SlideShare a Scribd company logo
1 of 12
Download to read offline
COLLECTED, BUNDLED,
AND SOLD:
YOUR SENSITIVE
PRIVATE DATA
2Entefy Collected, bundled, and sold: your sensitive private data
These slides provide insight into apps,
web services, and devices designed
to go unnoticed as they capture your
sensitive personal data.
3Entefy Collected, bundled, and sold: your sensitive private data
This presentation was curated by
Entefy, the company building the first
universal communicator—an AI-powered
communication platform that helps you
seamlessly interact with the people,
services, and smart things in your life.
4Entefy Collected, bundled, and sold: your sensitive private data
“Always on” in-home assistants
like Alexa and Google Home
have the capacity to record
everything that happens
around them. What happens to
that data?
Source: https://www.wired.com/2016/12/alexa-and-google-record-your-voice/
5Entefy Collected, bundled, and sold: your sensitive private data
Uber was collecting user
location data for up to 5
minutes after rides
ended. The company later
reversed the policy.
Source: http://mashable.com/2016/12/05/uber-data-location/?utm_cid=mash-com-Tw-
main-link#YPVByoA1Waq8
Source: http://fortune.com/2017/08/29/uber-app-privacy-location-data/
6Entefy Collected, bundled, and sold: your sensitive private data
Wearable devices can be
hacked to spy on hand
motions and reveal
info like ATM PIN numbers.
Source: https://www.stevens.edu/sites/stevens_edu/files/StevensWearablesPaper.pdf
7Entefy Collected, bundled, and sold: your sensitive private data
A number of Internet-connected
toys were sending private data
like kids’ conversations to a
third-party server without
permission.
Source: https://thenextweb.com/security/2016/12/06/cute-spying-toys/
8Entefy Collected, bundled, and sold: your sensitive private data
Hackers offer lookalike apps
for download outside of
Google Play, embedding
malwarethat spreads
ransomware and steals data.
Source: https://blog.checkpoint.com/2016/11/30/1-million-google-ac-
counts-breached-gooligan/
9Entefy Collected, bundled, and sold: your sensitive private data
Headphones can be hacked
and turned into covert
listening devices.
Source: https://thenextweb.com/security/2016/11/22/israeli-researchers-prove-head-
phones-can-be-used-as-covert-listening-device/
10Entefy Collected, bundled, and sold: your sensitive private data
Shazam on a Mac would record
data from the microphone
afterthe app was closed. The
company later reversed this policy.
Source: http://thenewdaily.com.au/life/tech/2016/11/17/shazam-forced-back-app-re-
vealed-constantly-recording/
11Entefy Collected, bundled, and sold: your sensitive private data
The research in this presentation
comes from the Entefy article,
“Collected, bundled, and sold:
your sensitive private data.”
12Entefy Collected, bundled, and sold: your sensitive private data
Entefy’s universal communicator is an intelligent
communication platform that seamlessly connects the
people, services, conversations, contacts, files, apps,
smart devices, and smart things in your digital life.
contact@entefy.com
entefy.com
About Entefy
©2017 Entefy Inc. All rights reserved.

More Related Content

Similar to Collected, bundled, and sold: your sensitive private data

9 Alarming developments in the fight for digital privacy
9 Alarming developments in the fight for digital privacy9 Alarming developments in the fight for digital privacy
9 Alarming developments in the fight for digital privacyEntefy
 
Reading Geek Night 2019
Reading Geek Night 2019Reading Geek Night 2019
Reading Geek Night 2019Pawel Krawczyk
 
7 new assaults on data privacy
7 new assaults on data privacy7 new assaults on data privacy
7 new assaults on data privacyEntefy
 
Smart Speakers, Digital Assistants, AI, and Home Automation
Smart Speakers, Digital Assistants, AI, and Home AutomationSmart Speakers, Digital Assistants, AI, and Home Automation
Smart Speakers, Digital Assistants, AI, and Home Automationmsz
 
Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016
Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016
Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016Advanced monitoring
 
What's Next for Technology? Mansfield Senior Center 2014
What's Next for Technology? Mansfield Senior Center 2014What's Next for Technology? Mansfield Senior Center 2014
What's Next for Technology? Mansfield Senior Center 2014Steve Sokoloski
 
Marketplace Innovation report Q2 2015
Marketplace Innovation report Q2 2015Marketplace Innovation report Q2 2015
Marketplace Innovation report Q2 2015Endava
 
Dell jort kollerie
Dell jort kollerieDell jort kollerie
Dell jort kollerieBigDataExpo
 
Emerging web technologies2012
Emerging web technologies2012Emerging web technologies2012
Emerging web technologies2012bthat
 
Apple inc. and digital management
Apple inc. and digital managementApple inc. and digital management
Apple inc. and digital managementRishabh Raj
 
Безопасность данных мобильных приложений. Мифы и реальность.
Безопасность данных мобильных приложений. Мифы и реальность.Безопасность данных мобильных приложений. Мифы и реальность.
Безопасность данных мобильных приложений. Мифы и реальность.Advanced monitoring
 
11 social media marketing trends for 2011
11 social media marketing trends for 201111 social media marketing trends for 2011
11 social media marketing trends for 2011Tiphereth Gloria
 
Running head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxRunning head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxtodd581
 
Running head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxRunning head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxglendar3
 
The fundamentals of Android and iOS app security
The fundamentals of Android and iOS app securityThe fundamentals of Android and iOS app security
The fundamentals of Android and iOS app securityNowSecure
 

Similar to Collected, bundled, and sold: your sensitive private data (20)

9 Alarming developments in the fight for digital privacy
9 Alarming developments in the fight for digital privacy9 Alarming developments in the fight for digital privacy
9 Alarming developments in the fight for digital privacy
 
Reading Geek Night 2019
Reading Geek Night 2019Reading Geek Night 2019
Reading Geek Night 2019
 
NWSLTR_Volume7_Issue1
NWSLTR_Volume7_Issue1NWSLTR_Volume7_Issue1
NWSLTR_Volume7_Issue1
 
7 new assaults on data privacy
7 new assaults on data privacy7 new assaults on data privacy
7 new assaults on data privacy
 
Smart Speakers, Digital Assistants, AI, and Home Automation
Smart Speakers, Digital Assistants, AI, and Home AutomationSmart Speakers, Digital Assistants, AI, and Home Automation
Smart Speakers, Digital Assistants, AI, and Home Automation
 
Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016
Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016
Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016
 
Technology Trends to Watch
Technology Trends to WatchTechnology Trends to Watch
Technology Trends to Watch
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
What's Next for Technology? Mansfield Senior Center 2014
What's Next for Technology? Mansfield Senior Center 2014What's Next for Technology? Mansfield Senior Center 2014
What's Next for Technology? Mansfield Senior Center 2014
 
Augmented reality
Augmented realityAugmented reality
Augmented reality
 
Abusing mobilegames
Abusing mobilegamesAbusing mobilegames
Abusing mobilegames
 
Marketplace Innovation report Q2 2015
Marketplace Innovation report Q2 2015Marketplace Innovation report Q2 2015
Marketplace Innovation report Q2 2015
 
Dell jort kollerie
Dell jort kollerieDell jort kollerie
Dell jort kollerie
 
Emerging web technologies2012
Emerging web technologies2012Emerging web technologies2012
Emerging web technologies2012
 
Apple inc. and digital management
Apple inc. and digital managementApple inc. and digital management
Apple inc. and digital management
 
Безопасность данных мобильных приложений. Мифы и реальность.
Безопасность данных мобильных приложений. Мифы и реальность.Безопасность данных мобильных приложений. Мифы и реальность.
Безопасность данных мобильных приложений. Мифы и реальность.
 
11 social media marketing trends for 2011
11 social media marketing trends for 201111 social media marketing trends for 2011
11 social media marketing trends for 2011
 
Running head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxRunning head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docx
 
Running head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxRunning head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docx
 
The fundamentals of Android and iOS app security
The fundamentals of Android and iOS app securityThe fundamentals of Android and iOS app security
The fundamentals of Android and iOS app security
 

More from Entefy

10 Consequences of tech use and abuse
10 Consequences of tech use and abuse10 Consequences of tech use and abuse
10 Consequences of tech use and abuseEntefy
 
Digital security update: 10 cybersecurity and privacy threats
Digital security update: 10 cybersecurity and privacy threatsDigital security update: 10 cybersecurity and privacy threats
Digital security update: 10 cybersecurity and privacy threatsEntefy
 
12 Ways digital devices are affecting the brain
12 Ways digital devices are affecting the brain  12 Ways digital devices are affecting the brain
12 Ways digital devices are affecting the brain Entefy
 
11 Tech habits that are bad for your health
11 Tech habits that are bad for your health11 Tech habits that are bad for your health
11 Tech habits that are bad for your healthEntefy
 
AI’s disruptive impact in 10 industries
AI’s disruptive impact in 10 industriesAI’s disruptive impact in 10 industries
AI’s disruptive impact in 10 industriesEntefy
 
9 disruptive artificial intelligence technologies happening now
9 disruptive artificial intelligence technologies happening now9 disruptive artificial intelligence technologies happening now
9 disruptive artificial intelligence technologies happening nowEntefy
 
Data trackers are watching your every move [SLIDES]
Data trackers are watching your every move [SLIDES]Data trackers are watching your every move [SLIDES]
Data trackers are watching your every move [SLIDES]Entefy
 
23 proven ways to boost focus
23 proven ways to boost focus23 proven ways to boost focus
23 proven ways to boost focusEntefy
 
What would professional sports look like with AI referees and other smart tec...
What would professional sports look like with AI referees and other smart tec...What would professional sports look like with AI referees and other smart tec...
What would professional sports look like with AI referees and other smart tec...Entefy
 
Inattention: the brain’s complex relationship with social media by Entefy
 Inattention: the brain’s complex relationship with social media by Entefy Inattention: the brain’s complex relationship with social media by Entefy
Inattention: the brain’s complex relationship with social media by EntefyEntefy
 
Patients are about to see a new doctor: artificial intelligence by Entefy
Patients are about to see a new doctor: artificial intelligence by EntefyPatients are about to see a new doctor: artificial intelligence by Entefy
Patients are about to see a new doctor: artificial intelligence by EntefyEntefy
 
Old school no more: AI disrupts the classroom by Entefy
Old school no more: AI disrupts the classroom by EntefyOld school no more: AI disrupts the classroom by Entefy
Old school no more: AI disrupts the classroom by EntefyEntefy
 
Entefy's research report on information overload and digital complexity
Entefy's research report on information overload and digital complexityEntefy's research report on information overload and digital complexity
Entefy's research report on information overload and digital complexityEntefy
 

More from Entefy (13)

10 Consequences of tech use and abuse
10 Consequences of tech use and abuse10 Consequences of tech use and abuse
10 Consequences of tech use and abuse
 
Digital security update: 10 cybersecurity and privacy threats
Digital security update: 10 cybersecurity and privacy threatsDigital security update: 10 cybersecurity and privacy threats
Digital security update: 10 cybersecurity and privacy threats
 
12 Ways digital devices are affecting the brain
12 Ways digital devices are affecting the brain  12 Ways digital devices are affecting the brain
12 Ways digital devices are affecting the brain
 
11 Tech habits that are bad for your health
11 Tech habits that are bad for your health11 Tech habits that are bad for your health
11 Tech habits that are bad for your health
 
AI’s disruptive impact in 10 industries
AI’s disruptive impact in 10 industriesAI’s disruptive impact in 10 industries
AI’s disruptive impact in 10 industries
 
9 disruptive artificial intelligence technologies happening now
9 disruptive artificial intelligence technologies happening now9 disruptive artificial intelligence technologies happening now
9 disruptive artificial intelligence technologies happening now
 
Data trackers are watching your every move [SLIDES]
Data trackers are watching your every move [SLIDES]Data trackers are watching your every move [SLIDES]
Data trackers are watching your every move [SLIDES]
 
23 proven ways to boost focus
23 proven ways to boost focus23 proven ways to boost focus
23 proven ways to boost focus
 
What would professional sports look like with AI referees and other smart tec...
What would professional sports look like with AI referees and other smart tec...What would professional sports look like with AI referees and other smart tec...
What would professional sports look like with AI referees and other smart tec...
 
Inattention: the brain’s complex relationship with social media by Entefy
 Inattention: the brain’s complex relationship with social media by Entefy Inattention: the brain’s complex relationship with social media by Entefy
Inattention: the brain’s complex relationship with social media by Entefy
 
Patients are about to see a new doctor: artificial intelligence by Entefy
Patients are about to see a new doctor: artificial intelligence by EntefyPatients are about to see a new doctor: artificial intelligence by Entefy
Patients are about to see a new doctor: artificial intelligence by Entefy
 
Old school no more: AI disrupts the classroom by Entefy
Old school no more: AI disrupts the classroom by EntefyOld school no more: AI disrupts the classroom by Entefy
Old school no more: AI disrupts the classroom by Entefy
 
Entefy's research report on information overload and digital complexity
Entefy's research report on information overload and digital complexityEntefy's research report on information overload and digital complexity
Entefy's research report on information overload and digital complexity
 

Recently uploaded

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 

Recently uploaded (20)

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

Collected, bundled, and sold: your sensitive private data

  • 1. COLLECTED, BUNDLED, AND SOLD: YOUR SENSITIVE PRIVATE DATA
  • 2. 2Entefy Collected, bundled, and sold: your sensitive private data These slides provide insight into apps, web services, and devices designed to go unnoticed as they capture your sensitive personal data.
  • 3. 3Entefy Collected, bundled, and sold: your sensitive private data This presentation was curated by Entefy, the company building the first universal communicator—an AI-powered communication platform that helps you seamlessly interact with the people, services, and smart things in your life.
  • 4. 4Entefy Collected, bundled, and sold: your sensitive private data “Always on” in-home assistants like Alexa and Google Home have the capacity to record everything that happens around them. What happens to that data? Source: https://www.wired.com/2016/12/alexa-and-google-record-your-voice/
  • 5. 5Entefy Collected, bundled, and sold: your sensitive private data Uber was collecting user location data for up to 5 minutes after rides ended. The company later reversed the policy. Source: http://mashable.com/2016/12/05/uber-data-location/?utm_cid=mash-com-Tw- main-link#YPVByoA1Waq8 Source: http://fortune.com/2017/08/29/uber-app-privacy-location-data/
  • 6. 6Entefy Collected, bundled, and sold: your sensitive private data Wearable devices can be hacked to spy on hand motions and reveal info like ATM PIN numbers. Source: https://www.stevens.edu/sites/stevens_edu/files/StevensWearablesPaper.pdf
  • 7. 7Entefy Collected, bundled, and sold: your sensitive private data A number of Internet-connected toys were sending private data like kids’ conversations to a third-party server without permission. Source: https://thenextweb.com/security/2016/12/06/cute-spying-toys/
  • 8. 8Entefy Collected, bundled, and sold: your sensitive private data Hackers offer lookalike apps for download outside of Google Play, embedding malwarethat spreads ransomware and steals data. Source: https://blog.checkpoint.com/2016/11/30/1-million-google-ac- counts-breached-gooligan/
  • 9. 9Entefy Collected, bundled, and sold: your sensitive private data Headphones can be hacked and turned into covert listening devices. Source: https://thenextweb.com/security/2016/11/22/israeli-researchers-prove-head- phones-can-be-used-as-covert-listening-device/
  • 10. 10Entefy Collected, bundled, and sold: your sensitive private data Shazam on a Mac would record data from the microphone afterthe app was closed. The company later reversed this policy. Source: http://thenewdaily.com.au/life/tech/2016/11/17/shazam-forced-back-app-re- vealed-constantly-recording/
  • 11. 11Entefy Collected, bundled, and sold: your sensitive private data The research in this presentation comes from the Entefy article, “Collected, bundled, and sold: your sensitive private data.”
  • 12. 12Entefy Collected, bundled, and sold: your sensitive private data Entefy’s universal communicator is an intelligent communication platform that seamlessly connects the people, services, conversations, contacts, files, apps, smart devices, and smart things in your digital life. contact@entefy.com entefy.com About Entefy ©2017 Entefy Inc. All rights reserved.