Proceedings of the 2017 on Multimedia Privacy and Security 2017
DOI: 10.1145/3137616.3137617
|View full text |Cite
|
Sign up to set email alerts
|

Unwinding Ariadne's Identity Thread

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 38 publications
(11 citation statements)
references
References 27 publications
0
11
0
Order By: Relevance
“…Recent research [4] has found that many popular devices have extremely lax security standards for the data they collect. Other work has found that privacy leakages in the Bluetooth communication between these trackers and a smartphone can track a person's movements (and identify them by gait) [5], or, related to the above discussion of re-identification, can leverage information posted on social media from these trackers with other public information to find home addresses [6]. The relatively lax regulatory environment that governs these trackers does not help mitigate these risks.…”
Section: Golden State Killermentioning
confidence: 99%
“…Recent research [4] has found that many popular devices have extremely lax security standards for the data they collect. Other work has found that privacy leakages in the Bluetooth communication between these trackers and a smartphone can track a person's movements (and identify them by gait) [5], or, related to the above discussion of re-identification, can leverage information posted on social media from these trackers with other public information to find home addresses [6]. The relatively lax regulatory environment that governs these trackers does not help mitigate these risks.…”
Section: Golden State Killermentioning
confidence: 99%
“…As wearable devices, such as the glasses from Andrew's story, become more complex and diverse due to industry manufacturers striving to deliver more features and functionality to users at lower costs, it is unsuspecting and uninformed users of such devices, as well as bystanders, that become exposed to a wider range of potential security and privacy attacks from malicious parties [30,66,93]. But glasses are not the only wearables that can become targets of such attacks: smartwatches, fitness trackers, and armbands have been repeatedly exposed in the scientific literature as being unsecure [6,15,20,30,81,94,94]. However, unlike smartwatches and fitness trackers, for which a large body of literature has uncovered many security threats and proposed defense mechanisms, similar systematic investigations for glasses are lacking.…”
Section: :2 • Opaschi and Vatavumentioning
confidence: 99%
“…The advent of wearables that publicly advertise their presence in the radio spectrum, share the data they collect with connected devices or with services from the cloud, and register to unsecured local networks, demands dedicated attention to the privacy and security threats to which they expose their users. Some of those security threats have been recently uncovered for smartwatches [81,93,94], fitness trackers [6,15,20,30], and smart armbands [103], but considerably less attention has been devoted to examine the security of video streaming camera glasses. Regarding the latter, the main focus of research has been the privacy of bystanders and their reactions to wearers of such devices [23,25,43,[48][49][50].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…When designing Geollery, we take privacy concerns into consideration right at the beginning since location data may reveal details of people's lives [32]. We tackle privacy in two ways:…”
Section: Privacymentioning
confidence: 99%