Violating Your Privacy is NOT an Oopsies - It's Premeditated and Systematic
Graphic from teachprivacy.com

Violating Your Privacy is NOT an Oopsies - It's Premeditated and Systematic

I’m just re-stating the obvious. But I think it’s worth re-stating because most of you are not cyber security researchers by day and may not remember the many reported examples of security and privacy violations over the years. 

Let me paint you a picture, starting with the smart devices we willingly invited into our homes in recent years -- Amazon Alexa, Google Home, and Apple HomePod with Siri. Indeed it is convenient to be able to ask “Alexa, what’s the weather today?” in the mornings, or “OK, Google, how many feet in a mile?” But are these cool, little conveniences worth the privacy tradeoffs? Oh, you didn’t know these smart assistants were constantly sending data to the cloud, in addition to listening to you all the time? Of course, these devices have to send some data to the cloud in order to return responses, but that should happen only after you activate it with your hot word. And all of that assumes the devices are working properly, and not hacked. 

Further reading: 


Assuming you’re comfortable with Amazon, Google, and Apple listening to you in your home all the time, let’s take a look at other devices you may have brought into your home -- connected security cameras, speakers, light bulbs, refrigerators, televisions, photo frames, microwave ovens, bathroom scales, toothbrushes (yeah, there are connected toothbrushes), etc. -- collectively known as the Internet of Things (IoT). Are they all honoring your privacy? Or are they collecting and sending data about you to the cloud, or worse, to servers in foreign countries? How would you even know?

Well, now we know, through some documented examples of privacy faux pas. Within the last week, we saw Xiaomi home security cameras “accidentally” sending video feeds to strangers’ Nest Hubs. They called it a “bug” -- oopsies! Perhaps Vizio and Samsung smart TVs listening to your conversations were not oopsies; those were features! Further, we’ve seen repeated, documented examples of Ring camera hacks, where hackers gained access to video feeds inside and outside the home and in one-case, the hacker told an 8-yr old girl he was Santa Claus. Smart lightbulbs have been shown to leak Wi-Fi passwords and smart plugs have been documented being used as a jumping off point for hackers to get into your home or office networks. These security issues are not new at all. Everyone has heard of the examples of hacking home networks via connected printers, which have been around a lot longer than IoT devices. 

Further reading:


Are you still comfortable that a wide variety of IoT devices have been documented to have security “flaws?” What if I showed you some more examples of low-cost Android devices coming with pre-installed malware, bloatware, adware, or worse. 

Note that malware or adware that is pre-installed by the manufacturer cannot be uninstalled; also, it may not be detected by anti-malware software, and it basically has administrative access to everything on your device. Do you still think these are “flaws” or “bugs” and do you believe the manufacturers of these devices when they claim “oopsies, we didn’t know?”

Consider the following graphic, that shows you what your devices “know” about you -- including passwords, credit card numbers, social security numbers, etc. 

No alt text provided for this image


What about the mobile apps that you voluntarily downloaded and installed on your own smartphone. And gave them a whole bunch of permissions. Of course, Instagram needs you to give it permission to record video and audio; but is there any reason that superbright flashlight app needs to turn on and off microphone, send and receive SMS, read and write to device storage, prevent the device from sleeping, and connect and disconnect to networks? Probably not. 

Further reading:


What about apps tracking your geolocation? You may not care if some company or many companies are tracking your location and selling that data. But what if your precise location was being constantly “leaked” so a stalker could know when you are home, or at the library, or walking home alone? And have you considered the broader implications of fitness tracking apps “accidentally” revealing the locations of secret military bases? The U.S. government seems to think this is important. In early 2019, the U.S. forced a Chinese company to divest a mobile app, citing “Chinese ownership of gay dating app Grindr is a national security risk.” In early 2020, both the U.S. Navy and the U.S. Army banned the popular app TikTok from all military devices over spying and privacy concerns. 

Further reading: 


Let’s bring this full circle, and think about why you should care. You may be OK with Amazon, Google, and Apple listening in on all your dinner table conversations at home; because you can ask about the weather, with your voice. You may also be OK with your microwave and light bulbs being constantly connected to the Internet; because you can remotely check if you accidentally left them on. 

But are you OK with connected security cameras that hackers can use to peer into your bedroom, or your child’s bedroom? (Of course, those were “oopsies” by the device manufacturers.) Are you still OK with low-cost Android phones that have adware and malware pre-installed to continuously collect and send data back to the cloud? Or mobile apps that do the same? Perhaps you are still OK with everything so far -- I’ve literally heard this from many young people (who are constantly on Instagram, Snapchat, and now TikTok) -- they are cool with being tracked because they have “nothing to hide.” 

Perhaps I am just scaring myself, because I’ve seen too much as a security researcher. Perhaps I shouldn’t be concerned that connected devices can be leveraged to gain access to networks that would have otherwise been secure. Perhaps I should not be afraid of the possibility of real-world loss of life when connected street lights are remotely controlled to all turn green at the same time or connected cars are remotely controlled to brake suddenly or accelerate. 

Perhaps I should be OK with all of that. Are you OK with all these?

Further reading: 

?

Here are some of the ways I protect myself from "surveillance marketing"

https://www.linuxjournal.com/content/wizard-kit-how-i-protect-myself-surveillance

Jebb Lewis

Engaging with digital disruptors and the digitally disrupted.

5 年

Dr. Augustine Fou - Ad Fraud Investigator, another great article. ?Thank you. ?I would like to just add that it is not just "low-cost Android devices coming with pre-installed malware, bloatware, adware, or worse." ?Samsung Phones come with a storage scanner made by a Chinese data-mining/antivirus company called Qihoo 360. It comes pre-installed on all Samsung phones and tablets, it communicates with Chinese servers, and you CANNOT REMOVE it! https://www.reddit.com/r/Android/comments/ektg8u/chinese_spyware_preinstalled_on_all_samsung Redmorph Max can block it from getting internet access, thus disabling its capability to spy on you.

回复
Tedd Speck

MSN Student, Johns Hopkins

5 年

The issue is trust and consumer control of their own data.? A blockchain-based relationship between consumers and verified, trusted services seems the answer.? I expect it will happen over the next 5 or so years.? But not until there is a major disaster waking up consumers to the issue and businesses and marketers to their responsibility/culpability.? I don't know what that disaster would look like.? It's easy to make a short list of countries from which it would most likely come.

回复
Akhilesh Shukla

Senior Frontend Developer at Pink Triangle Press

5 年

Wow.. Never thought this way..

Pushkar Mishra

Supporting App Growth Through The Entire User Journey | Founder at One Engine Media Works

5 年

Whole reality of IOT summarised perfectly, Dr. Fou

Abhinav Bangia

Founder & CEO at Com Olho | Crowdsourced security that never sleeps

5 年

Very well written!

要查看或添加评论,请登录

Dr. Augustine Fou的更多文章

社区洞察

其他会员也浏览了