Your Smart Speaker Might Be ‘Listening’! Important Considerations When Using Smart Home Devices

Your Smart Speaker Might Be 'Listening'! Important Considerations When Using Smart Home Devices

With the popularity of artificial intelligence and Internet of Things (IoT) technologies, smart home products such as smart locks, robotic vacuum cleaners, and smart whole-house temperature control systems are becoming increasingly common. It is important to note that if sensitive data from smart home products is exploited by malicious individuals, it could lead to information … Read more

Apple and Google Collaborate: Your Phone’s Bluetooth Can Be Used to Track COVID-19 Close Contacts

Apple and Google Collaborate: Your Phone's Bluetooth Can Be Used to Track COVID-19 Close Contacts

Reporter: Lu Keyan “ The tool primarily relies on the Bluetooth functionality of mobile phones. “ On April 10, Apple CEO Tim Cook and Google CEO Sundar Pichai jointly announced on Twitter that the two companies will collaborate to connect Apple and Android mobile systems to launch a plan for tracking the spread of the … Read more

Smart Speakers Can Hear Your Passwords

Smart Speakers Can Hear Your Passwords

Click the blue text to follow us In the past two years, people have been concerned that popular mobile apps and smart speakers/voice assistants could leak personal privacy information, but the reality is scarier than we imagined. Recently, researchers from the University of Cambridge discovered that any smart device capable of receiving voice commands (such … Read more

We Experienced an Apple Smart Home Apartment and Discovered Several Truths About HomeKit

We Experienced an Apple Smart Home Apartment and Discovered Several Truths About HomeKit

At the entrance, there is a password lock on the door handle, and as long as the phone has power, it can issue commands to Siri; stepping into the foyer, saying “I’m home” to Siri lights up the lights throughout the house, and the air purifier’s fan starts to run smoothly—this is a preset HomeKit … Read more

Students Hack Under-Desk Sensors Installed by University and Create Open Source Guide

Students Hack Under-Desk Sensors Installed by University and Create Open Source Guide

Produced by Big Data DigestAuthor: CalebOn a night in early October, a significant project was underway at the Interdisciplinary Science and Engineering Complex (ISEC) at Northeastern University in the United States.According to PhD student Max von Hippel from the Privacy Institute, sensors were being installed under all the desks in the building that night. ISEC … Read more

Smart Home Devices Turned into Peeping Tools: Your Privacy is Being Live-Streamed and Sold

Smart Home Devices Turned into Peeping Tools: Your Privacy is Being Live-Streamed and Sold

Your smart camera on the bedside table may currently be live-streaming in the dark web, being bid on at a price of 0.5 yuan per minute. In fact, in the first case of camera intrusion cracked by the Beijing police, hackers took only 19 days to gain control of over 200 households’ surveillance devices, with … Read more

Overview of Searchable Encryption Technology

Overview of Searchable Encryption Technology

Abstract Searchable encryption technology is a method for protecting user privacy, widely applied in data sharing, cloud computing, and location privacy protection. This article mainly introduces the basic knowledge, implementation methods, security threats, application scenarios, and future development directions of this technology. The article first introduces the concept of searchable encryption, then discusses existing symmetric … Read more

Understanding Tesla’s Data Security Concerns in Connected Cars

Understanding Tesla's Data Security Concerns in Connected Cars

At the 2021 Shanghai Auto Show, a female car owner, wearing a T-shirt that read “Brake Failure,” passionately accused Tesla from the roof of her car. Is there really a brake failure? Without data, we cannot know. However, Tesla’s strong corporate stance has made driving data a luxury for car owners seeking to protect their … Read more

Analysis of Security Risks of Smart Speakers and Development Suggestions

Analysis of Security Risks of Smart Speakers and Development Suggestions

Smart speakers are devices that utilize technologies such as computer networks, the Internet, audio and video to provide users with information and life services, featuring functionalities like voice recognition, voice interaction, natural language understanding, and speech synthesis. Currently, security issues with smart speakers are frequent: In May 2017, Alexa was reported to have eavesdropped on … Read more

Seven Major Data Compliance Challenges in IoT Edge Computing

Seven Major Data Compliance Challenges in IoT Edge Computing

Source: On August 6, 2022, the Global Edge Computing Conference in Shenzhen, organized by the Edge Computing Community, concluded successfully. At the conference, Wang Jie, Executive Director of Kenting (Guangzhou) Law Firm, was invited to give a speech titled “Edge Computing – Seven Major Data Compliance Challenges in IoT Scenarios.” Speaker: Wang Jie, Executive Director … Read more