How secure is your smartwatch?

4

October

2019

No ratings yet.

The number of smartwatches is increasing steeply. Smartwatches are often able to track your heart rate, sleep, location, exercise and much more. Additional features nowadays include receiving phone notifications and making payments. But how secure is your watch, and all your personal data?

In case of theft, a thief will often easily be able to enter the device as most people do not install screen locks on their devices (O’Connell, 2019). Manufactures do have additional features to prevent easy access, such as the option to obstruct a connection with an unknown phone and the requirement of a close-proximity connection with the phone for payments and other important functions (Symanovich, 2019). Most smartwatches use Bluetooth-technology to create such a connection, which is not often targeted by attacks (Thomas, 2019). Nevertheless, the data is often not encrypted due to the limited computing power of the watch and simply secured by a six-digit pin. A six-digit code is easily cracked with the use of brute force attacks (Wenz, 2019).

Whenever a device does get breached, almost all data (e.g. notifications, heartbeat, locations and audio recordings) can be subtracted from the device (Do, Martini and Choo, 2016). Furthermore, a hacked device could leak your data or even breach into your network, obtaining information from the network as well. (Symanovich, 2019).

Smartwatches often allow third-party apps on their operation system for providing the customer with additional features. These apps are able obtain all kinds of information. It’s therefore important to read the privacy policies of these apps to ensure your data is handled with care (Symanovich, 2019). The data can be used against you be insurers for example, although no case of this is revealed yet.

On the bright side, Google released Adiantium in the spring of 2019. Adiantium is an encryption mode that can run on devices running Android Wear by using the ChaCha stream to cipher in a length-preserving mode (Crowley and Biggers, 2018). In this way, low-performance devices can encrypt their data in the same degree as smartphones and laptops can. Apple did include encryption in their newest version of iOS as well (Apple, 2019). Moreover, Apple asks users to enter a password to adjust the device settings and allows users to deactivate their pay account remotely via iCloud and (Thomas, 2019).

A research by Kasperky (Lurye, 2019) showed that smartwatches are relatively safe nowadays. Their encryption is improving and so are their protection measures. Managing permissions, checking for privacy policies and being alerted for malware will help to prevent most damage. No guarantee for a breach can be given, however. In case of a breach, basic information can be obtained quite easily. More specific information such as what the user types on a computer or credit card information is much harder to obtain and requires advanced software such as neural networks.

Apple (2019). iOs security. [ebook] Apple, pp.37-38. Available at: https://www.apple.com/business/docs/site/iOS_Security_Guide.pdf [Accessed 4 Oct. 2019].

Crowley, P. and Biggers, E. (2018) “Adiantum: length-preserving encryption for entry-level processors”, IACR Transactions on Symmetric Cryptology, 2018(4), pp. 39-61. doi: 10.13154/tosc.v2018.i4.39-61.

Do, Q., Martini, B. and Choo, K. (2016). Is the data on your wearable device secure? An Android Wear smartwatch case study. Software: Practice and Experience, 47(3), pp.391-403.

Lurye, S. (2019). Experiment: How easy is it to spy on a smartwatch wearer?. [online] Kaspersky.com. Available at: https://www.kaspersky.com/blog/smart-watch-research/22536/ [Accessed 4 Oct. 2019].

O’Connell, J. (2019). 5 Security Concerns for Your Smart Watch | Hacked: Hacking Finance. [online] Hacked. Available at: https://hacked.com/5-security-concerns-smart-watch/ [Accessed 4 Oct. 2019].

Symanovich, S. (2019). Smart watches and internet security: Are my wearables safe? | Norton. [online] Us.norton.com. Available at: https://us.norton.com/internetsecurity-iot-how-to-protect-your-connected-wearables.html [Accessed 4 Oct. 2019].

Thomas, K. (2019). How secure is your smartwatch? | WeLiveSecurity. [online] WeLiveSecurity. Available at: https://www.welivesecurity.com/2015/04/15/secure-smartwatch/ [Accessed 4 Oct. 2019].

Wenz, J. (2019). Why Links Between Smartwatches and Phones Could be Vulnerable to Attacks. [online] Popular Mechanics. Available at: https://www.popularmechanics.com/technology/security/a13815/hackers-can-crack-smartwatch-and-smartphone-encryption-17514096/ [Accessed 4 Oct. 2019].

Please rate this

Does China present an alternative development model for ICT?

7

September

2019

No ratings yet.

Historically, global ICT standards have been produced by Western countries and their alliances, such as the International Telecommunication Union (ITU), International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC). As a result, the People’s Republic of China developed a strong, unwanted dependency on foreign technology. Besides, Chinese policymakers believe that setting international technology standards could help the country to move from a low labor manufacturing node within global production networks to a more economically sustainable model.

Over the last two decades, the People’s Republic of China has tried to provide an alternative model for ICT. The unique character of this model consists of a blend of different policies and developments originating from the government, as well as state-owned and private companies. The main elements of the model are indigenous standards, knowledge, capital, domestic market, and R&D.

A focus on the development of indigenous standards has been a successful strategy for latecomer countries such as Japan, South Korea, and Singapore, in able to climb up the value chain. However, there should be noted that the Chinese strategy focuses more on an import-led substitution strategy instead of export-led strategy as used by the previously mentioned countries. The low-cost technology developed by China is attractive to countries that can’t afford the premiums. Nowadays, by investing heavily in R&D, China is supplying more and more top-class technology. By entering international alliances, China managed to find a platform to promote its indigenous standards.

To enable China to move up the value chain, it needs knowledge. By sponsoring hundreds of thousands of students to study abroad, top-of-the-notch knowledge was available as nine out of ten students returned home after completing their studies.

20180519_SRC361

Moreover, in exchange for access to the Chinese market, foreign companies entered joint ventures with domestic companies and agreed on transferring their knowledge and capital into China. These joint ventures did also partner up with local suppliers and partners.

Speaking of capital, besides the joint ventures, the Chinese entry to the World Trade Organization in 2001 triggered a strong inflow of foreign direct investments. The economy has delivered astonishing growth rates over the past two decades, which stimulated investment inflows over the years. Foreign investors have criticized China for its market protection, even after the WTO entry.

With the growing economy, large sectors such as agriculture and manufacturing had a strong demand for ICT hardware and software. The consumer market for ICT started to grow strongly as well, stimulated by the rise of e-commerce. With the market protection in place and the unique characteristics of the Chinese market (bottom-of-pyramid and good-enough innovation), domestic companies managed to profit strongly from this development.

China’s policymakers have set the goal of becoming the best research and development capability by 2020. In able to fulfill this goal, enormous amounts of investments have been done. It’s an understatement to say that this is a very ambitious goal. China has had problems with becoming an innovative society for over a decade. But in able to move up the value chain, it’s a necessary step to make.

To conclude, China does provide an alternative model for ICT with which it is providing a way to set international standards for ICT. The acquirement of knowledge and capital, together with the growing domestic market and the participation in international alliances, made it possible to create a domestic demand and push the higher standards abroad. Nevertheless, big steps are still to be made to move up the value chain and to fulfill China’s ambitions. 5G would have been a good chance for China to show its capabilities as an international standard setter. However, the international debate around Huawei and ZTE may take this chance away.

 

References:

Chen, S. & Wen, P. (2016). The Evolution of China’s Mobile Phone Industry and Good-enough Innovation. China as an Innovation Nation, 261.

Gerth (2010). As China goes, so goes the world: how Chinese consumers are transforming everything.

Grimes, S., & Du, D. (2013). Foreign and indigenous innovation in China: Some evidence from Shanghai. European Planning Studies, 21(9), 1357–1373.

Meng, Qingxuan & Li Mingzhi (2002). New Economy and ICT Development in China. Information Economics and Policy 14.2: 275-295.

Yutao, S. & Grimes, S (2016). China’s Increasing Participation in ICT’s Global Value Chain: A Firm Level Analysis. Telecommunications Policy 40, 210-224.

Wang, P., Kwak, J., & Lee, H. (2014). The latecomer strategy for global ICT standardization: Indigenous innovation and its dilemma. Telecommunications Policy, 38, 933–943

全国人民代表大会 (2016). 中华人民共和国国民经济和社会发展第十三个五年规划纲要. Retrieved from http://www.lawinfochina.com/display.aspx?id=3fe76ec605b256e9bdfb&lib=law

Please rate this