Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Bug Crime Medicine

$75K Prosthetic Arm Is Bricked When Paired iPod Is Stolen 194

kdataman writes U.S. Army Staff Sgt. Ben Eberle, who lost an arm and both legs in Afghanistan, had his Ipod Touch stolen on Friday. This particular Ipod Touch has an app on it that controls his $75,000 prosthetic arm. The robbery bricked his prosthesis: "That is because Eberle's prosthetic hand is programmed to only work with the stolen iPod, and vice versa. Now that the iPod is gone, he said he has to get a new hand and get it reprogrammed with his prosthesis." I see three possibilities: 1) The article is wrong, possibly to guilt the thief into returning the Ipod. 2) This is an incredibly bad design by Touch Bionics. Why would you make a $70,000 piece of equipment permanently dependent on a specific Ipod Touch? Ipods do fail or go missing. 3) This is an intentionally bad design to generate revenue. Maybe GM should do this with car keys? "Oops, lost the keys to the corvette. Better buy a new one."
This discussion has been archived. No new comments can be posted.

$75K Prosthetic Arm Is Bricked When Paired iPod Is Stolen

Comments Filter:
  • Bad Planning (Score:5, Insightful)

    by neoform ( 551705 ) <djneoform@gmail.com> on Tuesday August 26, 2014 @08:50AM (#47755685) Homepage

    What if the ipod was dropped and breaks? What kind of poor planning is this where that one ipod was the linchpin of this expensive prosthetic?

  • Re:Hmmm ... (Score:5, Insightful)

    by RobinH ( 124750 ) on Tuesday August 26, 2014 @09:03AM (#47755765) Homepage
    Except the terribly bad design we typically see in embedded design is normally to provide a back-door way to prevent just this kind of problem. "Oh, you lost your password? No problem, hold down these three buttons and cycle power and it'll reset everything to factory defaults, and then you can login with this default password."
  • Re:Hmmm ... (Score:5, Insightful)

    by nine-times ( 778537 ) <nine.times@gmail.com> on Tuesday August 26, 2014 @09:10AM (#47755811) Homepage
    I'm having a bit of a hard time understanding how the entire device could be permanently bricked, even in the case of a poor design. Instead of replacing the entire $70k arm, surely they could swap out a chip or circuit board somewhere...?
  • Re:Hmmm ... (Score:5, Insightful)

    by Richard_at_work ( 517087 ) on Tuesday August 26, 2014 @09:11AM (#47755815)

    Why is that bad design? It allows access to the system again, but in a way that makes it pretty fecking obvious access has been gained - thats how I would like it to be handled rather than the alternatives of never gaining access or gaining unfettered access with all data in place and no one being aware access was gained.

  • by OzPeter ( 195038 ) on Tuesday August 26, 2014 @09:14AM (#47755843)

    Possibility 4) Hardlinking to a specific iPod makes it harder to hack the prosthetic arm from.

    Bricking a device because a external independent device which is well known to be fragile and/or a target of theft has died/lost/stolen is a pretty bad design.

    And if the external device is not independent, but is in fact required part of the bricked devices operation - then that is also bad design

  • Re:Hmmm ... (Score:5, Insightful)

    by sjames ( 1099 ) on Tuesday August 26, 2014 @09:21AM (#47755897) Homepage Journal

    Exactly. Especially when the reset to factory requires physical presence. In most cases it is exactly the right thing.

  • Re:Hmmm ... (Score:3, Insightful)

    by Anonymous Coward on Tuesday August 26, 2014 @10:21AM (#47756447)

    Bollox. Bad design is built in on purpose. Some manager or above explicitly told the programmer to build that dependency in. Been there, done that, fought against it and was categorically told do it or lose my job.

    Never assume a skilled professional makes a terrible decision. It has to be coded and someone makes that call above a programmer's pay-grade.

    I'd say it's more likely that some manager told their programmer to make absolutely sure that no other iPod than his could possibly control his prosthetics to avoid the possibility of some jokester deciding it would be fun it he took control of someone's arms.

  • by gnasher719 ( 869701 ) on Tuesday August 26, 2014 @11:59AM (#47757357)
    Apple doesn't allow access to UDIDs (universal device identifiers) anymore, so unless the software is quite old, or requires a jailbroken device, the prosthesis cannot be paired to the device. (That's one of the reason why you can't access the UDID anymore, because pairing information with a device is stupid; the bigger reason is privacy).

    The prosthesis can easily be paired to an AppleID plus an application specific ID. However, all information about this would be stored on the device, backed up to iTunes, and could be restored by just buying a new phone, entering the AppleID and password, and downloading the last backup.

    If that doesn't work, then these guys must have some really strange and stupid software design + implementation.

HELP!!!! I'm being held prisoner in /usr/games/lib!

Working...