Smartphone Privacy and Security, at Poptech 2013

Jason Hong
Jason HongProfessor at Carnegie Mellon University, Human Computer Interaction
In the near future, our
smartphones will know

everything

about us
Smartphone Privacy and Security, at Poptech 2013
Fun Facts about Millennials

83% sleep with phones
Fun Facts about Millennials

83% sleep with phones
90% check first thing
Fun Facts about Millennials

83% sleep with phones
90% check first thing
1 in 3 use in bathroom
In the near future, our
smartphones will know

everything

about us
What about

privacy?

What is being collected?
Where is it sent?
How is it used?
Failing to address privacy
and security could blunt
adoption of amazing
technologies with huge
societal benefits
Location Data
Unique device ID
Location Data
Network Access
Unique device ID
Location Data
Unique device ID
Privacy as Expectations
User Expectations
(What people think
the app does)

App Behavior
(What the app
actually does)
Privacy as Expectations
User Expectations
(What people think
the app does)

App Behavior
(What the app
actually does)
95% users were surprised this app
sent their approximate location
to mobile ads providers.

85% users
sent their
mobile ad

95% users were surprised this app
95% users were surprised this app
sent their approximate location
sent their phone’s unique ID to
to mobile ads providers.
mobile ads providers.

85% users
25%
sent their
mobile ad
dictionary
words.
25% users
sent their
10% users
dictionary
wrote con
words.

95% users were surprised this app
90% users were surprised this app
sent their phone’s unique ID
sent their precise location to to
mobile ads providers.
mobile ads providers.
90% users were surprised this app
0% users were surprised this app
sent their precise location to
can control camera flashlight.
mobile ads providers.

0% users
10% users
could con
wrote con
95% users were surprised this app
sent their approximate location
to mobile ads providers.

85% users
sent their
mobile ad

85% users
25%
sent their
mobile ad
dictionary
words.
25%
Advertising and other users
95% users were surprised this app
sent their
90% users were surprised this app
10% users
dictionary
sent their phone’s unique to to
sent their precise behaviors usually ok,
location ID
wrote con
words.
mobile ads providers.
mobile ads providers.

95% users were surprised this app
95% users were surprised this app
sent their approximate location
sent their phone’s unique ID to
to mobile ads providers.
mobile ads providers.

if people know

90% users were surprised this app
0% users were surprised this app
sent their precise location to
can control camera flashlight.
mobile ads providers.

0% users
10% users
could con
wrote con
How can we help
developers create
secure and
privacy-sensitive apps?
How can we work with
public policy makers
to create better
guidelines
around privacy?
Smartphone Privacy and Security, at Poptech 2013
How can we create
a connected world we
would want to live in?
Computer
Human
Interaction:
Mobility
Privacy
Security
Smartphone Privacy and Security, at Poptech 2013
1 of 18

Recommended

March Madness or April Fools Infographic by
March Madness or April Fools InfographicMarch Madness or April Fools Infographic
March Madness or April Fools InfographicFlexera
96 views1 slide
Surf Pitch Deck by
Surf Pitch Deck Surf Pitch Deck
Surf Pitch Deck sarahcornwell
336 views15 slides
Fake News by
Fake NewsFake News
Fake NewsYian Lu
251 views19 slides
From 0 to 94 percent automation by
From 0 to 94 percent automation From 0 to 94 percent automation
From 0 to 94 percent automation Besedo
56 views30 slides
Mic hyper - mtm16 by
Mic hyper - mtm16Mic hyper - mtm16
Mic hyper - mtm16Media Lab Bayern
367 views17 slides
2014 competition entry_presentation_-_template_v1.0 by
2014 competition entry_presentation_-_template_v1.02014 competition entry_presentation_-_template_v1.0
2014 competition entry_presentation_-_template_v1.0_CSS
295 views17 slides

More Related Content

What's hot

The App Attention Span by
The App Attention Span The App Attention Span
The App Attention Span AppDynamics
5.2K views1 slide
Thuraya SatSleeve - Transform your smartphone into a satellite phone by
Thuraya SatSleeve - Transform your smartphone into a satellite phoneThuraya SatSleeve - Transform your smartphone into a satellite phone
Thuraya SatSleeve - Transform your smartphone into a satellite phoneCygnus Telecom
1.9K views12 slides
IktissadEvents Mobile App by
IktissadEvents Mobile AppIktissadEvents Mobile App
IktissadEvents Mobile AppAl-Iktissad Wal-Aamal
355 views15 slides
How To Setup Thuraya SatSleeve - User Guide by
How To Setup Thuraya SatSleeve - User GuideHow To Setup Thuraya SatSleeve - User Guide
How To Setup Thuraya SatSleeve - User GuideCygnus Telecom
1.5K views9 slides
First Due - Mobile Responder by
First Due - Mobile ResponderFirst Due - Mobile Responder
First Due - Mobile ResponderFirst Due
9 views2 slides
Mobile app presentation by
Mobile app presentationMobile app presentation
Mobile app presentationberklibrary
280 views28 slides

What's hot(7)

The App Attention Span by AppDynamics
The App Attention Span The App Attention Span
The App Attention Span
AppDynamics5.2K views
Thuraya SatSleeve - Transform your smartphone into a satellite phone by Cygnus Telecom
Thuraya SatSleeve - Transform your smartphone into a satellite phoneThuraya SatSleeve - Transform your smartphone into a satellite phone
Thuraya SatSleeve - Transform your smartphone into a satellite phone
Cygnus Telecom1.9K views
How To Setup Thuraya SatSleeve - User Guide by Cygnus Telecom
How To Setup Thuraya SatSleeve - User GuideHow To Setup Thuraya SatSleeve - User Guide
How To Setup Thuraya SatSleeve - User Guide
Cygnus Telecom1.5K views
First Due - Mobile Responder by First Due
First Due - Mobile ResponderFirst Due - Mobile Responder
First Due - Mobile Responder
First Due9 views
Mobile app presentation by berklibrary
Mobile app presentationMobile app presentation
Mobile app presentation
berklibrary280 views

Similar to Smartphone Privacy and Security, at Poptech 2013

Mobile vs Social by Bart Fussel on Social Strategy Summit 2014 by
Mobile vs Social by Bart Fussel on Social Strategy Summit 2014Mobile vs Social by Bart Fussel on Social Strategy Summit 2014
Mobile vs Social by Bart Fussel on Social Strategy Summit 2014aFrogleap
772 views75 slides
The Mobile of Everything by
The Mobile of EverythingThe Mobile of Everything
The Mobile of EverythingZenithOptimedia
1.5K views20 slides
Mobile Marketing Mix by
Mobile Marketing MixMobile Marketing Mix
Mobile Marketing Mixmattpiette
5.4K views52 slides
Mobile is Knowledge: How travel and tourism sectors can utilise mobile by
Mobile is Knowledge: How travel and tourism sectors can utilise mobileMobile is Knowledge: How travel and tourism sectors can utilise mobile
Mobile is Knowledge: How travel and tourism sectors can utilise mobilemobilesquared Ltd
943 views37 slides
How Trinity Mobile Apps can increase your business by
How Trinity Mobile Apps can increase your businessHow Trinity Mobile Apps can increase your business
How Trinity Mobile Apps can increase your businessRaion Seishin
977 views36 slides
Top 5 Mobile Trends to Watch in 2014 by
Top 5 Mobile Trends to Watch in 2014Top 5 Mobile Trends to Watch in 2014
Top 5 Mobile Trends to Watch in 2014Paperlit
755 views1 slide

Similar to Smartphone Privacy and Security, at Poptech 2013(20)

Mobile vs Social by Bart Fussel on Social Strategy Summit 2014 by aFrogleap
Mobile vs Social by Bart Fussel on Social Strategy Summit 2014Mobile vs Social by Bart Fussel on Social Strategy Summit 2014
Mobile vs Social by Bart Fussel on Social Strategy Summit 2014
aFrogleap772 views
Mobile Marketing Mix by mattpiette
Mobile Marketing MixMobile Marketing Mix
Mobile Marketing Mix
mattpiette5.4K views
Mobile is Knowledge: How travel and tourism sectors can utilise mobile by mobilesquared Ltd
Mobile is Knowledge: How travel and tourism sectors can utilise mobileMobile is Knowledge: How travel and tourism sectors can utilise mobile
Mobile is Knowledge: How travel and tourism sectors can utilise mobile
mobilesquared Ltd943 views
How Trinity Mobile Apps can increase your business by Raion Seishin
How Trinity Mobile Apps can increase your businessHow Trinity Mobile Apps can increase your business
How Trinity Mobile Apps can increase your business
Raion Seishin977 views
Top 5 Mobile Trends to Watch in 2014 by Paperlit
Top 5 Mobile Trends to Watch in 2014Top 5 Mobile Trends to Watch in 2014
Top 5 Mobile Trends to Watch in 2014
Paperlit755 views
E contact by Vipul Dua
E contactE contact
E contact
Vipul Dua2.3K views
Masterclass: Bobbie Gersbach-Smith's (M&C Saatchi Mobile) presentation at Mum... by Ruperta Daher
Masterclass: Bobbie Gersbach-Smith's (M&C Saatchi Mobile) presentation at Mum...Masterclass: Bobbie Gersbach-Smith's (M&C Saatchi Mobile) presentation at Mum...
Masterclass: Bobbie Gersbach-Smith's (M&C Saatchi Mobile) presentation at Mum...
Ruperta Daher187 views
EFASHION- designing mobile shopping & fashion experiences on 
mobile that ins... by The Valley
EFASHION- designing mobile shopping & fashion experiences on 
mobile that ins...EFASHION- designing mobile shopping & fashion experiences on 
mobile that ins...
EFASHION- designing mobile shopping & fashion experiences on 
mobile that ins...
The Valley1K views
Mobile Marketing Presentation by Craig Daitch
Mobile Marketing PresentationMobile Marketing Presentation
Mobile Marketing Presentation
Craig Daitch495 views
An insider's look into Mobile payments nyc 2015 07 by Globant
An insider's look into Mobile payments nyc 2015 07An insider's look into Mobile payments nyc 2015 07
An insider's look into Mobile payments nyc 2015 07
Globant742 views
Everything you wanted to know about mobile commerce (and mobile retail), but ... by mobilesquared Ltd
Everything you wanted to know about mobile commerce (and mobile retail), but ...Everything you wanted to know about mobile commerce (and mobile retail), but ...
Everything you wanted to know about mobile commerce (and mobile retail), but ...
mobilesquared Ltd4.3K views
Consumer Mobile Policy & Security - Lightspeed & Kantar by Merlien Institute
Consumer Mobile Policy & Security - Lightspeed & KantarConsumer Mobile Policy & Security - Lightspeed & Kantar
Consumer Mobile Policy & Security - Lightspeed & Kantar
Merlien Institute822 views
Mobile Trends Report 2014 for Travel industry by Collective Camp
Mobile Trends Report 2014 for Travel industryMobile Trends Report 2014 for Travel industry
Mobile Trends Report 2014 for Travel industry
Collective Camp5.7K views
Gemalto Building Trust in Mobile Apps The Consumer Perspecti.docx by hanneloremccaffery
Gemalto Building Trust in  Mobile Apps The Consumer Perspecti.docxGemalto Building Trust in  Mobile Apps The Consumer Perspecti.docx
Gemalto Building Trust in Mobile Apps The Consumer Perspecti.docx

Recently uploaded

Cencora Executive Symposium by
Cencora Executive SymposiumCencora Executive Symposium
Cencora Executive Symposiummarketingcommunicati21
139 views14 slides
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha... by
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...ShapeBlue
138 views18 slides
Data Integrity for Banking and Financial Services by
Data Integrity for Banking and Financial ServicesData Integrity for Banking and Financial Services
Data Integrity for Banking and Financial ServicesPrecisely
78 views26 slides
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ... by
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...ShapeBlue
146 views15 slides
Network Source of Truth and Infrastructure as Code revisited by
Network Source of Truth and Infrastructure as Code revisitedNetwork Source of Truth and Infrastructure as Code revisited
Network Source of Truth and Infrastructure as Code revisitedNetwork Automation Forum
52 views45 slides
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue by
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlueCloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlueShapeBlue
93 views15 slides

Recently uploaded(20)

Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha... by ShapeBlue
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...
ShapeBlue138 views
Data Integrity for Banking and Financial Services by Precisely
Data Integrity for Banking and Financial ServicesData Integrity for Banking and Financial Services
Data Integrity for Banking and Financial Services
Precisely78 views
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ... by ShapeBlue
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...
ShapeBlue146 views
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue by ShapeBlue
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlueCloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue
ShapeBlue93 views
NTGapps NTG LowCode Platform by Mustafa Kuğu
NTGapps NTG LowCode Platform NTGapps NTG LowCode Platform
NTGapps NTG LowCode Platform
Mustafa Kuğu365 views
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or... by ShapeBlue
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
ShapeBlue158 views
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit... by ShapeBlue
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...
ShapeBlue117 views
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue by ShapeBlue
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue
ShapeBlue103 views
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N... by James Anderson
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
James Anderson156 views
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT by ShapeBlue
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBITUpdates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT
ShapeBlue166 views
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava... by ShapeBlue
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...
ShapeBlue101 views
Confidence in CloudStack - Aron Wagner, Nathan Gleason - Americ by ShapeBlue
Confidence in CloudStack - Aron Wagner, Nathan Gleason - AmericConfidence in CloudStack - Aron Wagner, Nathan Gleason - Americ
Confidence in CloudStack - Aron Wagner, Nathan Gleason - Americ
ShapeBlue88 views
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ... by ShapeBlue
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...
ShapeBlue85 views
The Role of Patterns in the Era of Large Language Models by Yunyao Li
The Role of Patterns in the Era of Large Language ModelsThe Role of Patterns in the Era of Large Language Models
The Role of Patterns in the Era of Large Language Models
Yunyao Li80 views
Extending KVM Host HA for Non-NFS Storage - Alex Ivanov - StorPool by ShapeBlue
Extending KVM Host HA for Non-NFS Storage -  Alex Ivanov - StorPoolExtending KVM Host HA for Non-NFS Storage -  Alex Ivanov - StorPool
Extending KVM Host HA for Non-NFS Storage - Alex Ivanov - StorPool
ShapeBlue84 views
Igniting Next Level Productivity with AI-Infused Data Integration Workflows by Safe Software
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Safe Software385 views

Smartphone Privacy and Security, at Poptech 2013

  • 1. In the near future, our smartphones will know everything about us
  • 3. Fun Facts about Millennials 83% sleep with phones
  • 4. Fun Facts about Millennials 83% sleep with phones 90% check first thing
  • 5. Fun Facts about Millennials 83% sleep with phones 90% check first thing 1 in 3 use in bathroom
  • 6. In the near future, our smartphones will know everything about us
  • 7. What about privacy? What is being collected? Where is it sent? How is it used?
  • 8. Failing to address privacy and security could blunt adoption of amazing technologies with huge societal benefits
  • 9. Location Data Unique device ID Location Data Network Access Unique device ID Location Data Unique device ID
  • 10. Privacy as Expectations User Expectations (What people think the app does) App Behavior (What the app actually does)
  • 11. Privacy as Expectations User Expectations (What people think the app does) App Behavior (What the app actually does)
  • 12. 95% users were surprised this app sent their approximate location to mobile ads providers. 85% users sent their mobile ad 95% users were surprised this app 95% users were surprised this app sent their approximate location sent their phone’s unique ID to to mobile ads providers. mobile ads providers. 85% users 25% sent their mobile ad dictionary words. 25% users sent their 10% users dictionary wrote con words. 95% users were surprised this app 90% users were surprised this app sent their phone’s unique ID sent their precise location to to mobile ads providers. mobile ads providers. 90% users were surprised this app 0% users were surprised this app sent their precise location to can control camera flashlight. mobile ads providers. 0% users 10% users could con wrote con
  • 13. 95% users were surprised this app sent their approximate location to mobile ads providers. 85% users sent their mobile ad 85% users 25% sent their mobile ad dictionary words. 25% Advertising and other users 95% users were surprised this app sent their 90% users were surprised this app 10% users dictionary sent their phone’s unique to to sent their precise behaviors usually ok, location ID wrote con words. mobile ads providers. mobile ads providers. 95% users were surprised this app 95% users were surprised this app sent their approximate location sent their phone’s unique ID to to mobile ads providers. mobile ads providers. if people know 90% users were surprised this app 0% users were surprised this app sent their precise location to can control camera flashlight. mobile ads providers. 0% users 10% users could con wrote con
  • 14. How can we help developers create secure and privacy-sensitive apps?
  • 15. How can we work with public policy makers to create better guidelines around privacy?
  • 17. How can we create a connected world we would want to live in? Computer Human Interaction: Mobility Privacy Security

Editor's Notes

  1. Jason Hong / jasonh@cs.cmu.eduI’m a computer scientist, and I’ve been working with sensor-based systems for 15 yearsMyclaim: in the near future, smartphones will know everything about usOur Smartphones will know if we are depressed or not / what our carbon footprint is / what our information needs are before we even know what we needImages fromhttp://www.androidtapp.com/how-simple-is-your-smartphone-to-use-funny-videos/http://www.sfgate.com/crime/article/Absorbed-device-users-oblivious-to-danger-4876709.php#photo-5278749http://www.reneweduponadream.com/2012/09/business-without-smartphone-dont-let-it.html
  2. I make this claim for three reasons1. Over 1B smartphones and rapidly growing, impressive since smartphones only came out in 20072. Our smartphones already have incredible capabilities… they know who we know (contact list and social networking apps), where we go (GPS, cell tower, WiFi), and to a weak extent what we do (sensors and apps)3. Smartphones are highly intimate, perhaps the most intimate devices we’ve created
  3. From Pew Internet
  4. From Cisco report
  5. Also from Cisco report
  6. If we push all three of these trends to their logical conclusion, we come back to my claim, that in the near future, our smartphones will know everything about usIn many ways, this will be a good thing. Our smartphones will be able to help us with healthcare, education, transportation, urban planning, and morehttp://www.androidtapp.com/how-simple-is-your-smartphone-to-use-funny-videos/http://www.sfgate.com/crime/article/Absorbed-device-users-oblivious-to-danger-4876709.php#photo-5278749http://www.reneweduponadream.com/2012/09/business-without-smartphone-dont-let-it.html
  7. But what about privacy?
  8. This is the main philosophy behind my research group
  9. Privacy concerns aren’t just hypothetical risks either. There are many apps with unusual behaviors.Brightest Flashlighthttps://play.google.com/store/apps/details?id=goldenshorestechnologies.brightestflashlight.freeBible apphttps://play.google.com/store/apps/details?id=com.sirma.mobile.bible.android
  10. One project we have been doing is to analyze the behavior of these apps and using crowdsourcing techniques to pinpoint and convey unusual behaviors. For example, most people don’t expect Angry Birds (Android) to use location data, but in reality it does. Given the big gap in expectations and reality, we consider this a privacy problem.
  11. In contrast, most people do expect Google Maps to use location data, and so we consider this less of a privacy problem.
  12. Here is an example summary of our work, showing the level of surprise that other people had.
  13. Interestingly, we found that people actually usually ok with a lot of data sharing if told what used for
  14. But end-users are only part of the picture. Need to help developers.Right now, developers have few tools and little guidance to help them.http://design.cmu.edu/sites/default/files/users/user10/undergrad-junior-studio.jpg
  15. Same with public policy makers. Little guidance for themhttp://readwrite.com/2013/04/18/ftc-ready-to-move-if-carriers-ignore-android-security
  16. But I also want to emphasize that these issues with privacy and security aren’t just with smartphones. Ubiquitous computing is happening. Computation, communication, sensing increasingly embedded in our everyday lives.Can help society in so many ways, but only if we can address these challenges of privacy and security.
  17. Close with one last questionJason Hong / jasonh@cs.cmu.edu