Maker-craft: An Alternative (and More Secure) Approach to the Internet of Things?

With estimates of up to 50 billion smart devices coming online by 2020, the Internet of Things (IoT) is a panacea for our want-to-be-wired world. Everyday items from cars to thermostats to hair brushes (yes, seriously) are being ‘smartified’, whether we need them to be or not. But all of this connectivity is creating substantial privacy and security concerns as well—because of the data that will be collected about our behaviors and preferences, and because of the internet’s considerable vulnerabilities, including rampant cyberattacks.

One bright mind is devising a way around these pitfalls while still being able to reap the IoT’s benefits. His solution? Becoming a “Maker.” I recently visited with Dr. Ulrich Norbisrath to see first-hand his Home Automation method, which may hold great promise for a different approach to IoT.

First, what is a Maker? Dr. Norbisrath defines it as “a person who physically creates and integrates things from commonly available recipes…The process of Making creates value, as the finished product is more valuable than its parts and can often be sold. It is, therefore, comparable with manufacturing—on a small scale.”

So how does one Make smart, connected devices out of “commonly available” items? Dr. Norbisrath has created an “eHome” network from affordable parts such as wireless micro computers ($3 each), Raspberry Pi micro computers (higher cost at around $10-$35), low cost power supplies and adapters, small servo motors (~$2.50), push buttons (~$1-2) and other inexpensive piece parts like wire, card stock, glue, screws, washers and nuts—all easily sourced online or at local stores. He repurposes old smart phones for control panels.

Of course there is technical know-how required, as well as some good software to work from. Dr. Norbisrath relies on open source software such as the Home Assistant home automation platform, snapcast for multi-room synchronous sound, the Raspberry Pi Operating System Raspbian, and Micropython as the operating system for the other micro computers. These tools and parts are within budget of most students and other Makers looking to create their own IoTs.

Using this self-built collection of smart devices, Dr. Norbisrath controls many operations in his home: a smart lock for the door, smart light switches, smart stereo, smart temperature sensors—all managed from his smart phone over local secure wifi when in range, or secure VPN when farther away. The devices connect to partitioned networks for added security, although he has built an interface to expose each device to his Amazon Echo, if and when he chooses to do so.

While all of this “making” can be fun, what’s the real point? Dr. Norbisrath relishes the conveniences and efficiencies of home automation, but he also sees other significant benefits. A separate IoT that is not continuously connected to the internet is far more secure and private than the legion of smart devices that push everything through the cloud. A personal IoT could also enable digital forensics inside the automated home. For instance, you would be able to determine how often devices connect, when, who connected them and where they connected to. Further, with the right know-how, makers’ connected devices and networks can be done at a much lower cost than commercially available IoT offerings.

Dr. Norbisrath noted that “You can, in a relatively non-invasive way, automate your home. Doing it this way, it’s much more secure and private. I know what I am doing, and I know what my devices are doing.”

He sees home automation as just the start, with myriad other potential applications. Looking at the bigger picture, this kind of Making can teach people to apply technology in their daily life. Educating people on how to build even simple connected devices will help them develop technical skills needed in the job market. Extrapolate that out, and it can be a way to empower local communities and bring a new type of manufacturing back to the US.

The rush to the Internet of Things is both benefitting and exposing us as individuals and as a society. Perhaps a growing community of Makers will help enable a more balanced approach that puts users more in control of their own digital destiny.

For more information about Dr. Norbisrath’s work, please visit:


Dr. Norbisrath’s ‘eHome Demonstrator’ incorporating 13 computers, on display at the recent Maker Faire, built and supported  by George Mason University’s MIX (Mason Innovation Exchange).

An interesting perspective on ethics.

Last week I attended a conference on Data Privacy and Security. These are white hot topics, and the conference was filled with attorneys, technologists, vendors and speakers who offer a lot of how-to advice, products and services for dealing with these formidable challenges. This is great, because

Read more

Data Privacy in Asia – an opportunity for competitive differentiation

Are you doing business in Asia? Is so, the Cross-Border Privacy Rules (CPBR) could offer a good differentiator for your business. The APEC economic zone (which happens to include countries from North America) is increasing adoption of CPBR – which codifies a framework of principles for how

Read more

New Rules for Moving Data ‘Across the Pond’

Does your US organization do business in Europe? If so, the rules for collecting and moving the personal data of EU citizens across borders and into the US are about to change. A new EU regulation is taking shape under a tight deadline and intense pressure that

Read more

Brand Reputation in the Era of Data – Should You Really Do It?

Over the past few weeks, I’ve outlined 8 Principles that will help marketers protect and strengthen their brands in an era of radical change, where there is great temptation (and quite likely management pressure) to push boundaries further than ever before. Throughout this time and many preceding

Read more

Brand Reputation in the Era of Data – Principle 8: Actively Demonstrate Respect for Your Customers

The final of these 8 Principles clarifies a concept implied across the other seven. To become and remain a successful brand, businesses must actively demonstrate customer respect. Just saying ‘We respect our customers!’ is not enough. Prove it. This can take many forms, from being transparent and

Read more

Brand Reputation in the Era of Data – Principle 7: Apply Technology Thoughtfully

  Last week, Chapman University published the results of its survey America’s Top Fears 2015. Respondents were asked their fear level about different factors ranging from crime to disasters to their personal futures. FIVE OF THE TOP TEN THINGS PEOPLE FEAR ARE RELATED TO MIS-USE OF THEIR

Read more

Brand Reputation in the Era of Data – Principle 6: Comply with All Applicable Laws and Regulations. Then Exceed Them.

There are a LOT of laws and regulations out there that govern data handling and privacy. They vary according to where you conduct business. The European Union has the strictest set of laws that are built on the principle of human rights. The United States has what’s

Read more

Brand Reputation in the Era of Data – Principle 5: Practice Customer Empathy

Hand in hand with getting your own house in order to secure customer data is developing an empathic organizational culture that understands, internalizes and practices customer-sensitive behaviors. This can be reflected in the marketing practices you adopt, the way customer data is collected and handled, and the

Read more

Brand Reputation in the Era of Data – Principle 4: Mind Your Partners!

While the last post discussed getting your own house in order around protecting customer data, equally important is protection of that data when it is passed on to others in your value chain. Consumers regularly agree to share data with a particular organization for immediately known purposes

Read more

Brand Reputation in the Era of Data – Principle 3: Do Everything You Can to Protect Customer Data

There are few hotter topics these days than cyber security. Sadly, the state of affairs will probably not significantly improve in the foreseeable future. Estimates are that two new malwares proliferate every second. Even the best intrusion protection software cannot keep up with that. The reality is

Read more
Page 1 of 3123
January 2018
« Sep    

Lastest Tweets

Dialog Research & Comm.

Dialog serves clients from the Silicon Valley to Washington DC.

Tel: 925-719-1260

NAICS Codes:
541611, 541613, 541618, 541820, 541910