Connect with us

Feature/OPED

Ericsson: Smart Home Privacy: How to Avoid ‘Data Paparazzi’

Published

on

Smart home tablet Data Paparazzi

The paparazzi are known for often taking covert photographs of celebrities and selling them to tabloids or gossip magazines.

In a similar vein, could the increasing number of smart, connected devices coming into our lives start acting like covert “data paparazzi”? And what can we do to avoid it? Find out here.

Today, our devices collect and forward information to all sorts of external parties: our home security alarm provider, our electricity supplier, our fitness watch vendor, our car manufacturer, our security needs to be good enough that it deters attackers and so on. Smart assistants listen to our voice commands and take that information to the internet to execute our orders.

But smart devices go beyond the obvious too – they can be anything from a connected toaster to a washing machine, sewing machine, or a toothbrush!

Data from one device may not be a problem, but combining data from several devices could create a pattern that may reveal unwanted information about a user or a business. And with more devices coming into homes, concerns around the way personal data is managed, controlled and used by devices and organizations are increasingly being raised.

Each new device may introduce a new security risk, if not properly managed through its life cycle. The security risks must be handled by all actors in the value chain, including the device owner, regardless if devices are used by consumers, industries, or smart cities.

So what will be important to think about to ensure that users benefit and get value from devices and their related services, but avoid adding security issues? Should we risk unintentionally becoming surrounded by data paparazzi with their viewfinder aimed at us?

In this blog post, we’ll bring some light on to what these factors mean for the device owner and what can be done to confront it.

Smart devices and privacy: the big picture

Many of us already interact with at least 3 to 5 devices daily – a smartphone or even two, a smart watch, a tablet PC, a work laptop, and maybe a smart TV. One estimate is that by 2030, each of us will own 15 connected devices. Some devices, like a connected car or smart meter, are connected by default and typically managed by the company the user is a customer of. They typically rely on cellular connectivity. For many other devices, the users themselves select and provide the connectivity, often Wi-Fi or cellular, and are personally responsible for the management of the devices.

Above all, the network infrastructure and devices need to be secure. It’s important for us all that we can trust how our devices operate and handle data. It will also be important to ensure device security through the life cycle of the devices. With the fast growth and wide of range of smart and connected devices from different brands – that come with different user interfaces and functions – it might be cumbersome to keep all devices up to date in terms of firmware and security status, for example, from the day the device is purchased until its recycled. However, this is a key requirement for enabling a secure and trustworthy IoT environment.

GDPR and similar efforts have raised more attention to privacy from the general public. As people become more informed and want to know how their devices and information are used and managed, there will be an increased need for tools that enable identifying, verifying, and controlling the data the devices are collecting and sharing.

The data paparazzi problem

Let’s now go into some issues that celebrities have to deal with, regarding paparazzi and stalkers, and how similar situations can also occur in the IoT world. We’ll also reveal if similar mitigation strategies can work for both regular, and data paparazzi.

Information availability

While the saying goes that “all publicity is good publicity”, many celebrities wouldn’t agree. They want to be in control of the information shared about them, to build a relevant public image but avoid revealing private relations, unattractive personal habits, or similar.

The same thinking is behind IoT security; information that’s needed to complete the intended tasks of an IoT device should be made available, while the rest of the information should be kept private. However, for IoT there’s often a more fine-grained approach as the information made available should in many cases only be made available to a restricted group of observers on a need-to-know basis.

The stalker problem

Many celebrities might also have to deal with stalkers – individuals who are overly interested in them and may try to gain as much information about them as possible, even using illegal means.

In the IoT space, the same phenomenon could happen to the average Joe. A smart home that doesn’t restrict access to the information it generates can easily become a lucrative target for an attacker; the information generated by the home can be used to gather different information about the inhabitants, which could later be leveraged to commit a cyber attack. Information about when various appliances are used, such as when doors are opened, lights are switched on/off, energy consumption fluctuates, can be a real treasure trove. This also means that potential attackers might not skip a house just because there’s some security applied, rather the security needs to be good enough that it deters attackers from trying, or stops them in their tracks.

Mitigation strategies

Celebrities tend to take precautions to hinder paparazzi and stalkers from invading their privacy. This can be in the form of living in gated communities or at least having access control to their property, through walls and gates for example. They might also apply surveillance measures such as motion sensors and surveillance cameras, and even security measures such as guards or guard dogs. When moving about in public, they might have a security guard with them to keep interested parties at least at arm’s length.

The same things need to be considered in the IoT world. For example, in smart homes, access to the internal network and the data generated and stored there should be controlled and protected, monitoring should be applied to pick up on suspicious behaviour, and reactive security measures, such as blocking and logging, should be taken when a breach is detected.

What has been normal for celebrities should now also become the standard for anyone in an IoT environment. When it comes to privacy, active measures should be taken to maintain it. While this might sound scary – and without proper actions, it would be – it’s not something that’s difficult to achieve. Rather it’s about having the right mindset and recognizing that security needs to be built in and considered more and more in the connected world, even for private citizens.

What to protect?

IoT is very much about the data generated and consumed by IoT devices. At first, this data may be seen as producing no risk, but even simple data in a certain context may be sensitive. For example:

  • Power consumption data recorded by a smart meter can provide a lot of information about what’s happening in a home. For example, based on the power consumption profile of TVs, switching on the TV will be visible from the data and if it’s possible to match the time the TV is turned on with the TV guide, that will provide a good indication as to what people at home are watching.
  • Any competent smart lock manufacturer will make sure that the communication with the lock is encrypted and its integrity protected. However, this might not be enough; by observing the traffic generated by a smart lock, one could potentially deduce whether the lock has been opened from the inside or the outside and thereby predict if there’s anyone in the house at any given moment. Other data generated by a smart home, including power consumption and light switch data, can be used to improve the prediction.
  • It’s inevitable that, at some point, an electric device will reach the end of its lifetime and will need to be disposed of. If the information stored on the device isn’t properly removed, a hacker who retrieves the device from a waste bin or who purchases it from a second-hand store could dig out data or credentials, as well as information about the services the device has been connected to. This is information that could be used to spy on the owner in a more efficient way, or even control or modify other devices belonging to the owner from the backend.

The question, therefore, shouldn’t be, “what do I need to protect?”, rather, “what don’t I need to protect?”, meaning “what do I actually need to share?”.

How to avoid unauthorized use of private data

There’s no silver bullet solution to this problem and the complexity is proportional to the number of devices and services that we as individuals interact with. Applying the best security practices is the responsibility of many entities. Device manufacturers and service providers need to provide secure devices/services, with proper control and maintenance for future proof device security.

But there are some rules of thumb that each of us can follow to minimize security and privacy issues related to our devices. By following these recommendations, one can build a system that will withstand a great deal of malicious intent, and deter the vast majority of attackers and opportunists. A few highly skilled and well-connected groups or individuals might be able to get past even the most secure systems, often through social engineering and phishing, that is, human weakness, rather than by technical security exploits. However, with the effort required, “average Joe” is maybe not the typical target.

End-user responsibilities include selecting suitable and secure solutions, and installing and configuring them in a secure way. Well-designed products should make this a relatively easy task, but it can also be done with the help of professionals. Furthermore, there are initiatives such as the Finnish Cybersecurity Label providing security labels for IoT devices, which aim to help consumers select products for which security has been verified.

Another important thing is to remember to update the software of the device.

And based on statistics regarding how a system’s security most often fails, a crucial task for the end-user is to remember to change the default password of all and any devices that are installed.

What can I do as a device owner?

  • Check whether the device manufacturer/service provider offers firmware/software upgrades in case of security issues.
  • Consider what data is generated and how it’s used and stored, for example, locally and/or in the cloud.
  • Check user terms and conditions to find out how data is used.
  • Remember to change the default device password.
  • Remember to keep device software up to date.
  • Remember to wipe the device before recycling.

And remember to consider the trustworthiness of a device and its services before purchase!

More reading

Read about Ericsson’s contribution to IoT security protocol standard OSCORE, which aims to optimize the computational strain on constrained devices, and keep a low overhead, while maintaining a high level of security.

Read our blog post on evolving SIM solutions for IoT. Such solutions allow the use of the well-established identity management features of mobile networks also for IoT deployments where manual SIM card handling isn’t feasible.

Explore Ericsson telecom security and security management.

Learn more about our research into the future of network security.

Click to comment

Leave a Reply

Feature/OPED

The Future of Payments: Key Trends to Watch in 2025

Published

on

Luke Kyohere

By Luke Kyohere

The global payments landscape is undergoing a rapid transformation. New technologies coupled with the rising demand for seamless, secure, and efficient transactions has spurred on an exciting new era of innovation and growth. With 2025 fast approaching, here are important trends that will shape the future of payments:

1. The rise of real-time payments

Until recently, real-time payments have been used in Africa for cross-border mobile money payments, but less so for traditional payments. We are seeing companies like Mastercard investing in this area, as well as central banks in Africa putting focus on this. 

2. Cashless payments will increase

In 2025, we will see the continued acceleration of cashless payments across Africa. B2B payments in particular will also increase. Digital payments began between individuals but are now becoming commonplace for larger corporate transactions. 

3. Digital currency will hit mainstream

In the cryptocurrency space, we will see an increase in the use of stablecoins like United States Digital Currency (USDC) and Tether (USDT) which are linked to US dollars. These will come to replace traditional cryptocurrencies as their price point is more stable. This year, many countries will begin preparing for Central Bank Digital Currencies (CBDCs), government-backed digital currencies which use blockchain. 

The increased uptake of digital currencies reflects the maturity of distributed ledger technology and improved API availability. 

4. Increased government oversight

As adoption of digital currencies will increase, governments will also put more focus into monitoring these flows. In particular, this will centre on companies and banks rather than individuals. The goal of this will be to control and occasionally curb runaway foreign exchange (FX) rates.

5. Business leaders buy into AI technology

In 2025, we will see many business leaders buying into AI through respected providers relying on well-researched platforms and huge data sets. Most companies don’t have the budget to invest in their own research and development in AI, so many are now opting to ‘buy’ into the technology rather than ‘build’ it themselves. Moreover, many businesses are concerned about the risks associated with data ownership and accuracy so buying software is another way to avoid this risk. 

6. Continued AI Adoption in Payments

In payments, the proliferation of AI will continue to improve user experience and increase security.  To detect fraud, AI is used to track patterns and payment flows in real-time. If unusual activity is detected, the technology can be used to flag or even block payments which may be fraudulent. 

When it comes to user experience, we will also see AI being used to improve the interface design of payment platforms. The technology will also increasingly be used for translation for international payment platforms.

7. Rise of Super Apps

To get more from their platforms, mobile network operators are building comprehensive service platforms, integrating multiple payment experiences into a single app. This reflects the shift of many users moving from text-based services to mobile apps. Rather than offering a single service, super apps are packing many other services into a single app. For example, apps which may have previously been used primarily for lending, now have options for saving and paying bills. 

8. Business strategy shift

Recent major technological changes will force business leaders to focus on much shorter prediction and reaction cycles. Because the rate of change has been unprecedented in the past year, this will force decision-makers to adapt quickly, be decisive and nimble. 

As the payments space evolves,  businesses, banks, and governments must continually embrace innovation, collaboration, and prioritise customer needs. These efforts build a more inclusive, secure, and efficient payment system that supports local to global economic growth – enabling true financial inclusion across borders.

Luke Kyohere is the Group Chief Product and Innovation Officer at Onafriq

Continue Reading

Feature/OPED

Ghana’s Democratic Triumph: A Call to Action for Nigeria’s 2027 Elections

Published

on

ghana election 2024

In a heartfelt statement released today, the Conference of Nigeria Political Parties (CNPP) has extended its warmest congratulations to Ghana’s President-Elect, emphasizing the importance of learning from Ghana’s recent electoral success as Nigeria gears up for its 2027 general elections.

In a statement signed by its Deputy National Publicity Secretary, Comrade James Ezema, the CNPP highlighted the need for Nigeria to reclaim its status as a leader in democratic governance in Africa.

“The recent victory of Ghana’s President-Elect is a testament to the maturity and resilience of Ghana’s democracy,” the CNPP stated. “As we celebrate this achievement, we must reflect on the lessons that Nigeria can learn from our West African neighbour.”

The CNPP’s message underscored the significance of free, fair, and credible elections, a standard that Ghana has set and one that Nigeria has previously achieved under former President Goodluck Jonathan in 2015. “It is high time for Nigeria to reclaim its position as a beacon of democracy in Africa,” the CNPP asserted, calling for a renewed commitment to the electoral process.

Central to CNPP’s message is the insistence that “the will of the people must be supreme in Nigeria’s electoral processes.” The umbrella body of all registered political parties and political associations in Nigeria CNPP emphasized the necessity of an electoral system that genuinely reflects the wishes of the Nigerian populace. “We must strive to create an environment where elections are free from manipulation, violence, and intimidation,” the CNPP urged, calling on the Independent National Electoral Commission (INEC) to take decisive action to ensure the integrity of the electoral process.

The CNPP also expressed concern over premature declarations regarding the 2027 elections, stating, “It is disheartening to note that some individuals are already announcing that there is no vacancy in Aso Rock in 2027. This kind of statement not only undermines the democratic principles that our nation holds dear but also distracts from the pressing need for the current administration to earn the trust of the electorate.”

The CNPP viewed the upcoming elections as a pivotal moment for Nigeria. “The 2027 general elections present a unique opportunity for Nigeria to reclaim its position as a leader in democratic governance in Africa,” it remarked. The body called on all stakeholders — including the executive, legislature, judiciary, the Independent National Electoral Commission (INEC), and civil society organisations — to collaborate in ensuring that elections are transparent, credible, and reflective of the will of the Nigerian people.

As the most populous African country prepares for the 2027 elections, the CNPP urged all Nigerians to remain vigilant and committed to democratic principles. “We must work together to ensure that our elections are free from violence, intimidation, and manipulation,” the statement stated, reaffirming the CNPP’s commitment to promoting a peaceful and credible electoral process.

In conclusion, the CNPP congratulated the President-Elect of Ghana and the Ghanaian people on their remarkable achievements.

“We look forward to learning from their experience and working together to strengthen democracy in our region,” the CNPP concluded.

Continue Reading

Feature/OPED

The Need to Promote Equality, Equity and Fairness in Nigeria’s Proposed Tax Reforms

Published

on

tax reform recommendations

By Kenechukwu Aguolu

The proposed tax reform, involving four tax bills introduced by the Federal Government, has received significant criticism. Notably, it was rejected by the Governors’ Forum but was still forwarded to the National Assembly. Unlike the various bold economic decisions made by this government, concessions will likely need to be made on these tax reforms, which involve legislative amendments and therefore cannot be imposed by the executive. This article highlights the purposes of taxation, the qualities of a good tax system, and some of the implications of the proposed tax reforms.

One of the major purposes of taxation is to generate revenue for the government to finance its activities. A good tax system should raise sufficient revenue for the government to fund its operations, and support economic and infrastructural development. For any country to achieve meaningful progress, its tax-to-GDP ratio should be at least 15%. Currently, Nigeria’s tax-to-GDP ratio is less than 11%. The proposed tax reforms aim to increase this ratio to 18% within the next three years.

A good tax system should also promote income redistribution and equality by implementing progressive tax policies. In line with this, the proposed tax reforms favour low-income earners. For example, individuals earning less than one million naira annually are exempted from personal income tax. Additionally, essential goods and services such as food, accommodation, and transportation, which constitute a significant portion of household consumption for low- and middle-income groups, are to be exempted from VAT.

In addition to equality, a good tax system should ensure equity and fairness, a key area of contention surrounding the proposed reforms. If implemented, the amendments to the Value Added Tax could lead to a significant reduction in the federal allocation for some states; impairing their ability to finance government operations and development projects. The VAT amendments should be holistically revisited to promote fairness and national unity.

The establishment of a single agency to collect government taxes, the Nigeria Revenue Service, could reduce loopholes that have previously resulted in revenue losses, provided proper controls are put in place. It is logically easier to monitor revenue collection by one agency than by multiple agencies. However, this is not a magical solution. With automation, revenue collection can be seamless whether it is managed by one agency or several, as long as monitoring and accountability measures are implemented effectively.

The proposed tax reforms by the Federal Government are well-intentioned. However, all concerns raised by Nigerians should be looked into, and concessions should be made where necessary. Policies are more effective when they are adapted to suit the unique characteristics of a nation, rather than adopted wholesale. A good tax system should aim to raise sufficient revenue, ensure equitable income distribution, and promote equality, equity, and fairness.

Continue Reading

Trending