Vulnerabilities of the Connected Car

Security Impact Analysis should be a regulatory requirement for all cars that rise above a certain threshold of connectivity (a...

Gilad Rosner’s podcast on IoT privacy and state actors

IoT Privacy Forum founder Gilad Rosner features in the latest episode of O'Reilly's Hardware Podcast, discussing his research for...

New Report: Privacy and the Internet of Things

I'm very happy to announce the publication of a new report: Privacy and the Internet of Things. Published by O'Reilly Media, the...

Berkeley CLTC releases “Cybersecurity Futures 2020,” including one on IoT

UC Berkeley's Center for Long-Term Cybersecurity released "Cybersecurity Futures 2020," a set of scenarios meant to spur...

Webcast: Privacy, Society & the Internet of Things

It's an exploration of the many meanings of 'privacy,' the privacy risks implied by a world of connected devices, and some of the...

credit: https://tosdr.org/

In the age of connected devices, will our privacy regulations be good enough?

Did you read a privacy policy in full today? According to research from Carnegie Mellon in 2008, it will take you an average of 76...

Law is Code

While waiting for a taxi in Barcelona, my friend, irritated at waiting for one to appear, told me that Uber was made illegal in...

No, the IoT does not need strong privacy or security to flourish

It’s a nice idea, imagining that concern for privacy and security will curtail or slow IoT growth. But don’t believe it: the...

Collection Limitation and the IoT

One of the debates in privacy is the continuing feasibility of Collection Limitation as a data protection principle.