Trending designs to inspire you
Work designers are riffing on
Interviews, tutorials, and more
Prompt to flex your design skills
Find your dream design job
An exclusive list for contract work
Get new leads in your inbox every day
Find, contact, and hire designers
The #1 job board for creatives
Board for freelance & contract work
Deploying IoT devices into the field can be a dangerous game. For example, someone may tamper with your e-scooter’s hardware to remove the SIM card and insert it into their phone, streaming data on your dime.
When this happens, we want to provide our customers the right contextual data. Here we highlight the change from an e-scooter with a Quectel modem to a consumer phone from Samsung. This is paired with usage data before and after this hardware change, as well as where the hardware change occurred and where the SIM is being used now. Lastly, we write out the "story" behind the change in this unfurled state.
All of this contextual data is combined to help clients quickly make a decision and take action to prevent unauthorized use of their cellular plans.
Why are you reporting this shot?
Please visit our Help Center for instructions on reporting Trademark or Copyright violations.