners more choices and reduces electronic waste in the event of a change.

Summary

ADT’s traditional security hardware and Google Nest integration are available for professional and self installation now. For more information about the company’s product and service offerings, you can head to their website or call (800) 750-0372.

Interview by Daniele Mendez of The New Product Launchpad.

Sponsored by:
Get $5 to protect your credit card information online with Privacy.
Amazon Prime gives you more than just free shipping. Get free music, TV shows, movies, videogames and more.
The most flexible tools for podcasting. Get a 30 day free trial of storage and statistics.


Apollo brings full automation to ADT’s commercial offerings @ CES 2023



ADT Commercial Apollo security robotIt seems like every day we hear about another industry that AI, robotics, and automation are coming to improve. Fast food service has gotten better with more automation in the kitchen. Manufacturing has been helped immensely by robotics and automation, making the jobs in factories safer and less physically intensive. However, one place that we didn’t expect to see robotics, at least not today, is security. However, ADT Commercial has a new robot security guard called Apollo.

What is Apollo?

Apollo is a humanoid robot that is intended to augment traditional security guards in an office, retail space, or any other commercial property. It is part of the company’s new EvoGuard initiative, which seeks to infuse high-tech capabilities into ADT’s commercial security offerings.

A large part of a human security guard’s job is to observe their surroundings and report on what they see. This can be done by walking the premises and looking for things that are out of place, or by sitting with a wall of screens watching an entire property at once. If something out of the ordinary is observed, the correct people are alerted. This could be another member of security, the property owner, or even the police.

Apollo is capable of doing all of this, without any of the restrictions of a person. The robot can travel around a property easily looking for changes in the environment, or even recognizable issues. Once an issue is recognized, it can report back to a security supervisor and a human can take over control of the robot to go and investigate further. If warranted, the agent can then notify someone on the grounds, the property owner, or the local police.

One of the interesting features of Apollo is the virtual reality option. Using a VR headset, the supervisor is able to essentially become the robot. They are able to see through the perspective of the robot and manipulate it as if they were there. This includes moving its hands, opening or closing doors, checking windows, etc. However, if the supervisor is unable or unwilling to use the VR experience, the entire thing can also be controlled from the system’s computer-based dashboard.

This is actually the reason why Apollo is humanoid. If the purpose was merely to observe and report, then it could have been designed to look like a trash can. However, because it is intended to be able to be used remotely to accomplish goals, the company let it was important to make it with a wider range of motion. But, since all of our environments are designed for humans, it was decided that Apollo should be humanoid, as well.

Summary

Apollo is currently in use through partnerships with three test partners. Using their feedback, the company and its design partner are able to make adjustments before it becomes available for a wider audience, hopefully during quarter 1 of 2023. To learn more about Apollo or ADT’s other commercial security offerings, you can check out their website.

Interview by Daniele Mendez of The New Product Launchpad.

Sponsored by:
Get $5 to protect your credit card information online with Privacy.
Amazon Prime gives you more than just free shipping. Get free music, TV shows, movies, videogames and more.
The most flexible tools for podcasting. Get a 30 day free trial of storage and statistics.


The future for BenjiLock is secure and brighter than ever @ CES 2023



BenjiLock Biometric SecuritySince we first encountered BenjiLock in Eureka Park in 2017, the company has changed a lot. Those early days were at a tiny booth with a non-functioning prototype. Before we got to see them again, the company had been on Shark Tank and partnered with Mr. Wonderful Kevin O’Leary. O’Leary put together a partnership to help Founder Robbie Cabral bring the product to market with manufacturing, sales, and more. Today, the company is looking at its next phase in life, including helping to support other startups at CES.

What is BenjiLock?

BenjiLock is the world’s first biometric padlock with a traditional key. The importance of having a biometric padlock allows you to go to the gym without having to carry anything with you. We’ve all had a phone fall out of our pocket or had to go look for our keys later on. With the BenjiLock, you can safely leave your items in a locker without having to carry a key.

The importance of having a physical key allows for a backup. Batteries die – and always at inopportune times. With other smart padlocks, if the battery dies, you’re possibly out of luck. You’ll have to cut the expensive lock off and throw it away. However, with the physical key, you’ve got a way to open the lock in that situation.

BenjiLock also now offers a wider range of products. The line now includes a biometric deadbolt and biometric bike lock, offering the convenience of unlocking your door or bike without keys. BenjiLock hopes to revolutionize home security, bike safety, and more with its innovative technology. By expanding the ecosystem, more people in more situations can go about their days without the need to carry as many keys.

BenjiLock at CES 2023

This year, the company took a different approach to CES. Rather than having its large blue booth on the show floor, Robbie spent his time helping to bring awareness to other startups exhibiting at the show in Eureka Park. BenjiLock sponsored the startup pitch event on the CTA Stage with Canon, allowing BenjiLock to help new startups get their start by giving them a platform at CES. BenjiLock was able to use its resources and experience from standing out in Eureka Park just six years ago to give back and help other startups get their big break.

This event was in partnership with the CTA Foundation, the non-profit arm of the Consumer Technology Association, the organization that oversees CES. The event was intended to showcase the best startups and entrepreneurs in technology, giving BenjiLock a chance to help out where they originally got started. Their support of the CTA Foundation really shows how far they’ve come since their first appearance at CES in 2017.

BenjiLock has gone from a small startup with big dreams to an established company ready to give back. The company is continuing to innovate, bringing biometric technology to the masses in a way we’ve never seen before. Robbie Cabral looks forward to what the future holds as the brand continues to grow and expand their product line. BenjiLock has come a long way since 2017, and with its support of other startups through initiatives like this partnership with the CTA Foundation, the company is setting itself up for even more success in the years to come.

Summary

The entirety of the BenjiLock product line is available now through the company’s website, as well as Amazon, Ace Hardware, and more.

Interview by Todd Cochrane of Geek News Central and Scott Ertz of F5 Live: Refreshing Technology.

Sponsored by:
Get $5 to protect your credit card information online with Privacy.
Amazon Prime gives you more than just free shipping. Get free music, TV shows, movies, videogames and more.
The most flexible tools for podcasting. Get a 30 day free trial of storage and statistics.


ATBHASH is using blockchain to provide safety and security @ CES 2023



Over the past few years, we’ve seen a lot of companies implement platforms based on blockchain technology. However, these platforms are often not enhanced by the permanent and unalterable nature of the technology. But, there are a lot of places where blockchain technology can be of use, and Parisian company ATBHASH is implementing them for safety and security purposes.

What is blockchain technology?

Blockchain technology is a revolutionary form of distributed ledger technology that enables secure and efficient transactions without the need for an intermediary. It is a decentralized system that keeps track of data across a network of computers, using cryptography to ensure the integrity and security of all transactions.

Put simply, blockchain is a digital ledger system where records or blocks are secured by cryptography and can be shared across a vast network of computers. Each block contains a timestamp, transaction data, and the digital signature of the previous block – creating an unchangeable chain. This makes it virtually impossible to modify or delete any data stored on the blockchain without having access to every node in the network.

The immutability of records stored on the blockchain provides a robust platform to store data securely and transparently. It is widely considered to be the most secure form of ledger technology, with potential applications in a vast range of industries from shipping and logistics to finance and healthcare. Blockchain technology has the potential to revolutionize how we do business by eliminating intermediaries, reducing transaction costs, increasing trust between parties, and streamlining the process of transferring assets.

ATBHASH for construction

The company began its blockchain journey in the construction space. By using blockchain technology, the company was able to produce a platform that creates a way to track a building project without the risks inherent in digital data. The platform is called CEERTIF. As the project proceeds, all steps are logged into the system. This gives auditors and inspectors a detailed and step-by-step insight into the building project.

Because of the blockchain backend, everyone involved can be assured that the data has not been changed within the CEERTIF platform. However, if it has been changed, then an audit log is available to show every change and when it happened. This way there are no questions about the integrity of the data being presented – a problem that happens normally in construction.

ATBHASH for domestic violence victims

Using the same core technology that made CEERTIF possible, ATBHASH has launched another blockchain product called NANSHE. This product focuses on the victims of domestic abuse rather than the construction industry. Using NANSHE, victims can safely and securely present evidence of domestic abuse.

The safety and security of the platform is the most important part in this case, as victims are often scared to come forward because of the potential backlash from reporting the crime. The platform, however, allows them to do so in a way that the abuser cannot find out about, and therefore cannot respond to.

In addition, because of the blockchain technology, there is no way for someone to hack in and change the data or delete it entirely. This is because blockchain data is immutable. This protects the victim’s safety and ensures the authorities can pursue the case without fear of loss.

Summary

Both platforms – CEERTIF and NANSHE – are available t use now. To learn more about the company and its products, head over to their website.

Interview by Todd Cochrane of Geek News Central.

Sponsored by:
Get $5 to protect your credit card information online with Privacy.
Amazon Prime gives you more than just free shipping. Get free music, TV shows, movies, videogames and more.
The most flexible tools for podcasting. Get a 30 day free trial of storage and statistics.


LapLok protects your laptop when you work on-the-go @ CES 2023



LapLok Tech SecurityIf you travel as often as our team does, you know there are a number of issues that pop up regularly. For example, one day you could be working in a hotel office and the next you’re sitting at a table in a coffee bar. But, one thing always remains the same – how do you secure your computer? There are Kensington-style locks, but so many laptops today don’t have a lock port (including the one I’m using to write this). This is the space that LapLok is looking to fill.

What is LapLok?

LapLok is a near pocket-sized security system for anyone who uses their laptop out in public. This could be writers who need to be seen writing at Starbucks or travelers trying to get work done at the airport. Wherever you are, so long as you’ve got a flat surface, you can secure your laptop.

The device works fairly simply. You attach a mounting bracket to the back of your laptop, ideally before you go out. The bracket goes on with a strong 3M adhesive that will hold it in place in nearly all situations. Then, when you’re ready to lock the computer, you attach the base to the bracket and clamp it to the table. Once locked in place, it will only open with the PIN you’ve programmed.

In addition to the base locking system, there are other security accessories that can be added. The most prominent add-on that we saw was to also secure your purse or laptop bag to the underside of the table. Now, with a single device, you can deter the casual grab-and-go thief.

But, what happens if someone does grab the laptop and tries to get away? The LapLok has a built-in alarm that sounds. The alarm is loud and annoying enough that they didn’t want to demonstrate it at the show. Obviously, the idea of the alarm is to deter the theft, but also to alert everyone around in the event it happens.

Who is LapLok for?

With the increase in work-from-home and work-from-anywhere mentality, many people are working while out of the office. Because of this, companies have been issuing laptops to employees who previously may not have had one. So, with working from anywhere growing in popularity, the LapLok is really for anyone.

The most common use case is for people who travel a lot. Travelers often find themselves working in strange places. But, these days, many of us do. Even around town, I find myself working from restaurants and coffee shops – even gaming centers. Being able to secure your laptop to go to the bathroom is a great ability, but securing it while you’re sitting there is just as important – possibly more important.

Summary

LapLok is in a late prototype phase and TechLok, the company behind the product, is taking pre-orders now. The expected retail price of the device is $80, but in pre-order, you can get the whole productivity bundle for $7, though quantities are limited. To learn more or pre-order your own, head to the company’s website.

Interview by Todd Cochrane of Geek News Central.

Sponsored by:
Get $5 to protect your credit card information online with Privacy.
Amazon Prime gives you more than just free shipping. Get free music, TV shows, movies, videogames and more.
The most flexible tools for podcasting. Get a 30 day free trial of storage and statistics.