This commentary gives an overview of an IEEE paper that zeros in on software design principles and security issues regarding wearable fitness devices.