-
34c3 intro
-
Herald: So, to our next talk... Sit and
relax, you know what that means. Glass of
-
wine or mate, your favorite easy chair,
and of course your latest WIFI enabled toy
-
compromising your intimate moments.
Barbara Wimmer, as free author and
-
journalist, will tell you more about the
Internet of Fails,
-
will tell you more about where IoT goes
wrong. She's a free author and journalist
-
at futurezone.at, (DORF?), and will in the
near future release one or two public
-
stories and a book. Applause!
applause
-
Barbara Wimmer: Hello everybody. I'm
waiting for my slides to appear on the
-
screen. Where are my slides please? That's
not my slides.
-
Oh, thank you very much. So welcome to the
talk Internet of Fails when IoT has gone
-
wrong. This is a very negative topic title
actually and you're getting a lot of
-
negative stories in this next hour but I
don't want to talk only about negative
-
things so you can see "FAIL" as a "first
attempt in learning". So actually at the
-
end of the talk I want to talk about
solutions as well and I don't want to
-
provide only bad and negative examples
because that's what we hear every day. And
-
this is perfect for the congress motto
"tuwat" because this is all about let's
-
tuwat together. So nobody, most of you in
this room don't will not know me. So I'm
-
going to introduce myself a little bit and
why I'm talking to you about this topic,
-
because that's probably what everybody
asks me when I appear somewhere and say oh
-
I give talks about IoT. And so actually I
work as an IT journalist for more than 12
-
years. And I got in contact with internet
of things in 2014 when I talked to the
-
local CERT.at team in Austria. I'm from
Vienna. And they first told me that the
-
first refrigerator was caught that was
sending out spam mails and that was in
-
2014 and actually that was really a funny
story back then and we were laughing about
-
it but at the same time we already knew
that there is something coming up which is
-
quite going to be a huge development and
so from back then I watched the whole IoT
-
development in terms of security and
privacy. And in the next 45min you will
-
hear a lot of stuff about IoT, and where
the problem with IoT is currently and
-
examples of fails in terms of security and
privacy. But like I mentioned before I
-
wanna talk about solutions and when we
talk about solutions it will not be like
-
only one side, like only the consumer,
only the IT-security, only developers.
-
Actually what I'm going not to provide is
detailed IT-security stuff. So if you
-
wanna focus more on any story that I'm
talking about I'm mentioning most of the
-
the sources in the slides and if you
really wanna know this example got up,
-
please look it up if you're really
interested deeply into it. I'm a
-
journalist and not an IT-security person
so please don't expect me to go into
-
details in this talk. Thats why it's also
in the ethics talk - ethics section of the
-
congress and not the security part. So
coming to the internet of things I want to
-
start with a few numbers because these
numbers show the development of IoT. In
-
2016 we had 6.3 billions of devices out
there. This year we already had 8.3
-
billion of devices and in 2020 we will -
we are going to have 20.4 billion
-
connected devices out there. So the
numbers are from Gartner Institute from
-
January and I have one more slide with
more accurate data from June this year and
-
actually this slide shows that the
development is actually really growing.
-
17% more compared to the previous year.
And by 2021 global IoT spending is
-
expected to reach about 1.4 trillion
dollars. So maybe some you are asking
-
yourself: What is the internet of things?
Maybe some of you expected I'm only
-
talking about a smart home, because IoT is
often related to the smart home. And we're
-
having all the smart devices that we put
into our living rooms, but that's actually
-
not the main focus because it's more about
the connected everything. Which means
-
toys, sex toys, home automation,
lightbulbs, surveillance cameras,
-
thermostats, but also digital assistants
and wearables. So I wanna start with a few
-
examples of classical internet of things
stuff which is actually a smart coffee
-
maker. That's ... so what is smart about a
coffee maker? It only gets ... it doesn't
-
get smart when you regulate your coffee
machine by app because what's smart about
-
that? You can just press the button on the
machine. But when you connect your coffee
-
machine with fitness and sleeping trackers
the coffee machine already knows when you
-
get up if you need a strong or soft coffee
in the morning and so that might sound
-
comfortable for some of us, but it also
has a lot of dangers inside, because you
-
never know that the data is really safe
and only stays with you. Maybe your
-
insurance company get them one day. So you
all know Cars -probably-, the film, and
-
this is McLightning Queen and it got a toy
nowadays which is sold for 350 dollars -
-
no sorry, euros - and this car is able to
sit next to you and watch the film with
-
you and is going to comment the film.
laughter
-
And it is - this sounds very funny - but -
and it is funny - but it means that it has
-
a microphone integrated which is waiting
for the terms in the film on the right
-
stories and then it makes comments. And
the microphone can only be turned off by
-
app so there's no physical button to turn
it off and actually another thing is when
-
you first ... when you actually got this
present for Christmas, which is a really
-
expensive present with 350 euros, it's
actually first updating for more than
-
35min before you can even use it. The next
example - you're already laughing - is
-
internet of ... I call it internet of shit
because you can't say anything else to
-
that example. It's a toilet IoT sensor
which is actually a smart, small little
-
box which is put into the toilet. And this
box has sensors. It's an Intel box but I
-
don't know and this box has sensors and
these sensors help analyzing the stool.
-
And this data that is collected is going
to send into the cloud. And actually this
-
could be very useful for people who are
having chronical diseases like Colitis
-
Ulcerosa or other chronical diseases with
the digestion stuff but it is mainly
-
designed for healthy people who want to
make better nutrition and reduce their
-
stress levels with the stool analysis. And
maybe it sounds good at the beginning but
-
this data that is collected could also be
used for other things in the future. So
-
it's a perfect example for internet of
shit. But there is another internet of
-
shit which is a twitter account that
collects all these funny little stories.
-
It's not from me, so I'm not behind that.
I tried to reach the person but I never
-
got a replay so I can't tell you anything
about them but they collect examples - if
-
you don't follow them now and are
interested in this topic you might do
-
after this talk - so after presenting a
couple of IoT examples with the good and a
-
bit of the bad sides I first wanna focus a
little bit on the problem because as I
-
said before you might now think that
everything is nice, comfortable, why
-
shouldn't we do that and stuff like that.
So the problem is that most of the vendors
-
that are doing IoT stuff now, that start
to connect everything, they are creating
-
manually operated devices without
connectivity for long years and they had a
-
lot of knowledge in terms of materials,
ergonomics, mechanical engineering but
-
almost zero in the fields of IT security.
Actually I don't say that without having
-
talked to vendors that have said exactly
that when I interviewed them. Like there
-
was a lightbulb vendor from Austria who is
a really big vendor who is making
-
lightbulbs for years and years and years
and actually they started to make
-
connected lightbulbs in 2015 and when they
did that they ... and I asked them "Oh how
-
big is your IT security department?" "1
Person". So they didn't actually have the
-
knowledge that IT security might be more
important when they connect - when they
-
start to connect things. And actually the
result is that these vendors are making
-
the same sort of security errors than the
high tech industry was dealing with 15
-
years ago. So the early 2000s called and
want their web security, their lack of
-
security back. So there are all kinds of
problems we already know from past:
-
hardcoded passwords, unsecure bluetooth
connections, permanent cloud server
-
connections and a lot of other stuff. So
we're going to have from all these 20
-
billion devices out there, there will be a
lot of unsecure devices and the problem is
-
that they are collecting to a botnet and
are starting DDoS attacks and we are going
-
to have internet outages. For those who
are not familiar with the terms I made a
-
really really really short explanation so
that you are also understanding what I am
-
talking about. A botnet is a network of
private computers infected with malicious
-
software and controlled as a group without
the owners knowledge. Like the example of
-
the refrigerator that was sending out spam
I told you about earlier. This
-
refrigerator sent out ... one refrigerator
was sending out 750.000 spam mails by the
-
way. So the botnet, that has a botnet
owner of course, because it's not only a
-
zombie botnet, and the botnet owner can
control this network of infected computers
-
by issuing commands to perform malicious
activities like DDoS attacks. So DDoS is a
-
distributed denial of Service attack and
actually that's an attempt to stop
-
legitimate users form accessing the data
normally available on a website. And this
-
actually can lead to completely shutdown
of a service. And we had this already so
-
I'm not talking about something in the far
future but we had this in 2016 and most
-
people already recognized it but it didn't
recognized why - their twitter accounts
-
did not work, they couldn't use Reddit, or
Spotify, or they couldn't pay with PayPal
-
at the moment. And behind that attack was
Mirai so several other major services were
-
offline because an infrastructure provider
was attacked by zombie IoT devices. And
-
this was one year ago and now one year
later Mirai botnet infections are still
-
widespread so not every zombie device is
already secured so there are still some
-
around and not so little and actually
there is a study saying that every
-
unsecured - no every botnet infection
that's there - every security hole thats
-
there is staying there for at least 7
years which means that all the unsecure
-
devices which are out now could get
infected and could stay infected for 7
-
years. So that's why it's very important
that we are going to do something really
-
quickly and not starting like in 2020. So
Mirai was supposed to continue in 2017 and
-
actually a lot of DDoS attacks similar
attacks like Mirai happened in 2017. This
-
as an example could unleash at any moment
which was in November one few days later
-
exactly this attack was unleashed, so it
happened. In 2017 we also had a huge
-
increase in DDoS attacks 91% increase from
Q1 and it's going to increase more. I have
-
to take a short sip, sorry.
Now we're coming back to examples. One
-
really good example is the university that
was attacked by it's own vending machines
-
and smart lightbulbs and 5000 other IoT
devices. This was very very difficult to
-
get fixed because they couldn't get the
university network down so they had to
-
find a really difficult solution to get it
back up. And actually how did they even
-
notice about it? Because the students
complained that the internet was going so
-
slow. Another example which has nothing to
do with DDoS attacks anymore but with IoT
-
sensors - actually - in a fishtank in an
American casino - north American casino
-
there were sensors measuring the
temperature of the aquarium and the
-
fishtank - that the fishes didn't die -
and these sensors were sending the data to
-
a PC of this casino and this PC was the
same - was using the same network than the
-
sensors so actually the cybercriminals
could access to this data of the casino
-
and were stealing them and sending them to
their own servers in Finland. And the
-
amount was about 10GB of data. Another
example which is actually one of my most -
-
I don't know why but it's the example I
personally like most of the whole examples
-
that are collected in 2017. So there was a
surveillance camera bought by a
-
netherlands woman. Actually she wanted to
surveil her dog when she was out at work
-
but what did this camera do? It did
surveil the dog when she was out at work,
-
but when she was at home the camera
followed her through the room and was
-
watching her all over the place. And it
had a microphone integrated and one day it
-
started to talk with her and it said "hola
señorita". And this woman was so
-
frightened that she actually started to
record that because she thought that
-
nobody will buy this story. All will think
I’m crazy but this camera actually did not
-
surveil the dog but was hacked and
surveiled her. And it was a very cheap
-
camera by the way. She bought it in a
supermarket but we don't know the name of
-
the vendor in this case. So coming for a
very cheap camera to a very hightech
-
camera the cameras you see here is one
that is actually build in a lot of
-
companies and there was a security hole
found by some Vienna security specialists
-
from SEC consult and actually they
demonstrated me how they could actually
-
hack into this camera and how they could
make it possible that this camera shows
-
pictures of an empty room in a bank so the
pictures from the empty room in the bank
-
were shown to me and in reality the bank
was robbed - ok, not in reality. But it
-
could have been robbed. So thats actually
sounding a little bit like a movie scene
-
and actually this camera which is sold as
a security camera is kind of useless when
-
it doesn't have security and it doesn't
really show the picture. And the problem
-
with this camera was hardcoded passwords.
And the hardcoded password got fixed after
-
so it was responsible disclosure process
and this camera is safe now. So I'm coming
-
to a different example now. And this now
finally explains why this toy is sitting
-
here. Before my talk everybody was telling
me "Ah, you brought your favorite toy, to
-
protect you during your talk." and I was
laughing "Oh no. No no no no, it one of
-
the most unsecure devices out there." But
before we come to this in special I'm
-
going to talk a little bit about connected
toys. So the Germany Stiftung Warentest
-
had made a study regarding connected toys.
The people were testing them and actually
-
all of their tested bears, robot dogs and
dolls were very very unsecure and some of
-
them were even critical and are extremely
critical and others were critical. And
-
actually what was the problem with the
toys and also with this? They were using -
-
they are using bluetooth connections. And
these bluetooth connections are not
-
secured by a password or a PIN code. So
every smartphone user close enough could
-
connect to the toy and listen to children
or ask questions or threaten them and
-
another problem are the data collecting
apps related to this stuff. So actually
-
this little unicorn has an app where you
can send the messages. So what does this
-
actually? It can play messages and you can
- as a child you can record messages and
-
send it to you mom or your dad. And when
you play messages you never - the heart
-
blinks. So actually there's a message
waiting for you now. And I'm not sure if
-
it's the same that I recorded earlier
before. Maybe now it is, maybe at the end
-
of the talk when I press the button again
it might not be. And so everybody can - so
-
this - err sorry - This device does have
an app where you can send the message to.
-
And it also has a children interface and
where you are using the children interface
-
you're seeing that there are ads
integrated. And in the children's
-
interface there were ads for porn and
ehm... ...other stuff, which are not
-
really in the best hands of a child. And
this is also what Stiftung Warentest has
-
actually - yeah has actually found out.
The data is also used to send to third
-
party companies and they put trackers to
control the online behavior of their
-
parents. This is also done with this
device. So the Stiftung Warentest advises
-
a not connectible dumb teddy might be the
smarter choice in the future. And before I
-
finally press this button - you're
probably curious now - but first I'm going
-
to talk a little bit about Cayla. You
probably have heard of Cayla as a very
-
unsecure doll. Actually it got forbidden
in Germany by law. It is judged as a
-
prohibited broadcasting station. And
parents who do not destroy it will be
-
actually fined. And I tried to buy Cayla
in Austria and didn't get the doll. So
-
actually it should be really off the
market in the German speaking area. And
-
actually that is also a result of a
campaign from Norway called Toyfail, which
-
is a Norwegian consumer organization who
are actually - this is Cayla. You can see
-
her now. Which is actually going to the
European Parliament to make them
-
understand how unsecure toys is doing a
lot of harm and how we should put more
-
security into toys. And I've brought a
short little video and I hope we can hear
-
the audio here as well. We will see.
No. You don't hear anything.
-
But this doesn't matter because they
have...
-
Sign Language Interpreter: subtitles
Barbara: subtitles.
-
Person (Video): There's not added any kind
of security. With simple steps I can talk
-
through the doll and listen to other
people.
-
Person through doll (Video): No one wants
others to speak directly through the doll.
-
Barbara: He's speaking now at the moment.
Doll: inaudible
-
Person: And you may think... [see video
subs] ... Cayla, can I trust you?
-
Doll: I don't know.
laughter
-
applause
Barbara: Yeah and we don't trust Cayla and
-
we also don't trust our little unicorn.
button clicking
-
laughter
crying baby in background
-
Barbara: Ok, somebody has hacked it.
laughter
-
Yes.
Unicorn Toy: Hello, Chaos Communication
-
Congress.
Barbara: Ok, that's what I recorded
-
earlier. But there is some time left.
Maybe, maybe... but you're all sitting too
-
far actually and nobody of you brought
your computer, so... but we will see, we
-
will try it later on. So but actually you
shouldn't trust this unicorn, because this
-
unicorn is from the company called
Cloudpets, which is a - no sorry It's a
-
toy called Cloudpet and the company is
Spiraltoys from the US. So this is
-
Cloudpet and there are cats and dogs and
unicorns and it's very ugly but it's a
-
unicorn. And actually now I'm already
talking a lot about this. Why I'm
-
explaining you now. There already was a
data breach with this toy so the
-
children's messages in Cloudpets data
actually was stolen and was public on the
-
internet. 2 million voice messages
recorded on the cuddly toys has been
-
discovered free on the internet. And
actually Spiraltoys say that there was no
-
data breach but the data was there, so...
Thats also why I brought this, it was
-
still very easily available and actually
as I said before the app for child the
-
interface shows porn ads, so I would not
recommend that for your child. Actually
-
there are already a lot of institutions
out there which are warning for connected
-
toys also the consumer group Which? which
actually did a study about this and other
-
like also the Furby connected they
analyzed, the German Stiftung Warentest,
-
the Austrian Verein für
Konsumenteninformation, the Norwegian
-
consumer council, and the FBI. The list is
to be continued. So consider if you really
-
need a connected toy for your child or
yourself because the next section is about
-
sex toys.
laughter
-
applause
squeaky horn
-
more laughter and applause
I am not... It's not necessary say a lot
-
about this example. It's actually a
connected vibrator that has a build-in
-
camera and this camera is very very very
unsafe. Also this toy is really expensive,
-
so you can't say "Eh, it's only the cheap
stuff that is so unsecure." Also the high-
-
tech stuff can be really unsecure. I mean
this vibrator costs 250 dollars so it's
-
very expensive and it has a build-in web-
connected endoscope and they found out
-
that it's massively insecure. The password
of this... And if you forgot to change it
-
it's a few more players than expected that
might be watching your newest video about
-
your private sex adventures. There was
another example actually in this - sorry
-
go back one more time to this example -
there's a very funny video on it on
-
youtube about it, maybe you wanna watch
it. I didn't bring it because I couldn't
-
reach the makers of it. So I'm going to
the next example which is about a case of
-
sex toy company that actually admits to
recording users remote sex sessions and it
-
called it a "minor bug". It was this love
sensor remote app you can see the icon
-
here and actually this is a vibrator and
an app and the vibrator controlling app
-
was recording all the sex sounds, all the
sounds you're making when you're using
-
this vibrator and stores them on the phone
without your knowledge. And the company
-
says that no information or data was sent
to the servers so this audio file exists
-
only temporarily and only your device. And
they already had an update so actually
-
this is not as funny as the other story
but still it's an example of how unsecure
-
sex stuff can be. So there are lot of lot
of more sex examples out there. One you
-
should actually definitely search for
after - please don't search for now, but
-
after this talk. You could google or
duckduckgo or whatever you use the terms
-
"blowjob injection". And please add
"security" because otherwise you will land
-
on other sites.
laughter
-
And this was a female security expert who
was doing this research about a device
-
which actually was supposed to your
girlfriend could make you a special
-
blowjob program, your special blowjob and
this could be hacked so somebody else's
-
blowjob might appear instead your own.
laughter
-
So there's also a story about a map of
buttplugs in Berlin that are unsecure.
-
Also if you're interested in that please
also search for that story. Because it's
-
funny to talk about this, but I also wanna
talk little bit about things that we could
-
actually do. And one of the projects in
this part is actually doing something
-
thats called the "internet of dongs
project - hacking sex toys for security
-
and privacy". And as you can see it's
supported by PornHub, which in this case
-
means that they get money from PornHub
that they can buy sex toys for their
-
research. So PornHub is sponsoring them.
Actually I did for talk to the guy who is
-
behind this project. He's called
Randomman. That's a render of him and this
-
is the website by the way. So he told me
he's currently - they're currently a team
-
of about 15-20 people out there that are
doing their security research in their own
-
spare time. And they are not getting any
money for it and they also don't want to
-
get any money but they are already looking
for more security experts that wanna join
-
the team and also they have also an
ethical codex and stuff like that and
-
actually one of the most important things
that he was telling me is that he doesn't
-
want that you should stay off connected
sex toys at all, but to find the security
-
holes that we are all able to use them if
we want without any fear. So yeah, you can
-
get in contact with him if you're
interested. Coming to a different section
-
now. You can see I'm switching from
security to security and privacy and now
-
I'm landed on the privacy section. This is
Google Home. And we all know that there is
-
also Amazon Echo and digital assistants
are also smart IoT devices and this is why
-
I wanna talk a very very short time about
them because I'm sure a lot of people got
-
those devices for Christmas. Actually
there was a big increase of digital
-
assistants in the last year int this
quarter 3 of 2016 there were only 900.000
-
of such devices sold and in the quarter 3
2017 we had more than 7.4 million of those
-
devices sold. So there's a huge increase
and we don't even have the numbers of the
-
Christmas time. Yeah you have seen it. so
why I wanna talk about it, because when
-
you put this kind of stuff in your home it
might be very comfortable at the beginning
-
because you don't have to look up the
weather information you can - you don't
-
have to read your emails you can make the
device read your own emails you can use
-
them to program your list of what you're
going to buy and stuff like that but
-
that's how they learn a lot about the
users habits and their personalties and
-
those devices will learn more and more
information about you and this information
-
does not stay in your own home it actually
is going to send to the servers of amazon
-
and google and I don't need to tell you
what amazon an google are doing with this
-
data. current at least currently they are
only collecting it but that's very
-
valuable and they turn around and use it
or sell it in various ways to monetize
-
that information in one of the future
days. So all digital assistants send the
-
voice controls that are made after "Ok,
Google" or "Alexa" to their servers and
-
the data will be saved there and it was
not possible for me to find out for how
-
long and at which servers. It's not in
their terms of conditions and I couldn't
-
find it anywhere. So also the German data
privacy delegate Andrea Voßhoff didn't
-
find this information. She criticized that
"It is not easy for users to understand
-
how, to what extent and where the
information collected is processed. Also,
-
it is not clear how long the data will be
stored." So if you still want those
-
devices in your home now there are at
least physical mute button with google
-
home and amazon echo and you can also
change the settings to control the data so
-
all the data that is collected is regulary
deleted from the servers but of course you
-
never know in how may backups it's
collected as well. So yes it's only
-
recording after this voice control but
both devices already got hacked and yeah I
-
didn't amazon echo got hacked in 2016 and
google mini got hacked in 2017 of course
-
both problems got fixed and when I say got
hacked it means that the devices in your
-
home were listening to the conversations
all the time. So I'm coming -
-
unfortunately the funny examples are over.
I'm coming to the part where I wanna speak
-
about what we can do against the lack of
security and lack of privacy with the
-
internet of things. So we are currently
having the status quo where we are having an
-
information asymmetry between the vendor
and the customer. Currently the
-
manufacturers do not need to provide a
sample information but(?) how security of
-
a device such as how long it will receive
security updates. so when we buy a device
-
we never know... oh is it going to be safe
or not. So what we need ... actually what
-
we need. I did write a couple of things -
I write down a couple of things here which
-
are partly stolen by the green MEP Jan
Philipp Albrecht from his program because
-
he's dealing a lot with that kind of
question what we can do with his work and
-
I'm also - I also was stealing some of
those suggestions from the Renderman from
-
the Internet of Dongs project, he also had
some helpful tips. And I also stole some
-
of the information from security experts I
talked in interviews all of the time
-
because we never talk only about the bad
things we always - we all want to get the
-
internet of things safer at the end. So
some of them suggested that we could need
-
an security star rating system similar to
the energy labeling. And when we talk
-
about security star ratings that could
mean that we use a label. When a device
-
gets security updates for free for the
next five years it gets the A++ label, if
-
it's no updates at all and it stays
unsecure it gets the baddest rating or
-
such things. Actually vendors should also
be forced to close security holes instead
-
of ignoring them. And they should provide
the security researchers with email
-
addresses where we can easily report
security flaws because sometimes the
-
hardest part of the game is to actually
find the right contact to send out the
-
information about what is unsecure and
what's not. What we also need is a
-
mandatory offline mode for electronical
devices so this device at least has a
-
button where you can turn it off. so it
doesn't listen to you permanently. And we
-
need that for all devices - all connected
devices. Also an airbag and seatbelt for
-
the digital age and we also have to talk
about product liability and a clear update
-
policy. so there are also good examples
that we are having now. Actually all what
-
I was talking about here is regulation.
Regulation that is not existing at the
-
moment. But there is some regulation that
is existing in the kind of data which is
-
the GDPR the General Data Protection
Regulation which is coming up in May 2018
-
and it has included some really really
really helpful things: privacy by design
-
and privacy by default. And more
possibilities for law enforcement. And
-
this is very very important because it
doesn't say that because we are going to
-
have a regulation about privacy by design
and privacy by default this is really done
-
by the vendors. Actually when is was
interviewing some of them they already
-
told me that it's not their plan to
integrate that in their products they are
-
going to wait until they are sued. They
say "Oh, we don't need it. why should we
-
do it worked now - nope." So that's why
the law enforcement comes into place and
-
maybe some of you know Max Schrems, he's
also speaking here in two days about
-
something else though and he a data
protection activist. And he says that
-
everything that goes will be done in this
phase we are now, but if vendors won't
-
observe the law we have to remind them to
do it. So this is how he looks like and he
-
says that with this new regulation we can,
as a customer, ask for compensation when
-
data breaches occur. We couldn't do that
so easily now but with this new regulation
-
it will get a lot of easier. And if 4
billion people sue a company and ask for
-
compensation that could be a bit expensive
at the end. So if you are not able to sue
-
anybody yourself, which is not cheap so
nobody - not everybody will secure
-
companies you can support organizations
that help you with that like the new
-
organization from Max Schrems called "None
of Your Business" maybe you have seen this
-
already, I'm not saying that you should
support especially (???) this
-
organization but his plan is to actually
do that stuff I explained earlier: sue
-
companies that are not abiding to the law.
So if you wanna visit the website they
-
currently collecting money. What else can
consumers do? That are no easy tips but we
-
can't do much except a few easy things.
Does this product really need an internet
-
connection? Is it possible to turn it off?
Is it still working after that? What do we
-
find about it on the internet? Can we
reach the vendor? Does the vendor reply
-
when I have a question? Do we get more
information? Sometimes also clicktivism
-
helps to stop vendors making stupid
decisions. Here is another example from
-
the vacuum robot cleaning machine Roomba
who wanted to sell the data that is
-
collected from the home from the vacuum
cleaner and actually there was a huge huge
-
huge shitstorm after he was announcing
that - the CEO that was announcing that.
-
And after the shitstrorm the CEO said "Ok,
no nono. We're not collecting. We're not
-
selling your data. No no." So sometimes
this helps as well and of course follow
-
the basics in IT-security please update
everything that has updates, separate
-
networks from IoT products and use safe
passwords, support open hardware, open
-
software, products where the data is
stored locally is always better than in
-
the cloud and if you're tech savvy enough
start - which I think you are here - start
-
building your own tools. Because you have
the control. And what can developers do?
-
Support privacy by design, security by
design, think about it from the beginning
-
because you can change it and take
responsibility. And IT security can also
-
do some stuff or continue to do some
stuff. Point the vendor to the problems,
-
make helping IT security stronger, keep
reporting the flaws, publish your
-
research, help develop standards, labels
and seat belts and support each others
-
work to a stronger voice about this. So
I'm coming to the end of my talk now and
-
to the topic back to the internet of
fails: How many must be killed in the
-
Internet of Deadly Things train wrecks?
This is actually an article I was reading
-
with a huge interest myself because it was
starting to deal with making comparisons
-
to the great age of railway construction
that was likewise riddled with decades of
-
disasters before the introduction of
effective signaling and failsafe breaks.
-
And it was also comparisoned with the
automotive industry where the mandatory
-
fitting of seatbelts designing the bodies
of cars to reduce injury to pedestrians,
-
airbag and measures to reduce air
pollution were not introduced not early
-
enough. So this guy was asked: Do we
really need to kill a few people first?
-
And he said: Unfortunately that will happen.
So he says: Safety and security standards
-
for the internet of things can't come soon
enough. I agree with that. With that we
-
need standards really soon. So I am at the
end of my talk and if we have some time
-
left I'm waiting for your questions,
ideas, and input now. Otherwise I will
-
thank you very much for your attention.
-
applause
-
Herald: Thank you Barbara. A very warm
applause.
-
So a small information: If you want to
exit the room please exit the room to your
-
left over there. So, questions?
I see one question from the Signal Angel.
-
Q: Hello, ok. The internet wants to know,
well those companies don't have any IoT
-
security whatsoever or basically none, so
what can we do to make them have more?
-
B: What we as who, as consumers?
Q: Yeah, basically.
-
B: Yeah, actually I would - what I said
was I would write them and ask for
-
standards. I would - I think it can be the
first step that we can write emails or
-
call them and say "Well, what kind of
security is build in this device, can you
-
tell me? Otherwise I won't buy your
product."
-
Herald: Thank you. Any other question? Ok,
in this case again: Thank you Barbara for
-
your nice talk.
applause
-
A very warm round of applause. Thanks.
-
34c3 outro
-
subtitles created by c3subtitles.de
in the year 2018. Join, and help us!