How to Kill Your Privacy and IoT your home along the way
Seminar for students of the 5th Year of the Integrated Master Degree on Informatics and Computing Engineering at Faculdade de Engenharia da Universidade do Porto.
the state or condition of being free from being observed or disturbed by other people. ▪ synonyms : seclusion, solitude, isolation, freedom from disturbance, freedom from interference NgramViewer
into one's personal matters, and personal information (applies to the person). • Confidentiality: ensuring that only authorized individuals will have access to the information (applies to the data). • Secrecy: your messages can only be understood by intended recipients • Anonymity: the ability to send and receive messages without revealing sender or receiver • Autonomy: avoidance of interference/intervention by people who violated our secrecy or anonymity and are using it to control us • Integrity: assurance that the data is real, accurate and safeguarded from unauthorized user modification. • Security: is the protection of systems from any damage to their hardware, software or information, in a way that it can compromise the services they provide or the data they hold.
privacy because you have nothing to hide, is no different than saying you don’t care about free speech because you have nothing to say.” • “Privacy isn’t about something to hide. Privacy is about something to protect. And that’s who you are. That’s what you believe in. That’s who you want to become. Privacy is the right to the self. Privacy is what gives you the ability to share with the world who you are on your own terms.” -- Edward Snowden • From XKCD • https://xkcd.com/1269/ alt: I'm the Philosopher until someone hands me a burrito.
lives: public, private, and secret." - Gabriel Garcia Marquez But why does it matter to me that have nothing to hide? • Identity Theft and other kinds of fraud • Influence (e.g. Advertising, Opinions) • Surveillance & Tracking • Implications on the individual right to freedom
they are also enabling unparalleled invasions of privacy.” – Electronic Frontier Foundation • Knowledge is power; knowledge about you is power over you. Your information will be used to anticipate your actions and manipulate the way you shop, vote, and think. – Why Privacy Matters, https://whyprivacymatters.org/ But why should we care about privacy?
by all. Only then will we be able to preserve one of the greatest innovations of the last century, the Internet, and allow our world to continue to develop, innovate, and prosper.” -- David Gorodyansky, Privacy and Security in the Internet Age, Wired, 2015
/ n ▪ Support STA / AP / STA + AP ▪ OTA ▪ Remote firmware upgrade ▪ Programming Languages: ▪ C (Arduino compatible), Lua and MicroPython ▪ Price: ~ 4$ (e.g. ebay)
and its dependencies in a virtual container that can run on any Linux server. This helps enable flexibility and portability on where the application can run, whether on premise, public cloud, private cloud, bare metal, etc.” Source: https://www.linux.com/news/docker- shipping-container-linux-code
multi-container Docker applications. With Compose, you use a Compose file to configure your application's services. Then, using a single command, you create and start all the services from your configuration.” Source: https://github.com/docker/compose For package install help (using apt-get on Raspbian): https://blog.hypriot.com/post/your-number-one-source-for-docker-on- arm/
so it can be reproduced anywhere. 2. Define the services that make up your app in docker- compose.yml so they can be run together in an isolated environment. 3. Lastly, run docker-compose up and Compose will start and run your entire app. • Source: https://github.com/docker/compose version: '2' services: web: build: . ports: - "5000:5000“ volumes: - .:/code redis: image: redis Sample docker-compose.yml
written in Go and optimized for fast, high-availability storage and retrieval of time series data in fields such as operations monitoring, application metrics, Internet of Things sensor data, and real-time analytics.” Source: https://docs.influxdata.com/influxdb/v1.3/guides/ Resources: https://docs.influxdata.com/influxdb/v1.3/guides/
and graph editor for Graphite, Elasticsearch, OpenTSDB, Prometheus and InfluxDB.” Source: https://github.com/grafana/grafana Resources: http://docs.grafana.org/guides/getting_started/
collecting, processing, aggregating, and writing metrics. • Design goals are to have a minimal memory footprint with a plugin system so that developers in the community can easily add support for collecting metrics from well known services (like Hadoop, Postgres, or Redis) and third party APIs (like Mailchimp, AWS CloudWatch, or Google Analytics).” • Source: https://github.com/influxdata/telegraf • Resource: https://www.influxdata.com/time-series-platform/telegraf/
together hardware devices, APIs and online services (…). • It provides a browser- based editor that makes it easy to wire together flows using the wide range of nodes in the palette that can be deployed to its runtime in a single-click.”