Smart Watches and wristbands: who is watching the watches?

Over the last few weeks a number of stories have appeared about new “wearable” technology that has the means to track you and your children.  NBC News has a comparison of several “Smart Watches” that are either on the market or could soon be.  Think Dick Tracy.  Some have phones built in, while others can send and receive email.  These things don’t replace smartphones or other PDAs in general because their screen size is so small.  They’re likely not to have much of an Internet browser for that reason, and they may only support a few simultaneous applications on board.

Still, smart watches may find their own nitch.  For instance, a smart watch can carry an RFID that that could be used to control access to garage doors, or perhaps even your front door.  A smart watch might be ideal for certain types medical monitoring, because of its size.  In all likelihood these devices would have limited storage, and would take advantage of various cloud services.  It’s this point that concerns me.

Any time data about you is stored somewhere, you have to know what others are using it for, and what damage can be done if that data falls into the wrong hands.  And so, now let’s consider some of the examples we discussed above in that light:

  1. Voice communications: as one large vendor recently discovered, anything that can be used as a phone can be used as a bug, to listen into conversations.  Having access to a large aggregations of smart watches through the cloud would provide an entire market for attackers, especially if the information is linked to specific individuals.
  2. Medical monitoring: similarly, if you are using a smart watch or any other device for medical monitoring, consider who else might want to act on that information.  Insurance companies and employers immediately leap to mind, but then perhaps so do pharmaceutical companies who might want to market their wares directly to you.
  3. RFID and location-based services.  There have already been instances of people being tracked electronically and murdered.  Children wearing this or a similar device could be kidnapped if the cloud-based services associated with the device is broken into.

This is what concerns me about Disney’s MagicBand.  Disney makes a strong case that having such a band can actually improve service.  But should their information systems be broken into by a hacker, how much might a deranged estranged parent pay that criminal to find out where the child is?

It is the linkage of various attributes that must be considered.  Add location to a name and all of a sudden, a hacked cloud-based service can really do someone damage.  We give away a lot of this information already with many smartphone applications and other devices we carry.  Before we give away more, perhaps we should stop and think about our privacy in broader terms and what is necessary to protect it.  In Europe, the Data Privacy Directive covers a lot of this ground.  But America and other countries are far behind that level of protection.  Further, every new service on a smart device is going to want to monetize every last bit of data they can get.

[del.icio.us] [Digg] [Facebook] [Reddit] [Twitter]

Secure SmartPhone? No Such thing

iPhoneToday’s CNN reports that President Barack Obama will supposedly get a secure smartphone that would be similar to his Blackberry.  The Sectera Edge, made by General Dynamics, has already received a seal of approval from the National Security Agency.  There is only one problem: either it’s not that smart or it’s not that secure.  You can have either one, but you can’t have both.  Smartphones are those phones that can provide some form of general purpose computing function.  It is that function that is subject to abuse.  While it is possible to develop and provide a general purpose computing function that is perhaps even provably secure, it will also be provably useless.

Another problem with the Sectera Edge is that it lacks the ecosystem that Mr. Obama may be used to with the Blackberry, or others might be used to with the iPhone.  I imagine that very few applications have actually been written outside of GD.  Looking at the iPhone, only a fraction of the apps for the iPhone are developed by Apple.

[del.icio.us] [Digg] [Facebook] [Reddit] [Twitter]