https://www.iotworldtoday.com/wp-content/themes/ioti_child/assets/images/logo/mobile-logo.png
  • Home
  • News
    • Back
    • Roundups
  • Strategy
  • Special Reports
  • Business Resources
    • Back
    • Webinars
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Podcasts
    • Strategic Partners
    • Latest videos
  • More
    • Back
    • About Us
    • Contact
    • Advertise
    • Editorial Submissions
  • Events
    • Back
    • Embedded IoT World (Part of DesignCon) 2022
Iot World Today
  • NEWSLETTER
  • Home
  • News
    • Back
    • Roundups
  • Strategy
  • Special Reports
  • Business Resources
    • Back
    • Webinars
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Podcasts
    • Strategic Partners
    • Latest videos
  • More
    • Back
    • About Us
    • Contact
    • Advertise
    • Editorial Submissions
  • Events
    • Back
    • Embedded IoT World (Part of DesignCon) 2022
  • newsletter
  • IIoT
  • Cities
  • Energy
  • Homes/Buildings
  • Transportation/Logistics
  • Connected Health Care
  • Retail
  • AI
  • Metaverse
  • Development
  • Security
ioti.com

Security


Getty Images

Big brother

How Much Is Smart Home Privacy Worth?

Now that the topic of smart home privacy is receiving more attention, a number of consumers will take the time to protect their privacy. It may be too early to tell, however, how big the movement is.
  • Written by Brian Buntz
  • 28th October 2019

“The telescreen received and transmitted simultaneously. Any sound that Winston made, above the level of a very low whisper, would be picked up by it; moreover, so long as he remained within the field of vision which the metal plaque commanded, he could be seen as well as heard. There was of course no way of knowing whether you were being watched at any given moment.” —George Orwell, 1984

The line, “If you can’t measure it, you can’t manage it,” has become a management cliché.

Likely derived from an utterance from management thinker Peter Drucker, the phrase frequently refers to tracking various elements of business operations. But in this era of surveillance capitalism, often the object being quantified is the individual. A number of corporations want to measure and manage your interests, habits and, ultimately, purchases.

A small army of companies from well-known entities like Facebook and Google to more-obscure ad tech companies and data brokers are collecting and trafficking in consumer data. While that in itself is not a revelation, the ubiquity of smartphones and, increasingly, IoT devices such as smart speakers provide new possibilities for measuring the whims of scores of consumers.

The situation is leading individuals who supported companies that gather such data to revolt. “I’ve become a critic of the very industry to which I devoted my entire life, not because tech is bad; tech is great! But because the culture of a handful of companies — Google, Facebook, Microsoft, Amazon — has gone completely off the rails,” said Roger McNamee, a prominent Silicon Valley investor at McAfee MPOWER in early October.

The fundamental goal of gathering data and using it to support business goals has become toxic, McNamee said. A new philosophy in Silicon Valley has arisen to spur efficiency at all costs. “And the two things [tech firms trafficking in personal data] are going to eliminate most are your personal choice and democracy because those are inherently inefficient things,” McNamee said.

[IoT Security Summit is the conference where you learn to secure the full IoT stack, from cloud to the edge. Visit the website for more information.]

McNamee’s wakeup call came in 2016 when he decided the same tools that make Facebook “the most effective platform ever for advertisers can be used to distort a democratic election.”

Richard Stokes, chief executive officer of the startup Winston Privacy, had a similar awakening while working in the advertising industry. “The ad industry was really fond of saying: ‘Hey, trust us. The data is anonymous. We don’t do anything with it,” Stokes said.

But then he attended a demo in 2017, where several ad tech company employees would walk onto a stage and show off their proficiency in tracking customer data. “The first company [representative] pulled up his own records by name,” Stokes recalled. The resulting data was akin to “the most invasive credit report you could imagine,” he said. It showed that the employee had a penchant for craft brewing, where he banked, how much he earned, his political affiliation, the kind of car he drove, and so forth.

“That was pretty disturbing,” Stokes said.

The second demonstration at the event would be equally unsettling. Opening up with a map of San Francisco, the company showed its ability to track individuals as they went about their day. The company showed an individual who woke up, went to an elementary school, a Starbucks, a yoga studio and so on. “And you can tell this from this one day in the life, this was a mom with young kids,” Stokes said. “Imagine if we have this [kind of data] for almost everybody in the U.S., and we’re trying to get it to within 10 minutes with 10 feet of accuracy. You can imagine having this whole 360-degree X-ray of your life seeing available for anybody who wants to buy it.”

While McNamee’s change of heart has led him to become an outspoken critic of Silicon Valley culture and author of “Zucked: Waking Up to the Facebook Catastrophe,” Stokes decided to investigate the situation and later found a startup to address it. While some involved in the ad tech industry posit that consumers don’t care about privacy, Stokes points to Pew research concluding “would like to do more to protect their privacy.”

While some options designed to protect privacy, such as VPNs and the Tor browser, are not a good fit for the average consumer, Stokes said. So he decided to found a company known as Winston Privacy to create hardware that is compatible with home-based IoT devices while also offering features for web browsing. The company spent about two years designing the tool, which packages various privacy technologies together. “The whole goal of Winston is you plug it into your network, 60 seconds later, it’s going to block almost all [tracking]. And then you can harden your browser with a single simple, integrated browser extension that does the work of Ghostery, Adblock Plus and Privacy Badger all in one,” Stokes said.

When asked how the service preserves smart home functionality while safeguarding privacy, Stokes acknowledged there is something of a balancing act at play. “In terms of what we do, we had to make a choice right between, on one in the spectrum, hardcore privacy concerns and on the other, some people actually do want smart speakers and smart home devices and thermostats and so on,” he said.

Winston Privacy’s strategy is to reinforce the boundary between consensual first-party data collection and non-consensual third-party data collection. “If you bring an [Amazon] Echo into your home, you’re sending data to Amazon, and you’re okay with that,” Stokes said. “But you may not be okay with other companies harvesting the data.”

The details of how smart speaker companies use data is often vague, but Amazon says it does not share voice recordings with third-parties. When a consumer uses a third-party Alexa app, the company says it shares relevant information with that app maker, but not personally identifiable information. Google has a similar policy to preserve privacy. But the company got something of a black eye when a contractor leaked more than 1,000 Google Assistant recordings to the Belgian broadcaster VRT NWS. In a blog post, Google Product Search, Manager David Monsees blamed the breach on the misconduct of a single language reviewer. Apple and Amazon have faced similar embarrassments.

In terms of data sharing from IoT devices with third-party organizations, Stokes points to the smart TV as an example. “There are dozens of apps that are preinstalled on it. They run in the background; they’re all recording. And virtually all of them are phoning home and reporting on what you’re watching, and all of the data that TV can provide,” he said. “So Winston, when it is plugged in, is blocking almost all the telemetry and all the tracking data from your TV while retaining your television’s core functionality.”

In any event, smart TVs are one of the clearest examples of consumer devices in the home that gather troves of data about customers’ habits. Smart TVs loaded with voice recognition technology offer even more potential for privacy infringement. A 2015 article in The Telegraph quotes the privacy policy for Samsung smart TVs: “Please be aware that if your spoken words include personal or other sensitive information, that information will be among the data captured and transmitted to a third-party through your use of Voice Recognition.”

While the majority of consumers continue to feel uneasy about the prospects of having systems ranging from web browsers to smart speakers to smart TVs track them, such tracking has become entrenched. “You know how [some people] say: ‘If you’re not the customer, you’re the product’?” McNamee asked at McAfee MPOWER. “In the world of today, the truth is all of us relative to Facebook, Google, Microsoft and Amazon, we’re not a product. We’re the fuel,” he said. “Our data is what drives their profitability. And it’s not because they’re bad people. It’s because there are no rules.”

Winston Privacy aims to address the situation with its device, which has won considerable crowdsourced funding on Kickstarter ($514,669) and Indiegogo ($942,813), in addition to private funding.

The device has a price tag of $249 in addition to a $99 per year subscription fee, although the company could offer a lifetime subscription option as well.

While there are competing products offering similar functionality, most are targeted at a tech-savvy subset of the population and have more fragmented functionality. By contrast, Winston Privacy device bundles together multiple privacy-protecting technologies and is aimed at the broader population.

One of Stoke’s main objectives for Winston Privacy is blocking data from becoming a commodity for sale. “There are thousands of companies that are buying and selling this data. I worked with a lot of them. You cannot control this data once it is out,” he said. “Whenever you have this much data out there on the scale and comprehensiveness, there’s potential for abuse and where there’s a potential for a profit motive, combined with that, it’s going to happen.”

Tags: Smart homes Security Smart Homes and Smart Buildings Features

Related


  • Image shows welding robotics and a digital manufacturing operation.
    IoT Supply Chain Vulnerability Poses Threat to IIoT Security
    The supply chain provides building blocks for IoT but also vulnerabilities. IT pros need to ward against malicious attacks that exploit supply chain security gaps.
  • IoT Security Needs Pen Testing Approach
    IoT pen testing is a no-brainer, say experts. But don’t test everything.
  • Image shows a digital background depicting innovative technologies in security systems,
    Securing IoT Devices With Zero Trust Requires Mindset Shift
    Zero-trust approaches require a shift in mindset to ensure IoT devices have rigorous security policies applied — and the work is never done, say IT pros.
  • An Integrated Approach to IoT Security
    This e-book provides a comprehensive framework to help organizations reduce risk in IoT products and environments.

Leave a comment Cancel reply

-or-

Log in with your IoT World Today account

Alternatively, post a comment by completing the form below:

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Related Content

  • Electric Grid Stability Assailed by Growing Challenges
  • COVID-19 Driving Data Integration Projects in IoT
  • Common Internet of Things Security Pitfalls 
  • Can Privacy-Preserving Machine Learning Overcome Data-Sharing Worries?

Roundups

View all

IoT Product Roundup: PTC, Nokia, Arm and More

19th May 2022

IoT Deals, Partnerships Roundup: Intel, Nauto, Helium and more

14th May 2022

IoT Product Roundup: Amazon, Synaptics, Urban Control and More

27th April 2022

White Papers

View all

The Role of Manufacturing Technology in Continuous Improvement Ebook

6th April 2022

IIoT Platform Trends for Manufacturing in 2022

6th April 2022

Latest Videos

View all
Dylan Kennedy of EMQ

Embedded IoT World 2022: Dylan Kennedy of EMQ

Dylan Kennedy, EMQ’s VP of global operations, sat down with Chuck Martin at Embedded IoT World 2022.

Embedded IoT World 2022: Omdia’s Sang Oh Talks Vehicle Chip Shortage

Omdia’s automotive semiconductor analyst sits down with Chuck Martin at this year’s event

E-books

View all

How Remote Access Helps Enterprises Improve IT Service and Employee Satisfaction

12th January 2022

An Integrated Approach to IoT Security

6th November 2020

Webinars

View all

Rethinking the Database in the IoT Era

18th May 2022

Jumpstarting Industrial IoT solutions with an edge data management platform

12th May 2022

AI led Digital Transformation of Manufacturing: Time is NOW

9th December 2021

Special Reports

View all

Omdia’s Smart Home Market Dynamics Report

7th January 2022

Cybersecurity Protection Increasingly Depends on Machine Learning

28th October 2020

IoT Security Best Practices for Industry and Enterprise

20th October 2020

Twitter

IoTWorldToday, IoTWorldSeries

The U.S. Army is getting a 5G boost for #AR #VR capabilities from #5G network provider @OceusNetworks.… twitter.com/i/web/status/1…

24th May 2022
IoTWorldToday, IoTWorldSeries

@IoTWorldSeries and The #AISummit will be hosted this year in Silicon Hills, the tech hub of Austin, Texas. Acces… twitter.com/i/web/status/1…

24th May 2022
IoTWorldToday, IoTWorldSeries

Hannover Messe 2022: @BoschGlobal,@BostonDynamics robotics showcased. @hannover_messe dlvr.it/SQzhr1 https://t.co/vHWRmsIGcm

24th May 2022
IoTWorldToday, IoTWorldSeries

📣JUNE DIGITAL SYMPOSIUM Drive your strategy forward and stay on the #Healthcare and #IndustrialIoT pulse with key… twitter.com/i/web/status/1…

24th May 2022
IoTWorldToday, IoTWorldSeries

Hyundai Investing $5B on Autonomous Driving and Robotics dlvr.it/SQzfZh https://t.co/1Jyr4Xlord

24th May 2022
IoTWorldToday, IoTWorldSeries

Partner with @IoTWorldToday to reach your prospects and accomplish your goals in 2022. Download our 2022 IoT Mark… twitter.com/i/web/status/1…

24th May 2022
IoTWorldToday, IoTWorldSeries

Explore Emerging Tech For Enterprises at @TechXLR8 2022 this June ➡️ Join us from 1-3 June in harnessing the pow… twitter.com/i/web/status/1…

24th May 2022
IoTWorldToday, IoTWorldSeries

Clearview AI has been fined $9.4 million for collecting images of people from social media platforms to add to its… twitter.com/i/web/status/1…

24th May 2022

Newsletter

Sign up for IoT World Today newsletters: vertical industry coverage on Tuesdays and horizontal tech coverage on Thursdays.

Special Reports

Our Special Reports take an in-depth look at key topics within the IoT space. Download our latest reports.

Business Resources

Find the latest white papers and other resources from selected vendors.

Media Kit and Advertising

Want to reach our audience? Access our media kit.

DISCOVER MORE FROM INFORMA TECH

  • IoT World Series
  • Channel Futures
  • RISC-V
  • Dark Reading
  • ITPro Today
  • Web Hosting Talk

WORKING WITH US

  • Contact
  • About Us
  • Advertise
  • Login/Register

FOLLOW IoT World Today ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookies Policy
  • Terms
Copyright © 2022 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X