THE (IN)SECURITY OF
THINGS
Privacy and security considerations of IoT and wearables
CSERTÁN ÁKOS, I&I MEETUP, BUDAPEST 2015
HELLO!
+ I’m a psychologist
+ No, I don’t know what you are
thinking about right now
+ I’m a UX Designer
+ All my pictures look awful
”COMPLETE DAILY CHALLANGES”
”SEE HOW MANY EGGS
YOU’VE GOT”
”STAY CONNECTED
WITH LAUNDRY
CHORES”
”MONITOR YOUR
PROPANE
SUPPLY”
”EAT SLOWLY”
YOU SHARE A LOOOOOT OF DATA
YOU SHARE A LOOOOOT OF DATA
DATA IS VALUABLE
REMEMBER TARGET, RIGHT?
AND SOMETIMES REALLY CREEPY
THE CURLY FRIES CONUNDRUM, ANYONE?
IT’S THE NATURE OF THINGS
+ Check and set temperature + Check and set temperature
+ What devices are on the network?
+ How many people live there?
+ Is anyone home?
TRUSTING THE WRONG DEVICE…
+ 8 bit
+ $5 to buy
+ $1 to embed
+ 32 bit
+ $35 to buy
+ may be cheaper to embed
…MADE BY THE WRONG PEOPLE…
+ Small groups of startuppers…
+ …with no security background or money for
consultancy…
+ …with a huge time-to-market pressure
…WITH THE WRONG DATA
PRIVACY AND SECURITY IS PART OF
THE PRODUCT
+ Security trade-off for usability – NO SUCH THING
+ Technological security =/= Perception of security
+ Privacy vs Usability – FAKE DICHOTOMY
+ Privacy vs Feature development – IT’S CALLED FRAUD, MAN!
DATA PROPORTIONALITY
PRIVACY BY DESIGN
A.K.A. A WAY TO STAY OUT OF THE NEWS
PROACTIVE NOT REACTIVE
+ Anticipate privacy invasive events
+ Specify the goals for your data collection BEFORE you collect
+ Minimize data collection, find low-data alternatives
PRIVACY AS THE DEFAULT
+ Defaults rule by default
+ Informed consent should be really informed real consent
+ No action required to secure privacy
EMBEDDED PRIVACY
+ Part of the products strategy
+ Part of the design
+ Part of the architecture
POSITIVE-SUM
+ No trade-offs necessary
+ ”Full functionality” includes security and privacy barriers
END-TO-END SECURITY
+ Strong security measures are the basis of privacy
+ Security is not just secure storage but secure destruction of data, too
VISIBILITY AND TRANSPARENCY
+ ToS is neither transparent, nor visible
+ Trust, but verify
USER-CENTRIC
+ …or you can also do it just for the money, but, you know. Don’t.
?
!
@csertanakos
.

The (in)security of things

Editor's Notes

  • #9 http://www.pnas.org/content/110/15/5802.full?sid=5284c068-bd43-4031-ac6e-792f6f8a6c99
  • #11 http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/
  • #13 http://www.autoblog.com/2015/02/09/can-darpa-hack-into-a-chevy-impala-through-onstar/