The Future of Smart Living: Smart Homes

Future-Home-Design-Dupli-CasaAt this year’s Consumer Electronics Show, one of the tech trends to watch was the concept of the Smart Home. Yes, in addition to 4K televisions, curved OLEDs, smart car technology and wearables, a new breed of in-home technology that extends far beyond the living room made some serious waves. And after numerous displays and presentations, it seems that future homes will involve connectivity and seamless automation.

To be fair, some smart home devices – such as connected light bulbs and thinking thermostats – have made their way into homes already. But by the end of 2014, a dizzying array of home devices are expected to appear, communicating across the Internet and your home network from every room in the house. It’s like the internet of things meets modern living, creating solutions that are right at your fingertips (via your smartphone)

smarthomeBut in many ways, the companies on the vanguard of this movement are still working on drawing the map and several questions still loom. For example, how will your connected refrigerator and your connected light bulbs talk to each other? Should the interface for the connected home always be the cell phone, or some other wirelessly connect device.

Such was the topic of debate at this year’s CES Smart Home Panel. The panel featured GE Home & Business Solutions Manager John Ouseph; Nest co-founder and VP of Engineering Matt Rogers; Revolv co-founder and Head of Marketing Mike Soucie; Philips’ Head of Technology, Connected Lighting George Yianni; Belkin Director of Product Management Ohad Zeira, and CNET Executive Editor Rich Brown.

samsunglumenSpecific technologies that were showcased this year that combined connectivity and smart living included the Samsung Lumen Smart Home Control Panel. This device is basically a way to control all the devices in your home, including the lighting, climate control, and sound and entertainment systems. It also networks with all your wireless devices (especially if their made by Samsung!) to run your home even when your not inside it.

Ultimately, Samsung hopes to release a souped-up version of this technology that can be integrated to any device in the home. Basically, it would be connected to everything from the washer and dryer to the refrigerator and even household robots, letting you know when the dishes are done, the clothes need to be flipped, the best before dates are about to expire, and the last time you house was vacuumed.


As already noted, intrinsic to the Smart Home concept is the idea of integration to smartphones and other devices. Hence, Samsung was sure to develop a Smart Home app that would allow people to connect to all the smart devices via WiFi, even when out of the home. For example, people who forget to turn off the lights and the appliances can do so even from the road or the office.

These features can be activated by voice, and several systems can be controlled at once through specific commands (i.e. “going to bed” turns the lights off and the temperature down). Cameras also monitor the home and give the user the ability to survey other rooms in the house, keeping a remote eye on things while away or in another room. And users can even answer the phone when in another room.

Check out the video of the Smart Home demonstration below:


Other companies made presentations as well. For instance, LG previewed their own software that would allow people to connect and communicate with their home. It’s known as HomeChat, an app based on Natural Language Processing (NLP) that lets users send texts to their compatible LG appliances. It works on Android, BlackBerry, iOS, Nokia Asha, and Windows Phone devices as well as OS X and Windows computers.

This represents a big improvement over last year’s Smart ThinQ, a set of similar application that were debuted at CES 2013. According to many tech reviewers, the biggest problem with these particular apps was the fact that each one was developed for a specific appliance. Not so with the HomeChat, which allows for wireless control over every integrated device in the home.

LGHomeChatAura, a re-imagined alarm clock that monitors your sleep patterns to promote rest and well-being. Unlike previous sleep monitoring devices, which monitor sleep but do not intervene to improve it, the Aura is fitted a mattress sensor that monitors your movements in the night, as well as a series of multi-colored LED light that “hack” your circadian rhythms.

In the morning, its light glows blue like daytime light, signaling you to wake up when it’s optimal, based upon your stirrings. At night, the LED glows orange and red like a sunset and turn itself off when you fall asleep. The designers hopes that this mix of cool and warm light can fill in where the seasons fall short, and coax your body into restful homeostasis.

aura_nightlightMeanwhile, the Aura will send your nightly sleep report to the cloud via Wi-Fi, and you can check in on your own rest via the accompanying smartphone app. The entire body is also touch-sensitive, its core LED – which are generally bright and piercing – is cleverly projected into an open air orb, diffusing the light while evoking the shape of the sun. And to deactivate the alarm, people need only trigger the sensor by getting out of bed.

Then there was Mother, a robotic wellness monitor produced by French inventor Rafi Haladjian. This small, Russian-doll shaped device is basically an internet base station with four sensors packs that track 15 different parts of your life. It is small enough to fit in your pocket to track your steps, affix to your door to act as a security alarm, and stick to your coffee maker to track how much you’re drinking and when you need more beans.

mother_robotAnd though the name may sound silly or tongue-in-cheek, it is central to Haladjian’s vision of what the “Internet of things” holds for us. More and more, smart and sensor-laden devices are manifesting as wellness accessories, ranging from fitness bands to wireless BP and heart rate monitors. But the problem is, all of these devices require their own app to operate. And the proliferation of devices is leading to a whole lot of digital clutter.

As Haladjian said in a recent interview with Co.Design:

Lots of things that were manageable when the number of smart devices was scarce, become unbearable when you push the limit past 10. You won’t be willing to change 50 batteries every couple of weeks. You won’t be willing to push the sync button every day. And you can’t bear to have 50 devices sending you notifications when something happens to them!

keekerAnd last, but not least, there was the Keecker – a robotic video projector that may just be the future of video entertainment. Not only is this robot able to wheel around the house like a Roomba, it can also sync with smartphones and display anything on your smart devices – from email, to photos, to videos. And it got a battery charge that lasts a week, so no cords are needed.

Designed by Pierre Lebeau, a former product manager at Google, the robot is programmed to follow its human owner from room to room like a little butler (via the smartphone app). It’s purpose is to create an immersive media environment by freeing the screen from its fixed spots and projecting them wherever their is enough surface space.


In this respect, its not unlike the Omnitouch or other projection smartscreens, which utilizes projectors and motion capture technology to allow people to turn any surface into a screen. The design even includes features found in other smart home devices – like the Nest smoke detector or the Spotter – which allow for the measuring of a home’s CO2 levels and temperature, or alerting users to unusual activity when they aren’t home.

Lebeau and his company will soon launching a Kickstarter campaign in order to finance bringing the technology to the open market. And though it has yet to launch, the cost of the robot is expected to be between $4000 and $5000.

Sources: cnet.com, (2), (3), (4), fastcodesign, (2), (3), (4)

Crypto Wars: The Tech World vs. the NSA

cyber_securitySix years ago, something interesting took place at Microsoft’s Windows annual Crypto conference in Santa Barbara. In the course of the presentations, two members of the company’s security group (Dan Shumow and Niels Ferguson) gave a talk that dealt with internet security and the possibility that major systems could be hacked.

They called their presentation “On the Possibility of a Back Door in the NIST SP800-90 Dual Ec Prng”. That’s a name few people outside of the techy community would recognize, as it refers to a pseudorandom number generating program that is used extensively in cryptography. And thought the presentation was only nine slides and a few minutes long, they managed to capture the attention of the crowd with some rather stark observations.

cyber_security1Basically, they laid out a case showing that the new encryption standard, given a stamp of approval by the U.S. government, possessed a glaring weakness that made one of the program’s algorithms susceptible to cracking. But the weakness they described wasn’t just an average vulnerability, it had the kind of properties one would want if one were intentionally inserting a backdoor to make the algorithm susceptible to cracking by design.

At the time, no one thought much of it. But today, that’s all changed, thanks to Edward Snowden. Apparently, cryptographers and journalists are seeing a connection between the talk given by Shumow and Ferguson and the classified NSA documents Snowden leaked. Apparently, some of that information confirms that the weakness in the Dual_EC_DRBG algorithm might be indeed a backdoor.

nsa_aerialEarlier this month, an article appeared in the New York Times that implied that the backdoor was intentionally put there by the NSA as part of a $250-million, decade-long covert operation by the agency to weaken and undermine the integrity of a number of encryption systems used by millions of people around the world.

Naturally, these allegations not only stoked the fires over the NSA’s long history of spying on databases, both domestic and foreign, it has also raised questions over the integrity of the rather byzantine process that produces security standards in the first place. The National Institute of Standards and Technology (NIST) approved Dual_EC_DRBG and the standard, is now facing criticism alongside the NSA.

nist_aerialbigAnd while NIST has since been forced to re-open the program to examination and public discussion, security and crypto firms around the world are scrambling to unravel just how deeply the suspect algorithm infiltrated their code, if at all. Some even went so far as to publicly denounce it, such as corporate giant RSA Security.

But of course, a number of crypto experts have noted that the Times hasn’t released the memos that purport to prove the existence of a backdoor. What’s more, the paper’s direct quotes from the classified documents don’t mention a backdoor or efforts by the NSA to weaken it or the standard, only the efforts of the agency to push the standard through NIST’s committees for approval.

nsasecurity_primary-100041064-largeOne such person is Jon Callas, the CTO of Silent Circle – a company that offers encrypted phone communication. Having attended the Crypto conference in 2007 and heard the presentation by Shumow, he believes that the real problem may lie in the fact that the algorithm was poorly made:

If [the NSA] spent $250 million weakening the standard and this is the best that they could do, then we have nothing to fear from them. Because this was really ham-fisted. When you put on your conspiratorial hat about what the NSA would be doing, you would expect something more devious, Machiavellian … and this thing is just laughably bad. This is Boris and Natasha sort of stuff.

Sources at Microsoft agree. In addition to the presenters – who never mention the NSA in their presentation and went out of their way to avoid accusing NIST of any wrongdoing – a manager who spoke with WIRED on condition of anonymity believes the reporters at the Times saw the classified documents dealing with the program, read about the 2007 talk, and assumed their was a connection.

cryptographyBut Paul Kocher, president and chief scientist of Cryptography Research, says that regardless of the lack of evidence in the Times story, he discounts the “bad cryptography” explanation for the weakness, in favor of the backdoor one:

Bad cryptography happens through laziness and ignorance. But in this case, a great deal of effort went into creating this and choosing a structure that happens to be amenable to attack.

Personally, I find it interesting that the NSA would be so committed to making sure a program passed inspection. Especially one that had a fatal flaw that, when exploited properly, could be used to give someone who knew about it access to encrypted information. But of course, it’s not like the NSA has been known to invade people’s privacy, right? RIGHT?

Clearly, all there is at this point is speculation. One thing is certain though. In the coming weeks and months, the NSA is going to be the recipient of even more flak over its monitoring and cryptographic activities. Whether this effects any change in policy remains to be seen, but I doubt anyone will be holding their breaths.

Sources: wired.com, nytimes.com