Xin Wei responded in an interview for a French magazine and his disappointment was the fact that the journalist does not even considered it useful to listen about the real problem that lies beneath all wireless connected devices, but just wanted to undercover how K3OPS technology works.

Alexandre Despallieres and Xin Wei

Alexandre Despallieres and Xin Wei

“The only questions were about our technology and what materials we used to create our meta-surface. I  somehow tried to explain that a much more critical situation had to be solved before mass marketing our harvester in every product, because without real security we could not be part of this frenetic race which encompasses the succulent IoT market. It must be borne in mind that if we dare to place our RF Energy harvesters in current systems, we will then become complicit in cybercriminals attacks since it can only get worse as long as the different protocols in usage are not fully revamped and secured. We aim to provide a constant clean source of energy; it is certainly not in our philosophy to power these devices that totally lacks security, neither to place STICKnCHARGE in devices that have a scheduled obsolescence. This leeds us to rethink the object, to reinforce our protocols because they not only allow exchange of information but also the proper distribution of the energy to be provided. Imagine for a moment that one of our devices charge a smartphone and that a problem related to the battery starts to catch fire, we will without hesitation become the best target with the pretext that if the smartphone in question exploded it is the fault of our harvester. The same situation arises if we allowed our energy harvester to power Philips connected Light bulbs, those light bulbs use an unsecured gateway, and then we would be responsible for chopping which can take control of your home, stealing your personal information, through the gateway. This subject is a very serious subject, we must respect our customers and it is definitely about the time to listen to their needs as well as to inform them clearly about the devastating risk using any of the IoT. It is for us a moral choice and also long-term battle.”

To concluded, Xin Wei provides a link for journalists that wants to understand how it works by placing images 🙂

“Yes, safety must always be designed and integrated upstream to any IoT system, but securing valuable devices is already a challenge, add to them the useless devices without any security at all, and, as a result you have a ‘thing’ that tarnishes the Internet, compromising our personal data, offering access to hackers.” said Alexandre Despallieres.

Then they both concluded about the difference between one smartphone to another, which brand actually made the change and who followed a trend by copying without ever bringing that little extra sparkle that would have made all the difference. 2017 is the 10th anniversary of the famous iPhone; obviously a tribute to the one that has radically shaken our way of communication is necessary, the one that unleashed the third screen and created the smartphone hip, sexy and touchable. There was a before Steve Jobs and since then … A succession of copy more or less aesthetic, more or less efficient and unfortunately also more or less dangerous. Samsung after being the world leader finds himself in an unfortunate position, how to recover dignitary from the cataclysm of his Galaxy Note 7. Explanations are certainly no longer enough, security remains paramount. Meantime, Huawei the very discreet leader in radio communication, succeeded within few years to be the great winner. The duel seems now to be between Apple and Huawei, hopefully cooperation will be their preoccupation because that is the only way to progress. Finally, as Alexandre Despallieres and Xin Wei pointed out, “let’s not forget the origin, everything started with iPhone, and this is probably a good indication of the true winner, because we can never pretend otherwise. Oops one more thing: happy holiday season!”