Message Font: Serif | Sans-Serif
No. of Recommendations: 0
A moderately sophisticated enemy could extract the IP addresses from just one intercepted transmission of a legitimate command. The use of a radio control link would require much more sophisticated security measures.

WEP encryption could be used to guard both the robot and command computer, just like I have at home. Add a time-signature to each command sent and encrypt, and you're pretty much secure. Sure-it can be hacked eventually, but not quickly. The more simple solution would be to produce a jamming or conflicting radio signal, which happens to me all the time. I have a 100% guaranteed method of jamming wireless modems, it's called a cordless phone. Pump up the power 10-100x and it's got a jamming radius of about 20 yards, I'll bet.

But, again, that is why it's a robot. If it loses contact, it can retrace its steps until it gets back to safety, presumably with recorded information and mapping.
Print the post  


When Life Gives You Lemons
We all have had hardships and made poor decisions. The important thing is how we respond and grow. Read the story of a Fool who started from nothing, and looks to gain everything.
Contact Us
Contact Customer Service and other Fool departments here.
Work for Fools?
Winner of the Washingtonian great places to work, and Glassdoor #1 Company to Work For 2015! Have access to all of TMF's online and email products for FREE, and be paid for your contributions to TMF! Click the link and start your Fool career.