I'm sure, due to their hard work, all new computer have hardware jumpers to write protect the BIOS....
It can be used for data logging and collecting stats. An old off-the-shelf method was to use an Ethernet to 15-pin AUI module and break off the transmit pin. Today it's easier to use port mirroring if you trust the hardware.
Also, assumes that the card generates good key pairs and doesn't use some secret process that allows private key recovery from the public key. This has been done by card suppliers in the past.
As a side questions: Does any CA have a process for signing S/MIME certificates that can be generated outside of a browser?
Don't put it in small engines either. The 10% stuff caused a leak in a generator fuel tank. It leaked at the shutoff valve/tank seal. The tank was almost empty or I might have lost the house.
Make sure your service agreement allows you to destroy a failed drive, for credit, instead of doing an RMA.
I suspect that no off the shelf product is secure from the network side. The hardware needs to have two independent blocks: a communications module and a application module. The two need to be linked with a well defined API so that the communications module can't change the application code and there is a good point for an audit. There are probably regulatory issues like GPS to emergency services, not being able to hang up an emergency call, etc. You need to be able to load the application code from a secure interface with signed code etc. A smart card slot for application module key material would be a plus. Good luck trying to find one and good luck getting approval to sell one with these features.
A lot of people must skip vaccines. I just received an email saying that basketball practice was canceled due to a measles outbreak. It's sad that we could probably eliminate many of these diseases.
I wonder about Fry's too. Our local store hasn't restocked surface mount resistors in months. Nothing like paying for over night delivery to get a badly needed 470 ohm resistor just because the peg is empty.
Stop the trouble before it occurs: Make sure your service agreements allow you to destroy drives before getting an under warranty replacement.
Metric won't happen without a really big stick. Fuel pumps would probably change in less than 24 hours if there was a 1% tax on sales measured in gallons.
There appears to be more privacy issues beyond monitoring in the phone. My Smartphone (GT-I9100 v.2.3.4) won't allow access to https://www.google.com./ It also doesn't allow the addition of private certificate authorities or the removal of bad ones. To make matters worse, it won't display the fingerprint of a certificate. So the only option is to accept, on faith, the issuer name displayed. It seems obvious that the handset makers don't care about privacy or potential harm to customers.
How about an app that beeps and turns the display red if encryption, as feeble as it is, gets turned off.
A big improvement would be to require e-commerce servers to protect their private key in a hardware accelerator that won't give up the key. This would protect the certificate if the server is compromised. Someone might be able to use the accelerator, via some type of proxy hack, but the certificate would be safe after a compromised server is reloaded.
Maybe the "scam" factor could be reduced if the certificates were signed by two or more entities in different jurisdctions.