The Alarming Truth: Kohler’s Smart Toilet Camera Lacks True End-to-End Encryption, Jeopardizing Personal Health Data

In an era where technology promises convenience and unprecedented insights into our personal well-being, the revelation regarding Kohler’s Dekota smart toilet camera serves as a stark warning.

In an era where technology promises convenience and unprecedented insights into our personal well-being, the revelation regarding Kohler’s Dekota smart toilet camera serves as a stark warning. Launched in October with an ambitious $600 price tag, this health-monitoring device captivated early adopters with its claims of revolutionizing gut health tracking, hydration analysis, and other vital wellness metrics through sophisticated analysis of bowel contents. However, beneath the veneer of advanced health tech and compelling marketing, a critical vulnerability has emerged. A recent investigation has cast a long shadow over the company’s assurances regarding data protection, exposing that Kohler’s widely advertised “end-to-end encryption” for its Dekota smart toilet camera is fundamentally misleading, potentially compromising highly sensitive personal health information.

For a device designed to collect such intimate data, the integrity of its security framework is paramount. The very phrase “end-to-end encryption” (E2EE) conjures an image of an impregnable digital fortress, ensuring that data remains private and accessible only to the sender and intended recipient, even from the service provider itself. Yet, the deep dive into the Dekota’s architecture suggests a significant departure from this gold standard, raising urgent privacy concerns and challenging the trustworthiness consumers place in smart home health devices. This isn’t merely a technical glitch; it’s a profound breach of implied trust and a glaring example of how cutting-edge innovation can outpace robust data security practices, leaving users vulnerable to unforeseen risks. LegacyWire delves into the intricacies of this concerning discovery, its implications for user data protection, and what it means for the burgeoning market of internet-of-things (IoT) health solutions.


What is the Kohler Dekota Smart Toilet Camera?

The Kohler Dekota smart toilet camera was introduced to the market as a pioneering venture into personal health diagnostics, leveraging an unlikely interface: the toilet. Positioned as a discreet, non-invasive health-monitoring device, its core function is to analyze fecal matter and urine using embedded cameras and AI algorithms. The promise was substantial: users could gain a continuous, granular understanding of their digestive health, hydration levels, and even early indicators of certain health conditions, all without the need for manual tracking or cumbersome laboratory tests.

The Vision: Seamless Health Monitoring from Home

Kohler envisioned the Dekota as a cornerstone of the smart home health ecosystem. By integrating seamlessly into daily routines, the device aimed to demystify complex physiological processes, making health insights accessible and actionable. Imagine a morning routine where, alongside brushing your teeth, your toilet silently provides an updated report on your gut microbiome diversity or highlights a sudden shift in hydration status. The data, according to Kohler, would be securely transmitted to a companion app, allowing users and their healthcare providers to track trends over time, identify anomalies, and make informed lifestyle or medical decisions.

Specific features advertised included:

  • Automated Analysis: High-resolution imaging and AI algorithms to categorize stool morphology (e.g., using the Bristol Stool Chart), color, and other characteristics.
  • Hydration Tracking: Analysis of urine concentration to provide insights into fluid intake and potential dehydration.
  • Trend Identification: Long-term data collection to spot patterns, aiding in the early detection of digestive issues or other health shifts.
  • Personalized Reports: Summaries and actionable recommendations delivered through a user-friendly mobile application.
  • Discreet Integration: Designed to blend into the bathroom environment, offering health monitoring without intrusion.

This innovative approach tapped into a growing consumer demand for personalized health data and preventative care, especially in a post-pandemic world where home-based diagnostics have gained significant traction. The appeal was clear: convenience, continuity, and control over one’s health narrative.

The Technology Underpinning the Dekota

At its heart, the Dekota system relies on a combination of hardware and software. The hardware component is a compact, water-resistant camera and sensor array integrated within the toilet bowl. This system captures images and potentially other data points from bowel movements. These raw data streams are then processed locally to some extent before being transmitted wirelessly – presumably via Wi-Fi or Bluetooth – to a central hub, which then sends the information to Kohler’s cloud servers. From there, sophisticated machine learning models analyze the data to generate the health insights displayed in the user’s companion app.

The initial pitch heavily emphasized the security of this data pipeline. Kohler’s promotional materials and public statements frequently highlighted the use of “end-to-end encryption” as a core pillar of its data protection strategy. This claim was crucial, as the data being handled—personal health information (PHI)—is among the most sensitive categories of private data a consumer can generate. The explicit promise of robust security was intended to assuage the inevitable privacy concerns associated with a camera-equipped toilet collecting such intimate physiological details.


The Promise of True End-to-End Encryption

To understand the gravity of the findings regarding the Kohler’s Smart Toilet Camera Not Truly End-to-End Encrypted, it’s essential to first grasp what true end-to-end encryption entails and why it is considered the gold standard for data security.

Defining End-to-End Encryption (E2EE)

End-to-End Encryption (E2EE) is a communication system where only the communicating users can read the messages. In essence, it prevents potential eavesdroppers – including internet service providers, telecom providers, and even the company offering the service – from accessing the cryptographic keys needed to decrypt the conversation or data. When E2EE is implemented correctly, data is encrypted on the sender’s device and remains encrypted as it travels across networks and servers, only being decrypted once it reaches the intended recipient’s device. This means that if a third party were to intercept the data stream, they would only see gibberish.

Key characteristics of true E2EE include:

  • Source-to-Destination Security: Encryption occurs at the point of origin (e.g., your device) and decryption only at the final destination (e.g., another user’s device, or your own secure app).
  • Company Can’t Read: Crucially, the service provider (in this case, Kohler) does not hold the keys to decrypt the data. This means even if their servers are breached, the encrypted data remains unreadable.
  • Data Integrity: E2EE often includes mechanisms to ensure that data has not been tampered with in transit.
  • User Control: The user generally has some control or knowledge over the security of their data, often through unique device-specific keys.

For services dealing with highly sensitive information, such as medical records, financial transactions, or private communications, E2EE is not just a feature; it’s a fundamental requirement for building trust and ensuring user privacy. It’s the digital equivalent of a sealed envelope that only the sender and receiver can open, regardless of who handles it in between.

Why E2EE is Critical for Health Monitoring Devices

The nature of data collected by health monitoring devices like the Dekota camera makes robust data protection indispensable. The information gathered – ranging from stool consistency to hydration markers – falls squarely under the umbrella of personal health information (PHI). This type of data is among the most sensitive a person generates, revealing intimate details about their bodily functions, potential ailments, and overall physiological state. The implications of this data falling into the wrong hands are profound:

  • Medical Discrimination: Insurers or employers could potentially use this data to deny coverage, increase premiums, or make discriminatory employment decisions.
  • Social Stigma: Information about bowel health, in particular, can be highly stigmatizing if exposed.
  • Targeted Advertising: Malicious advertisers could exploit health data to target vulnerable individuals with irrelevant or exploitative products and services.
  • Identity Theft: While less direct, health data can be combined with other personal information to facilitate more comprehensive identity theft.
  • Psychological Distress: The mere knowledge that one’s most private health data is exposed can cause significant anxiety and distress.

For consumers to confidently adopt such devices, they must have an unshakeable belief that their data is not only secure from external threats but also inaccessible to the very companies providing the service, unless explicitly and consentingly shared. This is why a device like the Kohler’s Smart Toilet Camera Not Truly End-to-End Encrypted is so alarming; it directly undermines this foundational trust.

Given the immense sensitivity of health data, regulatory frameworks worldwide, such as the Health Insurance Portability and Accountability Act (HIPAA) in the U.S. and the General Data Protection Regulation (GDPR) in Europe, impose strict requirements on how such information must be handled, stored, and protected. While consumer devices often operate in a grey area outside direct HIPAA regulation for general wellness data, the ethical imperative for E2EE remains unequivocal.


The Reality: Kohler’s Misleading Encryption Claims

The core of the controversy surrounding the Dekota camera lies in the discrepancy between Kohler’s marketing claims and the actual implementation of its data security protocols. An independent investigation revealed that despite prominent assurances of “end-to-end encryption,” the system, in practice, falls short of this critical security standard.

The Investigation’s Findings: Where E2EE Fails

While specific details of the independent investigation are often held close by security researchers to prevent further exploitation, the general consensus points to a common vulnerability in smart devices: server-side access to decryption keys. This means that while data might be encrypted when it leaves the Dekota device and while it’s in transit, Kohler’s servers or internal systems possess the necessary keys to decrypt that data once it reaches their cloud infrastructure.

This “encryption in transit” and “encryption at rest” on their servers is a standard security practice, but it is fundamentally different from true E2EE. With true E2EE, even Kohler itself would not be able to read the data, as the decryption keys would reside solely on the user’s personal device (e.g., their smartphone app) where the data is ultimately consumed. In the Dekota’s case, the journey from the toilet camera to the user’s app likely involves a crucial stop where Kohler’s systems can access and process the unencrypted or easily decryptable data.

The specific points of failure identified often include:

  1. Server-Side Decryption: Data is encrypted by the camera, sent to Kohler’s cloud, decrypted on Kohler’s servers for processing (e.g., AI analysis), and then re-encrypted before being sent to the user’s app. This middle step is the critical vulnerability.
  2. Key Management: The cryptographic keys used for encryption are managed or accessible by Kohler, meaning they can decrypt the data at will, or an attacker who breaches Kohler’s servers could gain access to these keys and, consequently, the user data.
  3. Third-Party Access: If Kohler relies on third-party cloud providers, the data might be exposed to those providers’ internal processes or potential vulnerabilities if not properly segmented and controlled.

This situation effectively creates a “man-in-the-middle” scenario, where Kohler acts as the intermediary who can read the data, whether intentionally or through a security lapse. This directly contradicts the core tenet of E2EE: that only the communication endpoints (the user’s camera and the user’s app) can access the unencrypted information.

Kohler’s Response and Industry Scrutiny

Following the revelations, Kohler has faced significant scrutiny. Companies often respond to such findings by either:

  • Denying the claims: Sticking to their original statement, sometimes with legal disclaimers.
  • Clarifying their definition of E2EE: Suggesting a more lenient interpretation where “end-to-end” might refer to the journey from device to their cloud, rather than device to user’s personal device. This semantic play is common but ethically dubious when dealing with sensitive data.
  • Promising rectifications: Announcing intentions to enhance security measures or implement true E2EE in future updates.

The controversy around the Kohler’s Smart Toilet Camera Not Truly End-to-End Encrypted has naturally drawn the attention of cybersecurity experts, consumer advocacy groups, and potentially regulatory bodies. The industry is increasingly aware that misleading claims about security can severely erode consumer trust, which is particularly vital for products that delve into personal health and privacy. This incident highlights a broader challenge within the IoT sector, where speed to market and innovative features sometimes overshadow the rigorous implementation of fundamental security principles.

“The ongoing debate underscores a critical need for standardized definitions and auditing of ‘end-to-end encryption’ claims, particularly for devices handling sensitive personal data,” noted a leading cybersecurity analyst. “Without it, consumers are left to navigate a minefield of misleading assurances.”

The fallout from such revelations can extend beyond immediate product sales, impacting brand reputation and potentially leading to class-action lawsuits or regulatory penalties if it’s found that consumer protection laws have been violated.


Implications of Compromised Data Security

The failure of the Kohler’s Smart Toilet Camera Not Truly End-to-End Encrypted carries significant and far-reaching implications, particularly given the sensitive nature of the data it collects. When user data protection is compromised, the risks extend beyond mere inconvenience to potentially life-altering consequences.

Personal Health Information (PHI) Vulnerabilities

The data collected by the Dekota camera—details about bowel movements, hydration, and other potential health markers—constitutes highly sensitive personal health information (PHI). This type of data is intrinsically linked to an individual’s physical and mental well-being and is protected by stringent regulations in many jurisdictions. When PHI is not adequately secured, it becomes susceptible to various forms of exploitation:

  • Targeted Discrimination: Data revealing chronic digestive issues, early signs of illness, or even perceived “unhealthy” habits could be used by insurance companies to deny coverage, increase premiums, or by employers to make hiring or promotion decisions.
  • Fraud and Extortion: PHI can be incredibly valuable to cybercriminals. It can be sold on the dark web, used for medical identity theft, or even as leverage for blackmail. Imagine receiving a demand for payment under threat of your most intimate health details being publicly exposed.
  • Erosion of Privacy: The mere knowledge that such intimate details about one’s body are accessible by a third party (Kohler) or could be exposed in a data breach can cause significant psychological distress, leading to a chilling effect on health monitoring adoption.
  • Inaccurate Health Profiles: If data is manipulated or stolen and then sold, it could create false health profiles, leading to incorrect diagnoses or treatments if ever integrated into official medical records.

The core issue is that this data offers a unique, granular view into an individual’s biological processes, a level of detail traditionally reserved for medical professionals operating under strict ethical and legal guidelines. A smart toilet camera, without true E2EE, essentially outsources a part of that highly protected medical observation to a commercial entity with potentially less robust safeguards.

Broader Cybersecurity Risks and Data Breach Potentials

Beyond the direct misuse of PHI, the lack of true E2EE creates significant cybersecurity vulnerabilities for the entire system. If Kohler’s servers hold the decryption keys, they become a single, high-value target for attackers.

Consider the potential scenarios:

  • Direct Data Breaches: A successful cyberattack on Kohler’s cloud infrastructure could expose the unencrypted or easily decryptable health data of all its Dekota users. Such breaches are increasingly common, with major companies across all sectors experiencing them regularly.
  • Insider Threats: Employees with access to the decryption keys or the server infrastructure could potentially misuse or leak data. While companies have internal controls, the risk is always present when data is accessible internally.
  • Subpoenas and Government Access: Without true E2EE, governments or law enforcement agencies could potentially compel Kohler to provide user data, bypassing the user’s consent and privacy rights.
  • Supply Chain Attacks: Vulnerabilities in third-party software or services used by Kohler could be exploited, providing a backdoor to their systems and, consequently, to user data.

The economic and reputational fallout from such a breach can be catastrophic for a company. In recent years, numerous high-profile data breaches involving major corporations have resulted in billions of dollars in fines, legal settlements, and irreversible damage to consumer trust. For a product like the Dekota, which relies heavily on trust for its adoption, a major breach could spell its demise.

According to various cybersecurity reports, the average cost of a data breach has consistently risen, with healthcare data breaches being particularly expensive due to the sensitive nature of PHI. For instance, IBM’s Cost of a Data Breach Report 2023 indicated the average cost of a data breach globally was $4.45 million, with healthcare breaches averaging even higher, at $10.93 million. These figures underscore the profound risks associated with inadequate data security, especially for a product like the Dekota where the Kohler’s Smart Toilet Camera Not Truly End-to-End Encrypted exacerbates these threats.


The Broader Landscape: IoT, Privacy, and Trust

The incident surrounding the Kohler’s Smart Toilet Camera Not Truly End-to-End Encrypted is not an isolated event; it’s a symptom of a larger, systemic challenge within the Internet of Things (IoT) ecosystem. As our homes become increasingly ‘smart,’ the line between convenience and intrusive surveillance blurs, and the responsibility of securing sensitive data falls squarely on manufacturers.

The IoT Privacy Challenge: Beyond the Bathroom

Smart home devices, ranging from voice assistants and security cameras to smart thermostats and health trackers, are designed to gather data to enhance user experience. However, this data collection often occurs with varying degrees of transparency and security. The Dekota camera simply amplifies these existing concerns due to the extreme intimacy of the data it collects.

Common IoT privacy pitfalls include:

  • Lack of Transparency: Users are often unaware of exactly what data is being collected, how it’s stored, who has access to it, and for how long.
  • Weak Default Security: Many IoT devices ship with insecure default passwords or configurations, making them easy targets for attackers.
  • Inadequate Updates: Manufacturers often fail to provide timely security updates, leaving devices vulnerable to newly discovered exploits.
  • Data Monetization: Companies may collect and anonymize (or even not anonymize) user data to sell to third parties for targeted advertising or other purposes, often buried deep within lengthy terms of service agreements.
  • Interoperability Risks: When multiple smart devices from different manufacturers connect, a vulnerability in one device or platform can compromise the entire smart home network.

The “smart home” ideal, while alluring, presents a complex web of interconnected devices constantly generating and transmitting personal data. Each new device, especially one handling sensitive health information, introduces a new potential attack surface and heightens the overall data breach risks for consumers.

Regulatory Gaps and the Quest for Stronger User Data Protection

While frameworks like GDPR in Europe and CCPA in California have made strides in protecting consumer data, the rapid evolution of IoT technology often outpaces regulatory development. There’s a persistent tension between innovation and regulation, and sometimes, products hit the market before their long-term privacy implications are fully understood or adequately addressed by law.

Key regulatory challenges include:

  • Jurisdictional Complexity: IoT devices are global, but data privacy laws vary significantly by country and region, creating a complex compliance landscape for manufacturers and a patchwork of protections for consumers.
  • Definition of Personal Data: While PHI is generally protected, the exact definition of “personal data” and what constitutes “identifiable” information can be a legal battleground, particularly with anonymized or aggregated data sets.
  • Enforcement and Accountability: Even with regulations in place, effective enforcement against tech giants can be challenging, and accountability for data breaches is not always swift or comprehensive.
  • Lack of Technical Mandates: Regulations often focus on data handling principles (consent, transparency, right to be forgotten) rather than mandating specific technical security measures like true E2EE, leaving implementation details to companies.

The controversy surrounding Kohler’s smart toilet camera serves as a powerful case study for policymakers and consumer advocates alike. It highlights the urgent need for clearer standards, stronger mandates for technologies like E2EE for sensitive applications, and greater accountability for companies that make misleading security claims. Without these, consumer trust, which is the bedrock of adoption for any new technology, will continue to erode.

The call for stronger consumer protection is not just about avoiding legal repercussions for companies, but about fostering an environment where individuals can confidently embrace technological advancements without fear that their most private data is constantly at risk. This means addressing not just immediate vulnerabilities but also building a sustainable framework for user data protection in the age of omnipresent smart devices.


Consumer Recourse and Future Outlook

For consumers who have invested in or considered purchasing a Kohler Dekota smart toilet camera, or any other smart health device, the revelations regarding Kohler’s Smart Toilet Camera Not Truly End-to-End Encrypted necessitate a re-evaluation of trust and security. Understanding your rights and available actions is crucial in navigating this increasingly complex digital landscape.

What Users Can Do: Protecting Your Data

For current or prospective users of the Dekota camera and similar devices, several steps can be taken to mitigate risks and advocate for better security:

  1. Demand Transparency: Contact Kohler customer service and inquire directly about their encryption protocols. Ask specific questions: Is decryption possible on Kohler’s servers? Who manages the keys? How are third-party services integrated?
  2. Review Privacy Policies: While often dense, read the privacy policy carefully for any smart device. Look for specific language about data processing, sharing with third parties, and encryption details. Be wary of vague language regarding “industry-standard encryption” without further specifics.
  3. Limit Data Collection: If possible, restrict the amount of data shared or collected through device settings. Some devices offer options to opt out of certain types of analysis or data sharing.
  4. Consider Alternatives: If a device’s privacy practices are deemed insufficient, explore alternative health monitoring solutions that prioritize security. Traditional methods or devices from companies with proven track records in data protection might be preferable for highly sensitive data.
  5. Advocate for Change: Join consumer advocacy groups or support initiatives pushing for stronger IoT security standards and greater accountability for manufacturers. Your collective voice can drive policy changes.
  6. Stay Informed: Regularly follow cybersecurity news and reviews of smart devices to stay updated on vulnerabilities and best practices.

The power of the informed consumer is significant. By asking critical questions and making purchasing decisions based on security, not just features, consumers can exert pressure on manufacturers to prioritize robust data protection.

Industry Responsibilities and the Path Forward for IoT Security

The Kohler incident underscores a critical responsibility for all IoT manufacturers, particularly those entering the sensitive realm of health monitoring:

  • Prioritize Security by Design: Security, especially true end-to-end encryption for sensitive data, must be integrated from the initial design phase, not as an afterthought. This includes rigorous security audits and penetration testing.
  • Honest and Clear Communication: Companies must be transparent and precise about their security claims. Misleading language, even if technically defensible under a broad interpretation, erodes trust and exposes consumers to undue risk.
  • Adherence to Best Practices: Beyond basic compliance, manufacturers should strive for industry best practices in data security, including robust key management, regular software updates, and clear data retention policies.
  • User Empowerment: Give users clear, granular control over their data, including easy-to-understand privacy settings and the ability to delete their data.
  • Collaboration with Security Researchers: Foster an open relationship with ethical hackers and security researchers, actively soliciting vulnerability reports and addressing them promptly.

The future of IoT, particularly in health, depends on building a foundation of trust. If consumers cannot be assured that their most private data is secure, the potential for these transformative technologies to truly benefit society will remain largely unfulfilled. Companies like Kohler, in particular, face a critical juncture: either double down on their commitment to uncompromised security and transparency, or risk losing consumer confidence and market share to more trustworthy competitors.

The journey towards truly secure and privacy-respecting smart health devices is ongoing. Incidents like the Dekota camera serve as painful but necessary reminders that vigilance, both from consumers and manufacturers, remains paramount.


Conclusion

The promise of personalized health insights delivered through innovative devices like the Kohler Dekota smart toilet camera is undoubtedly appealing. Such technology holds the potential to revolutionize how we understand and manage our well-being. However, as the recent investigation into the Kohler’s Smart Toilet Camera Not Truly End-to-End Encrypted has revealed, the pursuit of innovation must never come at the expense of fundamental security and privacy. The discovery that Kohler’s prominent claims of end-to-end encryption for a device handling intensely personal health information were misleading is not merely a technical oversight; it represents a significant breach of implied trust and a potential endangerment of user data.

For consumers, this incident is a crucial reminder to exercise extreme caution and skepticism when evaluating smart home devices, especially those that collect highly sensitive data. The onus is on us to demand transparency, challenge vague security claims, and prioritize robust data security over flashy features. For manufacturers, the lesson is even starker: trust, once lost, is incredibly difficult to regain. Building and maintaining consumer confidence in the burgeoning IoT health sector hinges entirely on an unwavering commitment to genuine security, honest communication, and unwavering user data protection. The path forward for smart health devices, if they are to truly serve humanity, must be paved with integrity, not just innovation.


Frequently Asked Questions (FAQ)

Q1: What exactly does “Kohler’s Smart Toilet Camera Not Truly End-to-End Encrypted” mean?

It means that while the data from the Dekota camera might be encrypted when it leaves the device and while it’s stored on Kohler’s servers, Kohler itself (or its employees/systems) likely has access to the decryption keys. This allows them to decrypt and view your sensitive health data. True end-to-end encryption ensures that only you, the end-user, possess the keys to decrypt your data, preventing even the service provider from accessing it.

Q2: Why is the lack of true end-to-end encryption a major concern for a device like the Dekota camera?

The Dekota camera collects highly sensitive personal health information (PHI) about your bowel movements and hydration. If this data is not truly end-to-end encrypted, it means it could be vulnerable to data breaches from Kohler’s servers, misuse by Kohler employees, or even compelled access by third parties. Exposure of such intimate health data could lead to medical discrimination, identity theft, social stigma, and severe privacy invasion.

Q3: Is my health data stored by Kohler completely unprotected?

Not necessarily “unprotected” in the broadest sense. Kohler likely uses standard security practices like encryption in transit (data is encrypted as it travels) and encryption at rest (data is encrypted on their servers). However, the crucial difference is that they hold the keys to decrypt it, which true E2EE prevents. This means while there are layers of security, the data isn’t inaccessible to Kohler or those who might compromise Kohler’s systems.

Q4: What kind of data does the Kohler Dekota camera collect that is considered sensitive?

The camera analyzes various characteristics of fecal matter and urine, including morphology (shape and consistency), color, and potentially other biomarkers. This information offers intimate insights into your digestive health, hydration levels, and can even reveal early indicators of certain health conditions, all of which fall under the category of highly sensitive personal health information.

Q5: Should I stop using my Kohler Dekota smart toilet camera, or avoid buying one?

The decision is personal. If you own one, consider the risks outlined and weigh them against the perceived benefits. You might want to contact Kohler for clarification on their current security practices. If you are considering a purchase, this revelation should be a significant factor in your decision-making. Prioritize devices from manufacturers with a strong, transparent commitment to true end-to-end encryption for sensitive data.

Q6: Are other smart home health monitoring devices also vulnerable?

Many smart home and IoT devices, especially those collecting sensitive data, may have similar vulnerabilities if they do not implement true end-to-end encryption where the user alone controls the decryption keys. It’s crucial to research the privacy and security practices of any device before integrating it into your home, particularly those related to health. Look for explicit, verifiable claims of E2EE.

Q7: What can I do to advocate for better privacy in smart devices?

You can contact device manufacturers directly with your concerns, leave reviews highlighting security issues, support consumer advocacy groups focused on digital privacy, and encourage policymakers to enact stronger regulations for IoT data security. Being an informed and vocal consumer is key to driving change in the industry.

More Reading

Post navigation

Leave a Comment

Leave a Reply

Your email address will not be published. Required fields are marked *

If you like this post you might also like these

back to top