Your SlideShare is downloading. ×
0
Smartphone Privacy and Security, at Poptech 2013
Smartphone Privacy and Security, at Poptech 2013
Smartphone Privacy and Security, at Poptech 2013
Smartphone Privacy and Security, at Poptech 2013
Smartphone Privacy and Security, at Poptech 2013
Smartphone Privacy and Security, at Poptech 2013
Smartphone Privacy and Security, at Poptech 2013
Smartphone Privacy and Security, at Poptech 2013
Smartphone Privacy and Security, at Poptech 2013
Smartphone Privacy and Security, at Poptech 2013
Smartphone Privacy and Security, at Poptech 2013
Smartphone Privacy and Security, at Poptech 2013
Smartphone Privacy and Security, at Poptech 2013
Smartphone Privacy and Security, at Poptech 2013
Smartphone Privacy and Security, at Poptech 2013
Smartphone Privacy and Security, at Poptech 2013
Smartphone Privacy and Security, at Poptech 2013
Smartphone Privacy and Security, at Poptech 2013
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Smartphone Privacy and Security, at Poptech 2013

7,769

Published on

Slides from my 5-minute talk about smartphones and privacy

Slides from my 5-minute talk about smartphones and privacy

Published in: Technology, News & Politics
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
7,769
On Slideshare
0
From Embeds
0
Number of Embeds
6
Actions
Shares
0
Downloads
17
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • Jason Hong / jasonh@cs.cmu.eduI’m a computer scientist, and I’ve been working with sensor-based systems for 15 yearsMyclaim: in the near future, smartphones will know everything about usOur Smartphones will know if we are depressed or not / what our carbon footprint is / what our information needs are before we even know what we needImages fromhttp://www.androidtapp.com/how-simple-is-your-smartphone-to-use-funny-videos/http://www.sfgate.com/crime/article/Absorbed-device-users-oblivious-to-danger-4876709.php#photo-5278749http://www.reneweduponadream.com/2012/09/business-without-smartphone-dont-let-it.html
  • I make this claim for three reasons1. Over 1B smartphones and rapidly growing, impressive since smartphones only came out in 20072. Our smartphones already have incredible capabilities… they know who we know (contact list and social networking apps), where we go (GPS, cell tower, WiFi), and to a weak extent what we do (sensors and apps)3. Smartphones are highly intimate, perhaps the most intimate devices we’ve created
  • From Pew Internet
  • From Cisco report
  • Also from Cisco report
  • If we push all three of these trends to their logical conclusion, we come back to my claim, that in the near future, our smartphones will know everything about usIn many ways, this will be a good thing. Our smartphones will be able to help us with healthcare, education, transportation, urban planning, and morehttp://www.androidtapp.com/how-simple-is-your-smartphone-to-use-funny-videos/http://www.sfgate.com/crime/article/Absorbed-device-users-oblivious-to-danger-4876709.php#photo-5278749http://www.reneweduponadream.com/2012/09/business-without-smartphone-dont-let-it.html
  • But what about privacy?
  • This is the main philosophy behind my research group
  • Privacy concerns aren’t just hypothetical risks either. There are many apps with unusual behaviors.Brightest Flashlighthttps://play.google.com/store/apps/details?id=goldenshorestechnologies.brightestflashlight.freeBible apphttps://play.google.com/store/apps/details?id=com.sirma.mobile.bible.android
  • One project we have been doing is to analyze the behavior of these apps and using crowdsourcing techniques to pinpoint and convey unusual behaviors. For example, most people don’t expect Angry Birds (Android) to use location data, but in reality it does. Given the big gap in expectations and reality, we consider this a privacy problem.
  • In contrast, most people do expect Google Maps to use location data, and so we consider this less of a privacy problem.
  • Here is an example summary of our work, showing the level of surprise that other people had.
  • Interestingly, we found that people actually usually ok with a lot of data sharing if told what used for
  • But end-users are only part of the picture. Need to help developers.Right now, developers have few tools and little guidance to help them.http://design.cmu.edu/sites/default/files/users/user10/undergrad-junior-studio.jpg
  • Same with public policy makers. Little guidance for themhttp://readwrite.com/2013/04/18/ftc-ready-to-move-if-carriers-ignore-android-security
  • But I also want to emphasize that these issues with privacy and security aren’t just with smartphones. Ubiquitous computing is happening. Computation, communication, sensing increasingly embedded in our everyday lives.Can help society in so many ways, but only if we can address these challenges of privacy and security.
  • Close with one last questionJason Hong / jasonh@cs.cmu.edu
  • Transcript

    • 1. In the near future, our smartphones will know everything about us
    • 2. Fun Facts about Millennials 83% sleep with phones
    • 3. Fun Facts about Millennials 83% sleep with phones 90% check first thing
    • 4. Fun Facts about Millennials 83% sleep with phones 90% check first thing 1 in 3 use in bathroom
    • 5. In the near future, our smartphones will know everything about us
    • 6. What about privacy? What is being collected? Where is it sent? How is it used?
    • 7. Failing to address privacy and security could blunt adoption of amazing technologies with huge societal benefits
    • 8. Location Data Unique device ID Location Data Network Access Unique device ID Location Data Unique device ID
    • 9. Privacy as Expectations User Expectations (What people think the app does) App Behavior (What the app actually does)
    • 10. Privacy as Expectations User Expectations (What people think the app does) App Behavior (What the app actually does)
    • 11. 95% users were surprised this app sent their approximate location to mobile ads providers. 85% users sent their mobile ad 95% users were surprised this app 95% users were surprised this app sent their approximate location sent their phone’s unique ID to to mobile ads providers. mobile ads providers. 85% users 25% sent their mobile ad dictionary words. 25% users sent their 10% users dictionary wrote con words. 95% users were surprised this app 90% users were surprised this app sent their phone’s unique ID sent their precise location to to mobile ads providers. mobile ads providers. 90% users were surprised this app 0% users were surprised this app sent their precise location to can control camera flashlight. mobile ads providers. 0% users 10% users could con wrote con
    • 12. 95% users were surprised this app sent their approximate location to mobile ads providers. 85% users sent their mobile ad 85% users 25% sent their mobile ad dictionary words. 25% Advertising and other users 95% users were surprised this app sent their 90% users were surprised this app 10% users dictionary sent their phone’s unique to to sent their precise behaviors usually ok, location ID wrote con words. mobile ads providers. mobile ads providers. 95% users were surprised this app 95% users were surprised this app sent their approximate location sent their phone’s unique ID to to mobile ads providers. mobile ads providers. if people know 90% users were surprised this app 0% users were surprised this app sent their precise location to can control camera flashlight. mobile ads providers. 0% users 10% users could con wrote con
    • 13. How can we help developers create secure and privacy-sensitive apps?
    • 14. How can we work with public policy makers to create better guidelines around privacy?
    • 15. How can we create a connected world we would want to live in? Computer Human Interaction: Mobility Privacy Security

    ×