Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Privacy on the Series of Tubes of Things

981 views

Published on

Created and presented by Todd Manning for the EFF-Austin Meetup on November 17, 2014 at Capital Factory in Austin, Texas.

https://www.youtube.com/watch?v=OiLpe3--ZB8

Published in: Internet
  • Be the first to comment

  • Be the first to like this

Privacy on the Series of Tubes of Things

  1. 1. Privacy On the series of tubes of things
  2. 2. Privacy On the Internet of all the things
  3. 3. Howdy, EFFAustin • Observations on privacy • What is IoT? • Trends • The crossroads of security, privacy and IoT • Welcome to the future
  4. 4. @TManning • Greybeard, neckbeard • Longstanding Internet professional • EFF pizza connoisseur • Austin Hecklers Association • Security consultant • 100% NOT A PRIVACY EXPERT, ETC
  5. 5. Privacy • A right protected by laws • U.S. Const. amend. IV • Protection from observation by others e.g. in your own home • Communication confidentiality - wiretaps • Control over distribution of personal information
  6. 6. Internet privacy • “Thing” security • Data confidentiality • Preservation of anonymity • Advertising and other forms of surveillance
  7. 7. Privacy in the cloud • Trusting the provider • Attacks against cloud infrastructure affect your data • Law enforcement jurisdiction over your data https://www.apple.com/privacy/docs/government-information-requests-20131105.pdf
  8. 8. Internet of things
  9. 9. SCADA: Your Father's IoT
  10. 10. Oil & Gas Example
  11. 11. Monitoring SCADA
  12. 12. Keeping an Eye-OT* on things *Slide title cleverly changed after the meeting
  13. 13. IoT, Son of SCADA
  14. 14. Smart home
  15. 15. Smarten Everything
  16. 16. Bridge the air gap
  17. 17. Mobile
  18. 18. My phone is more interesting than I am* * I saw this quote on some brilliant graffiti in SF
  19. 19. Mobile Threats http://www.huffingtonpost.com/2014/10/31/apple-touch-id-ruling_n_6083920.html
  20. 20. IoT, Daughter of Mobile
  21. 21. Mobile Location
  22. 22. Mobile Payments
  23. 23. Wearables
  24. 24. Wearables
  25. 25. Privacy risks http://www.digitalmunition.com/OwningCopCar.pdf
  26. 26. Develop all the things
  27. 27. Photograph all the things http://getnarrative.com/
  28. 28. Honey, I Shrunk the Things Freescale KL03
  29. 29. Linux all the things
  30. 30. Dev boards as far as the eye can see
  31. 31. Linux all the things Inverse Path “USB Armory”
  32. 32. Yo, Dog
  33. 33. Full Stack Insecurity SSL
  34. 34. CEO of my kickstarter page
  35. 35. Always-On-Cloud- Connected Microphone
  36. 36. “He added that the iBeacon technology can also be used to monitor retail staff.”
  37. 37. Monitoring that no good dog
  38. 38. IoT Hacking http://download.gtvhacker.com/file/generic/GTVHacker-DEFCON22.pdf
  39. 39. IoT Hacking https://www.youtube.com/watch?v=MqpULC84rCQ
  40. 40. Driving all the things
  41. 41. * *Not actually true
  42. 42. Mapping The Net
  43. 43. IoT Security Research
  44. 44. All your base
  45. 45. Thanks! Todd Manning @tmanning REDACTED@EXAMPLE.COM

×