{"id":33180,"date":"2020-02-28T04:16:00","date_gmt":"2020-02-28T09:16:00","guid":{"rendered":"http:\/\/blog.cybercon1.com\/?p=33180"},"modified":"2020-02-28T04:16:00","modified_gmt":"2020-02-28T09:16:00","slug":"what-the-hell-is-that-device","status":"publish","type":"post","link":"https:\/\/blog.cyberconservices.com\/index.php\/2020\/02\/28\/what-the-hell-is-that-device\/","title":{"rendered":"What the Hell Is That Device"},"content":{"rendered":"\n<p>By\u00a0<a href=\"https:\/\/www.vice.com\/en_us\/contributor\/karl-bode\">Karl Bode<\/a> &#8211; There\u2019s really no escaping the internet of broken things.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignright size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cdn.pixabay.com\/photo\/2018\/02\/03\/18\/15\/satellite-3128213__340.jpg\" alt=\"\" width=\"394\" height=\"200\"\/><\/figure><\/div>\n\n\n\n<p>On any given day, Americans connect thousands of internet-enabled devices to the internet, despite\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/www.schneier.com\/blog\/archives\/2017\/02\/security_and_th.html\" target=\"_blank\">repeated warnings<\/a>\u00a0from cybersecurity experts that such devices often lack even the most rudimentary privacy and security protections.<br><br>The results haven\u2019t been pretty. From \u201csmart\u201d televisions that\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/www.vice.com\/en_us\/article\/8qbq5x\/the-cia-spied-on-people-through-their-smart-tvs-leaked-documents-reveal\" target=\"_blank\">hoover up your living room conversations<\/a>\u00a0to webcams that can be hacked and used in DDoS attacks\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/www.vice.com\/en_us\/article\/8q8dab\/15-million-connected-cameras-ddos-botnet-brian-krebs\" target=\"_blank\">in a matter of seconds<\/a>, the problem is monumental. And it\u2019s enabled by companies that routinely prioritize profits over consumer privacy, security, or the well being of the internet.<br><br>Researchers at Carnegie Mellon University have released a beta of an app they hope can address some of these problems. Dubbed the\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/cylab.cmu.edu\/news\/2020\/02\/19-privacy-assistant.html\" target=\"_blank\">The Internet of Things (IoT) Assistant<\/a>, (<a rel=\"noreferrer noopener\" href=\"https:\/\/apps.apple.com\/us\/app\/iot-assistant\/id1491361441?ls=1\" target=\"_blank\">iOS<\/a>,\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=io.iotprivacy.iotassistant\" target=\"_blank\">Android<\/a>) the app will scan any unidentified <strong>IOT<\/strong> nearby, tell you what they do, and guide you toward the ability to opt out of data collection (assuming such an option exists).  <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.google.com\/url?rct=j&amp;sa=t&amp;url=https:\/\/www.vice.com\/en_us\/article\/3a8pgj\/internet-of-things-tracking-app-spying&amp;ct=ga&amp;cd=CAEYDCoUMTI3NDM2MjkzMzYyODA0NTg4OTkyGmEyZDc1YTAxNDlhODIxZDc6Y29tOmVuOlVT&amp;usg=AFQjCNFg2gL3LgJFqt9AOWnb48fXyAyweA\" target=\"_blank\">Read On:<\/a><\/p>\n\n\n\n<iframe style=\"width:120px;height:240px;\" align=\"left\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" frameborder=\"0\" src=\"\/\/ws-na.amazon-adsystem.com\/widgets\/q?ServiceVersion=20070822&#038;OneJS=1&#038;Operation=GetAdHtml&#038;MarketPlace=US&#038;source=ss&#038;ref=as_ss_li_til&#038;ad_type=product_link&#038;tracking_id=cyberconservi-20&#038;language=en_US&#038;marketplace=amazon&#038;region=US&#038;placement=B07B93347H&#038;asins=B07B93347H&#038;linkId=faa737ecaef89b219bcad375b19a461b&#038;show_border=true&#038;link_opens_in_new_window=true\"><\/iframe>\n","protected":false},"excerpt":{"rendered":"<p>By\u00a0Karl Bode &#8211; There\u2019s really no escaping the internet of broken things. On any given day, Americans connect thousands of internet-enabled devices to the internet, despite\u00a0repeated warnings\u00a0from cybersecurity experts that such devices often lack even the most rudimentary privacy and <span class=\"excerpt-dots\">&hellip;<\/span> <a class=\"more-link\" href=\"https:\/\/blog.cyberconservices.com\/index.php\/2020\/02\/28\/what-the-hell-is-that-device\/\"><span class=\"more-msg\">Continue reading &rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[649,626],"tags":[650,627],"class_list":["post-33180","post","type-post","status-publish","format-standard","hentry","category-internet-of-things","category-iot","tag-internet-of-things","tag-iot"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/33180","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/comments?post=33180"}],"version-history":[{"count":0,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/33180\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/media?parent=33180"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/categories?post=33180"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/tags?post=33180"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}