SlideShare a Scribd company logo
1 of 26
Download to read offline
Smartphones Security
IT-Sicherheit
Hochschule für Technik, Wirtschaft und
Kultur Leipzig
Why is Smartphones Security
Important?
Our smartphones are more than our wallets,
because they can store:
● credit cards number
● contacts
● email accounts
● websites passwords
● et cetera
Too Many Features
Which features can be dangerous?
and
Which features can help users to increase their
security and privacy?
Bluetooth
Vulnerable to:
● BlueBug, bug with which is possible: make a copy of
contacts; listen calls; send and read SMS
messages and force connection to Internet
● BlueSmack, denial of service attack
● Eavesdropping
● Man in the middle
● ...
How Use Bluetooth Safely
For improve our security using Bluetooth we can:
● choose PIN codes that are long and not trivial,
● avoid pairing between Bluetooth devices in
crowded places,
● disable it or use in hidden mode to increase
the time of a possible attack.
Near Field Communication
● Set of standards for radio communication
between close devices
● No protection against eavesdropping
● Vulnerable to data modifications
Applications that use NFC should encrypt the
comunications!
Services for Remote Control
Some services for remote control that we can
find in our devices are:
– Secure Shell
– File Transert Protocol
– Package Manager
All these services are possible points of access
to our devices.
How can the average user disable them?
Summarizing we can say that we
should use an approach of
"Principle of Least Privilege"
enabling a feature only when needed
Which Features Users Should Use
● Screen Lock
● Data Encryption
● Remote Wipe Service
● Antivirus
● Two-factor
Authentication
Install an Antivirus
Mobile malware attacks are on the rise, this because smartphones
offer easy and fast ways for make profits:
● mobile payments
● directly charging on the phone bill of the device's owner
A 40% of modern smartphones don't have antivirus because users
think that they don't need one.
Some antivirus also offer tracking and remote wipe services, thus
providing three important functions with a single application.
Use the Two-factor Authentication
Two-factor authentication (TFA) is an authentication
which requires the presentation of two of the three
authentication factors: “something the user knows”,
“something the user has” and “something the user is”.
Something the user has: its smartphone
The user receives an SMS with an extra code or the
code is generated by a dedicated application.
How keep smartphones and privacy
more safe?
● Remember that it's not “Just a Phone”
● Say yes to updates
● Understand allowed permissions
● Don't download Apps from untrusted sources
● Keep strong password and don't be lazy
● Be careful free Wi-Fi
Be careful with free Wi-Fi
In free Wi-Fi networks lots of plain text is
exchanged and a big part of most popular
websites do not offer an encrypted connection
Published Date: January 14, 2013 on www.trustworthyinternet.org
Be careful with free Wi-Fi
Some websites use an encrypted connection
only for login
They are vulnerable to "Session
Hijacking"
Solutions for free Wi-Fi
● Use secure channels:
– HTTPS for surfing web sites;
– SSL when using applications that access the
Internet such as a mail client.
● Use a Virtual Private Network or a tunnel SSH
● Do not use free Wi-Fi
Which Measures Smartphones
Manufacturers and Software
Developers Should Take?
We will see solutions from the project phase of
hardware and software to the phase after the
sale of the device.
Opportunity to Create Different User
Profiles
Create a profile
just for children
Separate and secure work and
personal informations
Provide Long Term Support
● Provide long term support with updates is
extremely important for keep devices safe.
● Is possible find devices for sale with a version
of the OS no more supported.
● Most users don't know how to upgrade the OS
● Manufacturers want that users buy another
phone as soon as possible.
Android' situation
More than 60% have a version
released before the October 2011
Improve security on App Stores
● Check authors' identity
● Run a new application, checking for malicious and
hidden behaviors
● Use restricted policies against spam and fake apps
● Deny applications that download others applications
● Offer a payment system for purchases that
guarantees users and sellers
Separate Running Programs
Separate Running Programs
This prevents that any compromised app will
have access to not allowed lower system levels,
including:
● reading or writing the user's private data (like
contacts or emails)
● reading or writing another application's files
● performing network access
● et cetera
Implement Protocols Correctly.
Developers should make attention when use
third party libraries such as OpenSSL or JSSE.
Some implementations perform the SSL
certificate validation incorrectly or not at all.
Insecure against man in the middle
Chain of trust
A chain of trust is made by validating each
component of hardware and software from the
bottom up.
Only signed
software can be
booted.
Conclusion
Like for computers, smartphones security is a
process that involves manufactures, developers
and users.
This is why, is not enought that devices and
softwares are safe and poka-yoke (“idiot
proofing”) but we also have to hope that in a
future users will be aware.

More Related Content

What's hot

Two factor authentication
Two factor authenticationTwo factor authentication
Two factor authentication
Hai Nguyen
 
Two factor authentication presentation mcit
Two factor authentication presentation mcitTwo factor authentication presentation mcit
Two factor authentication presentation mcit
mmubashirkhan
 

What's hot (20)

Mobile security in Cyber Security
Mobile security in Cyber SecurityMobile security in Cyber Security
Mobile security in Cyber Security
 
OWASP Mobile Security: Top 10 Risks for 2017
OWASP Mobile Security: Top 10 Risks for 2017OWASP Mobile Security: Top 10 Risks for 2017
OWASP Mobile Security: Top 10 Risks for 2017
 
Two factor authentication 2018
Two factor authentication 2018Two factor authentication 2018
Two factor authentication 2018
 
this is test for today
this is test for todaythis is test for today
this is test for today
 
3 reasons your business can't ignore Two-Factor Authentication
3 reasons your business can't ignore Two-Factor Authentication3 reasons your business can't ignore Two-Factor Authentication
3 reasons your business can't ignore Two-Factor Authentication
 
Dos and Don'ts of Internet Security
Dos and Don'ts of Internet SecurityDos and Don'ts of Internet Security
Dos and Don'ts of Internet Security
 
Avoiding Two-factor Authentication? You're Not Alone
Avoiding Two-factor Authentication? You're Not AloneAvoiding Two-factor Authentication? You're Not Alone
Avoiding Two-factor Authentication? You're Not Alone
 
Smartphone security issues
Smartphone security issuesSmartphone security issues
Smartphone security issues
 
Two Factor Authentication: Easy Setup, Major Impact
Two Factor Authentication: Easy Setup, Major ImpactTwo Factor Authentication: Easy Setup, Major Impact
Two Factor Authentication: Easy Setup, Major Impact
 
Two factor authentication
Two factor authenticationTwo factor authentication
Two factor authentication
 
Securing sensitive accounts with MFA and Behavioral Biometrics
Securing sensitive accounts with MFA and Behavioral BiometricsSecuring sensitive accounts with MFA and Behavioral Biometrics
Securing sensitive accounts with MFA and Behavioral Biometrics
 
Combat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion TechniquesCombat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion Techniques
 
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
 
Owasp Mobile Top 10 – 2014
Owasp Mobile Top 10 – 2014Owasp Mobile Top 10 – 2014
Owasp Mobile Top 10 – 2014
 
Smartphone
SmartphoneSmartphone
Smartphone
 
OWASP Top 10 for Mobile
OWASP Top 10 for MobileOWASP Top 10 for Mobile
OWASP Top 10 for Mobile
 
Two factor authentication presentation mcit
Two factor authentication presentation mcitTwo factor authentication presentation mcit
Two factor authentication presentation mcit
 
Mobile security
Mobile securityMobile security
Mobile security
 
Adding Two Factor Authentication to your App with Authy
Adding Two Factor Authentication to your App with AuthyAdding Two Factor Authentication to your App with Authy
Adding Two Factor Authentication to your App with Authy
 
Mobile security
Mobile securityMobile security
Mobile security
 

Viewers also liked

ооо колибри строительная компания
ооо колибри строительная компанияооо колибри строительная компания
ооо колибри строительная компания
Aqil Aliyev
 
Electronic surveying
Electronic surveyingElectronic surveying
Electronic surveying
ifmrcmf
 
факторы
факторыфакторы
факторы
Vikarg
 
Christmas in norway
Christmas in norwayChristmas in norway
Christmas in norway
schreiber12
 
Tuesday night owl! 1.21
Tuesday night owl! 1.21Tuesday night owl! 1.21
Tuesday night owl! 1.21
mrsbubba33
 
Satélites artificiais
Satélites artificiaisSatélites artificiais
Satélites artificiais
nondoufeito
 

Viewers also liked (19)

MapReduce and Hadoop
MapReduce and HadoopMapReduce and Hadoop
MapReduce and Hadoop
 
Tari̇hfelsefeslaytı
Tari̇hfelsefeslaytıTari̇hfelsefeslaytı
Tari̇hfelsefeslaytı
 
Prevent browser hijack infection
Prevent browser hijack infectionPrevent browser hijack infection
Prevent browser hijack infection
 
Cellppt1
Cellppt1Cellppt1
Cellppt1
 
ооо колибри строительная компания
ооо колибри строительная компанияооо колибри строительная компания
ооо колибри строительная компания
 
PUSAT GROSIR SOLO
PUSAT GROSIR SOLOPUSAT GROSIR SOLO
PUSAT GROSIR SOLO
 
Electronic surveying
Electronic surveyingElectronic surveying
Electronic surveying
 
สื่อการเรียนรู้
สื่อการเรียนรู้สื่อการเรียนรู้
สื่อการเรียนรู้
 
4/3
4/34/3
4/3
 
Engineering project management
Engineering project managementEngineering project management
Engineering project management
 
Project annapoorna day
Project annapoorna dayProject annapoorna day
Project annapoorna day
 
Evaluation one final
Evaluation one finalEvaluation one final
Evaluation one final
 
факторы
факторыфакторы
факторы
 
AMA SUNDAY NIGHT AUCTION 12/29/2013 JEWELRY MAKING SUPPLIES
AMA SUNDAY NIGHT AUCTION 12/29/2013 JEWELRY MAKING SUPPLIESAMA SUNDAY NIGHT AUCTION 12/29/2013 JEWELRY MAKING SUPPLIES
AMA SUNDAY NIGHT AUCTION 12/29/2013 JEWELRY MAKING SUPPLIES
 
Christmas in norway
Christmas in norwayChristmas in norway
Christmas in norway
 
Maker Workshop 7 May 2014 - StudioX
Maker Workshop 7 May 2014 - StudioXMaker Workshop 7 May 2014 - StudioX
Maker Workshop 7 May 2014 - StudioX
 
Deploiement hybride - SharePoint 2013
Deploiement hybride - SharePoint 2013Deploiement hybride - SharePoint 2013
Deploiement hybride - SharePoint 2013
 
Tuesday night owl! 1.21
Tuesday night owl! 1.21Tuesday night owl! 1.21
Tuesday night owl! 1.21
 
Satélites artificiais
Satélites artificiaisSatélites artificiais
Satélites artificiais
 

Similar to Smartphones' Security

W01 Levent Gurses X
W01 Levent Gurses XW01 Levent Gurses X
W01 Levent Gurses X
Movel
 

Similar to Smartphones' Security (20)

How to Secure Your Mobile Commerce App.pdf
How to Secure Your Mobile Commerce App.pdfHow to Secure Your Mobile Commerce App.pdf
How to Secure Your Mobile Commerce App.pdf
 
Module 6.pdf
Module 6.pdfModule 6.pdf
Module 6.pdf
 
Module 6.Security in Evolving Technology
Module 6.Security in Evolving TechnologyModule 6.Security in Evolving Technology
Module 6.Security in Evolving Technology
 
3 steps security
3 steps security3 steps security
3 steps security
 
Secure End User
Secure End UserSecure End User
Secure End User
 
Top Practices You Need To Develop Secure Mobile Apps.
Top Practices You Need To Develop Secure Mobile Apps.Top Practices You Need To Develop Secure Mobile Apps.
Top Practices You Need To Develop Secure Mobile Apps.
 
Mobile App Security Protecting Your App from Cyber Threats.edited.docx
Mobile App Security Protecting Your App from Cyber Threats.edited.docxMobile App Security Protecting Your App from Cyber Threats.edited.docx
Mobile App Security Protecting Your App from Cyber Threats.edited.docx
 
Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it
 
Mobile Banking Security: Challenges, Solutions
Mobile Banking Security: Challenges, SolutionsMobile Banking Security: Challenges, Solutions
Mobile Banking Security: Challenges, Solutions
 
W01 Levent Gurses X
W01 Levent Gurses XW01 Levent Gurses X
W01 Levent Gurses X
 
Usability vs. Security: Find the Right Balance in Mobile Apps
Usability vs. Security: Find the Right Balance in Mobile AppsUsability vs. Security: Find the Right Balance in Mobile Apps
Usability vs. Security: Find the Right Balance in Mobile Apps
 
Mobile Security for the Enterprise
Mobile Security for the EnterpriseMobile Security for the Enterprise
Mobile Security for the Enterprise
 
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligence
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligenceDelivering secure mobile financial services (MFS) - "Frictionless" vs diligence
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligence
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security Innovation
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back
 
Tips To Protect Your Mobile App from Hackers.pdf
Tips To Protect Your Mobile App from Hackers.pdfTips To Protect Your Mobile App from Hackers.pdf
Tips To Protect Your Mobile App from Hackers.pdf
 
Document safer online for nonprofits guide
Document safer online for nonprofits guideDocument safer online for nonprofits guide
Document safer online for nonprofits guide
 
Mobile App Security: Enterprise Checklist
Mobile App Security: Enterprise ChecklistMobile App Security: Enterprise Checklist
Mobile App Security: Enterprise Checklist
 
Smartphone Security Article
Smartphone Security ArticleSmartphone Security Article
Smartphone Security Article
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

Smartphones' Security

  • 1. Smartphones Security IT-Sicherheit Hochschule für Technik, Wirtschaft und Kultur Leipzig
  • 2. Why is Smartphones Security Important? Our smartphones are more than our wallets, because they can store: ● credit cards number ● contacts ● email accounts ● websites passwords ● et cetera
  • 3. Too Many Features Which features can be dangerous? and Which features can help users to increase their security and privacy?
  • 4. Bluetooth Vulnerable to: ● BlueBug, bug with which is possible: make a copy of contacts; listen calls; send and read SMS messages and force connection to Internet ● BlueSmack, denial of service attack ● Eavesdropping ● Man in the middle ● ...
  • 5. How Use Bluetooth Safely For improve our security using Bluetooth we can: ● choose PIN codes that are long and not trivial, ● avoid pairing between Bluetooth devices in crowded places, ● disable it or use in hidden mode to increase the time of a possible attack.
  • 6. Near Field Communication ● Set of standards for radio communication between close devices ● No protection against eavesdropping ● Vulnerable to data modifications Applications that use NFC should encrypt the comunications!
  • 7. Services for Remote Control Some services for remote control that we can find in our devices are: – Secure Shell – File Transert Protocol – Package Manager All these services are possible points of access to our devices. How can the average user disable them?
  • 8. Summarizing we can say that we should use an approach of "Principle of Least Privilege" enabling a feature only when needed
  • 9. Which Features Users Should Use ● Screen Lock ● Data Encryption ● Remote Wipe Service ● Antivirus ● Two-factor Authentication
  • 10. Install an Antivirus Mobile malware attacks are on the rise, this because smartphones offer easy and fast ways for make profits: ● mobile payments ● directly charging on the phone bill of the device's owner A 40% of modern smartphones don't have antivirus because users think that they don't need one. Some antivirus also offer tracking and remote wipe services, thus providing three important functions with a single application.
  • 11. Use the Two-factor Authentication Two-factor authentication (TFA) is an authentication which requires the presentation of two of the three authentication factors: “something the user knows”, “something the user has” and “something the user is”. Something the user has: its smartphone The user receives an SMS with an extra code or the code is generated by a dedicated application.
  • 12. How keep smartphones and privacy more safe? ● Remember that it's not “Just a Phone” ● Say yes to updates ● Understand allowed permissions ● Don't download Apps from untrusted sources ● Keep strong password and don't be lazy ● Be careful free Wi-Fi
  • 13. Be careful with free Wi-Fi In free Wi-Fi networks lots of plain text is exchanged and a big part of most popular websites do not offer an encrypted connection Published Date: January 14, 2013 on www.trustworthyinternet.org
  • 14. Be careful with free Wi-Fi Some websites use an encrypted connection only for login They are vulnerable to "Session Hijacking"
  • 15.
  • 16. Solutions for free Wi-Fi ● Use secure channels: – HTTPS for surfing web sites; – SSL when using applications that access the Internet such as a mail client. ● Use a Virtual Private Network or a tunnel SSH ● Do not use free Wi-Fi
  • 17. Which Measures Smartphones Manufacturers and Software Developers Should Take? We will see solutions from the project phase of hardware and software to the phase after the sale of the device.
  • 18. Opportunity to Create Different User Profiles Create a profile just for children Separate and secure work and personal informations
  • 19. Provide Long Term Support ● Provide long term support with updates is extremely important for keep devices safe. ● Is possible find devices for sale with a version of the OS no more supported. ● Most users don't know how to upgrade the OS ● Manufacturers want that users buy another phone as soon as possible.
  • 20. Android' situation More than 60% have a version released before the October 2011
  • 21. Improve security on App Stores ● Check authors' identity ● Run a new application, checking for malicious and hidden behaviors ● Use restricted policies against spam and fake apps ● Deny applications that download others applications ● Offer a payment system for purchases that guarantees users and sellers
  • 23. Separate Running Programs This prevents that any compromised app will have access to not allowed lower system levels, including: ● reading or writing the user's private data (like contacts or emails) ● reading or writing another application's files ● performing network access ● et cetera
  • 24. Implement Protocols Correctly. Developers should make attention when use third party libraries such as OpenSSL or JSSE. Some implementations perform the SSL certificate validation incorrectly or not at all. Insecure against man in the middle
  • 25. Chain of trust A chain of trust is made by validating each component of hardware and software from the bottom up. Only signed software can be booted.
  • 26. Conclusion Like for computers, smartphones security is a process that involves manufactures, developers and users. This is why, is not enought that devices and softwares are safe and poka-yoke (“idiot proofing”) but we also have to hope that in a future users will be aware.