How can we trust the AWS IoT Core?
Introduction Today I will explain how connected devices can establish trust with the AWS IoT Core. To trust someone, we need to confirm their identity. The same is true in the ecosystem of connected devices.
AWS IoT Core exposes an MQTT Broker so devices can establish the MQTT connectivity.
What if some villain actor creates an MQTT Broker and tries to mislead devices? Is there a way to verify the real identity of the exposed endpoint?