SlideShare a Scribd company logo
Jeff Katz | KIWI
Privacy and Security in the Internet
of Things
Agenda
• A bit about me
• Privacy and Data Collection
• Security and Data Protection
• Guidelines
• Example
• Questions
A small bio
• Embedded Engineer, hardware and
software (but also backend, mobile,
frontend, web...)
• Developed hardware to break Nintendo
DS copy protection
• 7+ Years in Physical Access Control
Industry
• VP Engineering, KIWI (more at
kraln.com)
Image Credit: Twitter @internetofshit
Privacy
• Ability to preclude information from
being shared or communicated
• What is sensitive changes over time
• What is private changes over time
• Remember: Anonymized data isn’t 1
1 Ohm, Paul, Broken Promises of Privacy: Responding to the Surprising Failure of
Anonymization (August 13, 2009). UCLA Law Review, Vol. 57, p. 1701, 2010; U of
Colorado Law Legal Studies Research Paper No. 9-12. Available at
SSRN: http://ssrn.com/abstract=1450006
Data Collection
• Don’t collect data you don’t need
• Don’t use services that collect data in
order to provide your product or service
• Avoid unintentional information leakage
• Data is a double-edged sword
• Pretend everything will become public!
Example: Smart Thermostat
• What you want
– House temperature auto-adjusts
– House is warm when you come home
– Less energy usage
• What you get leak
– Knowledge about where other people are
– When you are on vacation
– Location information collected by
background service on your phone
A designer knows he has
achieved perfection not when
there is nothing left to add, but
when there is nothing left to
take away.
Antoine de Saint-Exupery
Example: Smart Power Meter
• What you want
– Power usage over time
– Optimize grid
– Easy metering
• What you get leak
– When people are home
– What is being watched on TV
– Ability to remotely kill power1
1 http://www.sciencedirect.com/science/article/pii/S1877050915008492
But we’re the good guys!
• Security breaches
• Government intrusion
• Corporate sale
Information you collect, even with the best
of intentions, can be used against you
and your customers.
Security breaches
• Any data you have can &
will be used against you
• The more data you have,
the more valuable you
are as a target
• Large or small scale
possible
• Matter of when, not if!
http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/
Example: Smart Lock
• What you want
– Lock works with cellphone over Bluetooth
– List of people who come and go, and when
– No need for metal keys anymore
• What you everyone gets
– List of people who come and go, and when
– Ability to drain battery, lock people out of
their houses
Government intrusion
• 2013 Facebook: 38,000 requests
• 6mo 2014 Twitter: 2,871 requests
• 3mo 2014 Snapchat: 400 requests
• Google:
https://www.eff.org/who-has-your-back-government-data-requests-2015
Corporate sale
• Barclays bank tells 13 million customers it is to start selling information
on their spending habits to other companies
http://www.theguardian.com/business/2013/jun/24/barclays-bank-sell-customer-data
• Bell faces $750M lawsuit over allegedly selling customer data
http://www.cbc.ca/news/canada/windsor/bell-faces-750m-lawsuit-over-allegedly-
selling-customer-data-1.3037545
• “RadioShack Corp. won court approval to sell data on about 67 million
customers in a $26.2 million deal for assets that also includes the
bankrupt electronics retailer’s name.”
http://www.bloomberg.com/news/articles/2015-05-20/radioshack-receives-approval-
to-sell-name-to-standard-general
Security
• The internet is radioactive ☢
• Wireless communications are radioactive ☢
• Users are very radioactive ☢
• Minimize your exposure!
• Strong encryption is your radiation shielding!
• Keep your business-critical data, and your
user’s data, as far away from the danger as
possible
Example: LIFX
• What you want
– App to control lightbulb
– Easy set up, wireless control
• What you get
– Mesh-network “encrypted” with keys sent
in plain-text
– WIFI password broadcast unencrypted
http://www.contextis.com/resources/blog/hacking-internet-connected-light-bulbs/
Medical Devices: Myth
• High standards mean high quality
• Enable doctors to work remotely
• Security vulnerabilities do not exist, or
even if they did, they would not cause
problems
• Medical devices are always airgapped
Medical Devices: Reality
• High standards mean lots of shortcuts
• Enable anyone to access remotely
• Security vulnerabilities do exist, and
create critical problems
• Medical devices are almost never
airgapped. Many devices can be
crashed just by running simple security
scans (port scans)
Why should I care?
• Immunizations provide herd immunity!
• Designing for privacy and security is
much easier and more effective than
retrofitting
• Defense in depth
• Think of your mom!
Example: Smart “Toy”
http://motherboard.vice.com/read/yes-your-smart-dildo-can-be-hacked
• Remote control
• Video
• Sound
Do I really need to explain why this is a
bad idea?
What can I do?
• Collect as little information as possible
• What you collect, always secure/encrypt
• Secure command & control channel
• Have a disaster recovery plan
• Have a privacy policy
• Don’t re-invent the wheel
• Work with security researchers
More ideas: https://msdn.microsoft.com/en-us/library/ms976532.aspx
• Physical Access Control as a Service
• Private apartments, service providers,
and house management companies
• Mix of hardware, software, wireless
sensor network and web applications
• High focus on privacy and security of
our users
Privacy and Security in the Internet of Things
Questions?
Jeff Katz
jeff.katz@kiwi.ki
kraln.com / @kraln

More Related Content

PPTX
ON THE SECURITY AND PRIVACY OF INTERNET OF THINGS ARCHITECTURES
PPTX
Internet of Things (IoT) Security
PPTX
Security challenges for internet of things
PPTX
IoT Security Middleware: evaluating the threats and protecting against them
DOCX
Security and Privacy considerations in Internet of Things
PDF
Internet of Things - Privacy and Security issues
PPTX
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
PDF
Iot Security and Privacy at Scale
ON THE SECURITY AND PRIVACY OF INTERNET OF THINGS ARCHITECTURES
Internet of Things (IoT) Security
Security challenges for internet of things
IoT Security Middleware: evaluating the threats and protecting against them
Security and Privacy considerations in Internet of Things
Internet of Things - Privacy and Security issues
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
Iot Security and Privacy at Scale

What's hot (20)

PPTX
IoT security patterns
PPT
IoT Security – Executing an Effective Security Testing Process
PPTX
Internet of things security challenges
PDF
IoT Security Elements
PDF
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
PDF
IoT/M2M Security
PPTX
IoT security compliance checklist
PDF
Privacy & Security for the Internet of Things
PPTX
IoT Security: Debunking the "We Aren't THAT Connected" Myth
PPTX
Security Testing for IoT Systems
PPTX
Introduction to IOT security
PPTX
Iot top 10 vulnerabilities and misconceptions 2016
PPTX
Attacking the cloud with social engineering
PDF
E Fraud And Predictive Forensic Profiling Reducing Losses By Combining Sci...
PDF
IoT Security in Action - Boston Sept 2015
PPTX
Modern Cyber Threat Protection techniques for Enterprises
PPTX
Mobile Security Research Projects Help
PPT
Indian perspective of cyber security
PPTX
Smart Defense: Strategic Approach to fight contemporary Security, Privacy & A...
PPTX
Technical Challenges in Cyber Forensics
IoT security patterns
IoT Security – Executing an Effective Security Testing Process
Internet of things security challenges
IoT Security Elements
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
IoT/M2M Security
IoT security compliance checklist
Privacy & Security for the Internet of Things
IoT Security: Debunking the "We Aren't THAT Connected" Myth
Security Testing for IoT Systems
Introduction to IOT security
Iot top 10 vulnerabilities and misconceptions 2016
Attacking the cloud with social engineering
E Fraud And Predictive Forensic Profiling Reducing Losses By Combining Sci...
IoT Security in Action - Boston Sept 2015
Modern Cyber Threat Protection techniques for Enterprises
Mobile Security Research Projects Help
Indian perspective of cyber security
Smart Defense: Strategic Approach to fight contemporary Security, Privacy & A...
Technical Challenges in Cyber Forensics
Ad

Viewers also liked (9)

PDF
Privacy on the Series of Tubes of Things
PDF
Security & privacy on the internet: things you should now
PPTX
Automatski - The Internet of Things - Security in IoT
PPTX
security and privacy-Internet of things
PDF
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
PPTX
APrIGF 2015: Security and the Internet of Things
PPTX
What hope for privacy in an IoT world?
PDF
The Internet of Things: Privacy and Security Issues
PPTX
OPEN SOURCE SEMINAR PRESENTATION
Privacy on the Series of Tubes of Things
Security & privacy on the internet: things you should now
Automatski - The Internet of Things - Security in IoT
security and privacy-Internet of things
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
APrIGF 2015: Security and the Internet of Things
What hope for privacy in an IoT world?
The Internet of Things: Privacy and Security Issues
OPEN SOURCE SEMINAR PRESENTATION
Ad

Similar to Privacy and Security in the Internet of Things (20)

PDF
This Time, It’s Personal: Why Security and the IoT Is Different
PPTX
An Introduction To IT Security And Privacy for Librarians and Libraries
PDF
New challenges to secure the IoT (with notes)
PPTX
IoT -Internet of Things
PPTX
Digital Defense for Activists (and the rest of us)
PPTX
IoT security presented in Ada's List Conference
PPTX
Internet of Things TCLG Oct 23 2014
PPTX
Ch01 NetSec5e Network Security Essential Chapter 1.pptx
PPTX
Lily lim data privacy ownership and ethics
PDF
Film 260 flipbook
PPTX
Data Privacy for Activists
PPTX
Is your privacy, private?
PPTX
The (in)security of things
DOCX
Protecting Intellectual Property in the Age of WikiLeaks
PDF
IT Security Presentation - IIMC 2014 Conference
PPT
Mist2012 panel discussion-ruo ando
PDF
Security, Privacy and the Future Internet
PPTX
2012 Reenergize the Americas 3B: Angel Avila
PDF
The internet of things..perspectives for the Nigerian legal system
PPTX
Ethics in development of Information Technology
This Time, It’s Personal: Why Security and the IoT Is Different
An Introduction To IT Security And Privacy for Librarians and Libraries
New challenges to secure the IoT (with notes)
IoT -Internet of Things
Digital Defense for Activists (and the rest of us)
IoT security presented in Ada's List Conference
Internet of Things TCLG Oct 23 2014
Ch01 NetSec5e Network Security Essential Chapter 1.pptx
Lily lim data privacy ownership and ethics
Film 260 flipbook
Data Privacy for Activists
Is your privacy, private?
The (in)security of things
Protecting Intellectual Property in the Age of WikiLeaks
IT Security Presentation - IIMC 2014 Conference
Mist2012 panel discussion-ruo ando
Security, Privacy and the Future Internet
2012 Reenergize the Americas 3B: Angel Avila
The internet of things..perspectives for the Nigerian legal system
Ethics in development of Information Technology

More from Jeff Katz (12)

PDF
The Future, and IoT, and Blockchain
PDF
Towards a Responsible Internet of Things
PDF
Augmenting Retro Consoles with New Hardware
PPTX
2018: Overview of Berlin Hardware Past, Present, and Future
PPTX
It's 2017, Where is my Smart Home?
PDF
Unlocking Western Retail Markets for your Hardware
PPTX
Wearables Beyond the Drawer
PDF
KIWI IoT Presentation
PPTX
Building Connected Hardware (for the internet of things)
PDF
The Internet of Invisible Things
PPTX
Jeff Katz on Lean Hardware Startups
PPTX
Jeff Katz on Prototyping
The Future, and IoT, and Blockchain
Towards a Responsible Internet of Things
Augmenting Retro Consoles with New Hardware
2018: Overview of Berlin Hardware Past, Present, and Future
It's 2017, Where is my Smart Home?
Unlocking Western Retail Markets for your Hardware
Wearables Beyond the Drawer
KIWI IoT Presentation
Building Connected Hardware (for the internet of things)
The Internet of Invisible Things
Jeff Katz on Lean Hardware Startups
Jeff Katz on Prototyping

Recently uploaded (20)

PDF
Recruitment and Placement PPT.pdfbjfibjdfbjfobj
PPTX
mbdjdhjjodule 5-1 rhfhhfjtjjhafbrhfnfbbfnb
PPTX
Introduction to Basics of Ethical Hacking and Penetration Testing -Unit No. 1...
PPT
Reliability_Chapter_ presentation 1221.5784
PPTX
1_Introduction to advance data techniques.pptx
PPTX
oil_refinery_comprehensive_20250804084928 (1).pptx
PPTX
Data_Analytics_and_PowerBI_Presentation.pptx
PDF
168300704-gasification-ppt.pdfhghhhsjsjhsuxush
PPTX
ALIMENTARY AND BILIARY CONDITIONS 3-1.pptx
PPTX
05. PRACTICAL GUIDE TO MICROSOFT EXCEL.pptx
PPTX
The THESIS FINAL-DEFENSE-PRESENTATION.pptx
PPTX
Database Infoormation System (DBIS).pptx
PPTX
Business Ppt On Nestle.pptx huunnnhhgfvu
PPT
Chapter 2 METAL FORMINGhhhhhhhjjjjmmmmmmmmm
PPTX
Moving the Public Sector (Government) to a Digital Adoption
PPTX
Computer network topology notes for revision
PPTX
Global journeys: estimating international migration
PDF
22.Patil - Early prediction of Alzheimer’s disease using convolutional neural...
PPTX
Business Acumen Training GuidePresentation.pptx
PPTX
Acceptance and paychological effects of mandatory extra coach I classes.pptx
Recruitment and Placement PPT.pdfbjfibjdfbjfobj
mbdjdhjjodule 5-1 rhfhhfjtjjhafbrhfnfbbfnb
Introduction to Basics of Ethical Hacking and Penetration Testing -Unit No. 1...
Reliability_Chapter_ presentation 1221.5784
1_Introduction to advance data techniques.pptx
oil_refinery_comprehensive_20250804084928 (1).pptx
Data_Analytics_and_PowerBI_Presentation.pptx
168300704-gasification-ppt.pdfhghhhsjsjhsuxush
ALIMENTARY AND BILIARY CONDITIONS 3-1.pptx
05. PRACTICAL GUIDE TO MICROSOFT EXCEL.pptx
The THESIS FINAL-DEFENSE-PRESENTATION.pptx
Database Infoormation System (DBIS).pptx
Business Ppt On Nestle.pptx huunnnhhgfvu
Chapter 2 METAL FORMINGhhhhhhhjjjjmmmmmmmmm
Moving the Public Sector (Government) to a Digital Adoption
Computer network topology notes for revision
Global journeys: estimating international migration
22.Patil - Early prediction of Alzheimer’s disease using convolutional neural...
Business Acumen Training GuidePresentation.pptx
Acceptance and paychological effects of mandatory extra coach I classes.pptx

Privacy and Security in the Internet of Things

  • 1. Jeff Katz | KIWI Privacy and Security in the Internet of Things
  • 2. Agenda • A bit about me • Privacy and Data Collection • Security and Data Protection • Guidelines • Example • Questions
  • 3. A small bio • Embedded Engineer, hardware and software (but also backend, mobile, frontend, web...) • Developed hardware to break Nintendo DS copy protection • 7+ Years in Physical Access Control Industry • VP Engineering, KIWI (more at kraln.com)
  • 4. Image Credit: Twitter @internetofshit
  • 5. Privacy • Ability to preclude information from being shared or communicated • What is sensitive changes over time • What is private changes over time • Remember: Anonymized data isn’t 1 1 Ohm, Paul, Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization (August 13, 2009). UCLA Law Review, Vol. 57, p. 1701, 2010; U of Colorado Law Legal Studies Research Paper No. 9-12. Available at SSRN: http://ssrn.com/abstract=1450006
  • 6. Data Collection • Don’t collect data you don’t need • Don’t use services that collect data in order to provide your product or service • Avoid unintentional information leakage • Data is a double-edged sword • Pretend everything will become public!
  • 7. Example: Smart Thermostat • What you want – House temperature auto-adjusts – House is warm when you come home – Less energy usage • What you get leak – Knowledge about where other people are – When you are on vacation – Location information collected by background service on your phone
  • 8. A designer knows he has achieved perfection not when there is nothing left to add, but when there is nothing left to take away. Antoine de Saint-Exupery
  • 9. Example: Smart Power Meter • What you want – Power usage over time – Optimize grid – Easy metering • What you get leak – When people are home – What is being watched on TV – Ability to remotely kill power1 1 http://www.sciencedirect.com/science/article/pii/S1877050915008492
  • 10. But we’re the good guys! • Security breaches • Government intrusion • Corporate sale Information you collect, even with the best of intentions, can be used against you and your customers.
  • 11. Security breaches • Any data you have can & will be used against you • The more data you have, the more valuable you are as a target • Large or small scale possible • Matter of when, not if! http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/
  • 12. Example: Smart Lock • What you want – Lock works with cellphone over Bluetooth – List of people who come and go, and when – No need for metal keys anymore • What you everyone gets – List of people who come and go, and when – Ability to drain battery, lock people out of their houses
  • 13. Government intrusion • 2013 Facebook: 38,000 requests • 6mo 2014 Twitter: 2,871 requests • 3mo 2014 Snapchat: 400 requests • Google: https://www.eff.org/who-has-your-back-government-data-requests-2015
  • 14. Corporate sale • Barclays bank tells 13 million customers it is to start selling information on their spending habits to other companies http://www.theguardian.com/business/2013/jun/24/barclays-bank-sell-customer-data • Bell faces $750M lawsuit over allegedly selling customer data http://www.cbc.ca/news/canada/windsor/bell-faces-750m-lawsuit-over-allegedly- selling-customer-data-1.3037545 • “RadioShack Corp. won court approval to sell data on about 67 million customers in a $26.2 million deal for assets that also includes the bankrupt electronics retailer’s name.” http://www.bloomberg.com/news/articles/2015-05-20/radioshack-receives-approval- to-sell-name-to-standard-general
  • 15. Security • The internet is radioactive ☢ • Wireless communications are radioactive ☢ • Users are very radioactive ☢ • Minimize your exposure! • Strong encryption is your radiation shielding! • Keep your business-critical data, and your user’s data, as far away from the danger as possible
  • 16. Example: LIFX • What you want – App to control lightbulb – Easy set up, wireless control • What you get – Mesh-network “encrypted” with keys sent in plain-text – WIFI password broadcast unencrypted http://www.contextis.com/resources/blog/hacking-internet-connected-light-bulbs/
  • 17. Medical Devices: Myth • High standards mean high quality • Enable doctors to work remotely • Security vulnerabilities do not exist, or even if they did, they would not cause problems • Medical devices are always airgapped
  • 18. Medical Devices: Reality • High standards mean lots of shortcuts • Enable anyone to access remotely • Security vulnerabilities do exist, and create critical problems • Medical devices are almost never airgapped. Many devices can be crashed just by running simple security scans (port scans)
  • 19. Why should I care? • Immunizations provide herd immunity! • Designing for privacy and security is much easier and more effective than retrofitting • Defense in depth • Think of your mom!
  • 20. Example: Smart “Toy” http://motherboard.vice.com/read/yes-your-smart-dildo-can-be-hacked • Remote control • Video • Sound Do I really need to explain why this is a bad idea?
  • 21. What can I do? • Collect as little information as possible • What you collect, always secure/encrypt • Secure command & control channel • Have a disaster recovery plan • Have a privacy policy • Don’t re-invent the wheel • Work with security researchers More ideas: https://msdn.microsoft.com/en-us/library/ms976532.aspx
  • 22. • Physical Access Control as a Service • Private apartments, service providers, and house management companies • Mix of hardware, software, wireless sensor network and web applications • High focus on privacy and security of our users