Criminals, Conjecture, and Connected Things
My connected devices were initially secured using a hash-based message authentication code (HMAC). An HMAC is constructed for each HTTP request directed at a device. The HMAC is created by combining certain HTTP header elements,… Criminals, Conjecture, and Connected Things