Margaret and I put together a paper on using Moonshot in consumer
devices and other constrained environments.
At least for cases where things are "online" and have a path out to the
network we think this is really neat. We're submitting this as a
position paper at the Smart Object Security workshop before the next
IETF.
we'd be very interested in comments. We'd also love to talk to anyone
who thinks this might be useful in their products.
|