The document discusses junk hacking and vulnerability research of IoT devices. It notes that many IoT devices have no security and can easily be hacked. It argues that while demonstrating vulnerabilities in everyday devices is interesting, the "junk hacking" trend has become overdone at security conferences. The document advocates moving the discussion beyond just identifying vulnerabilities and toward developing a standardized approach for assessing IoT security across different device types and platforms.