Could privacy protection be the next commodity?

Hacker
The Internet of Things is open season for hackers

What have Nest, Amazon Echo, Project Tango and a smart TV got in common? As well as being just some of the thousands of Internet of Things (IoT) devices, they also happen to be collecting, storing and sharing a lot of data on what happens in homes.

"The IoT is a marketing scheme to get more of your data," says Rafael Laguna, CEO of Open-Xchange. "Amazon and Google have built whole business models around selling you connected devices that monitor your home, listen to your private conversations, and map your home and interior movements, all while collecting huge quantities of personal data," he says.

Some won't care, but mostly it's a case of ignorance. "Privacy protection is already a commodity," says Christophe Birkeland, CTO Malware, Blue Coat Systems, "but the demand for privacy protection is tightly linked to awareness of privacy issues."

Technology that invades privacy rights and autonomously shares and distributes personal data is already widespread, but knowledge and awareness of such is limited. For instance, camera surveillance systems routinely have face recognition, while automated license plate readers automatically connect a vehicle with its owner, but who thinks of these as personal data silos?

Open season for hackers

From Samsung TVs and spying GoPro cameras to FitBit bathroom scales, dolls and even dildos, Ken Munro and his team of ethical hackers at Pen Test Partners have hacked into myriad IoT devices. He made the infamous discovery that the Wi-Fi kettle, together with data from social media sites, can be used to track, attack and take over a home network.

A Wi-Fi kettle was used to take over a home network

A Wi-Fi kettle was used to take over a home network

The conclusion? IoT security is in the dark ages, exhibiting the sort of security flaws the internet had 15 years ago. "It's not just IoT devices that have security problems, it's the cloud services that they consume, and send your data to, that are often the source of data leakage," says Munro, who discovered that a sports connect wristband and bathroom scales were sending personal data to the cloud without SSL, so it was possible to intercept anyone's activity details and personal data.

"Everything from access to your contacts, to your emails, your location, your texts and even your voice commands is up for grabs," says Munro, who blames app developers trying to safeguard future app revenue by ensuring software will have as wide an access as possible to the personal information of the user. "With Joe Public often reluctant to trawl through these permissions, and with little choice but to accept them if they want the app, the type of personal data now floating around in the 'app-mosphere' is frankly frightening."

It's also a question of how easy it is to hack. "Hacking IP cameras has previously been relatively easy, and as a consequence more people attempt to hack them," says Gordon Fletcher from Salford Business School's Centre for Digital Business, who thinks that it's the pervasiveness of the OS that's crucial.

"The variety of devices that use Android as their OS means that solving any identified security flaws is a much more complex problem, which is part of the explanation for the more controlled ecosystem approach of iOS," he says. "The more widespread a technology, and the more variable the types of the devices it is used on, simply multiplies the potential for security headaches."

Why is the IoT a security risk?

The security risk that the IoT represents is a result of the complexity of the network its devices create. "Different devices connecting to different types of networks in different ways makes it very difficult to consciously design security flaws out of IoT devices," says Fletcher. He outlines three reasons why the IoT is a security risk; the strength of a network is judged by the weakest link, all devices are potentially a target no matter how trivial, and anything connected to the internet is potentially vulnerable.

A password-protection option will always remain just that. "Where a device is supplied with a default password it is a dangerous design assumption that it will be changed by a user," says Fletcher. "Creating consumer devices that do not require user intervention to be secure is a good start." That way, privacy becomes a commodity by default.

TOPICS
Jamie Carter

Jamie is a freelance tech, travel and space journalist based in the UK. He’s been writing regularly for Techradar since it was launched in 2008 and also writes regularly for Forbes, The Telegraph, the South China Morning Post, Sky & Telescope and the Sky At Night magazine as well as other Future titles T3, Digital Camera World, All About Space and Space.com. He also edits two of his own websites, TravGear.com and WhenIsTheNextEclipse.com that reflect his obsession with travel gear and solar eclipse travel. He is the author of A Stargazing Program For Beginners (Springer, 2015),

Latest in Security
Data leak
A major Keenetic router data leak could put a million households at risk
Code Skull
Interpol operation arrests 300 suspects linked to African cybercrime rings
Insecure network with several red platforms connected through glowing data lines and a black hat hacker symbol
Multiple H3C Magic routers hit by critical severity remote command injection, with no fix in sight
Code Skull
This dangerous new ransomware is hitting Windows, ARM, ESXi systems
An abstract image of a lock against a digital background, denoting cybersecurity.
Critical security flaw in Next.js could spell big trouble for JavaScript users
Microsoft
"Another pair of eyes" - Microsoft launches all-new Security Copilot Agents to give security teams the upper hand
Latest in News
Zotac Gaming RTX 5090 Graphics Card
Nvidia Blackwell stock woes are compounded by price hikes as more RTX 5090 GPUs soar in pricing, and I’m sick and tired of it all at this point
A collage of Elizabeth Olsen's Scarlet Witch and Tatiana Maslany's She-Hulk
Marvel fans are already tired of Doomsday and Secret Wars cast gossip as two more superheroes get linked with roles in the next two Avengers movies
An Apple Music pink/pixellated poster advertising DJ with Apple Music
DJ with Apple Music lands, allowing subscribers to build and mix DJ sets directly from its +100 million-song catalog
The Meta Quest 3 and controllers on their charging station which is itself on a wooden desk next to a lamp
Forget Android XR, I've got my eyes on Vivo's new Meta Quest 3 competitor as it could be the most important VR headset of 2025
Samsung Galaxy S25 from the front
The Now Bar on Samsung One UI 7 is about to get a lot more useful – and could soon match Live Activities on iOS
Marvel Rivals
Marvel Rivals will get two new hero skins for Moon Knight and Black Panther this week meaning I'll now need to farm even more Units