SlideShare a Scribd company logo
In the near future, our
smartphones will know

everything

about us
Fun Facts about Millennials

83% sleep with phones
Fun Facts about Millennials

83% sleep with phones
90% check first thing
Fun Facts about Millennials

83% sleep with phones
90% check first thing
1 in 3 use in bathroom
In the near future, our
smartphones will know

everything

about us
What about

privacy?

What is being collected?
Where is it sent?
How is it used?
Failing to address privacy
and security could blunt
adoption of amazing
technologies with huge
societal benefits
Location Data
Unique device ID
Location Data
Network Access
Unique device ID
Location Data
Unique device ID
Privacy as Expectations
User Expectations
(What people think
the app does)

App Behavior
(What the app
actually does)
Privacy as Expectations
User Expectations
(What people think
the app does)

App Behavior
(What the app
actually does)
95% users were surprised this app
sent their approximate location
to mobile ads providers.

85% users
sent their
mobile ad

95% users were surprised this app
95% users were surprised this app
sent their approximate location
sent their phone’s unique ID to
to mobile ads providers.
mobile ads providers.

85% users
25%
sent their
mobile ad
dictionary
words.
25% users
sent their
10% users
dictionary
wrote con
words.

95% users were surprised this app
90% users were surprised this app
sent their phone’s unique ID
sent their precise location to to
mobile ads providers.
mobile ads providers.
90% users were surprised this app
0% users were surprised this app
sent their precise location to
can control camera flashlight.
mobile ads providers.

0% users
10% users
could con
wrote con
95% users were surprised this app
sent their approximate location
to mobile ads providers.

85% users
sent their
mobile ad

85% users
25%
sent their
mobile ad
dictionary
words.
25%
Advertising and other users
95% users were surprised this app
sent their
90% users were surprised this app
10% users
dictionary
sent their phone’s unique to to
sent their precise behaviors usually ok,
location ID
wrote con
words.
mobile ads providers.
mobile ads providers.

95% users were surprised this app
95% users were surprised this app
sent their approximate location
sent their phone’s unique ID to
to mobile ads providers.
mobile ads providers.

if people know

90% users were surprised this app
0% users were surprised this app
sent their precise location to
can control camera flashlight.
mobile ads providers.

0% users
10% users
could con
wrote con
How can we help
developers create
secure and
privacy-sensitive apps?
How can we work with
public policy makers
to create better
guidelines
around privacy?
How can we create
a connected world we
would want to live in?
Computer
Human
Interaction:
Mobility
Privacy
Security
Smartphone Privacy and Security, at Poptech 2013

More Related Content

What's hot

The App Attention Span
The App Attention Span The App Attention Span
The App Attention Span AppDynamics
 
Thuraya SatSleeve - Transform your smartphone into a satellite phone
Thuraya SatSleeve - Transform your smartphone into a satellite phoneThuraya SatSleeve - Transform your smartphone into a satellite phone
Thuraya SatSleeve - Transform your smartphone into a satellite phone
Cygnus Telecom
 
IktissadEvents Mobile App
IktissadEvents Mobile AppIktissadEvents Mobile App
IktissadEvents Mobile App
Al-Iktissad Wal-Aamal
 
How To Setup Thuraya SatSleeve - User Guide
How To Setup Thuraya SatSleeve - User GuideHow To Setup Thuraya SatSleeve - User Guide
How To Setup Thuraya SatSleeve - User Guide
Cygnus Telecom
 
First Due - Mobile Responder
First Due - Mobile ResponderFirst Due - Mobile Responder
First Due - Mobile Responder
First Due
 
Mobile app presentation
Mobile app presentationMobile app presentation
Mobile app presentationberklibrary
 
Lee Carrotte - SecondSync
Lee Carrotte - SecondSyncLee Carrotte - SecondSync
Lee Carrotte - SecondSync
MediaCom Edinburgh
 

What's hot (7)

The App Attention Span
The App Attention Span The App Attention Span
The App Attention Span
 
Thuraya SatSleeve - Transform your smartphone into a satellite phone
Thuraya SatSleeve - Transform your smartphone into a satellite phoneThuraya SatSleeve - Transform your smartphone into a satellite phone
Thuraya SatSleeve - Transform your smartphone into a satellite phone
 
IktissadEvents Mobile App
IktissadEvents Mobile AppIktissadEvents Mobile App
IktissadEvents Mobile App
 
How To Setup Thuraya SatSleeve - User Guide
How To Setup Thuraya SatSleeve - User GuideHow To Setup Thuraya SatSleeve - User Guide
How To Setup Thuraya SatSleeve - User Guide
 
First Due - Mobile Responder
First Due - Mobile ResponderFirst Due - Mobile Responder
First Due - Mobile Responder
 
Mobile app presentation
Mobile app presentationMobile app presentation
Mobile app presentation
 
Lee Carrotte - SecondSync
Lee Carrotte - SecondSyncLee Carrotte - SecondSync
Lee Carrotte - SecondSync
 

Similar to Smartphone Privacy and Security, at Poptech 2013

Mobile vs Social by Bart Fussel on Social Strategy Summit 2014
Mobile vs Social by Bart Fussel on Social Strategy Summit 2014Mobile vs Social by Bart Fussel on Social Strategy Summit 2014
Mobile vs Social by Bart Fussel on Social Strategy Summit 2014
aFrogleap
 
The Mobile of Everything
The Mobile of EverythingThe Mobile of Everything
The Mobile of Everything
ZenithOptimedia
 
Mobile Marketing Mix
Mobile Marketing MixMobile Marketing Mix
Mobile Marketing Mix
mattpiette
 
Mobile is Knowledge: How travel and tourism sectors can utilise mobile
Mobile is Knowledge: How travel and tourism sectors can utilise mobileMobile is Knowledge: How travel and tourism sectors can utilise mobile
Mobile is Knowledge: How travel and tourism sectors can utilise mobile
mobilesquared Ltd
 
How Trinity Mobile Apps can increase your business
How Trinity Mobile Apps can increase your businessHow Trinity Mobile Apps can increase your business
How Trinity Mobile Apps can increase your business
Raion Seishin
 
Top 5 Mobile Trends to Watch in 2014
Top 5 Mobile Trends to Watch in 2014Top 5 Mobile Trends to Watch in 2014
Top 5 Mobile Trends to Watch in 2014
Paperlit
 
E contact
E contactE contact
E contact
Vipul Dua
 
Masterclass: Bobbie Gersbach-Smith's (M&C Saatchi Mobile) presentation at Mum...
Masterclass: Bobbie Gersbach-Smith's (M&C Saatchi Mobile) presentation at Mum...Masterclass: Bobbie Gersbach-Smith's (M&C Saatchi Mobile) presentation at Mum...
Masterclass: Bobbie Gersbach-Smith's (M&C Saatchi Mobile) presentation at Mum...
Ruperta Daher
 
EFASHION- designing mobile shopping & fashion experiences on 
mobile that ins...
EFASHION- designing mobile shopping & fashion experiences on 
mobile that ins...EFASHION- designing mobile shopping & fashion experiences on 
mobile that ins...
EFASHION- designing mobile shopping & fashion experiences on 
mobile that ins...
The Valley
 
Mobile Marketing Presentation
Mobile Marketing PresentationMobile Marketing Presentation
Mobile Marketing Presentation
Craig Daitch
 
Top App Ideas For Startups To Launch In 2023.pdf
Top App Ideas For Startups To Launch In 2023.pdfTop App Ideas For Startups To Launch In 2023.pdf
Top App Ideas For Startups To Launch In 2023.pdf
Marie Weaver
 
COMM 303-50 Final Project
COMM 303-50 Final ProjectCOMM 303-50 Final Project
COMM 303-50 Final ProjectAshley Goodlett
 
An insider's look into Mobile payments nyc 2015 07
An insider's look into Mobile payments nyc 2015 07An insider's look into Mobile payments nyc 2015 07
An insider's look into Mobile payments nyc 2015 07Globant
 
Chad Gallagher of Advertising.com - Mobile Myth Busters at SIC2013
Chad Gallagher of Advertising.com - Mobile Myth Busters at SIC2013Chad Gallagher of Advertising.com - Mobile Myth Busters at SIC2013
Chad Gallagher of Advertising.com - Mobile Myth Busters at SIC2013
Seattle Interactive Conference
 
Stay on Top of Today’s and Tomorrow’s Mobile App Trends
Stay on Top of Today’s and Tomorrow’s Mobile App TrendsStay on Top of Today’s and Tomorrow’s Mobile App Trends
Stay on Top of Today’s and Tomorrow’s Mobile App Trends
Info-Tech Research Group
 
Everything you wanted to know about mobile commerce (and mobile retail), but ...
Everything you wanted to know about mobile commerce (and mobile retail), but ...Everything you wanted to know about mobile commerce (and mobile retail), but ...
Everything you wanted to know about mobile commerce (and mobile retail), but ...
mobilesquared Ltd
 
Consumer Mobile Policy & Security - Lightspeed & Kantar
Consumer Mobile Policy & Security - Lightspeed & KantarConsumer Mobile Policy & Security - Lightspeed & Kantar
Consumer Mobile Policy & Security - Lightspeed & Kantar
Merlien Institute
 
Mobile Trends Report 2014 for Travel industry
Mobile Trends Report 2014 for Travel industryMobile Trends Report 2014 for Travel industry
Mobile Trends Report 2014 for Travel industry
Collective Camp
 
Inventory to Audience
Inventory to AudienceInventory to Audience
Inventory to Audience
Narayan Murthy
 

Similar to Smartphone Privacy and Security, at Poptech 2013 (20)

Mobile vs Social by Bart Fussel on Social Strategy Summit 2014
Mobile vs Social by Bart Fussel on Social Strategy Summit 2014Mobile vs Social by Bart Fussel on Social Strategy Summit 2014
Mobile vs Social by Bart Fussel on Social Strategy Summit 2014
 
The Mobile of Everything
The Mobile of EverythingThe Mobile of Everything
The Mobile of Everything
 
Mobile Marketing Mix
Mobile Marketing MixMobile Marketing Mix
Mobile Marketing Mix
 
Mobile is Knowledge: How travel and tourism sectors can utilise mobile
Mobile is Knowledge: How travel and tourism sectors can utilise mobileMobile is Knowledge: How travel and tourism sectors can utilise mobile
Mobile is Knowledge: How travel and tourism sectors can utilise mobile
 
How Trinity Mobile Apps can increase your business
How Trinity Mobile Apps can increase your businessHow Trinity Mobile Apps can increase your business
How Trinity Mobile Apps can increase your business
 
Top 5 Mobile Trends to Watch in 2014
Top 5 Mobile Trends to Watch in 2014Top 5 Mobile Trends to Watch in 2014
Top 5 Mobile Trends to Watch in 2014
 
E contact
E contactE contact
E contact
 
Masterclass: Bobbie Gersbach-Smith's (M&C Saatchi Mobile) presentation at Mum...
Masterclass: Bobbie Gersbach-Smith's (M&C Saatchi Mobile) presentation at Mum...Masterclass: Bobbie Gersbach-Smith's (M&C Saatchi Mobile) presentation at Mum...
Masterclass: Bobbie Gersbach-Smith's (M&C Saatchi Mobile) presentation at Mum...
 
EFASHION- designing mobile shopping & fashion experiences on 
mobile that ins...
EFASHION- designing mobile shopping & fashion experiences on 
mobile that ins...EFASHION- designing mobile shopping & fashion experiences on 
mobile that ins...
EFASHION- designing mobile shopping & fashion experiences on 
mobile that ins...
 
Mobile Marketing Presentation
Mobile Marketing PresentationMobile Marketing Presentation
Mobile Marketing Presentation
 
Top App Ideas For Startups To Launch In 2023.pdf
Top App Ideas For Startups To Launch In 2023.pdfTop App Ideas For Startups To Launch In 2023.pdf
Top App Ideas For Startups To Launch In 2023.pdf
 
COMM 303-50 Final Project
COMM 303-50 Final ProjectCOMM 303-50 Final Project
COMM 303-50 Final Project
 
An insider's look into Mobile payments nyc 2015 07
An insider's look into Mobile payments nyc 2015 07An insider's look into Mobile payments nyc 2015 07
An insider's look into Mobile payments nyc 2015 07
 
Chad Gallagher of Advertising.com - Mobile Myth Busters at SIC2013
Chad Gallagher of Advertising.com - Mobile Myth Busters at SIC2013Chad Gallagher of Advertising.com - Mobile Myth Busters at SIC2013
Chad Gallagher of Advertising.com - Mobile Myth Busters at SIC2013
 
Stay on Top of Today’s and Tomorrow’s Mobile App Trends
Stay on Top of Today’s and Tomorrow’s Mobile App TrendsStay on Top of Today’s and Tomorrow’s Mobile App Trends
Stay on Top of Today’s and Tomorrow’s Mobile App Trends
 
Everything you wanted to know about mobile commerce (and mobile retail), but ...
Everything you wanted to know about mobile commerce (and mobile retail), but ...Everything you wanted to know about mobile commerce (and mobile retail), but ...
Everything you wanted to know about mobile commerce (and mobile retail), but ...
 
Consumer Mobile Policy & Security - Lightspeed & Kantar
Consumer Mobile Policy & Security - Lightspeed & KantarConsumer Mobile Policy & Security - Lightspeed & Kantar
Consumer Mobile Policy & Security - Lightspeed & Kantar
 
Mobile Trends Report 2014 for Travel industry
Mobile Trends Report 2014 for Travel industryMobile Trends Report 2014 for Travel industry
Mobile Trends Report 2014 for Travel industry
 
Inventory to Audience
Inventory to AudienceInventory to Audience
Inventory to Audience
 
Inventory to Audience
Inventory to AudienceInventory to Audience
Inventory to Audience
 

Recently uploaded

Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 

Recently uploaded (20)

Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 

Smartphone Privacy and Security, at Poptech 2013

  • 1. In the near future, our smartphones will know everything about us
  • 2.
  • 3. Fun Facts about Millennials 83% sleep with phones
  • 4. Fun Facts about Millennials 83% sleep with phones 90% check first thing
  • 5. Fun Facts about Millennials 83% sleep with phones 90% check first thing 1 in 3 use in bathroom
  • 6. In the near future, our smartphones will know everything about us
  • 7. What about privacy? What is being collected? Where is it sent? How is it used?
  • 8. Failing to address privacy and security could blunt adoption of amazing technologies with huge societal benefits
  • 9. Location Data Unique device ID Location Data Network Access Unique device ID Location Data Unique device ID
  • 10. Privacy as Expectations User Expectations (What people think the app does) App Behavior (What the app actually does)
  • 11. Privacy as Expectations User Expectations (What people think the app does) App Behavior (What the app actually does)
  • 12. 95% users were surprised this app sent their approximate location to mobile ads providers. 85% users sent their mobile ad 95% users were surprised this app 95% users were surprised this app sent their approximate location sent their phone’s unique ID to to mobile ads providers. mobile ads providers. 85% users 25% sent their mobile ad dictionary words. 25% users sent their 10% users dictionary wrote con words. 95% users were surprised this app 90% users were surprised this app sent their phone’s unique ID sent their precise location to to mobile ads providers. mobile ads providers. 90% users were surprised this app 0% users were surprised this app sent their precise location to can control camera flashlight. mobile ads providers. 0% users 10% users could con wrote con
  • 13. 95% users were surprised this app sent their approximate location to mobile ads providers. 85% users sent their mobile ad 85% users 25% sent their mobile ad dictionary words. 25% Advertising and other users 95% users were surprised this app sent their 90% users were surprised this app 10% users dictionary sent their phone’s unique to to sent their precise behaviors usually ok, location ID wrote con words. mobile ads providers. mobile ads providers. 95% users were surprised this app 95% users were surprised this app sent their approximate location sent their phone’s unique ID to to mobile ads providers. mobile ads providers. if people know 90% users were surprised this app 0% users were surprised this app sent their precise location to can control camera flashlight. mobile ads providers. 0% users 10% users could con wrote con
  • 14. How can we help developers create secure and privacy-sensitive apps?
  • 15. How can we work with public policy makers to create better guidelines around privacy?
  • 16.
  • 17. How can we create a connected world we would want to live in? Computer Human Interaction: Mobility Privacy Security

Editor's Notes

  1. Jason Hong / jasonh@cs.cmu.eduI’m a computer scientist, and I’ve been working with sensor-based systems for 15 yearsMyclaim: in the near future, smartphones will know everything about usOur Smartphones will know if we are depressed or not / what our carbon footprint is / what our information needs are before we even know what we needImages fromhttp://www.androidtapp.com/how-simple-is-your-smartphone-to-use-funny-videos/http://www.sfgate.com/crime/article/Absorbed-device-users-oblivious-to-danger-4876709.php#photo-5278749http://www.reneweduponadream.com/2012/09/business-without-smartphone-dont-let-it.html
  2. I make this claim for three reasons1. Over 1B smartphones and rapidly growing, impressive since smartphones only came out in 20072. Our smartphones already have incredible capabilities… they know who we know (contact list and social networking apps), where we go (GPS, cell tower, WiFi), and to a weak extent what we do (sensors and apps)3. Smartphones are highly intimate, perhaps the most intimate devices we’ve created
  3. From Pew Internet
  4. From Cisco report
  5. Also from Cisco report
  6. If we push all three of these trends to their logical conclusion, we come back to my claim, that in the near future, our smartphones will know everything about usIn many ways, this will be a good thing. Our smartphones will be able to help us with healthcare, education, transportation, urban planning, and morehttp://www.androidtapp.com/how-simple-is-your-smartphone-to-use-funny-videos/http://www.sfgate.com/crime/article/Absorbed-device-users-oblivious-to-danger-4876709.php#photo-5278749http://www.reneweduponadream.com/2012/09/business-without-smartphone-dont-let-it.html
  7. But what about privacy?
  8. This is the main philosophy behind my research group
  9. Privacy concerns aren’t just hypothetical risks either. There are many apps with unusual behaviors.Brightest Flashlighthttps://play.google.com/store/apps/details?id=goldenshorestechnologies.brightestflashlight.freeBible apphttps://play.google.com/store/apps/details?id=com.sirma.mobile.bible.android
  10. One project we have been doing is to analyze the behavior of these apps and using crowdsourcing techniques to pinpoint and convey unusual behaviors. For example, most people don’t expect Angry Birds (Android) to use location data, but in reality it does. Given the big gap in expectations and reality, we consider this a privacy problem.
  11. In contrast, most people do expect Google Maps to use location data, and so we consider this less of a privacy problem.
  12. Here is an example summary of our work, showing the level of surprise that other people had.
  13. Interestingly, we found that people actually usually ok with a lot of data sharing if told what used for
  14. But end-users are only part of the picture. Need to help developers.Right now, developers have few tools and little guidance to help them.http://design.cmu.edu/sites/default/files/users/user10/undergrad-junior-studio.jpg
  15. Same with public policy makers. Little guidance for themhttp://readwrite.com/2013/04/18/ftc-ready-to-move-if-carriers-ignore-android-security
  16. But I also want to emphasize that these issues with privacy and security aren’t just with smartphones. Ubiquitous computing is happening. Computation, communication, sensing increasingly embedded in our everyday lives.Can help society in so many ways, but only if we can address these challenges of privacy and security.
  17. Close with one last questionJason Hong / jasonh@cs.cmu.edu