{"guid":"bc898254-e3f4-5d49-a33b-de09a3e09fa7","title":"Internet of Things (IoT) Privacy \u0026 Security","subtitle":null,"slug":"pw19-251-internet-of-things-iot-privacy-security","link":"https://cfp.privacyweek.at/pw19/talk/9P9KRY/","description":"Das Internet der Dinge (Internet of Things) wird immer wichtiger und\nwird auch kurzfristig Einfluss auf unsere Privatsphäre und Sicherheit\nhaben.  Der Talk wird eine Einführung in die Problematik anhand von Beispielen\ngeben.\n\nDieses Jahr liegt der Schwerpunkt auf sogenannten \"Constrained \nDevices\", also Geräten die nur sehr wenig Speicher und Prozessor \nLeistung habe, dafür sehr wenig Strom verbrauchen. Hier wird \"Moore's \nLaw\" zur Verbesserung der Embedded-Eigenschaften (Größe, Stromverbrauch) \nverwendet, nicht zur Leistungssteigerung [1]\n\nIn der Diskussion wird sich Gelegenheit ergeben, auch eigene Anekdoten\nund Erfahrungen mit IoT-Geräten beizutragen.\n\n[1] J. Gilger and H. Tschofenig. Report from the smart object security\n    workshop. RFC 7397, Internet Engineering Task Force, December 2014.","original_language":"eng","persons":["Ralf Schlatterbeck"],"tags":["pw19","251","2019"],"view_count":234,"promoted":false,"date":"2019-10-26T16:00:00.000+02:00","release_date":"2020-01-07T01:00:00.000+01:00","updated_at":"2026-03-29T14:00:06.616+02:00","length":3403,"duration":3403,"thumb_url":"https://static.media.ccc.de/media/events/privacyweek/2019/251-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/privacyweek/2019/251-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/privacyweek/2019/251-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/privacyweek/2019/251-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/pw19-251-internet-of-things-iot-privacy-security","url":"https://api.media.ccc.de/public/events/bc898254-e3f4-5d49-a33b-de09a3e09fa7","conference_title":"PrivacyWeek 2019","conference_url":"https://api.media.ccc.de/public/conferences/pw19","related":[],"recordings":[{"size":215,"length":3403,"mime_type":"video/webm","language":"eng","filename":"pw19-251-eng-Internet_of_Things_IoT_Privacy_Security_webm-hd.webm","state":"new","folder":"webm-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2020-01-07T21:31:34.203+01:00","recording_url":"https://cdn.media.ccc.de/events/privacyweek/2019/webm-hd/pw19-251-eng-Internet_of_Things_IoT_Privacy_Security_webm-hd.webm","url":"https://api.media.ccc.de/public/recordings/44966","event_url":"https://api.media.ccc.de/public/events/bc898254-e3f4-5d49-a33b-de09a3e09fa7","conference_url":"https://api.media.ccc.de/public/conferences/pw19"},{"size":97,"length":3403,"mime_type":"video/webm","language":"eng","filename":"pw19-251-eng-Internet_of_Things_IoT_Privacy_Security_webm-sd.webm","state":"new","folder":"webm-sd","high_quality":false,"width":720,"height":576,"updated_at":"2020-01-07T21:10:55.104+01:00","recording_url":"https://cdn.media.ccc.de/events/privacyweek/2019/webm-sd/pw19-251-eng-Internet_of_Things_IoT_Privacy_Security_webm-sd.webm","url":"https://api.media.ccc.de/public/recordings/44958","event_url":"https://api.media.ccc.de/public/events/bc898254-e3f4-5d49-a33b-de09a3e09fa7","conference_url":"https://api.media.ccc.de/public/conferences/pw19"},{"size":32,"length":3371,"mime_type":"audio/opus","language":"eng","filename":"pw19-251-eng-Internet_of_Things_IoT_Privacy_Security_opus.opus","state":"new","folder":"opus","high_quality":false,"width":0,"height":0,"updated_at":"2020-01-07T21:00:47.460+01:00","recording_url":"https://cdn.media.ccc.de/events/privacyweek/2019/opus/pw19-251-eng-Internet_of_Things_IoT_Privacy_Security_opus.opus","url":"https://api.media.ccc.de/public/recordings/44956","event_url":"https://api.media.ccc.de/public/events/bc898254-e3f4-5d49-a33b-de09a3e09fa7","conference_url":"https://api.media.ccc.de/public/conferences/pw19"},{"size":51,"length":3371,"mime_type":"audio/mpeg","language":"eng","filename":"pw19-251-eng-Internet_of_Things_IoT_Privacy_Security_mp3.mp3","state":"new","folder":"mp3","high_quality":false,"width":0,"height":0,"updated_at":"2020-01-07T21:00:34.537+01:00","recording_url":"https://cdn.media.ccc.de/events/privacyweek/2019/mp3/pw19-251-eng-Internet_of_Things_IoT_Privacy_Security_mp3.mp3","url":"https://api.media.ccc.de/public/recordings/44955","event_url":"https://api.media.ccc.de/public/events/bc898254-e3f4-5d49-a33b-de09a3e09fa7","conference_url":"https://api.media.ccc.de/public/conferences/pw19"},{"size":78,"length":3403,"mime_type":"video/mp4","language":"eng","filename":"pw19-251-eng-Internet_of_Things_IoT_Privacy_Security_sd.mp4","state":"new","folder":"h264-sd","high_quality":false,"width":720,"height":576,"updated_at":"2020-01-07T21:00:21.117+01:00","recording_url":"https://cdn.media.ccc.de/events/privacyweek/2019/h264-sd/pw19-251-eng-Internet_of_Things_IoT_Privacy_Security_sd.mp4","url":"https://api.media.ccc.de/public/recordings/44954","event_url":"https://api.media.ccc.de/public/events/bc898254-e3f4-5d49-a33b-de09a3e09fa7","conference_url":"https://api.media.ccc.de/public/conferences/pw19"},{"size":139,"length":3403,"mime_type":"video/mp4","language":"eng","filename":"pw19-251-eng-Internet_of_Things_IoT_Privacy_Security_hd.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2020-01-07T20:51:51.836+01:00","recording_url":"https://cdn.media.ccc.de/events/privacyweek/2019/h264-hd/pw19-251-eng-Internet_of_Things_IoT_Privacy_Security_hd.mp4","url":"https://api.media.ccc.de/public/recordings/44952","event_url":"https://api.media.ccc.de/public/events/bc898254-e3f4-5d49-a33b-de09a3e09fa7","conference_url":"https://api.media.ccc.de/public/conferences/pw19"}]}