SlideShare a Scribd company logo
1 of 18
In the near future, our
smartphones will know

everything

about us
Fun Facts about Millennials

83% sleep with phones
Fun Facts about Millennials

83% sleep with phones
90% check first thing
Fun Facts about Millennials

83% sleep with phones
90% check first thing
1 in 3 use in bathroom
In the near future, our
smartphones will know

everything

about us
What about

privacy?

What is being collected?
Where is it sent?
How is it used?
Failing to address privacy
and security could blunt
adoption of amazing
technologies with huge
societal benefits
Location Data
Unique device ID
Location Data
Network Access
Unique device ID
Location Data
Unique device ID
Privacy as Expectations
User Expectations
(What people think
the app does)

App Behavior
(What the app
actually does)
Privacy as Expectations
User Expectations
(What people think
the app does)

App Behavior
(What the app
actually does)
95% users were surprised this app
sent their approximate location
to mobile ads providers.

85% users
sent their
mobile ad

95% users were surprised this app
95% users were surprised this app
sent their approximate location
sent their phone’s unique ID to
to mobile ads providers.
mobile ads providers.

85% users
25%
sent their
mobile ad
dictionary
words.
25% users
sent their
10% users
dictionary
wrote con
words.

95% users were surprised this app
90% users were surprised this app
sent their phone’s unique ID
sent their precise location to to
mobile ads providers.
mobile ads providers.
90% users were surprised this app
0% users were surprised this app
sent their precise location to
can control camera flashlight.
mobile ads providers.

0% users
10% users
could con
wrote con
95% users were surprised this app
sent their approximate location
to mobile ads providers.

85% users
sent their
mobile ad

85% users
25%
sent their
mobile ad
dictionary
words.
25%
Advertising and other users
95% users were surprised this app
sent their
90% users were surprised this app
10% users
dictionary
sent their phone’s unique to to
sent their precise behaviors usually ok,
location ID
wrote con
words.
mobile ads providers.
mobile ads providers.

95% users were surprised this app
95% users were surprised this app
sent their approximate location
sent their phone’s unique ID to
to mobile ads providers.
mobile ads providers.

if people know

90% users were surprised this app
0% users were surprised this app
sent their precise location to
can control camera flashlight.
mobile ads providers.

0% users
10% users
could con
wrote con
How can we help
developers create
secure and
privacy-sensitive apps?
How can we work with
public policy makers
to create better
guidelines
around privacy?
How can we create
a connected world we
would want to live in?
Computer
Human
Interaction:
Mobility
Privacy
Security
Smartphone Privacy and Security, at Poptech 2013

More Related Content

What's hot

The App Attention Span
The App Attention Span The App Attention Span
The App Attention Span AppDynamics
 
Thuraya SatSleeve - Transform your smartphone into a satellite phone
Thuraya SatSleeve - Transform your smartphone into a satellite phoneThuraya SatSleeve - Transform your smartphone into a satellite phone
Thuraya SatSleeve - Transform your smartphone into a satellite phoneCygnus Telecom
 
How To Setup Thuraya SatSleeve - User Guide
How To Setup Thuraya SatSleeve - User GuideHow To Setup Thuraya SatSleeve - User Guide
How To Setup Thuraya SatSleeve - User GuideCygnus Telecom
 
First Due - Mobile Responder
First Due - Mobile ResponderFirst Due - Mobile Responder
First Due - Mobile ResponderFirst Due
 
Mobile app presentation
Mobile app presentationMobile app presentation
Mobile app presentationberklibrary
 

What's hot (7)

The App Attention Span
The App Attention Span The App Attention Span
The App Attention Span
 
Thuraya SatSleeve - Transform your smartphone into a satellite phone
Thuraya SatSleeve - Transform your smartphone into a satellite phoneThuraya SatSleeve - Transform your smartphone into a satellite phone
Thuraya SatSleeve - Transform your smartphone into a satellite phone
 
IktissadEvents Mobile App
IktissadEvents Mobile AppIktissadEvents Mobile App
IktissadEvents Mobile App
 
How To Setup Thuraya SatSleeve - User Guide
How To Setup Thuraya SatSleeve - User GuideHow To Setup Thuraya SatSleeve - User Guide
How To Setup Thuraya SatSleeve - User Guide
 
First Due - Mobile Responder
First Due - Mobile ResponderFirst Due - Mobile Responder
First Due - Mobile Responder
 
Mobile app presentation
Mobile app presentationMobile app presentation
Mobile app presentation
 
Lee Carrotte - SecondSync
Lee Carrotte - SecondSyncLee Carrotte - SecondSync
Lee Carrotte - SecondSync
 

Similar to Smartphone Privacy and Security, at Poptech 2013

Mobile vs Social by Bart Fussel on Social Strategy Summit 2014
Mobile vs Social by Bart Fussel on Social Strategy Summit 2014Mobile vs Social by Bart Fussel on Social Strategy Summit 2014
Mobile vs Social by Bart Fussel on Social Strategy Summit 2014aFrogleap
 
The Mobile of Everything
The Mobile of EverythingThe Mobile of Everything
The Mobile of EverythingZenithOptimedia
 
Mobile Marketing Mix
Mobile Marketing MixMobile Marketing Mix
Mobile Marketing Mixmattpiette
 
Mobile is Knowledge: How travel and tourism sectors can utilise mobile
Mobile is Knowledge: How travel and tourism sectors can utilise mobileMobile is Knowledge: How travel and tourism sectors can utilise mobile
Mobile is Knowledge: How travel and tourism sectors can utilise mobilemobilesquared Ltd
 
How Trinity Mobile Apps can increase your business
How Trinity Mobile Apps can increase your businessHow Trinity Mobile Apps can increase your business
How Trinity Mobile Apps can increase your businessRaion Seishin
 
Top 5 Mobile Trends to Watch in 2014
Top 5 Mobile Trends to Watch in 2014Top 5 Mobile Trends to Watch in 2014
Top 5 Mobile Trends to Watch in 2014Paperlit
 
Masterclass: Bobbie Gersbach-Smith's (M&C Saatchi Mobile) presentation at Mum...
Masterclass: Bobbie Gersbach-Smith's (M&C Saatchi Mobile) presentation at Mum...Masterclass: Bobbie Gersbach-Smith's (M&C Saatchi Mobile) presentation at Mum...
Masterclass: Bobbie Gersbach-Smith's (M&C Saatchi Mobile) presentation at Mum...Ruperta Daher
 
EFASHION- designing mobile shopping & fashion experiences on 
mobile that ins...
EFASHION- designing mobile shopping & fashion experiences on 
mobile that ins...EFASHION- designing mobile shopping & fashion experiences on 
mobile that ins...
EFASHION- designing mobile shopping & fashion experiences on 
mobile that ins...The Valley
 
Mobile Marketing Presentation
Mobile Marketing PresentationMobile Marketing Presentation
Mobile Marketing PresentationCraig Daitch
 
Top App Ideas For Startups To Launch In 2023.pdf
Top App Ideas For Startups To Launch In 2023.pdfTop App Ideas For Startups To Launch In 2023.pdf
Top App Ideas For Startups To Launch In 2023.pdfMarie Weaver
 
COMM 303-50 Final Project
COMM 303-50 Final ProjectCOMM 303-50 Final Project
COMM 303-50 Final ProjectAshley Goodlett
 
An insider's look into Mobile payments nyc 2015 07
An insider's look into Mobile payments nyc 2015 07An insider's look into Mobile payments nyc 2015 07
An insider's look into Mobile payments nyc 2015 07Globant
 
Chad Gallagher of Advertising.com - Mobile Myth Busters at SIC2013
Chad Gallagher of Advertising.com - Mobile Myth Busters at SIC2013Chad Gallagher of Advertising.com - Mobile Myth Busters at SIC2013
Chad Gallagher of Advertising.com - Mobile Myth Busters at SIC2013Seattle Interactive Conference
 
Stay on Top of Today’s and Tomorrow’s Mobile App Trends
Stay on Top of Today’s and Tomorrow’s Mobile App TrendsStay on Top of Today’s and Tomorrow’s Mobile App Trends
Stay on Top of Today’s and Tomorrow’s Mobile App TrendsInfo-Tech Research Group
 
Everything you wanted to know about mobile commerce (and mobile retail), but ...
Everything you wanted to know about mobile commerce (and mobile retail), but ...Everything you wanted to know about mobile commerce (and mobile retail), but ...
Everything you wanted to know about mobile commerce (and mobile retail), but ...mobilesquared Ltd
 
Consumer Mobile Policy & Security - Lightspeed & Kantar
Consumer Mobile Policy & Security - Lightspeed & KantarConsumer Mobile Policy & Security - Lightspeed & Kantar
Consumer Mobile Policy & Security - Lightspeed & KantarMerlien Institute
 
Mobile Trends Report 2014 for Travel industry
Mobile Trends Report 2014 for Travel industryMobile Trends Report 2014 for Travel industry
Mobile Trends Report 2014 for Travel industryCollective Camp
 

Similar to Smartphone Privacy and Security, at Poptech 2013 (20)

Mobile vs Social by Bart Fussel on Social Strategy Summit 2014
Mobile vs Social by Bart Fussel on Social Strategy Summit 2014Mobile vs Social by Bart Fussel on Social Strategy Summit 2014
Mobile vs Social by Bart Fussel on Social Strategy Summit 2014
 
The Mobile of Everything
The Mobile of EverythingThe Mobile of Everything
The Mobile of Everything
 
Mobile Marketing Mix
Mobile Marketing MixMobile Marketing Mix
Mobile Marketing Mix
 
Mobile is Knowledge: How travel and tourism sectors can utilise mobile
Mobile is Knowledge: How travel and tourism sectors can utilise mobileMobile is Knowledge: How travel and tourism sectors can utilise mobile
Mobile is Knowledge: How travel and tourism sectors can utilise mobile
 
How Trinity Mobile Apps can increase your business
How Trinity Mobile Apps can increase your businessHow Trinity Mobile Apps can increase your business
How Trinity Mobile Apps can increase your business
 
Top 5 Mobile Trends to Watch in 2014
Top 5 Mobile Trends to Watch in 2014Top 5 Mobile Trends to Watch in 2014
Top 5 Mobile Trends to Watch in 2014
 
E contact
E contactE contact
E contact
 
Masterclass: Bobbie Gersbach-Smith's (M&C Saatchi Mobile) presentation at Mum...
Masterclass: Bobbie Gersbach-Smith's (M&C Saatchi Mobile) presentation at Mum...Masterclass: Bobbie Gersbach-Smith's (M&C Saatchi Mobile) presentation at Mum...
Masterclass: Bobbie Gersbach-Smith's (M&C Saatchi Mobile) presentation at Mum...
 
EFASHION- designing mobile shopping & fashion experiences on 
mobile that ins...
EFASHION- designing mobile shopping & fashion experiences on 
mobile that ins...EFASHION- designing mobile shopping & fashion experiences on 
mobile that ins...
EFASHION- designing mobile shopping & fashion experiences on 
mobile that ins...
 
Mobile Marketing Presentation
Mobile Marketing PresentationMobile Marketing Presentation
Mobile Marketing Presentation
 
Top App Ideas For Startups To Launch In 2023.pdf
Top App Ideas For Startups To Launch In 2023.pdfTop App Ideas For Startups To Launch In 2023.pdf
Top App Ideas For Startups To Launch In 2023.pdf
 
COMM 303-50 Final Project
COMM 303-50 Final ProjectCOMM 303-50 Final Project
COMM 303-50 Final Project
 
An insider's look into Mobile payments nyc 2015 07
An insider's look into Mobile payments nyc 2015 07An insider's look into Mobile payments nyc 2015 07
An insider's look into Mobile payments nyc 2015 07
 
Chad Gallagher of Advertising.com - Mobile Myth Busters at SIC2013
Chad Gallagher of Advertising.com - Mobile Myth Busters at SIC2013Chad Gallagher of Advertising.com - Mobile Myth Busters at SIC2013
Chad Gallagher of Advertising.com - Mobile Myth Busters at SIC2013
 
Stay on Top of Today’s and Tomorrow’s Mobile App Trends
Stay on Top of Today’s and Tomorrow’s Mobile App TrendsStay on Top of Today’s and Tomorrow’s Mobile App Trends
Stay on Top of Today’s and Tomorrow’s Mobile App Trends
 
Everything you wanted to know about mobile commerce (and mobile retail), but ...
Everything you wanted to know about mobile commerce (and mobile retail), but ...Everything you wanted to know about mobile commerce (and mobile retail), but ...
Everything you wanted to know about mobile commerce (and mobile retail), but ...
 
Consumer Mobile Policy & Security - Lightspeed & Kantar
Consumer Mobile Policy & Security - Lightspeed & KantarConsumer Mobile Policy & Security - Lightspeed & Kantar
Consumer Mobile Policy & Security - Lightspeed & Kantar
 
Mobile Trends Report 2014 for Travel industry
Mobile Trends Report 2014 for Travel industryMobile Trends Report 2014 for Travel industry
Mobile Trends Report 2014 for Travel industry
 
Inventory to Audience
Inventory to AudienceInventory to Audience
Inventory to Audience
 
Inventory to Audience
Inventory to AudienceInventory to Audience
Inventory to Audience
 

Recently uploaded

How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 

Recently uploaded (20)

How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 

Smartphone Privacy and Security, at Poptech 2013

  • 1. In the near future, our smartphones will know everything about us
  • 2.
  • 3. Fun Facts about Millennials 83% sleep with phones
  • 4. Fun Facts about Millennials 83% sleep with phones 90% check first thing
  • 5. Fun Facts about Millennials 83% sleep with phones 90% check first thing 1 in 3 use in bathroom
  • 6. In the near future, our smartphones will know everything about us
  • 7. What about privacy? What is being collected? Where is it sent? How is it used?
  • 8. Failing to address privacy and security could blunt adoption of amazing technologies with huge societal benefits
  • 9. Location Data Unique device ID Location Data Network Access Unique device ID Location Data Unique device ID
  • 10. Privacy as Expectations User Expectations (What people think the app does) App Behavior (What the app actually does)
  • 11. Privacy as Expectations User Expectations (What people think the app does) App Behavior (What the app actually does)
  • 12. 95% users were surprised this app sent their approximate location to mobile ads providers. 85% users sent their mobile ad 95% users were surprised this app 95% users were surprised this app sent their approximate location sent their phone’s unique ID to to mobile ads providers. mobile ads providers. 85% users 25% sent their mobile ad dictionary words. 25% users sent their 10% users dictionary wrote con words. 95% users were surprised this app 90% users were surprised this app sent their phone’s unique ID sent their precise location to to mobile ads providers. mobile ads providers. 90% users were surprised this app 0% users were surprised this app sent their precise location to can control camera flashlight. mobile ads providers. 0% users 10% users could con wrote con
  • 13. 95% users were surprised this app sent their approximate location to mobile ads providers. 85% users sent their mobile ad 85% users 25% sent their mobile ad dictionary words. 25% Advertising and other users 95% users were surprised this app sent their 90% users were surprised this app 10% users dictionary sent their phone’s unique to to sent their precise behaviors usually ok, location ID wrote con words. mobile ads providers. mobile ads providers. 95% users were surprised this app 95% users were surprised this app sent their approximate location sent their phone’s unique ID to to mobile ads providers. mobile ads providers. if people know 90% users were surprised this app 0% users were surprised this app sent their precise location to can control camera flashlight. mobile ads providers. 0% users 10% users could con wrote con
  • 14. How can we help developers create secure and privacy-sensitive apps?
  • 15. How can we work with public policy makers to create better guidelines around privacy?
  • 16.
  • 17. How can we create a connected world we would want to live in? Computer Human Interaction: Mobility Privacy Security

Editor's Notes

  1. Jason Hong / jasonh@cs.cmu.eduI’m a computer scientist, and I’ve been working with sensor-based systems for 15 yearsMyclaim: in the near future, smartphones will know everything about usOur Smartphones will know if we are depressed or not / what our carbon footprint is / what our information needs are before we even know what we needImages fromhttp://www.androidtapp.com/how-simple-is-your-smartphone-to-use-funny-videos/http://www.sfgate.com/crime/article/Absorbed-device-users-oblivious-to-danger-4876709.php#photo-5278749http://www.reneweduponadream.com/2012/09/business-without-smartphone-dont-let-it.html
  2. I make this claim for three reasons1. Over 1B smartphones and rapidly growing, impressive since smartphones only came out in 20072. Our smartphones already have incredible capabilities… they know who we know (contact list and social networking apps), where we go (GPS, cell tower, WiFi), and to a weak extent what we do (sensors and apps)3. Smartphones are highly intimate, perhaps the most intimate devices we’ve created
  3. From Pew Internet
  4. From Cisco report
  5. Also from Cisco report
  6. If we push all three of these trends to their logical conclusion, we come back to my claim, that in the near future, our smartphones will know everything about usIn many ways, this will be a good thing. Our smartphones will be able to help us with healthcare, education, transportation, urban planning, and morehttp://www.androidtapp.com/how-simple-is-your-smartphone-to-use-funny-videos/http://www.sfgate.com/crime/article/Absorbed-device-users-oblivious-to-danger-4876709.php#photo-5278749http://www.reneweduponadream.com/2012/09/business-without-smartphone-dont-let-it.html
  7. But what about privacy?
  8. This is the main philosophy behind my research group
  9. Privacy concerns aren’t just hypothetical risks either. There are many apps with unusual behaviors.Brightest Flashlighthttps://play.google.com/store/apps/details?id=goldenshorestechnologies.brightestflashlight.freeBible apphttps://play.google.com/store/apps/details?id=com.sirma.mobile.bible.android
  10. One project we have been doing is to analyze the behavior of these apps and using crowdsourcing techniques to pinpoint and convey unusual behaviors. For example, most people don’t expect Angry Birds (Android) to use location data, but in reality it does. Given the big gap in expectations and reality, we consider this a privacy problem.
  11. In contrast, most people do expect Google Maps to use location data, and so we consider this less of a privacy problem.
  12. Here is an example summary of our work, showing the level of surprise that other people had.
  13. Interestingly, we found that people actually usually ok with a lot of data sharing if told what used for
  14. But end-users are only part of the picture. Need to help developers.Right now, developers have few tools and little guidance to help them.http://design.cmu.edu/sites/default/files/users/user10/undergrad-junior-studio.jpg
  15. Same with public policy makers. Little guidance for themhttp://readwrite.com/2013/04/18/ftc-ready-to-move-if-carriers-ignore-android-security
  16. But I also want to emphasize that these issues with privacy and security aren’t just with smartphones. Ubiquitous computing is happening. Computation, communication, sensing increasingly embedded in our everyday lives.Can help society in so many ways, but only if we can address these challenges of privacy and security.
  17. Close with one last questionJason Hong / jasonh@cs.cmu.edu