Bestand wählen
Merken

Internet of Fails

Zitierlink des Filmsegments
Embed Code

Automatisierte Medienanalyse

Beta
Erkannte Entitäten
Sprachtranskript
the so to our next talk center that's you know what that means there's of wine or Martin the favorite easy chair and of course if this Wi-Fi-enabled story compromising your intimate moments Bobrove alone as free author and the list will tell you more about the Internet of fails I will tell you more about where I 0 t is good wrong she is the free although and a at futures zone for about 18 the I have and will in the near future use 1 or 2 public own stories and the book thanks the hello everybody and I'm waiting for my slides to appear on the screen where are my slides please That's not my slides well thank you very much so welcome to the Talk Internet of fails when I the has gone wrong and this is a
very negative topic title actually and you're getting a lot of negative stories in this next hour but I don't want to talk only about negative things so you can see the face of is the 1st attempt in learning so actually at the end of the talk I wanna talk about solutions as well and I don't wanna provide only bad and negative examples because that's what we hear it every day and
this is perfect for the congress model toolbox because this is all about that too much together
and so no body and most of you in this room don't do not know me so I'm going to introduce myself a little bit and why I am talking to you about this topic and because that's probably what everybody asks me when I appears on there and say I didn't give talks about IT and so actually I work as an IT journalist since more than 12 years and I got in contact with the Internet of Things in in 2014 when I talked to the local staff at the team in Austria and from the end up an end they 1st told me that's the 1st refrigerator most called that was sending out spam e-mails and that was in 2 thousand and 6 14 and actually really that was really a funny story back then you all laughing about it but on the same time the irony new debt is something coming up which is clive they're going to be a huge developments and and so from back then I watched the whole idea development and in terms of security and privacy and
than in the next 45 minutes you will hear a lot of stuff about my ends but the problem with dieting he is currently examples of fails in terms of security and privacy but like I mentioned before I also wanna talk about solutions and so that when we talk about solutions it will not be like on the 1 side I don't mean the consumer on the IT security on the developers actually what I'm going not to provide the is deep high detailed security starts so if you wanna focus more on any story that I'm talking about I'm mentioning most of the sources in the slides and if you really wanna know a hollow of this example that up but he's look it up if you're really interested deeply into it I am a journalist and not an IT security person so please don't expect me to go into details in this talk that's why it's also in that ethics talk at the I 6 session of the Congress and not that security part so coming to the Internet of
Things I want to start with a few numbers because these numbers show to development of fire and in 2016 we had 6 points we billions of of devices out there this year we already had 8 comma decimal 3 billions of devices and in 2020 will have we are going to have 20 comma decimal 4 billion connected devices out there so the numbers of from Gartner Institute from generating and I
have 1 more slide with war accurate data from June this year and actually this slide shows that the development it's actually really drawing and 17 their 17 per cent more compared to the previous year and by 2021 global IT spending is expected to reach about 1 comma decimal 1 point 4 trillion dollars
so maybe some of you are asking yourself what is the Internet of Things maybe some of you also expected I am only talking about the smart home because my AT T is often related to what a smart home and and we in like all the smart devices the that would put in our living rooms but that's actually not the main focus because it's more about this connected everything which means poorest sex toys home automation light evolves so weight and cameras chemist that's but also digital assistants and variables so
I wanna start with a few examples of classical Internet of Things stuff which is actually a smart coffee maker that what so what is mine about a coffee maker and it only gets in and it doesn't get smart when you regulate your coffee machine by because what's smart about that you can just press the button on the machine but and when you connect your coffee machine with fitness and sleeping trek and the coffee machine already knows when you get on if you need assistance Romulus of coffee in the morning and so that might sound confortable for some of us but it also has a lot of dangerous inside because and you never know that the data is stored in a safe and on the stage was you know maybe your insurance company gets them 1 day cell
and you all know cars hope and probably the film and this is lighten clean and it got toy nowadays which is a solid force 350 dollars no sorry euros and in the end just fire a stable sits next to you and watch the film with you and it's going to comment on the field and it is this sounds very funny and this funny but it means that it has a microphone integrated which is waiting for the terms in the field on the right authorities and then it makes comments and the microphone can only be turned off by and so there's no physical buttons and turned off and actually another thing is when you 1st when you actually what's this present for Christmas which is a really expensive friends present mystery and a 50 dollars and euros it's actually 1st updating for more than 35 minutes before you can even use it the next
example you already being its Internet of psychology Internet of shit because you can't you can't say anything else to that example it's a toilet I U T sensor which is actually a smart that a small little box which is put into the point and this box has sensor it's an internal books but I don't know and in this book systems there's and the senators held analyzing the stools and this data that is collected is going to stand in tool that cannot and actually dis- could be very useful for people who are having chronic diseases likely disordered civils up or adults trying to diseases were with those that Czeschin stuff about it is mainly designed for have some people who want to make a better nutrition and food to reduce distress levels so still analyzes and you and maybe it sounds good at the beginning but this data that is collected could also be used for other things in the future so it's a perfect example for Internet of ships but there's another Internet of
shit which is a Twitter account that collects all this funny little stories it's not from me and so I'm not behind that I tried to reach the person but like you could never never got replies so I can't tell you anything about them but they collect examples if you don't follow them now and I'm interested in this topic you might do after this talk and so
I'm after presenting a couple of fire t examples with the good and bad deeds of Tibet side first one of focus and a little bit on the problem you hand because as I said before you might not think that everything is nice comfort Table of why shouldn't we do that and stuff like that so the problem is that most of the winners that I'm doing I stuff now and that started to connect everything they they're creating manually operated devices without connectivity for long years and they had a lot of knowledge in terms of materials Arab anomic mechanical engineering but almost 0 under the of IT security actually I don't say that without ever having talked to vendors that say exactly that to me when I interviewed them like there was a light bulb when they're from Austria who is a really big when who is making light bulbs fall in the years and years and years and actually and they started to make connected by pipes in 2015 and when they did that day they actually I and I asked them over because the IT security department 1 person so need they didn't actually have their their knowledge that IT security might be more importantly when they connect manage start connects sings and
actually the result is that these vendors I'm making the same sort of security arrows than the high-tech industry was dealing with 15 years ago so daily to sell science called and once they're web
security dialect of security
so there are all kind of problems we already know from the past hard-coded passwords unsecured Pluto's connections permanent cannot connect Clouds'' connections and a lot of other stuff
so we're going to have and from all of these 20 Indian devices out there there will be a lot of unsecured devices and the problem is that they are collecting to a botnet and starting the DOS texts and we're going to have infinite outages for
DOS to and not that familiar with the terms and I made it really really really short explanation so that you also understand you what I'm talking about the pork that is a network of private computers infected with malicious software and controlled as a group without the owner's knowledge like the example of the refrigerator that was sending out spam and told you know about building found this refrigerator sent
out 1 refrigerator was sending out 700 50 thousand spam names by the way so and about
that has the botnet not of course because it's not only a zombie botnet and the botnet owner can control this network of infected computers by issuing commands to perform malicious activities like the DOS a text
so the doors is a distributed denial-of-service attack and actually that's an ad tends to stop clickety meant we from accessing the data normally available on the website and this actually can lead to a completely shut down a service and we had this
already so I'm not talking about something in the far future but we had is that in 2016 and this is where the most people already recognized it but it didn't recognize why and did 2 at a constant work they couldn't use ready was quantify order couldn't pay up with people at the moment and behind that attack was you're right so several other major services offline because infrastructure provider was attacked by somebody IOT devices and this
was 1 year ago and now 1 year later yeah botnet infections are still widespread so not every zombie occur device it's already secured so there are still some around the not so little and actually there's a study saying that every unsecured and every apartment infection that's there every security hole and that's there is staying there for at least 7 years which means that all the unsecured devices which are out now I could get infect them and could stay infected for 7 years so that's why it's very important that we are going to do something really quickly and not starting like in 2020 so yeah I
was supposed to continue in 2017 and actually a lot of the DOS the texts and similar attacks like murine happened in 2017 this is an example could unleash at any moment which was in the Member 1 of the few days later I expected this detector was unleashed so it happened in
2017 we also had a huge increase in the DOS attacks and 91 per cent increase from Q 1 and it's going to increase the more so I
have to take a short story now we are coming back to examples have 1 really good example is the university that was at tech its only when the machines and smart light bulbs and 5 thousand other IoT devices this was very very very difficult to get fixed because they couldn't take the university metric down so they had to find a really difficult solution to get it back up and actually how did they even notice about it because the students complained that the internet was going so slow
and another example which has nothing to do with the DOS the text anymore but to is with society sensors actually in a fish tank in American casino North American scene there rest a sensor system which where measuring the temperature and after Kamari and the fish tank and that the future student died and the sensors we're sending the data to a PC ofthis casino and this to see was the same was using the same network and defense so actually the cybercriminals codes access to this data after casino and diverse stealing them and sending them to their own service in Finland and that amount was about 10 gigabytes of data another example
which is actually 1 of my most I I I don't like I don't know why but stick sample I personally like most of the whole of examples are collected in 2017 and so there was this awakens Cammarata blood by and Netherlands women actually she wanted tool learning he wanted to so way her dog when she was out of work but the in it what did Justice Kemmerer do it did so with the dark when she was out of work but when she was at home on the Cammarata I followed her through the rule and we're watching her all over the place and it had a microphone and integrated and 1 day it started to talk with her and instead points in the report of and this woman must so frightening she actually started to recall its debt because she's she's sort nobody will buy this story and should always think I'm crazy but this camera actually did not so where the dog but was hacked and so when her and he was a very cheap Kemmerer
by the way around it what she wanted in a supermarket but we don't know the name of the vendor in this case
so coming from a very cheap to a very high tech catamaran the cameras you see here only in this environment it is actually built in a lot of that companies and there was a security hole farms by some Vienna security specialist's there from SEC Consult and actually they demonstrated mean how they could actually hack into this camera and how they could making it
possible that this camera shows picture of an empty room in bank so the pictures from the empty room in the bank were shown to me and in reality the bank was robbed OK not in reality it could have been rocked and so that's actually sounding a little bit like move fish movie she's seeing and that actually this camera and which is sold as a security camera I what this kind of useless I mean it doesn't have security and doesn't really show at the picture and the problem with this camera was hard coded passwords and the hard-coded passwords I got the thanks after so it was their responsibility disclose the process and this camera safe now so I'm
coming so but different example now than it is now finally explains why a sitting here before my talk everybody was telling me not you brought your favorite toy tool that protects you during your talk and I was laughing no no no no no it's not protecting me it's 1 of the most unsecured devices out there have but before we come to this in special and I'm going to talk a little bit about connected toys so the Germany Stiftung bottom tests had made a study regarding connected toys the people they're testing them and actually all of all of them tested here's robot dogs all very very very unsecure ends some of them there is much more critical and art extremely critical and others were critical
and actually what's what's the problem with this occasion with toys and also with this can there was there when using dead using Bluetooth connections and entities tools connections are not secured by a password or PIN code so every smartphone users close enough could connect to the toy and listened to a chair and ask questions or threatened them and
another problem and other data collected camps related to this stuff so actually gives you the little unicorn doesn't have varied you can send the messages so what does this actually it's it can play messages and you can roll Roderick as a child you can record messages and sent it to your mom or a that and when you playing messages you know my head and the heart links so actually there's a message waiting for you now and I'm not sure if it's the same let that I recorded recorded the year before maybe maybe now it is maybe at the end of the talk when level press the button again it might not be I mean and so everybody can get so this there sorry this device does have never met with where you can send a message to and it also has a children interface and when you are using the children interface Europe seeing that there are at that's integrated and in the children's interface the ads for porn and I mean others staff at which are not really in the best hands of child and this is also watched chiefdom bomb test has actually and yeah his actually found out the data is also used to send to search party companies and they put trekkers control the online behavior of their parents this is also done with these devices so just if demand test
devices and not connected will dump tell might be the smarter choice in the future
ends before and finally press this button you probably curious now but 1st I am going to talk in the bit and all of in case of you probably have heard of a case that has a very unsecured doll actually it's got forbidden in Germany by law it is judged as the prohibited broadcasting station and parents who do not destroy it will be actually applying and that tried to buy K Lane Austria and didn't get the dog so actually it should be you really off the market in the German-speaking area and actually that is also a result of the campaign from Norway collards toys failed which is a
Norwegian consumer organizations who actually this scalar consider now I mean which is actually going on to the European Parliament to make there make them understand hall unsecured toys is doing a lot of harm and how we should put more security into toys
and and I brought you as a short little video and I hope we can hear day all of your here as well we will see know you don't hear
anything the doesn't matter because
and they have subtitles
and this 1 off all
that the speaking now at the moment the
conversation thing the the
the OK yeah and
we don't trust scale and we also don't trust our little unique OK somebody has affected yes now of is the case of OK that's what I to what I reported earlier what there is sometimes left maybe maybe but you're all sitting too far actually and nobody brought of you brought your computer so but we will see I will try later on so but actually you should not trust is unique on because this unicorn is from the company called pinout contest which is no sorry it's it's a toy called can head and accompanied Spiral Toys and from the U.S. so it is its clout that and their kept and docks and unique and it's very but It's a unique and actually in the I'm already talking a lot about this what I am explaining now their own work or edited by Reddy was a data breach with this
toy so the children's messages in cannot pets data actually was stolen and was public on the Internet 2 million voice matched messages recorded on a cuddly toys has been discovered free on the Internet and actually and Spiral Toys say it there was no data breach but the data was there so and that's also why emperor I brought this in its was it's still very easy away labeled and actually as I said before that for a child the interface shows porn and so on I would not recommend Floyd your child's
actually there already a lot of institutions out there which of warning for connected toys also the consumer groups which which actually did a study about these and other like also the Fermi connected stay analyzed the German shifting monetarist Austrians for then comes men instruments until the Norwegian Consumer Council and the FBI the list is to be continued so I consider if you
really need a connected toy for a child for yourself because because the next lecture room is
about sex toys I
am not and it's not necessarily sphere not about this example you actually connected by breakdown that has a built in camera and manage this camera in very very very unsafe also
toy is really expensive you so you can't say it's only the cheap stuff that is so unsecured also the tech stuff can be really unsecure I mean this the greater costs with 250 dollars so it's very expensive and it has a built-in but connected endoscope and they found out that it's necessary insecure the past work
of and if you forgot to change it it's a few more players than expected that might be watching the news with you about the private sector interest there was another
example actually if in go back
1 more time to this example does a very funny video on its on you stupid but it's maybe you wanna watch what should I didn't bring it's because I couldn't reach their the makers of it and so
I'm going to the next example which is about a case of as sex toy company actually admits to recording users' remote sex sessions and it's called it minor block but it was this
love science remote you can see die come here and actually this
the greater and then at the and vibrator controlling that was recording all the six-ounce order sounds you making when you're using this whether greater and stores them on the phone without your knowledge and the company's
there's that no information of that data was sent to the server was so this audio file exists only temporarily and on the on your device and they already had an update so actually this is not as funny as the other story but still it's an example of how unsecure 6 stuff can be so there are a lot of a lot of a lot of more than 60 examples out there and 1 you should actually definitely search for after please don't search for now but after this talk to and you could pull the bora DuckDuckGo or whatever you use the terms chopped injection and means that security because otherwise you will end on the other side and this was a female security experts who was doing this research about and devised which actually was supposed to your graph girlfriend could could say make you a special launch program you special note and this could be so somebody else's blowjob might appear instead the only
so I mean there's always a story about the map of not in Berlin than that and secure I also if you are interested in that at least please also search for that story and because mean the it's funny to talk about this but I also wanna talk a little about about things that we could actually do and 1 of the project in this the is actually doing something that's called the Internet of dance can sex toys for security and privacy and as he concedes supported by point out in it which in this case means and that they get money from porn up that they can buy the sex toys for their research and so on and porn have is sponsoring them actually
I did this for the talk tools the guy who was behind this project is called when men and it's a render of him and so this is
the Web site by the way so he told me that he is currently there currently a team of about 15 to 20 people out there that they're doing the research security research in their own spare time and they are not getting any money for it and they also don't want to get any money but they are all the already looking for more security experts that 1 up showing the team and also they have also etiquette Codex and stuff like that and actually 1 of the most important things that she was telling me is that he doesn't want that you should stay off connected sex toys at all but to to find the security holes that where we all able to use them and if we want without any fear show yeah you can get in contact with him each Europe interested in coming
to a different sect she now you can see I'm switching from security to hear security and privacy and now I'm land it's on the Privacy section and this is still the home and we all know that there's also us on April and that digital disk systems are also smart a devices and that's why I wanna talk a very very very short time about them because I'm sure a lot of people got those devices for Christmas actually there was a big increase of in digital assistants in the last year in the squatter history of 2016 and their where only in 900 thousand of such devices sold and in the quarters 3 2017 we had more domain 7 point 4 millions of DOS devices sold so I guess it's huge increase and we don't even have the numbers of the Christmas time and
yeah you have seen it so why I wanna
talk about it because when you put this kind of stuff in your home it might be very confortable table at the beginning because you don't have to look up the weather information you you can you don't have to read the it's you can make the device reads as you can use them to program your lists of what you're going to buy and stuff like that about that how do they learn a lot about the users have bits and their personalities and those devices will learn more and more information about you and this information does not stay in your own home it actually is going
to stand to the service of the Amazon and Google and I don't need to tell you that what Amazon and Google of doing with this data current at least is currently there only collecting it stops and that's very value able and they turn around and use it or set it in various ways to monetize that information in 1 of the future data so
all digital assistants send the voice controls to them made after OK Google or LX to the serve and the data will be safe there and it was not possible for me to find out for how long and at which serve us it's not in the terms of conditions and I couldn't find it anywhere so also the
Chairman data-privacy delegate and the was soft and find this information she criticized that it's not easy for users to understand how to what extent and buried the information collected is processed also it is not clear how long the data will be start so if you still
want those devices in your home now there at least of physical mute button I was also with school home and so it at your and you can also change in the Settings to control the data so all the data that is collected it's a regular regularly to meet its from the service but of course you never knowing how many collected as well so yes it's only
recording after this voice controlled but it's in those devices already got hacked and yeah I didn't as Emerson echo but Hector in 2016 and cool Bimini got text in 2017 of course pose problems of got fixed in when as they got head it means that the devices in your home they're listening to the conversations all the time so I'm coming
but that unfortunately the funny examples over I'm coming to their parts where wanna speak about what we can do against the lack of security and lack of privacy with the Internet of Things so we are
currently having the start of war and where we are having an information as symmetry between the winner and a customer apparently the manufacturers that do not need to provide essential information about how security if a device such as how long it will receive security updates so when we buy a device that you never know all it's it's is it going to be the safe or not so and what
we need exactly what we need I did write a couple of things that have direct down a couple of things here which our partly still lose by the green energy density by pressure from his program because the stealing and there's a lot with that kind of question what we can do with his his work and I am also I also was doing some of those suggestions from Dick random and from the Internet of dance project he also had some helpful tips and I also stole some of the information from security experts I talked in interviews all of the time because we never talk only about the bad things we always that we all want to get the Internet of Things they fire at the end so some of them suggested that we put need to memorize a security star rating system similar to the energy labeling and when we talk about security star ratings that could mean that the used enable when when in a device in gets security updates for free for the next 5 years it gets state last class label if it's no updates the pollen in space and security gets defenestrating or so far such things actually when those should also be forced to close security holes instead of ignoring them and they should provide at this security researchers with e-mail addresses where we can easily report security flaws because sometimes the hardest part of the game is to actually find the right contact to stand out the information about what's unsecured what's not what we also
need to be is mandatory offline mode for electronic devices so this device at least has about where you can turn it off so it doesn't listen to you permanently and and we need that for all rise of connected devices Our also an air back and seat belts for the digital age and we also have to talk about products liability and the computer updates policy so
they're also good examples that we are having now actually all
what I was talking about here is regulation regulation that is not the thing at the moment but there is some regulation that is existing in the kind of
data which is the GDPR there the General Data Protection Regulation which is coming up in May 2018 and it has included some really really really helpful sings privacy by design and privacy by default ends and more possibilities for law enforcement and this is very very important because it doesn't saying that because we are going to have a regulation about privacy about privacy but fine and privacy by default this is really done by the actually when I was interviewing some of them they already told me that it's not their plan to integrate that in their products they're going to wait until they are this this although we don't we don't need it why should you do it worked now know so that's why they're
wider law-enforcement comes into place and maybe some of you know mocks Schrems he's also speaking here in 2 days about something else though and he's the Data Protection Act is and he's saying that everything that goes will be done in this phase we are now but if vendors' won't observed and all we have to remind them to do it so
and this is how it he looks like
and he says that with this new regulation we can as a customer asks for compensation and data breaches of curve we couldn't do that so easily now but with this new regulation it will get a lot of easier and if 4 million people you a company and ask for compensation that could be a bit expensive at the end
so if you are not able to you anybody yourself which is not she so as you know what the the pattern that everybody will secure companies you can support organizations that help you with that like the new organization for much limbs calls none of your business maybe you will have seen this already I'm not saying that you should support especially death disorganization but his plan is to actually do dead staff I explained earlier as you companies that I'm not a binding to the law so if you wanna visit the web said they currently collecting money
what else can consumers do that they're not his but we can't do much except if you these these things thus this product really need an internet connection is it possible to turn it off it is still working after
that what do we find about it on the internet can be reached at when the does the when there when I have a question do we get more information
sometimes also click the reason helps to stop vendors making the big decisions and here's another example from the vocal world what cleaning machine room but who wanted to sail of the data that is collected of from the home from the vacuum cleaner and actually there was a huge huge huge shitstorm after he was announcing that the CEO was announcing that and after this shitstorm the CEO state OK No no no we're not collecting I we not setting a date of no no so sometimes it is helps as well
and of course followed the base 16 IT security trees update everything that has update separated networks for IoT T. products and use use safe
past works support open hardware open software products vendor data is stored locally is always better than in the clouds end if Europe takes a enough start it with which I think you're here and start building your own tools because you have to control and what can
developers and support privacy-but assigned a security by design seemed about it from the beginning because you can't change it and
take a responsibility and I. T. security can also do some stuff of continued to do some stuff points that when there's 2 problems make helping I. T. security stronger to be reporting the floors publisher research help develop standards enables them seat belts and support each other's work to get this from the voice about this
so I I'm coming to that the end of my talk now and to the topic act to the Internet of fails how many must be killed in the Internet of get anything train wrecks this is actually an article I was reading was a huge interest myself because
it was starting to deal with making comparisons to the great age of rain reconstruction that was like a western reader with the case of disasters before the introduction of effective signaling and phase takes breaks the and it was also a comparison with the
automotive industry but a mandatory fitting of seat belts deciding the bodies of cars to reduce injuries to pedestrians and and measures to reduce air pollution well not introduced early enough so
and this guy was asked do you need do we really need to kill a few people 1st and he said unfortunately that will have so he he's is safety and security standards for the Internet of Things can't come soon enough I agree with you I was there we need standard resource so on at the end of my
talk and if we have some time left I'm waiting for your questions ideas and input now
otherwise I will thank you very much for your attention we the a little from small you might want to take the root meets exit the units of the those questions I see 1 question from the signal I don't think you want to know it well those companies don't have the right to security whatsoever I think so can be used to make them have more what we as cool as consumers that is the yeah actually I would what what I said was I want to write them and ask for standards I would I think it can be the 1st step that we can the minutes or call them and say well what kind of security is built in this device can you tell me otherwise I'm going to buy your product thank you any other questions OK in this case again I think you probably most often and the
the I think that would be if it could be that
Autorisierung
Internetworking
Momentenproblem
Systemplattform
Mailing-Liste
Twitter <Softwareplattform>
Assembler
Zeitzone
Internetworking
Rechenschieber
Dijkstra-Algorithmus
Freeware
Lesezeichen <Internet>
Chatten <Kommunikation>
LASER <Mikrocomputer>
Betafunktion
Code
Registrierung <Bildverarbeitung>
Touchscreen
Internetworking
Datenmissbrauch
Bit
Informationsmodellierung
Negative Zahl
Computersicherheit
Stab
Internet der Dinge
Softwareentwickler
Kälteerzeugung
Term
E-Mail
Internetworking
Softwareentwickler
Datenmissbrauch
Punkt
Computersicherheit
Abelsche Kategorie
Zahlenbereich
Quellcode
Term
Datenmissbrauch
Open Source
Vertikale
Datenstruktur
Zahlenbereich
Total <Mathematik>
Mereologie
Computersicherheit
Softwareentwickler
Term
Rechenschieber
Internetworking
Variable
Digitalsignal
Gewicht <Mathematik>
Punkt
Notepad-Computer
Internet der Dinge
Softwareentwickler
Fokalpunkt
Notepad-Computer
Autorisierung
Chipkarte
Internetworking
Klassische Physik
Zellularer Automat
Fitnessfunktion
Internet der Dinge
Kombinatorische Gruppentheorie
Term
Chipkarte
Datenfeld
Forcing
Notepad-Computer
Fitnessfunktion
Streuungsdiagramm
Internetworking
Punkt
Quader
Baumechanik
Physikalisches System
Analysis
Ordnungsreduktion
Übergang
Internetworking
Chiffrierung
Medianwert
Perfekte Gruppe
Twitter <Softwareplattform>
Entropie
Einfach zusammenhängender Raum
Resultante
Fehlermeldung
Bit
Zusammenhängender Graph
Materialisation <Physik>
Computersicherheit
Fokalpunkt
Term
Quick-Sort
Benutzerbeteiligung
Körper <Physik>
Computersicherheit
Zeitrichtung
Quick-Sort
Term
Tabelle <Informatik>
Streuungsdiagramm
Einfach zusammenhängender Raum
Internetworking
Server
Datennetz
Computersicherheit
Gruppenkeim
Malware
Permanente
Malware
Computerunterstütztes Verfahren
Abschattung
Term
Dialekt
Digitalsignal
Gruppenkeim
Datenverarbeitungssystem
Datennetz
DoS-Attacke
Permanente
Computersicherheit
Passwort
Passwort
Kälteerzeugung
Web Services
DoS-Attacke
Web Site
Datennetz
Kontrollstruktur
Web Site
Malware
Computerunterstütztes Verfahren
Web Services
Gruppenkeim
Datenverarbeitungssystem
Datennetz
DoS-Attacke
Kälteerzeugung
Beobachtungsstudie
Web Services
Internetworking
Transformation <Mathematik>
Quantifizierung
Twitter <Softwareplattform>
Service provider
Service provider
Software
Web Services
Softwareschwachstelle
Bus <Informatik>
Computersicherheit
Ablöseblase
DoS-Attacke
Integraloperator
Ordnung <Mathematik>
Gammafunktion
Router
Explosion <Stochastik>
Momentenproblem
Datennetz
Computersicherheit
Malware
Ähnlichkeitsgeometrie
Chipkarte
Datennetz
Linienelement
t-Test
Malware
Computerkriminalität
Internet der Dinge
Physikalisches System
Datenmissbrauch
Zustandsdichte
Chipkarte
Internetworking
Demoszene <Programmierung>
Systemprogrammierung
Open Source
Virtuelle Maschine
Web Services
Computersicherheit
Codierung
Grundraum
Sichtbarkeitsverfahren
Punkt
Stichprobenumfang
Quick-Sort
Spezialrechner
Bit
Prozess <Physik>
Softwareschwachstelle
Computersicherheit
Endogene Variable
Computersicherheit
EDV-Beratung
Passwort
Programmierumgebung
Roboter
Softwaretest
Beobachtungsstudie
Einfach zusammenhängender Raum
Bit
Softwaretest
Lesezeichen <Internet>
Code
Minimum
Passwort
Passwort
Smartphone
Persönliche Identifikationsnummer
Roboter
Softwaretest
Auswahlaxiom
Kontrollstruktur
Stab
Vererbungshierarchie
Automatische Differentiation
Binder <Informatik>
Auswahlaxiom
Message-Passing
Übergang
Schreib-Lese-Kopf
Schnittstelle
Sichtbarkeitsverfahren
Resultante
Chipkarte
Bit
Selbst organisierendes System
Computersicherheit
Gesetz <Physik>
Broadcastingverfahren
Arbeitsplatzcomputer
Flächeninhalt
Arbeitsplatzcomputer
Computersicherheit
Vererbungshierarchie
Broadcastingverfahren
Momentenproblem
Sprachsynthese
Videokonferenz
Umsetzung <Informatik>
IRIS-T
Streuungsdiagramm
Zentrische Streckung
Message-Passing
Verschlingung
Eindeutigkeit
Computer
Message-Passing
Schnittstelle
Internetworking
Beobachtungsstudie
Einfach zusammenhängender Raum
Mailing-Liste
Gruppenkeim
Gruppenkeim
Einfach zusammenhängender Raum
Mailing-Liste
Chipkarte
Internetworking
Modallogik
Kugel
Penetrationstest
Webcam
Computersicherheit
Einfach zusammenhängender Raum
Flächeninhalt
Inklusion <Mathematik>
Videokonferenz
Managementinformationssystem
Chipkarte
RPC
Abenteuerspiel
Spieltheorie
Gerade Zahl
Passwort
p-Block
Systemaufruf
Videokonferenz
Expertensystem
Kontrollstruktur
Graph
Computersicherheit
Information
Term
Systemaufruf
Erschütterung
Audiodatei
Injektivität
Server
Information
Speicher <Informatik>
Ordnung <Mathematik>
Optimierung
Mapping <Computergraphik>
Internetworking
Datenmissbrauch
Punkt
Computersicherheit
Volumenvisualisierung
Projektive Ebene
Internetworking
Einfach zusammenhängender Raum
Internetworking
Expertensystem
Datenmissbrauch
Web Site
Punkt
Computersicherheit
Zahlenbereich
Computerspiel
Physikalisches System
Domain-Name
Softwareschwachstelle
Mini-Disc
Digitalisierer
Notepad-Computer
Garbentheorie
Netiquette
Bit
Mailing-Liste
Information
Datenmissbrauch
Tabelle <Informatik>
Server
Cybersex
Strömungsrichtung
Information
Term
Datenmissbrauch
Gesetz <Physik>
Web Services
Konditionszahl
Widget
Computersicherheit
Notepad-Computer
Information
Notepad-Computer
Expertensystem
Web Services
Kontrollstruktur
Menge
Information
Information
Maßerweiterung
Datenmissbrauch
Datenmissbrauch
Umsetzung <Informatik>
Computersicherheit
Mereologie
Internet der Dinge
Schreib-Lese-Kopf
Freeware
Klasse <Mathematik>
Adressraum
Abgeschlossene Menge
Information
Raum-Zeit
Internetworking
Physikalisches System
Spieltheorie
Symmetrie
Computersicherheit
Randomisierung
Biprodukt
Optimierung
E-Mail
Expertensystem
Green-Funktion
Computersicherheit
Internet der Dinge
Physikalisches System
Bitrate
Dichte <Physik>
Energiedichte
Druckverlauf
Softwareschwachstelle
Mereologie
Asymmetrie
Projektive Ebene
Information
Verkehrsinformation
Aggregatzustand
ATM
Personal Area Network
Digitalsignal
Default
ATM
Biprodukt
Computer
Biprodukt
Datenmissbrauch
Datenmissbrauch
Digitalsignal
Momentenproblem
Default
ATM
Automatische Handlungsplanung
Biprodukt
Biprodukt
Default
Datenmissbrauch
Regulator <Mathematik>
Datenmissbrauch
Phasenumwandlung
Kurvenanpassung
Datenmissbrauch
Regulator <Mathematik>
Phasenumwandlung
Einfach zusammenhängender Raum
Internetworking
Benutzerbeteiligung
Selbst organisierendes System
Stab
Mustersprache
Automatische Handlungsplanung
Biprodukt
Biprodukt
Chaotisches System
Gesetz <Physik>
Internetworking
Virtuelle Maschine
Konfiguration <Informatik>
Hochvakuum
Lesen <Datenverarbeitung>
Biprodukt
Information
Information
Entscheidungstheorie
Aggregatzustand
Entscheidungstheorie
Internetworking
Trennungsaxiom
Softwareentwickler
Konfiguration <Informatik>
Hardware
Datennetz
Computersicherheit
Gebäude <Mathematik>
Internet der Dinge
Biprodukt
Datenmissbrauch
Netzwerktopologie
Software
Software
Offene Menge
Datennetz
Computersicherheit
Biprodukt
Passwort
Softwareentwickler
Term
Streuungsdiagramm
Hardware
Internetworking
Offene Menge
Punkt
Wellenpaket
Computersicherheit
Internetworking
Standardabweichung
Endogene Variable
Computersicherheit
Punkt
Hilfesystem
Softwareentwickler
Schwebung
Hilfesystem
Standardabweichung
Internetworking
Standardabweichung
Computersicherheit
Computersicherheit
Kontrollstruktur
Internet der Dinge
Paarvergleich
Information
Ordnungsreduktion
Phasenumwandlung
Standardabweichung
Fitnessfunktion
System F
Einheit <Mathematik>
Rechter Winkel
Computersicherheit
Ein-Ausgabe
Wurzel <Mathematik>
Twitter <Softwareplattform>
Biprodukt
Ein-Ausgabe
Standardabweichung
Medianwert
Systemprogrammierung
Neue Medien

Metadaten

Formale Metadaten

Titel Internet of Fails
Untertitel Where IoT has gone wrong
Serientitel 34th Chaos Communication Congress
Autor Wimmer, Barbara
Lizenz CC-Namensnennung 4.0 International:
Sie dürfen das Werk bzw. den Inhalt zu jedem legalen Zweck nutzen, verändern und in unveränderter oder veränderter Form vervielfältigen, verbreiten und öffentlich zugänglich machen, sofern Sie den Namen des Autors/Rechteinhabers in der von ihm festgelegten Weise nennen.
DOI 10.5446/34985
Herausgeber Chaos Computer Club e.V.
Erscheinungsjahr 2017
Sprache Englisch

Inhaltliche Metadaten

Fachgebiet Informatik
Abstract Expect current examples of IoT fails that I collected during my work as a journalist in regards of privacy and security. What do such fails mean for society? What are possible solutions and what can customers do?
Schlagwörter Ethics
Society & Politics

Zugehöriges Material

Folgende Ressource ist Begleitmaterial zum Video
Video wird in der folgenden Ressource zitiert
Sonstiges

Ähnliche Filme

Loading...
Feedback