{"id":5308,"date":"2015-01-14T10:36:28","date_gmt":"2015-01-14T15:36:28","guid":{"rendered":"http:\/\/kasperskydaily.com\/uk\/?p=5308"},"modified":"2019-11-22T10:15:22","modified_gmt":"2019-11-22T10:15:22","slug":"ces-2015-report","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.uk\/blog\/ces-2015-report\/5308\/","title":{"rendered":"CES 2015: four scary key tech trends"},"content":{"rendered":"<p>CES 2015 was a superb event in terms of new stuff per square foot, which has been referred to numerous times by tech website reporters. As for me, a person fully immersed into the world of information security,\u00a0I left the show with mixed feelings.<\/p>\n<p>On the one hand, CES demonstrated key trends awaiting us 5-10 years from now: smart home, connected cars, virtual reality, biometric\/healthcare body sensors \u2013 the so-called \u2018Internet of Things\u2019 at its best.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">257 gadgets in three minutes at <a href=\"https:\/\/twitter.com\/hashtag\/CES2015?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#CES2015<\/a> <a href=\"http:\/\/t.co\/iCipCcwfED\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/iCipCcwfED<\/a> <a href=\"http:\/\/t.co\/bcjrhw3MLb\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/bcjrhw3MLb<\/a><\/p>\n<p>\u2014 The Verge (@verge) <a href=\"https:\/\/twitter.com\/verge\/status\/553961192168128512?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">January 10, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>On the other hand, the degree of off-handedness in how developers and vendors treat users\u2019 data was striking. Beside scarce exceptions, I noted absolute negligence of such important aspects as privacy, security, and encryption.<\/p>\n<p>The market is eager to run forward, preaching the \u2018Internet of Everything\u2019 mantra. All the relevant questions like \u2018What kind of data will be collected?\u2019, \u2018Who and how will be receiving data?\u2019 and, of course, the main question, \u2018Will we be asking a user whether s\/he is keen on giving away data?\u2019, are either being ignored or asked in the manner a vendor wants them to be asked.<\/p>\n<p>https:\/\/plus.google.com\/116816299317552146445\/posts\/fj1GbdvSVpp<\/p>\n<p>Every time I asked these simple questions in the corridors of CES, I would get a strong feeling I am in the midst of Storm Troopers whom Emperor Palpatine has just ordered to execute \u2018Order 66\u2032. In the best scenario, people would take me for a madman saying \u201cDude, what are you talking about? We are talking a multi-billion worth market \u2013 users will have to accept privacy violations, anyway!\u201d<\/p>\n<p>Quite likely, they will. But as it comes to me, I am really enraged by any attempt to steal my right for privacy. This is why I decided to write this post and draw your attention to four key controversies which are going down the way this CES\u2019 tech trends, evolve.<\/p>\n<h3>1. Driverless cars<\/h3>\n<p>To be honest, I don\u2019t think we really need driverless cars that much. The key marketing message this strategy relies on is decreasing human factor in car accidents and, ultimately, eliminating them at all. Well, looks like a very legitimate reason, but there are several issues.<\/p>\n<p>https:\/\/twitter.com\/thegooglecar\/status\/535590615988195328<\/p>\n<p>The first problem concerns the labor market and employment. Obviously, the first entities to join the line of organizations eager to use driverless cars will be taxi companies. In New York alone, the taxi fleet includes about 40 thousand cars. In the entire world, their numbers are unimaginable, but we can safely add three more digits to make up a plausible number.<\/p>\n<p>If millions of low-wage employees will be deprived of their\u00a0hard but honest job, this would significantly contribute to growing crime rate all over the world. Curiously, I have never seen no analytical reports addressing these two closely interconnected trends.<\/p>\n<p>http:\/\/instagram.com\/p\/xh76IaRpV3\/<\/p>\n<p>But the above situation represents just a part of a bigger problem. In order for driverless cars to exist, the stats are crucial \u2013 and this statistical information would consist of zillions of gigabytes of data on routes, users, traffic load, etc.<\/p>\n<p>The driverless car, however a common user sees it, does not \u2018learn\u2019 to drive on its own: it just operates the statistical data to generate behavioral patterns, depending on the surrounding environment and conditions. These patterns result from the analysis of enormous quantity of accomplished scenarios. Who will \u2018feed\u2019 all this data to computers? Or course, \u2018we the users\u2019, there\u2019s no one else to do it.<\/p>\n<p>All the data on our transportation, i.e. the way we act, where we turn, and, most importantly, where and when we go, will be sent to\u2026 erm, somewhere.<\/p>\n<p>http:\/\/instagram.com\/p\/xh8ZvMRpWn\/<\/p>\n<p>For quite a long time, this fact never provoked any questions. But the recent Uber debacle proved this ignorance was not for long: people cannot help but care that some undefined agent is able to detect their precise location in real time. And, which is even more alarming, he can accumulate the ENTIRE history of translocations in a person\u2019s ENTIRE lifetime.<\/p>\n<p>In theory, the developer of driverless cars and taxis would try to protect user data from scammers. But the stakes are really high, so this attempt may be unsuccessful. The problem now lies within whether or not to trust the service providers. Offering data security and protection is a complex and science-intensive business where the majority of service providers just lack competence. Trusting their ability to properly secure data is like entrusting a child with a million dollars.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Driverless cars \u2013 what's to come? <a href=\"https:\/\/t.co\/XERAi2e9NM\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/XERAi2e9NM<\/a> via <a href=\"https:\/\/twitter.com\/kaspersky?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">@kaspersky<\/a> <a href=\"http:\/\/t.co\/y16EjoGTnW\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/y16EjoGTnW<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/544530038725419008?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">December 15, 2014<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>I do not say driverless cars are all that bad. I just want to convey the message that, before deploying and commercializing this tech, one should ensure that there is legislation in place to protect collected user data, and that service providers offer users a reliable and transparent means of fully wiping out the data from the provider\u2019s databases should there be need.<\/p>\n<h3>2. Drones<\/h3>\n<p>This year CES was packed with drones. These little robots become more and more affordable, and are available now for as little as \u00a3149. The majority of drones are equipped with cameras (or are GoPro or smartphone-mountable). Smart stabilization algorithms, sensor-based piloting and navigation system \u2013 everything is in place and continues to evolve, except one thing: regulation of flights and legislation on violation of privacy.<\/p>\n<p>A quick search on YouTube provides enough evidence drones are frequently used for mischief, including spying through the windows, stealth surveillance and many not so childish pranks. This topic was well covered by the journalist John Oliver:<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/K4NRJoCNHIs?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span><\/p>\n<p>Given the fact there is no proper regulation for drones, they might be used in practically any scenario. So, don\u2019t be surprised if you discover a couple of drones hovering opposite your balcony and recording videos.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Are <a href=\"https:\/\/twitter.com\/hashtag\/drones?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#drones<\/a> as scary as they seem? <a href=\"https:\/\/t.co\/6jqha7bonz\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/6jqha7bonz<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/security?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#security<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/privacy?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#privacy<\/a> <a href=\"http:\/\/t.co\/N4Puv6NRZ0\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/N4Puv6NRZ0<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/552497356210704384?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">January 6, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Today drones are no big threat, but this is just for now, when the tech has not evolved that much. And we all know how fast it evolves, don\u2019t we?<\/p>\n<h3>3. Healthcare\/fitness sensors<\/h3>\n<p>I have encountered 17 companies offering fitness trackers at CES this year. Needless to say, there are way more of them: fitness bands capable of counting steps, heartrate of other biometric parameters are produced by dozens of major vendors and small start-ups and are widely available on the market.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">How fitness has become smarter, better, faster, stronger \u2026 and more connected <a href=\"http:\/\/t.co\/RLHFrrs0RU\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/RLHFrrs0RU<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/TechTimeMachine?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#TechTimeMachine<\/a><\/p>\n<p>\u2014 Mashable (@mashable) <a href=\"https:\/\/twitter.com\/mashable\/status\/551887106860396545?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">January 4, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>I was one of the early adopters of this type of gadgets. After having spent a couple of years with these gizmos, I am fully positive they are completely useless for fitness purposes.<\/p>\n<div class=\"pullquote\">Life is way simpler than this. If you want to go jogging, just go for it. Want to slim down? Just stop eating junk and start jogging even harder<\/div>\n<p>As soon as the first \u2018wow\u2019 effect fades away, the reality strikes back, and you realize that life is way simpler than this. If you want to go jogging, just go for it: race track equipment in the gym will tell you how many miles you ran. Want to slim down? Just stop eating junk and start jogging even harder. An able coach or a specialized website will help you to develop your personalized routine.<\/p>\n<p>Fitness bands are not\u00a0a cure-all for your problems \u2013 you won\u2019t be a better runner just wearing it. But the very problem of the sensors is not their existence but the data they generate. And, of course, the latter is beneficial for many third parties.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Fitness tracking apps &amp; wearables vs <a href=\"https:\/\/twitter.com\/hashtag\/privacy?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#privacy<\/a>. Guess who wins? <a href=\"https:\/\/t.co\/YjIZv2vQVa\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/YjIZv2vQVa<\/a> <a href=\"http:\/\/t.co\/LfMqqWGBES\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/LfMqqWGBES<\/a><\/p>\n<p>\u2014 Eugene Kaspersky (@e_kaspersky) <a href=\"https:\/\/twitter.com\/e_kaspersky\/status\/528237276128501761?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">October 31, 2014<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>All the relevant questions would seem quite innocent, but today, one can identify a person based on the analysis of several arrays of biometric data.<\/p>\n<p>This is not necessarily bad, and this approach may end up as a means of replacing obsolete password-based authentication methods for example. The real problem is that anyone might be using our \u2014 yes, our! \u2014 personal data precisely now, but not us.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>The real problem is that anyone might be using our #personaldata now, but not us<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FE2VP&amp;text=The+real+problem+is+that+anyone+might+be+using+our+%23personaldata+now%2C+but+not+us\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>One more question arises: how well will this data be protected? Really, we are all sick and tired of hearing the news over and over again: some bad people have stolen batches of data from an honest megacorporation which just happened to have collected enormous amount of personal data from its customers.<\/p>\n<h3>4. Smart home<\/h3>\n<p>Another key trend of CES 2015 is the next generation of homes where lighting, HVAC, locks, fridge, stove, and everything you can find in an average home is connected and equipped with a controller deployed on a mobile device.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">A fascinating story how <a href=\"https:\/\/twitter.com\/JacobyDavid?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">@JacobyDavid<\/a> hacked his smart home <a href=\"https:\/\/t.co\/ckTyeMVLUp\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/ckTyeMVLUp<\/a> <a href=\"http:\/\/t.co\/q4LiqsBnA4\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/q4LiqsBnA4<\/a><\/p>\n<p>\u2014 Eugene Kaspersky (@e_kaspersky) <a href=\"https:\/\/twitter.com\/e_kaspersky\/status\/515189019617918976?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">September 25, 2014<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Again, this coin is two-sided. What connected home advocates usually show off at trade events is apparent convenience of such tech at home. But the reverse side of the coin is that, in fact, everything can be hacked. No system is 100% secure \u2013 the likes of Stuxnet, Gauss, Duqu serve a continuous reminder that even uranium enrichment centrifuges are not safe from trespassers.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Who is to blame for \u201chacked\u201d private web cameras? <a href=\"https:\/\/t.co\/1A3deNQCEQ\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/1A3deNQCEQ<\/a> <a href=\"http:\/\/t.co\/r4B079ile0\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/r4B079ile0<\/a><\/p>\n<p>\u2014 Eugene Kaspersky (@e_kaspersky) <a href=\"https:\/\/twitter.com\/e_kaspersky\/status\/536161207065931776?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">November 22, 2014<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>In an event of a hacker breaking into your connected home, the culprit may get access to everything you have, from a history of you fridge\u2019s \u2018correspondence\u2019 with Wal-Mart to telemetric data, surveillance videos, credit card numbers and tons of confidential data unthinkable for an average mortal.<\/p>\n<p>Today, the most paranoid users use tape to patch their laptop webcams \u2013 just because it has been proven that someone can spy on you through a remote connection. If we speak of smart home, you will quickly run out of tape to patch all sources of data.<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/E8zandvQvUc?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span><\/p>\n<p>P.S. Having returned from CES 2015, I started to better understand Ray Bradbury who, decades ago, preached that tech innovations do not play a major role in humanity\u2019s cultural and intellectual development, comfort and, most importantly, happiness. Really, there is nothing wrong with turning off the lights with old-fashioned switch. Manually.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CES 2015 was a superb event in terms of new stuff per square foot, which has been referred to numerous times by tech website reporters. As for me, a person<\/p>\n","protected":false},"author":7,"featured_media":5309,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,2026],"tags":[872,873,494,261,874,842,363,43,97,638],"class_list":{"0":"post-5308","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-threats","9":"tag-ces-2015","10":"tag-driverless-cars","11":"tag-drones","12":"tag-encryption","13":"tag-fitness-trackers","14":"tag-future","15":"tag-personal-data","16":"tag-privacy","17":"tag-security-2","18":"tag-smart-home"},"hreflang":[{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/ces-2015-report\/5308\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/ces-2015-report\/4517\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/ces-2015-report\/4457\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/ces-2015-report\/5001\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/ces-2015-report\/5454\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/ces-2015-report\/6621\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/ces-2015-report\/7159\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/ces-2015-report\/6630\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/ces-2015-report\/6621\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/ces-2015-report\/7159\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/ces-2015-report\/7159\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.uk\/blog\/tag\/ces-2015\/","name":"CES 2015"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/5308","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=5308"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/5308\/revisions"}],"predecessor-version":[{"id":17978,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/5308\/revisions\/17978"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media\/5309"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=5308"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=5308"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=5308"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}