{"id":903,"date":"2015-05-28T00:00:00","date_gmt":"2015-05-28T00:00:00","guid":{"rendered":"http:\/\/www.emergeinteractive.com\/iot-mobile-apps-and-privacy\/"},"modified":"2019-05-08T23:20:54","modified_gmt":"2019-05-08T23:20:54","slug":"iot-and-privacy","status":"publish","type":"post","link":"https:\/\/www.emergeagency.com\/insights\/detail\/iot-and-privacy\/","title":{"rendered":"IoT, Mobile Apps and Privacy"},"content":{"rendered":"<p class=\"subtitle tx-a\">\n<p>The proliferation of Internet of Things (IoT) and wearable devices promises amazing technological breakthroughs in our everyday lives. These developments are made possible by interchanging information between our devices (activity trackers, phones, cars, etc.) and storing that data in the cloud. But what if you\u2019re not the only one with access to the <a href=\"\/insights\/detail\/the-big-data-evolution\">massive amounts of data<\/a> that your devices collect? What if hackers can see what time you leave your home on a daily basis and they can unlock your front door with the click of a mouse? What if those same hackers can tap into all of your vital signals and see your exact location at any time? This might sound like science fiction, but unfortunately it is becoming the reality today.<\/p>\n<p>Delivering the conveniences that IoT promises requires massive amounts of data to be collected and stored in the cloud. We are promised that this data is secure, but since Edward Snowden\u2019s revelations we know that virtually no data is safe from interception by third parties once it enters the public Internet. We have seen proof that the NSA and British Intelligence are doing it on a massive scale; we\u2019ve seen that the North Koreans can do it on a more <a href=\"http:\/\/www.cbsnews.com\/news\/why-the-u-s-government-was-sure-north-korea-hacked-sony\/\" target=\"_blank\" rel=\"noopener noreferrer\">targeted scale<\/a>; and someone might be doing it to you right now. What if that unknown party can see your every activity, every movement, even every heartbeat? Are we ready to make our most personal and sensitive data accessible to hackers and government entities?<\/p>\n<p>Not only is our data vulnerable, but once our physical devices are connected to the Internet they can be hijacked and controlled by third parties as well. The separation between what\u2019s virtual and what\u2019s real is breaking down with each device that comes online. Let\u2019s take a look at common connected IoT devices:<\/p>\n<ul>\n<li>Phones, tablets, televisions<\/li>\n<li>Sensors (wearables, environmental, industrial)<\/li>\n<li>Home access (locks, cameras, security systems, etc.)<\/li>\n<li>Cars<\/li>\n<li>Medical devices<\/li>\n<\/ul>\n<p>As the list grows, not only is our personal data created by those devices possibly accessible, but the devices themselves are at risk. As a <a href=\"http:\/\/www.emergeagency.com\">leading digital experience&nbsp;agency<\/a>&nbsp;focused on <a href=\"\/services\/technology\">web and app development<\/a>&nbsp;we are always thinking of the security implications of the <a href=\"http:\/\/www.emergeagency.com\/work\">products we design<\/a>.&nbsp;Once you\u2019ve replaced the locks in your home with <a href=\"http:\/\/postscapes.com\/wireless-door-locks\" target=\"_blank\" rel=\"noopener noreferrer\">smart-locks<\/a>&nbsp;someone with the right resources can walk up to your house and unlock the door with a tap on their smartphone. They can also watch you on your <a href=\"http:\/\/www.computerworld.com\/article\/2913356\/cybercrime-hacking\/2-more-wireless-baby-monitors-hacked-hackers-remotely-spied-on-babies-and-parents.html\" target=\"_blank\" rel=\"noopener noreferrer\">internet-connected baby monitor<\/a>&nbsp;and even take control of your <a href=\"http:\/\/www.wired.com\/2014\/08\/car-hacking-chart\/\" target=\"_blank\" rel=\"noopener noreferrer\">connected car<\/a> to override the gas, brakes and steering. Many cars that are connected today are already <a href=\"http:\/\/www.scribd.com\/doc\/236073361\/Survey-of-Remote-Attack-Surfaces\" target=\"_blank\" rel=\"noopener noreferrer\">vulnerable to these kinds of attacks<\/a>.<\/p>\n<p>As average consumers, we might think this doesn\u2019t impact us. Security by minority might still apply today, where hackers have no interest in hacking some obscure IoT platform to control our home thermostats. But as standards evolve across the IoT platforms and data is shared across APIs, there are more centralized locations for hackers to search for your data. Metadata analysis is becoming more sophisticated as well, allowing analysts to find your relevant data easier than ever before. Finding the \u201cneedle in the haystack\u201d becomes increasingly easier.<\/p>\n<p>While you probably don\u2019t need to worry yet about hackers invading every part of your private life, as a society we are laying the technological foundation that will make us more vulnerable to hackers and government agencies than most of us can imagine. We need to begin the conversation now and evaluate the impacts of the Internet of Things on our privacy.<\/p>\n<div id=\"disqus_wrapper\">\n<div id=\"disqus_thread\"><\/div>\n<p><noscript>Please enable JavaScript to view the <a href=\"http:\/\/disqus.com\/?ref_noscript\">comments powered by Disqus.<\/a><\/noscript><a href=\"http:\/\/disqus.com\" class=\"dsq-brlink\">comments powered by <span class=\"logo-disqus\">Disqus<\/span><\/a><script>if((window.location.href.indexOf(\"erik\") != -1) || (window.location.href.indexOf(\"lvh.me\") != -1) || (window.location.href.indexOf(\"empirestaging\") != -1) || (window.location.href.indexOf(\"emergebeta\") != -1)){ var disqus_shortname = 'emerge2013erik'; }else{var disqus_shortname = 'emergeinteractiveproduction'}var disqus_config = function () {this.page.identifier = 2183;};(function() {var dsq = document.createElement('script'); dsq.type = 'text\/javascript'; dsq.async = true;dsq.src = '\/\/' + disqus_shortname + '.disqus.com\/embed.js';(document.getElementsByTagName('head')[0] || document.getElementsByTagName('body')[0]).appendChild(dsq);})();<\/script><\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p> Does the Internet of Things lead to the end of privacy as we know it?<\/p>\n","protected":false},"author":16,"featured_media":255,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[],"message_area_of_focus":[],"buy_cycle":[],"target_audience":[],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>IoT, Mobile Apps and Privacy<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.emergeagency.com\/insights\/detail\/iot-and-privacy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IoT, Mobile Apps and Privacy\" \/>\n<meta property=\"og:description\" content=\"Does the Internet of Things lead to the end of privacy as we know it?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.emergeagency.com\/insights\/detail\/iot-and-privacy\/\" \/>\n<meta property=\"og:site_name\" content=\"EMERGE | UX Agency\" \/>\n<meta property=\"article:published_time\" content=\"2015-05-28T00:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-05-08T23:20:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.emergeagency.com\/wp-content\/uploads\/2019\/01\/IoT_wearable_tech_img.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"768\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Julian Pscheid\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@EmergeInteract\" \/>\n<meta name=\"twitter:site\" content=\"@EmergeInteract\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Julian Pscheid\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.emergeagency.com\/insights\/detail\/iot-and-privacy\/\",\"url\":\"https:\/\/www.emergeagency.com\/insights\/detail\/iot-and-privacy\/\",\"name\":\"IoT, Mobile Apps and Privacy\",\"isPartOf\":{\"@id\":\"https:\/\/www.emergeagency.com\/#website\"},\"datePublished\":\"2015-05-28T00:00:00+00:00\",\"dateModified\":\"2019-05-08T23:20:54+00:00\",\"author\":{\"@id\":\"https:\/\/www.emergeagency.com\/#\/schema\/person\/dab01840291b244f372aa4e2afe970f1\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.emergeagency.com\/insights\/detail\/iot-and-privacy\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.emergeagency.com\/insights\/detail\/iot-and-privacy\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.emergeagency.com\/insights\/detail\/iot-and-privacy\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.emergeagency.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IoT, Mobile Apps and Privacy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.emergeagency.com\/#website\",\"url\":\"https:\/\/www.emergeagency.com\/\",\"name\":\"EMERGE | UX Agency\",\"description\":\"EMERGE is a UX design agency in Portland, OR. We help product and marketing leaders in healthcare, manufacturing, and tech drive revenue and improve outcomes through digital products that increase customer engagement and retention. Our specialties are in UX\/UI Design, product strategy, and full-stack development.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.emergeagency.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.emergeagency.com\/#\/schema\/person\/dab01840291b244f372aa4e2afe970f1\",\"name\":\"Julian Pscheid\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.emergeagency.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.emergeagency.com\/wp-content\/uploads\/2019\/01\/Julian_Pscheid-96x96.jpg\",\"contentUrl\":\"https:\/\/www.emergeagency.com\/wp-content\/uploads\/2019\/01\/Julian_Pscheid-96x96.jpg\",\"caption\":\"Julian Pscheid\"},\"url\":\"https:\/\/www.emergeagency.com\/author\/julian-pscheid\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IoT, Mobile Apps and Privacy","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.emergeagency.com\/insights\/detail\/iot-and-privacy\/","og_locale":"en_US","og_type":"article","og_title":"IoT, Mobile Apps and Privacy","og_description":"Does the Internet of Things lead to the end of privacy as we know it?","og_url":"https:\/\/www.emergeagency.com\/insights\/detail\/iot-and-privacy\/","og_site_name":"EMERGE | UX Agency","article_published_time":"2015-05-28T00:00:00+00:00","article_modified_time":"2019-05-08T23:20:54+00:00","og_image":[{"width":1280,"height":768,"url":"https:\/\/www.emergeagency.com\/wp-content\/uploads\/2019\/01\/IoT_wearable_tech_img.jpg","type":"image\/jpeg"}],"author":"Julian Pscheid","twitter_card":"summary_large_image","twitter_creator":"@EmergeInteract","twitter_site":"@EmergeInteract","twitter_misc":{"Written by":"Julian Pscheid","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.emergeagency.com\/insights\/detail\/iot-and-privacy\/","url":"https:\/\/www.emergeagency.com\/insights\/detail\/iot-and-privacy\/","name":"IoT, Mobile Apps and Privacy","isPartOf":{"@id":"https:\/\/www.emergeagency.com\/#website"},"datePublished":"2015-05-28T00:00:00+00:00","dateModified":"2019-05-08T23:20:54+00:00","author":{"@id":"https:\/\/www.emergeagency.com\/#\/schema\/person\/dab01840291b244f372aa4e2afe970f1"},"breadcrumb":{"@id":"https:\/\/www.emergeagency.com\/insights\/detail\/iot-and-privacy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.emergeagency.com\/insights\/detail\/iot-and-privacy\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.emergeagency.com\/insights\/detail\/iot-and-privacy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.emergeagency.com\/"},{"@type":"ListItem","position":2,"name":"IoT, Mobile Apps and Privacy"}]},{"@type":"WebSite","@id":"https:\/\/www.emergeagency.com\/#website","url":"https:\/\/www.emergeagency.com\/","name":"EMERGE | UX Agency","description":"EMERGE is a UX design agency in Portland, OR. We help product and marketing leaders in healthcare, manufacturing, and tech drive revenue and improve outcomes through digital products that increase customer engagement and retention. Our specialties are in UX\/UI Design, product strategy, and full-stack development.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.emergeagency.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.emergeagency.com\/#\/schema\/person\/dab01840291b244f372aa4e2afe970f1","name":"Julian Pscheid","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.emergeagency.com\/#\/schema\/person\/image\/","url":"https:\/\/www.emergeagency.com\/wp-content\/uploads\/2019\/01\/Julian_Pscheid-96x96.jpg","contentUrl":"https:\/\/www.emergeagency.com\/wp-content\/uploads\/2019\/01\/Julian_Pscheid-96x96.jpg","caption":"Julian Pscheid"},"url":"https:\/\/www.emergeagency.com\/author\/julian-pscheid\/"}]}},"_links":{"self":[{"href":"https:\/\/www.emergeagency.com\/wp-json\/wp\/v2\/posts\/903"}],"collection":[{"href":"https:\/\/www.emergeagency.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.emergeagency.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.emergeagency.com\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/www.emergeagency.com\/wp-json\/wp\/v2\/comments?post=903"}],"version-history":[{"count":2,"href":"https:\/\/www.emergeagency.com\/wp-json\/wp\/v2\/posts\/903\/revisions"}],"predecessor-version":[{"id":4330,"href":"https:\/\/www.emergeagency.com\/wp-json\/wp\/v2\/posts\/903\/revisions\/4330"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.emergeagency.com\/wp-json\/wp\/v2\/media\/255"}],"wp:attachment":[{"href":"https:\/\/www.emergeagency.com\/wp-json\/wp\/v2\/media?parent=903"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.emergeagency.com\/wp-json\/wp\/v2\/categories?post=903"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.emergeagency.com\/wp-json\/wp\/v2\/tags?post=903"},{"taxonomy":"message_area_of_focus","embeddable":true,"href":"https:\/\/www.emergeagency.com\/wp-json\/wp\/v2\/message_area_of_focus?post=903"},{"taxonomy":"buy_cycle","embeddable":true,"href":"https:\/\/www.emergeagency.com\/wp-json\/wp\/v2\/buy_cycle?post=903"},{"taxonomy":"target_audience","embeddable":true,"href":"https:\/\/www.emergeagency.com\/wp-json\/wp\/v2\/target_audience?post=903"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}