Our Internet-driven world filled with interconnected smart gadgets and computing applications is making us vulnerable to potentially life-changing hacks and tracking. Not only are modern cars open to being hacked, but also boats, planes, and GPS-driven weapons. (Source)
|The modern smart home|
So, perhaps you think you’ll ditch the modern car, get rid of the smartphone, limit travel and hunker down safe and cozy in your home? Well, unfortunately, if your house is filled with modern appliances and electronics, it could potentially open you up for a nightmare experience. This is the subject of a new European study that will be presented at the ACM Conference on Security and Privacy in Wireless and Mobile Networks in Oxford.
The smart home market is exploding even as news about pervasive surveillance and concerns over Agenda 21 continue to mount.
According to a report from Market Watch, the global numbers are staggering; the report also notes how government regulations will promote future growth.
The following points are taken from a full report that you can read here. Emphasis mine:
As you can see from the third bullet point, security is one of the main selling points of this massive rollout. However, vulnerabilities are being exposed which could undermine this aspect of the initiative.
IT security expert Christop Sorge and a team of researchers at Saarland University in Germany believe in the benefits of smart homes, so they have undertaken an examination of how to provide better protection against the negative consequences of the massive amount of data that is gathered by these systems.
Here is how they describe the current reality:
“Many of the systems do not provide adequate security against unwanted third-party access and therefore threaten the privacy of the inhabitants,” says Sorge.
For the purposes of their study, the researchers took on the role of a malicious attacker. “Using a simple mini-PC no bigger in size than a packet of cigarettes we eavesdropped on the wireless home automation systems (HASs) of two volunteers and were thus able to determine just how much information a conventional wireless HAS reveals about its user,” explains Sorge. No other information about the users was available to the research group. The result: “Non-encrypted systems provide large quantities of data to anyone determined enough to access the data, and the attacker requires no prior knowledge about the system, nor about the user being spied on,” says Professor Sorge.
“The data acquired by the attacker can be analysed to extract system commands and status messages, items which reveal a lot about the inhabitants’ behavior and habits. We were able to determine absence times and to identify home ventilation and heating patterns,” explains the expert in legal informatics. The analysis enabled the research group to build up profiles of the inhabitants. Even systems that use encryption technology can supply information to third parties: “The results indicate that even when encrypted communication is used, the number of messages exchanged is enough to provide information on absence times,” says Sorge. Potential attacks can be directed against the functionality of the system or the privacy of the inhabitants. “An attacker with malicious intent could use this sort of information to plan a burglary,” says Sorge. (emphasis added) [Source]
If we have learned anything, we have learned that there are gaping security holes in nearly every modern computing application. As a matter of personal privacy and data protection it is concerning enough, but as the Internet of Things expands to include everything – even our own bodies as form of identification and access – the potential dangers are becoming as exponential as the advancement of the technology itself.
Until the proper protections are proven in real-world conditions, we should be doing all we can not to buy into these gadgets and conveniences. We must also refuse any mandatory measures to impose this smart world upon us.
NOTICE OF DATA BREACH Dear User, We are writing to inform you about a data security issue that may involve your Yahoo account information. What Happened? A copy of certain user account information was stolen from our systems in late 2014 by what we believe is a state-sponsored actor. We are closely coordinating with law...
12:15am EDT Breaking News The hashtag #GasShortage is trending on twitter for Tennessee. It will soon be trending elsewhere. My brother reported to me a few minutes ago that Gas stations in Greensboro NC are out of gas and those truck stops have only about 7000 Gallons as of 1155pm EST. The immediate...
World Peace: The Final Chapter By Brooks Agnew Notes from 04 September 2016 World peace has been cited by pageant misses as their life’s work for more than a century. It is the stuff of happily ever fairy tales and Mendala shifting Disney movies. Guard dropping press releases misled Neville Chamberlain and countless other kings to...
Forgiveness by Luckee1 as heard on 30 August 2016 http://tfrlive.com/luckee-with-truth-frequency-news-66847/ I know when I was a girl, I was told that we had to forgive others. The adults, especially those associated with church, always talked about forgiving others. They also talked about how Jesus died for our forgiveness. They would talk about things like forgive your...
Original post is: Watch as amazing GcMAF treatment kills cancer cells in real time… holistic doctors ‘suicided’ over this stunning breakthrough A breakthrough cancer treatment appears to be the reason why a handful of holistic doctors were recently found “suicided” is now gaining worldwide attention as a potential universal cure for cancer. And new microscopic...