Eight years ago, I was sitting on a couch discussing technology with a friend. We were deep into theoretical topics, things like designing new network protocols for secure communication via different methods, a recent radio-based hack that triggered ...