Data Exploitation: how your digital doppelganger has been exploiting you all along

Presented at Still Hacking Anyway (SHA2017), Aug. 6, 2017, 12:10 p.m. (60 minutes)

In the world of the "internet of shit" - where it's not just our computers and phones that gather data about you but also your cars, your pacemaker, the toys you children play with and your fridge among many others - the dramatic growth in data collection has led to a loss of control over data. Who owns the data? How is it processed and collected? And more importantly how is it used to make decisions about you? Those are some of the questions Privacy International has been trying to address in order to help of us reclaim control over our devices. This talk will aim at explaining how data exploitation works and how it has already started affecting our lives so we can be prepared for and start resisting the exploitation. #Privacy #IoT Companies and governments are creating profiles, i.e our digital doppelgangers, to make decisions about us. How much you pay for your insurance, whether you are granted a loan or not, and whether you walk free or end up in jail, are only a few of the ways algorithms affect our lives. Privacy International has been looking into various fields (smart cities, finance, data-driven policing, connected cars and toys) where we have found that the impact of data exploitation is particularly alarming in terms of the impact it has on our lives. From research to data subject access request, we have been exploring ways to document and challenge the data exploitation environment. We want SHA2017 to be the place where we organise the next steps.

Presenters:

  • Privacy International
    Nerdo & BSB have over 15 minutes of infosec experience combined, after giving this talk. We only came for the CISSP credits and to satisfy our community service requirements.

Links:

Similar Presentations: