WISPAYR / AI ADVISORYStart →
AI/Casework/09 · halio-kiosks
All casework
// CASE / 09 / edge

Halio kiosks + surface-tokens — secure dashboard delivery

Anyone needing always-on dashboards in non-secure spaces (vans, public-facing rooms)
edgeoperationssecurityhardware

Self-hosted kiosk hardware with HMAC-signed short-lived tokens — no shared passwords, no kiosk hijacking.

// Cost
Trivial to add to existing dashboards.
// Duration
Pattern reused across every kiosk we deploy.
// 01 · The problem

Sticking dashboards on screens in non-secure rooms or vehicles usually means writing the password on a post-it and praying. Bad on its own; catastrophic when the dashboard contains live operational data.

// 02 · What we did

Each kiosk gets a per-device HMAC key. Tokens rotate, scoped to specific dashboards, with audience claims. Dashboards reject unsigned or wrong-audience requests outright.

// 03 · What the AI did

Nothing — this is a boring security pattern. Mentioning it because the *most useful* AI advice is often 'this isn't an AI problem'.

// 04 · What humans did

Threat model, key rotation discipline, deployment scripts.

// 05 · The outcome

Dashboards in vans, lobbies and back-of-house don't leak when a device gets pinched.

// 06 · What broke

Earlier kiosks ran the same admin login as the back-office. One stolen tablet = full back-office breach. Won't be doing that again.

// 07 · What works

Audience-scoped, time-bounded tokens. Boring, correct, durable.

// 08 · Reusable lessons
  1. 01Be honest with customers when their problem isn't an AI problem.
  2. 02Security plumbing is the cheapest insurance you'll buy.