While the potential of this practically real-time AoT system is considerable, there is also a large risk of abuse of the system or the data it produces. IoT devices are now common targets for exploitation, oftentimes for use in botnets to perform nefarious activities such DDOS attacks, due to their typically weak security and lack of updates and monitoring, compared to traditional internet-connected devices. I noticed that you mentioned that security experts reviewed your AoT system prior to deployment, but what specifically are some of the ways you are attempting to prevent or mitigate abuse of the system and its data? Were there any particularly challenging security issues that you had to overcome during the development of the system?
While the potential of this practically real-time AoT system is considerable, there is also a large risk of abuse of the system or the data it produces. IoT devices are now common targets for exploitation, oftentimes for use in botnets to perform nefarious activities such DDOS attacks, due to their typically weak security and lack of updates and monitoring, compared to traditional internet-connected devices. I noticed that you mentioned that security experts reviewed your AoT system prior to deployment, but what specifically are some of the ways you are attempting to prevent or mitigate abuse of the system and its data? Were there any particularly challenging security issues that you had to overcome during the development of the system?