Title:
Estimated Reading Time:
Word Count:
Connected Yet Exposed: The Privacy of IoT in the Modern Digital World
7minutes
904 words
INTRODUCTION
The relationship between humans and technology, particularly with computers and electronic devices, has profoundly shaped our world. However, this bond has led us to overlook significant aspects of this relationship, especially the devices and underlying technologies responsible for their functionalities. These devices, commonly classified under the Internet of Things (IoT) category, are a major component of modern technology.
The IoT refers to devices equipped with sensors, processing capabilities, software, and various technologies that enable them to connect and exchange data with other devices and systems over the Internet or alternative communication networks. Encompassing fields such as electronics, communication, and computer science engineering, the term “Internet of Things” can be misleading, as these devices do not need a public internet connection to operate; they only require a network connection and an individual identifier (e.g., MAC address).
Photo Credit: Gencraft
The advantages and accessibility of IoT devices have made them integral to daily life. However, one critical aspect has increasingly drawn public concern: the privacy implications of IoT devices. As these devices’ capabilities expand, the question of accountability regarding privacy issues has become more pressing. The potential for IoT devices to infringe on user privacy has been spotlighted, particularly as “eavesdropping” concerns have emerged around certain applications—especially in the advertising industry—that leverage user data for targeted social media activities.
PRIVACY CONCERNS RELATED TO IoT
Privacy concerns related to IoT devices and human interactions can generally be attributed to two main entities:
- Device Manufacturers: Manufacturers play a crucial role in designing and controlling microphone and sensor access and in embedding privacy protocols.
- Microphone and Sensor Control: Manufacturers are responsible for secure hardware and firmware to protect sensors like microphones and cameras from unauthorized access. If a device continuously listens, this must be communicated transparently to users.
- Privacy by Design: Adopting “privacy by design” principles, manufacturers should embed controls that allow users to mute, disable, or otherwise manage data collection. They are also expected to regulate data-sharing protocols, especially with third-party services.
- Software and App Developers: Often, developers have a greater role in privacy concerns, especially given their need for customer data to enable device functionality.
- Data Collection Practices: Developers determine when data is collected, processed, and shared with third parties, particularly for targeted advertising. To foster trust, they should disclose these practices and obtain user consent.
- AI and Voice Data Processing: In voice-activated IoT devices, developers control data handling, often utilizing AI for ad targeting, which requires clear user consent to avoid unintended “listening.”
Early research on IoT privacy concerns focused on external risks, such as unauthorized access to home cameras or eavesdropping vulnerabilities. However, recent studies by universities and research centers reveal a more profound array of risks embedded within device functions.
“One of the biggest problems is the invasion of privacy,” says David Choffnes, professor at Northeastern University. “These vulnerabilities allow attackers to understand the environment of your home, including who is present and where they move. We found that certain applications exploit this information for purposes unrelated to their advertised function. For me, this is a serious invasion of privacy,” he added.
Many users unknowingly grant these devices consent to access personal data, underestimating the risks associated with disclosing intimate details. This often leads to an extensive digital footprint accessible not only to advertising firms but also to potential malicious actors who may use this data for activities such as identity theft or fraud.
Privacy Concerns and Pre-installed Apps
Modern devices frequently come with pre-installed applications, suggesting that privacy agreements are often determined without explicit user consent. This practice is typically safeguarded by compliance with legal requirements, which frequently take the form of lengthy terms and conditions designed to gain user consent without necessarily requiring user comprehension. Most times this act is usually cloaked in the legal compliance veil justifying the bulky nature of such terms and conditions. Studies have indicated a decline in human attention spans, dropping from approximately 150 seconds to 47 seconds, due partly to our engagement with digital devices, making it challenging for the average user to scrutinize terms and conditions effectively. The obvious question would be, are there no ways to effectively highlight some of these critical sections for users’ consent?
Photo Credit: Pixabay
Most user consent activities occur when a new app is installed and launched. In these moments, users often overlook terms and conditions, compromising their data security and privacy. This behavior has contributed significantly to the privacy concerns surrounding IoT devices and applications.
Policies and Regulations
The growing concern for privacy has garnered the attention of institutions and governments worldwide, prompting stricter control over data access for device manufacturers and app developers. Major technology organizations, such as Apple, Google, and Amazon, have initiated privacy improvements to protect user data. Research suggests that Apple’s ecosystem is particularly robust, as it allows users greater control over data-sharing permissions, especially with third-party apps, while generally avoiding data sharing with advertisers compared to other platforms.
Notable policies, including the General Data Protection Regulation (GDPR) in the European Union and the California Consumer Privacy Act (CCPA) in the United States, have set standards that mandate companies to disclose data collection practices and gain user consent. However, the development of IoT-specific regulations is ongoing, with expectations for more stringent rules to address privacy concerns and prevent unauthorized eavesdropping.
CONCLUSION
Collaboration between manufacturers and developers is essential to create transparent privacy controls that empower users, while regulatory efforts are needed to hold these parties accountable. As IoT continues to shape our digital landscape, prioritizing user privacy will remain critical to ensuring trust and safety in increasingly connected environments.
REFERENCES
- Internet of Things – Wikipedia
- ‘People have no idea’: How smart devices spy on us and reveal information about our homes | Technology
- “Are Siri, Google, and Alexa spying on us?” | Science | EL PAÍS English
- “Is My Phone Listening in? On the Feasibility and Detectability of Mobile Eavesdropping”
- Speaking of Psychology: “Why our attention spans are shrinking,” with Gloria Mark, PhD


