CHIuXiD (Indonesia) keynote about privacy and security. Includes why care about privacy, design challenges, design opportunities, and brief discussion of some of my team's research on mobile sensing.
Jason HongProfessor at Carnegie Mellon University, Human Computer Interaction
I’ve been working on sensor-based systems for about 20 years now
I believe in the near future, our smart devices will know pretty much everything about us
They are going to know how well we are sleeping, whether we are depressed or not, and how sustainable or green we are
You probably have many questions about this simple statement:
How did we get here?
How do these technologies work?
What will this all mean for you and for society? And given the title of my talk, what will this all mean for privacy?
Let’s start with the first question, how did we get here?
https://commons.wikimedia.org/wiki/File:Dell_Desktop_Computer_in_school_classroom.jpg
About 30 years ago, computers were primarily large boxes that came with a monitor, keyboard, and mouse
Emphasis is on large here, really takes up the entire desk
You could also only get computers in one color:ugly
Today, computers come in all kinds of form factors
Smartphones, tablets, glasses, cars, watches, clothes, fitness trackers, health monitoring devices, parking meters, electronic locks, smart mirrors, drones, and yes, even smart toilets.
All of these smart devices are part of the third big wave of computing.
The first wave focused on computation, making the basics of computing work.
The second wave centered on networking, connecting all of these computers together in a global network.
The third wave, of which we are in the early stages, looks at making computers part of the physical world in which we live. Computation and communication are being embedded into everyday objects.
All of this is possible because of shifts in the costs and capabilities of technology.
What will this world be like?
Will just focus on smartphones for now, since they are the most pervasive devices we have today
Representative of many of the problems and opportunities we will be grappling with in the future
Smartphones are everywhere
http://marketingland.com/report-us-smartphone-penetration-now-75-percent-117746
http://www.pewinternet.org/fact-sheets/mobile-technology-fact-sheet/
http://www.androidauthority.com/google-play-store-vs-the-apple-app-store-601836/
These devices are also incredibly intimate, perhaps the most intimate computing devices we’ve ever created.
From Pew Internet and Cisco 2012 study
Main stats on this page are from:
http://www.cisco.com/c/en/us/solutions/enterprise/connected-world-technology-report/index.html#~2012
https://www.cisco.com/c/dam/en/us/solutions/enterprise/connected-world-technology-report/2012-CCWTR-Chapter1-Global-Results.pdf
Additional stats about mobile phones:
http://www.pewinternet.org/fact-sheets/mobile-technology-fact-sheet/
-----------------------
What’s also interesting are trends in how people use these smartphones
http://blog.sciencecreative.com/2011/03/16/the-authentic-online-marketer/
http://www.generationalinsights.com/millennials-addicted-to-their-smartphones-some-suffer-nomophobia/
In fact, Millennials don’t just sleep with their smartphones. 75% use them in bed before going to sleep and 90% check them again first thing in the morning. Half use them while eating and third use them in the bathroom. A third check them every half hour. Another fifth check them every ten minutes. A quarter of them check them so frequently that they lose count.
http://www.androidtapp.com/how-simple-is-your-smartphone-to-use-funny-videos/
Pew Research Center
Around 83 percent of those 18- to 29-year-olds sleep with their cell phones within reach.
http://persquaremile.com/category/suburbia/
From Cisco report
Also from Cisco report
But it’s not just the devices that are intimate, the data is also intimate.
Location, call logs, SMS, pics, more
Sleep monitor example
A grand challenge for computer science
http://www.flickr.com/photos/robby_van_moor/478725670/
Every week, we’re seeing more and more news articles like these
Girls Around Me used foursquare checkin data and profile data to see who (women) was nearby
Same data, different context, very different reactions
What kinds of safeguards for physical safety?
Can we build models of normal vs abnormal behaviors for devices and apps, and enforce?
What kinds of network protocols, APIs, and middleware to help manage IoT devices at scale?
The sheer number of these devices will make what would ordinarily be trivial tasks into significant challenges. For example, configuring a security policy for a single device is tractable. Configuring a security policy for hundreds of devices, each of which has a different user interface, is not. Similarly, it is easy to have unique passwords for a few devices, but less so for a house or building full of devices, many of which do not even have keyboard input or displays. It is also easy to physically lock down a few computers to prevent
them from being stolen, but it is very difficult to do the same for large numbers of IoT devices. Even worse, many of these IoT devices can be easily lost or stolen due to their small size, or even tampered with to send back fake data.
Image from wired.com
A friend told me that a person once annoyed a bunch of people wearing Google Glass by shouting out “Ok Glass, take a picture,” causing everyone’s wearable to take a picture.
What kinds of network protocols, APIs, and middleware to help manage IoT devices at scale?
The sheer number of these devices will make what would ordinarily be trivial tasks into significant challenges. For example, configuring a security policy for a single device is tractable. Configuring a security policy for hundreds of devices, each of which has a different user interface, is not. Similarly, it is easy to have unique passwords for a few devices, but less so for a house or building full of devices, many of which do not even have keyboard input or displays. It is also easy to physically lock down a few computers to prevent
them from being stolen, but it is very difficult to do the same for large numbers of IoT devices. Even worse, many of these IoT devices can be easily lost or stolen due to their small size, or even tampered with to send back fake data.
Grade 12.5
About 10 min to read
So based on Lorrie and Aleecia’s work, it will take 25 full days to read all privacy policies of all web sites
But this assumes people read it
Rationale behavior not to read privacy policies: we want to use the service, painful to read, clear cost but unclear benefit
https://www.flickr.com/photos/johnivara/536856713
https://creativecommons.org/licenses/by-nc-nd/2.0/
I want to wrap up by taking a big step back and looking at the big picture.
Today, we are at a crossroads. There is only one time in human history when a global network of computers is created, and that time is now. And there is only one time in human history when computation, communication, and sensing is woven into our everyday world, and that time is now. We’re already in the early stages of IoT. And it will offer tremendous benefits to society in terms of safety, sustainability, transportation, health care, and more, but only if we can address the real privacy problems that these same technologies pose. So I’ll end with a question for you to consider:
https://www.flickr.com/photos/johnivara/536856713
https://creativecommons.org/licenses/by-nc-nd/2.0/
Today, we are at a crossroads. There is only one time in human history when a global network of computers is created, and that time is now. And there is only one time in human history when computation, communication, and sensing is woven into our everyday world, and that time is now. Now, I’ve avoided using the term Internet of Things because as you may remember from yesterday, I don’t really like the term. But regardless of what it’s called, it’s coming, and coming soon. And it will offer tremendous benefits to society in terms of safety, sustainability, transportation, health care, and more, but only if we can address the real privacy problems that these same technologies pose. So I’ll end with a question for you to consider: