Territorial privacy is an old concept for privacy of the personal space dating back to the 19th century. Despite its former relevance, territorial privacy has been neglected in recent years, while privacy research and legislation mainly focused on the issue of information privacy. However, with the prospect of smart and ubiquitous environments, territorial privacy deserves new attention. Walls, as boundaries between personal and public spaces, will be insufficient to guard territorial privacy when our environments are permeated with numerous computing and sensing devices, that gather and share real-time information about us. Territorial privacy boundaries spanning both the physical and virtual world are required for the demarcation of personal spaces in smart environments. In this paper, we analyze and discuss the issue of territorial privacy in smart environments. We further propose a real-time user-centric observation model to describe multimodal observation channels of multiple physical and virtual observers. The model facilitates the definition of a territorial privacy boundary by separating desired from undesired observers, regardless of whether they are physically present in the user's private territory or virtually participating in it. Moreover, we outline future research challenges and identify areas of work that require attention in the context of territorial privacy in smart environments.
When Kashmir Hill filled her home with smart devices, she knew they would collect massive amounts of her personal information. She wanted to understand: what's the ultimate cost of that data mining? Kashmir Hill is a journalist who writes about technology and privacy for the Special Project Desk at Gizmodo Media Group. In her approach to writing about privacy, she has created her own smart home, built a fake business, lived on bitcoin, and written in only caps for a week. Through these projects, Kashmir explores the dark side of technology--and what we can do about it.
If you own a smart device or connected TV and found yourself alarmed by Tuesday's reports of CIA hacking, you need to start asking difficult questions about the companies you'll spend money with in the future. That's the message from cybersecurity experts Mashable spoke to on a day of explosive allegations following the latest WikiLeaks dump. Wikileaks dumped a trove of documents on Tuesday that allegedly show a range of techniques the CIA uses to hack or get around privacy protections such as encryption. While the CIA hasn't figured out how to crack encrypted messaging apps such as Signal and WhatsApp, according to the documents, they have figured out how to compromise phones so the in-app encryption becomes irrelevant. The CIA has also apparently figured out how to spy on people through smart TVs, and they've explored how to hack vehicle control systems.