Feature/OPED
Ericsson: Smart Home Privacy: How to Avoid ‘Data Paparazzi’
The paparazzi are known for often taking covert photographs of celebrities and selling them to tabloids or gossip magazines.
In a similar vein, could the increasing number of smart, connected devices coming into our lives start acting like covert “data paparazzi”? And what can we do to avoid it? Find out here.
Today, our devices collect and forward information to all sorts of external parties: our home security alarm provider, our electricity supplier, our fitness watch vendor, our car manufacturer, our security needs to be good enough that it deters attackers and so on. Smart assistants listen to our voice commands and take that information to the internet to execute our orders.
But smart devices go beyond the obvious too – they can be anything from a connected toaster to a washing machine, sewing machine, or a toothbrush!
Data from one device may not be a problem, but combining data from several devices could create a pattern that may reveal unwanted information about a user or a business. And with more devices coming into homes, concerns around the way personal data is managed, controlled and used by devices and organizations are increasingly being raised.
Each new device may introduce a new security risk, if not properly managed through its life cycle. The security risks must be handled by all actors in the value chain, including the device owner, regardless if devices are used by consumers, industries, or smart cities.
So what will be important to think about to ensure that users benefit and get value from devices and their related services, but avoid adding security issues? Should we risk unintentionally becoming surrounded by data paparazzi with their viewfinder aimed at us?
In this blog post, we’ll bring some light on to what these factors mean for the device owner and what can be done to confront it.
Smart devices and privacy: the big picture
Many of us already interact with at least 3 to 5 devices daily – a smartphone or even two, a smart watch, a tablet PC, a work laptop, and maybe a smart TV. One estimate is that by 2030, each of us will own 15 connected devices. Some devices, like a connected car or smart meter, are connected by default and typically managed by the company the user is a customer of. They typically rely on cellular connectivity. For many other devices, the users themselves select and provide the connectivity, often Wi-Fi or cellular, and are personally responsible for the management of the devices.
Above all, the network infrastructure and devices need to be secure. It’s important for us all that we can trust how our devices operate and handle data. It will also be important to ensure device security through the life cycle of the devices. With the fast growth and wide of range of smart and connected devices from different brands – that come with different user interfaces and functions – it might be cumbersome to keep all devices up to date in terms of firmware and security status, for example, from the day the device is purchased until its recycled. However, this is a key requirement for enabling a secure and trustworthy IoT environment.
GDPR and similar efforts have raised more attention to privacy from the general public. As people become more informed and want to know how their devices and information are used and managed, there will be an increased need for tools that enable identifying, verifying, and controlling the data the devices are collecting and sharing.
The data paparazzi problem
Let’s now go into some issues that celebrities have to deal with, regarding paparazzi and stalkers, and how similar situations can also occur in the IoT world. We’ll also reveal if similar mitigation strategies can work for both regular, and data paparazzi.
Information availability
While the saying goes that “all publicity is good publicity”, many celebrities wouldn’t agree. They want to be in control of the information shared about them, to build a relevant public image but avoid revealing private relations, unattractive personal habits, or similar.
The same thinking is behind IoT security; information that’s needed to complete the intended tasks of an IoT device should be made available, while the rest of the information should be kept private. However, for IoT there’s often a more fine-grained approach as the information made available should in many cases only be made available to a restricted group of observers on a need-to-know basis.
The stalker problem
Many celebrities might also have to deal with stalkers – individuals who are overly interested in them and may try to gain as much information about them as possible, even using illegal means.
In the IoT space, the same phenomenon could happen to the average Joe. A smart home that doesn’t restrict access to the information it generates can easily become a lucrative target for an attacker; the information generated by the home can be used to gather different information about the inhabitants, which could later be leveraged to commit a cyber attack. Information about when various appliances are used, such as when doors are opened, lights are switched on/off, energy consumption fluctuates, can be a real treasure trove. This also means that potential attackers might not skip a house just because there’s some security applied, rather the security needs to be good enough that it deters attackers from trying, or stops them in their tracks.
Mitigation strategies
Celebrities tend to take precautions to hinder paparazzi and stalkers from invading their privacy. This can be in the form of living in gated communities or at least having access control to their property, through walls and gates for example. They might also apply surveillance measures such as motion sensors and surveillance cameras, and even security measures such as guards or guard dogs. When moving about in public, they might have a security guard with them to keep interested parties at least at arm’s length.
The same things need to be considered in the IoT world. For example, in smart homes, access to the internal network and the data generated and stored there should be controlled and protected, monitoring should be applied to pick up on suspicious behaviour, and reactive security measures, such as blocking and logging, should be taken when a breach is detected.
What has been normal for celebrities should now also become the standard for anyone in an IoT environment. When it comes to privacy, active measures should be taken to maintain it. While this might sound scary – and without proper actions, it would be – it’s not something that’s difficult to achieve. Rather it’s about having the right mindset and recognizing that security needs to be built in and considered more and more in the connected world, even for private citizens.
What to protect?
IoT is very much about the data generated and consumed by IoT devices. At first, this data may be seen as producing no risk, but even simple data in a certain context may be sensitive. For example:
- Power consumption data recorded by a smart meter can provide a lot of information about what’s happening in a home. For example, based on the power consumption profile of TVs, switching on the TV will be visible from the data and if it’s possible to match the time the TV is turned on with the TV guide, that will provide a good indication as to what people at home are watching.
- Any competent smart lock manufacturer will make sure that the communication with the lock is encrypted and its integrity protected. However, this might not be enough; by observing the traffic generated by a smart lock, one could potentially deduce whether the lock has been opened from the inside or the outside and thereby predict if there’s anyone in the house at any given moment. Other data generated by a smart home, including power consumption and light switch data, can be used to improve the prediction.
- It’s inevitable that, at some point, an electric device will reach the end of its lifetime and will need to be disposed of. If the information stored on the device isn’t properly removed, a hacker who retrieves the device from a waste bin or who purchases it from a second-hand store could dig out data or credentials, as well as information about the services the device has been connected to. This is information that could be used to spy on the owner in a more efficient way, or even control or modify other devices belonging to the owner from the backend.
The question, therefore, shouldn’t be, “what do I need to protect?”, rather, “what don’t I need to protect?”, meaning “what do I actually need to share?”.
How to avoid unauthorized use of private data
There’s no silver bullet solution to this problem and the complexity is proportional to the number of devices and services that we as individuals interact with. Applying the best security practices is the responsibility of many entities. Device manufacturers and service providers need to provide secure devices/services, with proper control and maintenance for future proof device security.
But there are some rules of thumb that each of us can follow to minimize security and privacy issues related to our devices. By following these recommendations, one can build a system that will withstand a great deal of malicious intent, and deter the vast majority of attackers and opportunists. A few highly skilled and well-connected groups or individuals might be able to get past even the most secure systems, often through social engineering and phishing, that is, human weakness, rather than by technical security exploits. However, with the effort required, “average Joe” is maybe not the typical target.
End-user responsibilities include selecting suitable and secure solutions, and installing and configuring them in a secure way. Well-designed products should make this a relatively easy task, but it can also be done with the help of professionals. Furthermore, there are initiatives such as the Finnish Cybersecurity Label providing security labels for IoT devices, which aim to help consumers select products for which security has been verified.
Another important thing is to remember to update the software of the device.
And based on statistics regarding how a system’s security most often fails, a crucial task for the end-user is to remember to change the default password of all and any devices that are installed.
What can I do as a device owner?
- Check whether the device manufacturer/service provider offers firmware/software upgrades in case of security issues.
- Consider what data is generated and how it’s used and stored, for example, locally and/or in the cloud.
- Check user terms and conditions to find out how data is used.
- Remember to change the default device password.
- Remember to keep device software up to date.
- Remember to wipe the device before recycling.
And remember to consider the trustworthiness of a device and its services before purchase!
More reading
Read about Ericsson’s contribution to IoT security protocol standard OSCORE, which aims to optimize the computational strain on constrained devices, and keep a low overhead, while maintaining a high level of security.
Read our blog post on evolving SIM solutions for IoT. Such solutions allow the use of the well-established identity management features of mobile networks also for IoT deployments where manual SIM card handling isn’t feasible.
Explore Ericsson telecom security and security management.
Learn more about our research into the future of network security.
Feature/OPED
A Beginner’s Guide to Temu: Your Ultimate Shopping Companion
Ever wondered where to find trendy fashion, cutting-edge tech, or stylish home decor at unbeatable prices? Look no further than Temu.
What is Temu?
Temu, an online marketplace sensation, has taken the world by storm with its vast array of products, competitive prices, and user-friendly platform.
Since its 2022 launch, it has quickly become a global sensation, boasting hundreds of millions of downloads and catering to over 80 markets. Now, Nigerian shoppers can experience the Temu magic firsthand.
This guide will walk you through the Temu shopping experience, ensuring a smooth journey from product discovery to delivery.
Step 1: CREATE AN ACCOUNT TO UNLOCK SMART SHOPPING
The registration process
Joining Temu is super easy! Whether you prefer the traditional approach or the convenience of social media, Temu has you covered. For the classic signup, simply visit temu.com or download the mobile app, enter your email or phone number, create a strong password, and confirm your details. It’s as easy as that!
For social media savvy, link your Google, Apple, or Facebook account and skip the hassle of creating a new login. With Temu’s streamlined process, you can spend less time logging in and more time exploring the incredible deals awaiting you.
Mobile app vs. desktop: Which platform offers the best shopping experience?
Both the mobile app and desktop website offer a seamless shopping experience. However, for a truly dynamic and interactive shopping journey, we recommend the mobile app. You will enjoy real-time price alerts, exclusive mobile deals, and easy order tracking.
For a more deliberate shopping experience, the desktop website is the perfect choice. With larger screens and easy-to-use comparison features, you can take your time and make informed decisions.
Step 2: BROWSING AND SHOPPING LIKE A PRO
Navigating Temu’s vast selection
Temu offers a vast selection of over 200 product categories, from fashion and tech to home goods and beauty.
To get started, simply use the search bar function to find specific items or explore categories, and refine your search with filters for price, colour, size, and more. Sort items by relevance, price, or newest arrivals to find the perfect products.
Temu’s ranking system highlights popular and trusted products, often based on customer reviews and sales trends. To make informed choices, compare prices, features, and reviews before purchasing.
Best-selling products
Temu’s best-selling products are constantly updated based on real-time sales data.
Other metrics beyond rankings
Temu goes beyond traditional product rankings, focusing on the performance and quality of its providers. By considering factors like historic ratings, repurchase records, follower numbers, and new product releases, consumers can make informed decisions. This approach not only empowers buyers but also incentivises providers to deliver high-quality, diverse products and build strong customer relationships.
Providers can earn recognition directly on their product pages by ranking highly in categories like Top Sales, Top Rated, Top Repurchased, Top Followed, or New Arrival. These rankings are based on the provider’s performance over the past 30 days and are updated daily to ensure the most current information is displayed to consumers.
Finding your perfect fit
Temu provides detailed size guides to help shoppers find the perfect fit, particularly for clothing and accessories. These guides often include measurements, comparison charts, and sometimes even virtual fitting tools to make your online shopping experience seamless.
Save more, shop smart
Simplify your shopping and maximise your savings with Temu. All discounts are displayed directly on product pages. For the best deals, explore the platform’s Lightning Deals. To ensure satisfaction, pay attention to details, read descriptions, verify measurements, understand features, and consult seller ratings and reviews.
Step 3: PLACING AN ORDER
Shopping safely and securely
Temu offers a variety of payment methods, including popular credit cards and digital wallets like Visa, Mastercard, American Express, Maestro, Discover, JCB and Diners Club. To prioritise your security, the platform employs advanced security measures, adhering to strict industry standards to protect your information.
Step 4: FAST AND RELIABLE DELIVERY
Hassle-free delivery, every time
Temu prioritises customer satisfaction by providing real-time order tracking and reliable shipping options, including free standard shipping and express delivery. The platform guarantees on-time delivery and offers full refunds for damaged or undelivered orders.
At the moment, Temu is in partnership with local logistics firms, such as Flyt Express, SKYNET, and Speedaf to make delivery to Nigerian shoppers on time.
Step 5: AFTER-SALES SERVICE – BEYOND THE PURCHASE
Returns and exchanges made easy
Temu provides a seamless return process with its Purchase Protection Program. If you’re unsatisfied with a purchase, log into your account, select the item, provide a reason, and submit a return request. Temu will provide a prepaid shipping label.
You have a 90-day return window for most items. Once processed, you can choose a refund to Temu credit or original payment. For exchanges, return the item and place a new order. Temu also offers refund policies for no updates and no deliveries. Check Temu’s specific return policy for the latest information.
Beyond shopping: A greener future
Temu is committed to sustainability. By shopping on Temu, you contribute to a greener future. The platform’s Tree Planting Program and combined shipping initiatives help reduce environmental impact.
Smart shopping simplified
Temu has transformed online shopping, offering a wide range of affordable products and a user-friendly experience.
Follow these simple steps to easily navigate the platform and discover your next favourite find. If you need assistance, Temu’s customer support team is available 24/7.
So, shop with confidence on Temu!
Feature/OPED
Ebie: 55 Garlands to a Rare Breed of Human
By Jerome-Mario Utomi
Some persons are born as a special breed of humans. Chiedu Ebie, Chairman of the Governing Board of the Niger Delta Development Commission (NDDC) is one of such persons.
In fact, at 55, Ebie encapsulates Menachem Mendel Schneerson’s postulation about people born as a special breed. Schneerson: “Because time itself is like a spiral, something special happens on your birthday each year: The same energy that God invested in you at birth is present once again.”.
When you look at Ebie’s career trajectory, his exhilarating performances in all the public offices he has held, his contributions to making Delta State a dream state for Deltans, and his current efforts to saturate the Niger Delta region with socio-economic, infrastructural, and human capital development as NDDC chairman, you won’t but agree that he indeed, as submitted by Menachem Mendel Schneerson, belongs to a rare breed of humans. Born January 2, 1970, Ebie’s birthday is a huge celebration of excellence.
Though he wears no airs and does not sound his own trumpet, anyone who encounters him will readily see in him a personality whose life is characterised by remarkable, legendary, and exemplary feats.
A thoroughbred attorney and oil and gas exploration executive, before his appointment as NDDC Board Chairman in November 2023, Ebie had served as Delta State Commissioner for Basic and Secondary Education and later, Secretary to the State Government.
Private and public sector stakeholders share common, refreshing commentaries about Ebie’s eventful and impactful 55 years on earth and his salutary accomplishments.
The common denominator, however, is that this “birthday boy,” this illustrious son of the Ika ancient kingdom who had contributed immensely to the realisation of the Smart and Stronger Delta agenda of the Governor Ifeanyi Okowa administration”, is worthy of commendation, emulation, and celebration as he turns 55 today.
Late American President John Quincy Adams was probably talking about Ebie when he argued that “If your actions inspire others to dream more, learn more, do more, and become more, you are a leader.” Indeed, in Ebie, you see a man whose knack for hard work, honesty, integrity, purposefulness, and excellence has been a source of inspiration to his subordinates and admirers.
His amiable and genial attributes, his traits of transparency and rock-solid integrity, as well as his goal-orientated nature, are arguably traceable to his grandfather, who was the first ordained reverend of the Anglican Church in the Ika nation, and whose two sons later became ordained reverend gentlemen themselves.
As Commissioner for Basic and Secondary Education from 2015-2019, for instance, Ebie achieved unprecedented set goals, which included the massive renovation and rehabilitation of schools and the revamping of grassroots sports through the Zenith Bank Delta Principal’s and Headmaster’s Cup.
In 2019, he achieved a record-breaking and, of course, the transparent recruitment of 1,000 teachers, posted across secondary schools in the state. This merit-based and high-level transparency recruitment exercise made it possible for most of the beneficiaries to scale through without knowing anyone in the ministry or government.
In recognition of his rare attributes, then Governor Okowa made the following elegant statement about Ebie during his inauguration as SSG: “Mr Ebie is a fine gentleman who served meritoriously as Commissioner for Basic and Secondary Education in the first tenure of his administration. His civility, analytical intelligence, communication skills, and diligence are essential qualities needed for the office of the SSG.
In addition to these, modern statecraft, with all its complexities and challenges, requires team players, proactive leaders, and men with a large appetite for work. Mr Ebie meets these criteria, and I am convinced that he is well equipped to enrich the social, political, and economic narrative of our dear state.”
In just one year as NDDC Board Chairman, the Board under his leadership has turned not just the Commission round for the better but also the entire Niger Delta region through purposeful and result-orientated superintendence.
Today is not just Ebie’s birthday but also the dawn of a new year for him, the beginning of another cycle of 365 days of rendering quality, humane, deliberate, intentional, and transformational service to Nigeria and the people of the Niger Delta in particular.
Happy birthday, sir!
Utomi, a media specialist, writes from Lagos, Nigeria. He can be reached via [email protected]/08032725374.
Feature/OPED
Kaolin Mining in Nigeria and Processing into Pharmaceutical Grade Kaolin with Export Potential
By Anaekwe Everistus Nnamdi
Kaolin, a versatile and valuable industrial mineral, holds significant promise for Nigeria’s mining and industrial sectors. Its wide-ranging applications, especially in the pharmaceutical industry, present an untapped potential for mining and processing into pharmaceutical-grade material for both local use and export.
Kaolin, or china clay, is a soft, white clay primarily composed of kaolinite. It finds applications in ceramics, paper, paint, rubber, and plastics. In the pharmaceutical industry, it serves as an excipient, binder, and coating agent for tablets, underscoring its economic significance. Pharmaceutical-grade kaolin is a premium product, requiring high purity levels and strict processing standards.
Nigeria boasts substantial kaolin deposits in states like Adamawa, Katsina, Ogun, Ondo, and Ekiti, with reserves exceeding two billion metric tons. Despite this abundance, the potential of kaolin mining and processing remains underutilized due to limited investment, inadequate infrastructure, and technological challenges.
The local demand for kaolin, particularly in pharmaceuticals and cosmetics, is on the rise. As Nigeria’s pharmaceutical sector grows, fueled by an increasing population and higher prevalence of chronic diseases, the need for high-quality pharmaceutical excipients like kaolin is set to surge. Beyond pharmaceuticals, kaolin is essential in toothpaste, cosmetics, and agrochemicals, further diversifying its domestic applications.
Globally, the kaolin market was valued at USD 3.09 billion in 2022 and is projected to reach USD 4.90 billion by 2030, growing at a compound annual growth rate (CAGR) of 4.59% from 2023 to 2030. The rising demand across industries such as paper, ceramics, paints, and rubber drives this growth. Construction activities worldwide also contribute to the expanding market, aligning with the growing global population’s needs.
Pharmaceutical-grade kaolin represents a niche yet high-value segment of this market. Major importers include the United States, Germany, Japan, and South Korea, where stringent regulations require high-quality raw materials.
Nigeria’s strategic location and trade agreements with African and international partners position it as a potential supplier. Investments in mining and processing infrastructure could enable Nigeria to compete globally, leveraging its vast reserves and cost advantages.
Trends in the Kaolin Market
Increased Demand for High-Purity Kaolin: The pharmaceutical and cosmetic industries are driving the need for ultra-fine, high-purity kaolin that meets regulatory standards.
Sustainability in Mining: Emphasis is growing on sustainable practices, minimizing environmental impact, and benefiting local communities.
Technological Advancements: Innovations in processing technology improve beneficiation efficiency, meeting stringent global standards.
Local Value Addition: Many governments encourage local processing industries to reduce reliance on raw material exports.
Processing pharmaceutical-grade kaolin involves a series of meticulously controlled stages. The first step is mining and beneficiation, which includes extracting kaolin and removing impurities through processes such as washing, sieving, and magnetic separation.
Next, calcination is employed to heat the kaolin, removing moisture and enhancing its chemical and physical properties.
This is followed by grinding and micronizing, a critical phase where the kaolin is refined to achieve the ultra-fine particle size required for pharmaceutical applications.
Finally, quality testing is conducted to ensure the product meets stringent international pharmacopoeia standards, guaranteeing its suitability for high-value uses.
Modern processing plants in Nigeria could significantly boost the local value chain, create jobs, and reduce dependency on imported pharmaceutical-grade kaolin.
The Nigerian mining sector operates under the Minerals and Mining Act of 2007, which provides the legal framework for activities. Key provisions include:
Licensing: Companies require licenses, such as Exploration Licenses, Mining Leases, and Small-Scale Mining Leases.
Environmental Compliance: Operations must adhere to environmental regulations, including conducting Environmental Impact Assessments (EIAs).
Community Engagement: Companies must engage host communities and deliver socio-economic benefits.
Additionally, the National Agency for Food and Drug Administration and Control (NAFDAC) oversees pharmaceutical product quality, including raw materials like kaolin. Compliance with NAFDAC standards is crucial for local producers targeting the pharmaceutical market.
Kaolin mining and processing offer Nigeria an opportunity to diversify its economy, reduce import dependency, and boost foreign exchange earnings. Investments in infrastructure, technology, and regulatory compliance can unlock the full potential of Nigeria’s kaolin reserves.
As global demand for high-purity kaolin rises, particularly in the pharmaceutical sector, Nigeria’s strategic position and abundant resources make it a key player in the industry’s future.
Anaekwe Everistus Nnamdi is the founder and Market Research Analyst of Foraminifera Market Research Limited, Lagos and can be reached via [email protected] or +234 8033782777
-
Feature/OPED5 years ago
Davos was Different this year
-
Travel/Tourism8 years ago
Lagos Seals Western Lodge Hotel In Ikorodu
-
Showbiz2 years ago
Estranged Lover Releases Videos of Empress Njamah Bathing
-
Banking7 years ago
Sort Codes of GTBank Branches in Nigeria
-
Economy2 years ago
Subsidy Removal: CNG at N130 Per Litre Cheaper Than Petrol—IPMAN
-
Banking2 years ago
First Bank Announces Planned Downtime
-
Sports2 years ago
Highest Paid Nigerian Footballer – How Much Do Nigerian Footballers Earn
-
Technology4 years ago
How To Link Your MTN, Airtel, Glo, 9mobile Lines to NIN