Privacy 
On the series of tubes of things
Privacy 
On the Internet of all the things
Howdy, EFFAustin 
• Observations on privacy 
• What is IoT? 
• Trends 
• The crossroads of security, privacy and IoT 
• Welcome to the future
@TManning 
• Greybeard, neckbeard 
• Longstanding Internet professional 
• EFF pizza connoisseur 
• Austin Hecklers Association 
• Security consultant 
• 100% NOT A PRIVACY EXPERT, ETC
Privacy 
• A right protected by laws 
• U.S. Const. amend. IV 
• Protection from observation by others e.g. in 
your own home 
• Communication confidentiality - wiretaps 
• Control over distribution of personal information
Internet privacy 
• “Thing” security 
• Data confidentiality 
• Preservation of anonymity 
• Advertising and other forms of surveillance
Privacy in the cloud 
• Trusting the provider 
• Attacks against cloud infrastructure 
affect your data 
• Law enforcement jurisdiction over 
your data 
https://www.apple.com/privacy/docs/government-information-requests-20131105.pdf
Internet of things
SCADA: Your Father's IoT
Oil & Gas Example
Monitoring SCADA
Keeping an Eye-OT* 
on things 
*Slide title cleverly changed after the meeting
IoT, Son of SCADA
Smart home
Smarten Everything
Privacy on the Series of Tubes of Things
Bridge the air gap
Mobile
My phone is more 
interesting than I am* 
* I saw this quote on some brilliant graffiti in SF
Mobile Threats 
http://www.huffingtonpost.com/2014/10/31/apple-touch-id-ruling_n_6083920.html
IoT, Daughter of Mobile
Mobile Location
Mobile Payments
Wearables
Wearables
Privacy risks 
http://www.digitalmunition.com/OwningCopCar.pdf
Develop all the things
Photograph all the things 
http://getnarrative.com/
Honey, I Shrunk the Things 
Freescale KL03
Linux all the things
Dev boards 
as far as the eye can see
Linux all the things 
Inverse Path “USB Armory”
Yo, Dog
Full Stack Insecurity 
SSL
CEO of my kickstarter page
Always-On-Cloud- 
Connected Microphone
“He added that the iBeacon 
technology can also be used to 
monitor retail staff.”
Monitoring that no good dog
IoT Hacking 
http://download.gtvhacker.com/file/generic/GTVHacker-DEFCON22.pdf
IoT Hacking 
https://www.youtube.com/watch?v=MqpULC84rCQ
Driving all the things
* 
*Not actually true
Mapping The Net
IoT Security Research
All your base
Thanks! 
Todd Manning 
@tmanning 
REDACTED@EXAMPLE.COM

More Related Content

PPTX
Stepping Up conference 2013
PPT
Interop 2007 Keynote Teaser
PPTX
Computing on the Move - Mobile Security
PPTX
Mobile phones are nuisance
PDF
Hack the World: IT/IOT/ICS SCADA OSINT
PDF
Discover Cyber Security by 2 Web Design Inc.
PPTX
BRIDGING THE KNOWLEDGE GAP: From Higher Institution Theory to Real Life Pract...
Stepping Up conference 2013
Interop 2007 Keynote Teaser
Computing on the Move - Mobile Security
Mobile phones are nuisance
Hack the World: IT/IOT/ICS SCADA OSINT
Discover Cyber Security by 2 Web Design Inc.
BRIDGING THE KNOWLEDGE GAP: From Higher Institution Theory to Real Life Pract...

What's hot (20)

PPTX
Andersen Elementary Tech Safety 2015
PPTX
Feb 2014. Parenting in a cyber world
PDF
Identity - The Cornerstone of Information Security
PPTX
Pegasus Presentation Feb. 12, 2015
PPTX
5 Myths of Cybersecurity That are Important to You and Your Job
PDF
Introduction to the Internet of Things
PPTX
PPTX
Seven Simple Steps to Online Security
PPTX
Smartphone and mobile device safety & security
PPTX
Hacking Roman Codes with Mobile Phones
PPTX
ICO Presentation - Data Protection
PPT
Safe and ethical use page power point
PPTX
CST 20363 Session 6 Cyberspace
PPTX
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...
PDF
The art of being a lady in a hacking world
PPTX
Digital Age-Preparing Yourself
PDF
Homeland Security - strengthening the weakest link
PDF
Cyphra - Cyber Security
PPTX
Cybercrime trends in last five years
PPTX
Gripla slides 09 2011
Andersen Elementary Tech Safety 2015
Feb 2014. Parenting in a cyber world
Identity - The Cornerstone of Information Security
Pegasus Presentation Feb. 12, 2015
5 Myths of Cybersecurity That are Important to You and Your Job
Introduction to the Internet of Things
Seven Simple Steps to Online Security
Smartphone and mobile device safety & security
Hacking Roman Codes with Mobile Phones
ICO Presentation - Data Protection
Safe and ethical use page power point
CST 20363 Session 6 Cyberspace
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...
The art of being a lady in a hacking world
Digital Age-Preparing Yourself
Homeland Security - strengthening the weakest link
Cyphra - Cyber Security
Cybercrime trends in last five years
Gripla slides 09 2011
Ad

Viewers also liked (9)

PDF
Security & privacy on the internet: things you should now
PPTX
Privacy and Security in the Internet of Things
PPTX
ON THE SECURITY AND PRIVACY OF INTERNET OF THINGS ARCHITECTURES
PPTX
security and privacy-Internet of things
DOCX
Security and Privacy considerations in Internet of Things
PPTX
What hope for privacy in an IoT world?
PDF
The Internet of Things: Privacy and Security Issues
PPTX
OPEN SOURCE SEMINAR PRESENTATION
PDF
Internet of Things - Privacy and Security issues
Security & privacy on the internet: things you should now
Privacy and Security in the Internet of Things
ON THE SECURITY AND PRIVACY OF INTERNET OF THINGS ARCHITECTURES
security and privacy-Internet of things
Security and Privacy considerations in Internet of Things
What hope for privacy in an IoT world?
The Internet of Things: Privacy and Security Issues
OPEN SOURCE SEMINAR PRESENTATION
Internet of Things - Privacy and Security issues
Ad

Similar to Privacy on the Series of Tubes of Things (20)

PDF
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
PDF
The Convergence of IT, Operational Technology and the Internet of Things (IoT)
DOCX
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
PDF
Iot Security and Privacy at Scale
PDF
This Time, It’s Personal: Why Security and the IoT Is Different
PPTX
All The Things: Security, Privacy & Safety in a World of Connected Devices
DOCX
Personal data breaches and securing IoT devices· By Damon Culber.docx
PDF
The Internet of Things: We've Got to Chat
PDF
Infosecurity2013nl 131103184054-phpapp01
PPTX
IoT and the industrial Internet of Things - june 20 2019
PDF
Designing Trustable Products: Microinteractions Matter for Secure UX
PDF
4 principles to get full benefit of the Internet of Things
PDF
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
PDF
Tingenes internett for finn.no tech day
DOCX
IoT Vulnerability Analysis and IOT In security Controls
PDF
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
PDF
The Internet of Things and You
DOCX
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
PPTX
Android vs iOS encryption systems
PDF
How to Secure Your iOs Device and Keep Client Data Safe
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
The Convergence of IT, Operational Technology and the Internet of Things (IoT)
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
Iot Security and Privacy at Scale
This Time, It’s Personal: Why Security and the IoT Is Different
All The Things: Security, Privacy & Safety in a World of Connected Devices
Personal data breaches and securing IoT devices· By Damon Culber.docx
The Internet of Things: We've Got to Chat
Infosecurity2013nl 131103184054-phpapp01
IoT and the industrial Internet of Things - june 20 2019
Designing Trustable Products: Microinteractions Matter for Secure UX
4 principles to get full benefit of the Internet of Things
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Tingenes internett for finn.no tech day
IoT Vulnerability Analysis and IOT In security Controls
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
The Internet of Things and You
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
Android vs iOS encryption systems
How to Secure Your iOs Device and Keep Client Data Safe

Recently uploaded (20)

PPTX
Internet Safety for Seniors presentation
PDF
Course Overview and Agenda cloud security
PPTX
KSS ON CYBERSECURITY INCIDENT RESPONSE AND PLANNING MANAGEMENT.pptx
PDF
Uptota Investor Deck - Where Africa Meets Blockchain
PDF
Session 1 (Week 1)fghjmgfdsfgthyjkhfdsadfghjkhgfdsa
PDF
Lean-Manufacturing-Tools-Techniques-and-How-To-Use-Them.pdf
PDF
Understand the Gitlab_presentation_task.pdf
PDF
Buy Cash App Verified Accounts Instantly – Secure Crypto Deal.pdf
PDF
📍 LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1 TERPOPULER DI INDONESIA ! 🌟
PPT
Ethics in Information System - Management Information System
PPTX
Mathew Digital SEO Checklist Guidlines 2025
PPTX
artificialintelligenceai1-copy-210604123353.pptx
PPT
12 Things That Make People Trust a Website Instantly
PDF
Alethe Consulting Corporate Profile and Solution Aproach
PDF
Top 8 Trusted Sources to Buy Verified Cash App Accounts.pdf
PPTX
Reading as a good Form of Recreation
PDF
Alethe Consulting Corporate Profile and Solution Aproach
DOCX
Powerful Ways AIRCONNECT INFOSYSTEMS Pvt Ltd Enhances IT Infrastructure in In...
PPTX
IPCNA VIRTUAL CLASSES INTERMEDIATE 6 PROJECT.pptx
PDF
SlidesGDGoCxRAIS about Google Dialogflow and NotebookLM.pdf
Internet Safety for Seniors presentation
Course Overview and Agenda cloud security
KSS ON CYBERSECURITY INCIDENT RESPONSE AND PLANNING MANAGEMENT.pptx
Uptota Investor Deck - Where Africa Meets Blockchain
Session 1 (Week 1)fghjmgfdsfgthyjkhfdsadfghjkhgfdsa
Lean-Manufacturing-Tools-Techniques-and-How-To-Use-Them.pdf
Understand the Gitlab_presentation_task.pdf
Buy Cash App Verified Accounts Instantly – Secure Crypto Deal.pdf
📍 LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1 TERPOPULER DI INDONESIA ! 🌟
Ethics in Information System - Management Information System
Mathew Digital SEO Checklist Guidlines 2025
artificialintelligenceai1-copy-210604123353.pptx
12 Things That Make People Trust a Website Instantly
Alethe Consulting Corporate Profile and Solution Aproach
Top 8 Trusted Sources to Buy Verified Cash App Accounts.pdf
Reading as a good Form of Recreation
Alethe Consulting Corporate Profile and Solution Aproach
Powerful Ways AIRCONNECT INFOSYSTEMS Pvt Ltd Enhances IT Infrastructure in In...
IPCNA VIRTUAL CLASSES INTERMEDIATE 6 PROJECT.pptx
SlidesGDGoCxRAIS about Google Dialogflow and NotebookLM.pdf

Privacy on the Series of Tubes of Things