Internet of Things. Applicazioni, sicurezza e riservatezza dei dati personali

From Wiki IoT
Jump to: navigation, search

MAGGI F., Internet of Things. Applicazioni, sicurezza e riservatezza dei dati personali, medium.com, 26.01.2015

Type Article
Abstract
Link https://medium.com/@phretor/internet-of-things-sicurezza-e-riservatezza-dei-dati-personali-f18a13dbe1cf
Topics Contract, Data Protection, Data Usability, Property, Security, Information Security

Notes

Three key-factors have driven to the explosion of the IoT phenomenon:

  • technology accessibility
  • a lot of opportunities: no more problems about how to collect data, but only about what to do with the data collected
  • growing interest of media

The computational paradigm is changing:

  • the first step was about mainframes (mainframe + thin clients = computational capacity in the mainframe)
  • the second step was about the Internet (server at the place of mainframe + clients no more thin = shared computational capacity)
  • the third step is about the cloud (server + thin clients = computational capacity in the server)
  • the fourth step is about IoT (it is the current step: the features of the third step remain valid, but the difference from the first three steps is that data can be produced without the intervention of humans: even if sensors have been existing for a long time, with the IoT they are interconnected. and therefore there is no need for humans to realize operations of data entry, because their mere existence, their mere being entities belonging to the physical world allows automatic data collection)
  • the fourth step is about IoE (this is a step which must be implemented: in it, we need local computational capacities: now, sensors and devices in an intermediary step between sensors and the cloud are thin: we need that they become rich)


N.B. Today, device connectivity (also when these devices are "traditional objects" equipped with computational capacities) is a requirement, an essential feature, and not an extra.


"La tendenza mostra che, anche senza un contatore intelligente, i dispositivi che ci stiamo portando in casa sono fin troppo “smart”. Vi ricordate il caso di LG dello scorso maggio? I possessori di una smart TV di LG si sono visti aggiornare il software, ma non per eliminare una vulnerabilità di sicurezza. L’interfaccia chiedeva all’utente di esprimere o declinare consenso, pena il non funzionamento dei servizi a valore aggiunto. Consenso per cosa? Vediamo: "Our Privacy Policy explains and seeks your agreement for how we collect, use, and share information that we obtain as a result of your use of LG Smart TV Services, as well as how we use cookies. You do not have to agree to the Privacy Policy but if you do not, not all Smart TV Services will be available to you. In that case, we will still receive certain non-identifying information from your Smart TV that we need to provide the basic functions that will be available". Aggiungo che il testo di cui sopra è stato trascritto manualmente leggendo dalla TV, perché non ne esiste una versione pubblicamente disponibile, nemmeno nel manuale cartaceo o sul sito di LG. Sì, è la stessa LG che pochi mesi prima era stata contestata perché ogni volta che si collegava un disco esterno o una chiavetta USB alla TV, l’elenco dei file ivi presenti veniva spedito ai server di LG. Tornando alla privacy policy, avete notato il passaggio in cui si dice che, indipendentemente dall’accettazione o meno delle condizioni, LG continuerà a raccogliere dati (non identificanti il possessore) per continuare a poter erogare le funzionalità essenziali?"' See here (where it is stated: "Of course, there is always the “dumb” option. Users may have the ability to disable data collection, but it comes at a cost. The device will not function properly or allow the use of its high-tech features. This leaves consumers with an unacceptable choice between keeping up with technology and retaining their personal privacy.") and [LG Will Take The 'Smart' Out Of Your Smart TV If You Don't Agree To Share Your Viewing And Search Data With Third Parties