SlideShare una empresa de Scribd logo
1 de 51
Geo-Location Security: Issues &
        Best Practices
“Her father had taught her about a dog's paws. Whenever her father was alone
with a dog in a house he would lean over and smell the skin at the base of its paw.
This, he would say, as if coming away from a brandy snifter, is the greatest smell
in the world! A bouquet! Great rumours of travel! It's a cathedral! her father had
said, so-and-so's garden, that field of grasses, a walk through cyclamen--a
concentration of hints of all the paths the animal had taken during the day.”

                                             Michael Ondaatje, The English Patient
Getting to Know You


 • 07774 23X XXX
 • 07940 47X XXX
 • 07761 55X XXX
 • 07459 13X XXX
Where are you?
Value
How

Satellite tracking
Web browsing
Mobile phone
GPS devices
RFID tags
Credit / debit card transactions
Geo tags photos / postings
Proximity readers
How

A desktop browser is likely to use WiFi
(accurate to 20m) or IP Geolocation
which is accurate to the city or post code
depending on your ISP.

Mobile devices tend to use triangulation
techniques such as GPS (accurate to 10m
and only works outside), WiFi and
GSM/CDMA cell IDs (accurate to
1000m).
Browser Based
The Geolocation API is default in the following desktop
browsers:
•Firefox 3.5+
•Chrome 5.0+
•Safari 5.0+
•Opera 10.60+
•Internet Explorer 9.0+
•And for updates on earlier versions for all of the above
App Based
And the W3C Geolocation API on mobile devices:
•Android 2.0+
•iPhone 3.0+
•Opera Mobile 10.1+
•Symbian (S60 3rd & 5th generation)
•Blackberry OS 6
•Maemo
Detailed Of Data Captured
On the Road?
Down Loading It
Hacking It
Where You Live
Business Uses

 A US-based car rental company started using
 deployed GPS tracking devices to monitor
 driving speeds of its customers.

 If a customers car exceeded 79 miles per hour for
 2 continuous minutes, they were charged an
 additional $150 (without their consent).
Example

 A French Insurance company used both
 mobile phone and car GPS data to track sales
 executive locations and cross reference to
 their expense accounts.

 Policy resulted in 21 employee dismissals and
 the identification of over .5 million euro in
 false claims.
Example

 Earlier this year, a large New York-based
 charity used geo-location data from Grindr to
 identify homosexuals working in their offices.

 4 employees were fired for “inappropriate
 behavior.”
I’ll Be Watching You
Lay of the Land
Every Word You Say

 •   Tracking customers
 •   Tracking employees
 •   Tracking competitors
 •   Tracking subjects
Every Single Day

 • Competitive Intelligence
   – Location of executives easily disclose activities
     such as mergers and acquisitions or real estate
     sittings.
 • Targeting Intelligence
   – Location of subjects by private detectives
   – Location of subjects by the media
Every Claim You Stake
Can Someone Own
Your Whereabouts?
Can’t You See, You Belong To Me?
Every Pound They Make




                =
Every Law You Break
Every Arm You Break
Every Snack You Take
Every Move You Make
Every Word You Say

• How the app exposes the users is not the problem.
• How Google Maps, Facebook and Foursquare expose
  the users without their knowledge is the problem.
• Opt out is the default not opt in.
• Social networking business model = get everyone to
  share everything
• Your personal information (your life) is their product
I’ll Be Watching You


   "If you have something that you don't want
    anyone to know, maybe you shouldn't be
           doing it in the first place,"

                        Former Google CEO: Eric Schmidt
Industry Response



              User beware !
Every Window You Break
Every IP You Fake
Fake Your Location
Industry Location
Understand the Data

• Where you go
• Where you went

• What you do
• What you did

• Forever
Data Classification




      +               = PII
Regulatory Conundrum

Geo-location data falls under special category
of data subject to E-Privacy Directive. To
comply you must either:

  – Obtain prior consent - or:
  – Process the data anonymously (Good luck as this
    includes UDID, IMEI, Mac or IP addresses)
Best Practices?

     Information Security Governance Framework

           Policies
           Identification, Classification & Marking
           Prior Consent
           Identifier Sanitisation (UDID, IMEI, IPs)
           Privacy Statements
           Limited Retention
           Testing & Auditing
Find the Browser Secrets
Change Defaults
Change Defaults
DIY
Apple Safari:
• Go to the ‘Display a menu of General Safari settings’
• Go to ‘Preferences’
• Go to ‘Security’
• Uncheck ‘Allow websites to ask for location information’

Comodo Dragon:
• Go to the ‘Customize and control Comodo Dragon' icon
• Go to ‘Options’
• Go to ‘Under the Bonnet’
• Choose ‘Content Settings’
• Choose ‘Location’
• Check ‘Do not allow any site to track my physical location’

Facebook:
• Go to Privacy Settings
• Click ‘Custom’
• Click ‘Custom Settings’
• Disable ‘Places I check in’
• Disable ‘People here now’
• Disable ‘Friends can check me in to places’
DIY
Google Chrome:
• Go to the ‘Customize and control Google Chrome’ icon
• Go to ‘Options’
• Go to ‘Under the Bonnet’
• Choose ‘Content Settings’
• Choose ‘Location’
• Check ‘Do not allow any site to track my physical location’

Google GMail:
• Scroll down on your GMail page until your reach 'Last account activity:
• Hit 'Details'
• Scroll down
• Check 'Never show an alert for unusual activity'

Google Toolbar:
• Go to the ‘Adjust Toolbar options’ icon
• Go to Tools
• Uncheck ‘My Location’
• Hit 'Save'
Where are you?
Geo-Location Security

Más contenido relacionado

Destacado

Retail location
Retail locationRetail location
Retail locationRahul Jha
 
Retail Store Location
Retail  Store  LocationRetail  Store  Location
Retail Store LocationNikita Jain
 
Operations management location strategies (lecture)
Operations management location strategies  (lecture)Operations management location strategies  (lecture)
Operations management location strategies (lecture)Jun Gonzales
 
Chapter 7 retail locations ppt
Chapter 7 retail locations pptChapter 7 retail locations ppt
Chapter 7 retail locations pptrakeshhebbar
 
Location Strategy
Location StrategyLocation Strategy
Location StrategyJoanmaines
 
Plant Maintenance
Plant MaintenancePlant Maintenance
Plant Maintenancevishakeb
 
Factors affecting business location
Factors affecting business locationFactors affecting business location
Factors affecting business locationcrystalpullen
 

Destacado (9)

Retail location
Retail locationRetail location
Retail location
 
Retail location
Retail locationRetail location
Retail location
 
Retail Store Location
Retail  Store  LocationRetail  Store  Location
Retail Store Location
 
Operations management location strategies (lecture)
Operations management location strategies  (lecture)Operations management location strategies  (lecture)
Operations management location strategies (lecture)
 
Chapter 7 retail locations ppt
Chapter 7 retail locations pptChapter 7 retail locations ppt
Chapter 7 retail locations ppt
 
Location Strategy
Location StrategyLocation Strategy
Location Strategy
 
Plant Maintenance
Plant MaintenancePlant Maintenance
Plant Maintenance
 
Factors affecting business location
Factors affecting business locationFactors affecting business location
Factors affecting business location
 
Plant maintenance
Plant maintenancePlant maintenance
Plant maintenance
 

Similar a Risk Factory Geo-location Security Issues & Best Practices

How to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data SafeHow to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data SafeRocket Matter, LLC
 
Harbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vidHarbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vidErnest Staats
 
Privacy on the Internet
Privacy on the InternetPrivacy on the Internet
Privacy on the InternetPhil Bradley
 
Consumer_Device_Privacy
Consumer_Device_PrivacyConsumer_Device_Privacy
Consumer_Device_PrivacyMatthew Hoy
 
Presentation MONKINO for clients in english
Presentation MONKINO for clients in englishPresentation MONKINO for clients in english
Presentation MONKINO for clients in englishMonkino Lda
 
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...NCCOMMS
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security SeminarJeremy Quadri
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security PracticeBrian Pichman
 
Social Zombies Gone Wild: Totally Exposed and Uncensored
Social Zombies Gone Wild: Totally Exposed and UncensoredSocial Zombies Gone Wild: Totally Exposed and Uncensored
Social Zombies Gone Wild: Totally Exposed and UncensoredTom Eston
 
Free geek class on Data privacy
Free geek class on Data privacyFree geek class on Data privacy
Free geek class on Data privacyJoshua Johnston
 
Privacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile TechnologyPrivacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile TechnologyTom Eston
 
My dog is a hacker and will steal your data!
My dog is a hacker and will steal your data!My dog is a hacker and will steal your data!
My dog is a hacker and will steal your data!rafa_el_souza
 
10 reasons why now is the perfect time to get started with the mobile web
10 reasons why now is the perfect time to get started with the mobile web10 reasons why now is the perfect time to get started with the mobile web
10 reasons why now is the perfect time to get started with the mobile webTijs Vrolix
 
Hume Lake Spring Marriage Retreat tech safety presentation
Hume Lake Spring Marriage Retreat tech safety presentationHume Lake Spring Marriage Retreat tech safety presentation
Hume Lake Spring Marriage Retreat tech safety presentationScott Burnett
 
How to Get Started in Mobile Marketing
How to Get Started in Mobile MarketingHow to Get Started in Mobile Marketing
How to Get Started in Mobile MarketingSIXTY
 
Defrag 2014
Defrag 2014Defrag 2014
Defrag 2014Keen
 

Similar a Risk Factory Geo-location Security Issues & Best Practices (20)

How to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data SafeHow to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data Safe
 
Harbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vidHarbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vid
 
Privacy on the Internet
Privacy on the InternetPrivacy on the Internet
Privacy on the Internet
 
Consumer_Device_Privacy
Consumer_Device_PrivacyConsumer_Device_Privacy
Consumer_Device_Privacy
 
Presentation MONKINO for clients in english
Presentation MONKINO for clients in englishPresentation MONKINO for clients in english
Presentation MONKINO for clients in english
 
Digital investigations
Digital investigationsDigital investigations
Digital investigations
 
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security Seminar
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security Practice
 
Reo expo presentation_6-14-2011 vers1 6.11.11
Reo expo presentation_6-14-2011 vers1 6.11.11Reo expo presentation_6-14-2011 vers1 6.11.11
Reo expo presentation_6-14-2011 vers1 6.11.11
 
Social Zombies Gone Wild: Totally Exposed and Uncensored
Social Zombies Gone Wild: Totally Exposed and UncensoredSocial Zombies Gone Wild: Totally Exposed and Uncensored
Social Zombies Gone Wild: Totally Exposed and Uncensored
 
Judy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 PresentationJudy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 Presentation
 
Free geek class on Data privacy
Free geek class on Data privacyFree geek class on Data privacy
Free geek class on Data privacy
 
Case study 6
Case study 6Case study 6
Case study 6
 
Privacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile TechnologyPrivacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile Technology
 
My dog is a hacker and will steal your data!
My dog is a hacker and will steal your data!My dog is a hacker and will steal your data!
My dog is a hacker and will steal your data!
 
10 reasons why now is the perfect time to get started with the mobile web
10 reasons why now is the perfect time to get started with the mobile web10 reasons why now is the perfect time to get started with the mobile web
10 reasons why now is the perfect time to get started with the mobile web
 
Hume Lake Spring Marriage Retreat tech safety presentation
Hume Lake Spring Marriage Retreat tech safety presentationHume Lake Spring Marriage Retreat tech safety presentation
Hume Lake Spring Marriage Retreat tech safety presentation
 
How to Get Started in Mobile Marketing
How to Get Started in Mobile MarketingHow to Get Started in Mobile Marketing
How to Get Started in Mobile Marketing
 
Defrag 2014
Defrag 2014Defrag 2014
Defrag 2014
 

Más de Risk Crew

Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892Risk Crew
 
Pcishrinktofitpresentation 151125162550-lva1-app6891
Pcishrinktofitpresentation 151125162550-lva1-app6891Pcishrinktofitpresentation 151125162550-lva1-app6891
Pcishrinktofitpresentation 151125162550-lva1-app6891Risk Crew
 
Databasetheft 151120161435-lva1-app6891
Databasetheft 151120161435-lva1-app6891Databasetheft 151120161435-lva1-app6891
Databasetheft 151120161435-lva1-app6891Risk Crew
 
Risk Factory: Inside the Mind of a Hacker
Risk Factory: Inside the Mind of a HackerRisk Factory: Inside the Mind of a Hacker
Risk Factory: Inside the Mind of a HackerRisk Crew
 
Risk Factory The 2014 Numbers
Risk Factory The 2014 NumbersRisk Factory The 2014 Numbers
Risk Factory The 2014 NumbersRisk Crew
 
Risk Factory Information Security Coordination Challenges & Best Practice
Risk Factory Information Security Coordination Challenges & Best PracticeRisk Factory Information Security Coordination Challenges & Best Practice
Risk Factory Information Security Coordination Challenges & Best PracticeRisk Crew
 
Risk Factory Big Daddy Digs Big Data
Risk Factory Big Daddy Digs Big DataRisk Factory Big Daddy Digs Big Data
Risk Factory Big Daddy Digs Big DataRisk Crew
 
Risk Factory: Top 10 Risks 2013
Risk Factory: Top 10 Risks 2013Risk Factory: Top 10 Risks 2013
Risk Factory: Top 10 Risks 2013Risk Crew
 
Risk Factory: Getting a Grip on Mobile Devices
Risk Factory: Getting a Grip on Mobile DevicesRisk Factory: Getting a Grip on Mobile Devices
Risk Factory: Getting a Grip on Mobile DevicesRisk Crew
 
Risk Factory: PCI - The Essentials
Risk Factory: PCI - The EssentialsRisk Factory: PCI - The Essentials
Risk Factory: PCI - The EssentialsRisk Crew
 
Risk Factory: How to Implement an Effective Incident Response Programme
Risk Factory: How to Implement an Effective Incident Response ProgrammeRisk Factory: How to Implement an Effective Incident Response Programme
Risk Factory: How to Implement an Effective Incident Response ProgrammeRisk Crew
 
Risk Factory: Beyond Data Leakage
Risk Factory: Beyond Data LeakageRisk Factory: Beyond Data Leakage
Risk Factory: Beyond Data LeakageRisk Crew
 
Risk Factory: Security Lessons From the Online Adult Entertainment Industry
Risk Factory: Security Lessons From the Online Adult Entertainment IndustryRisk Factory: Security Lessons From the Online Adult Entertainment Industry
Risk Factory: Security Lessons From the Online Adult Entertainment IndustryRisk Crew
 
Risk Factory: Let's Get Physical
Risk Factory: Let's Get PhysicalRisk Factory: Let's Get Physical
Risk Factory: Let's Get PhysicalRisk Crew
 
Risk Factory: PCI Shrink to Fit
Risk Factory: PCI Shrink to FitRisk Factory: PCI Shrink to Fit
Risk Factory: PCI Shrink to FitRisk Crew
 
Risk Factory: PCI Compliance in the Cloud
Risk Factory: PCI Compliance in the CloudRisk Factory: PCI Compliance in the Cloud
Risk Factory: PCI Compliance in the CloudRisk Crew
 
Risk Factory: Database Security: Oxymoron?
Risk Factory: Database Security: Oxymoron? Risk Factory: Database Security: Oxymoron?
Risk Factory: Database Security: Oxymoron? Risk Crew
 
Risk Factory: Modems the Forgotten Back Door
Risk Factory: Modems the Forgotten Back DoorRisk Factory: Modems the Forgotten Back Door
Risk Factory: Modems the Forgotten Back DoorRisk Crew
 
Risk Factory How to Steal an Identity
Risk Factory How to Steal an IdentityRisk Factory How to Steal an Identity
Risk Factory How to Steal an IdentityRisk Crew
 
Risk Factory: The State of Electronic Eavesdropping
Risk Factory: The State of Electronic EavesdroppingRisk Factory: The State of Electronic Eavesdropping
Risk Factory: The State of Electronic EavesdroppingRisk Crew
 

Más de Risk Crew (20)

Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892
 
Pcishrinktofitpresentation 151125162550-lva1-app6891
Pcishrinktofitpresentation 151125162550-lva1-app6891Pcishrinktofitpresentation 151125162550-lva1-app6891
Pcishrinktofitpresentation 151125162550-lva1-app6891
 
Databasetheft 151120161435-lva1-app6891
Databasetheft 151120161435-lva1-app6891Databasetheft 151120161435-lva1-app6891
Databasetheft 151120161435-lva1-app6891
 
Risk Factory: Inside the Mind of a Hacker
Risk Factory: Inside the Mind of a HackerRisk Factory: Inside the Mind of a Hacker
Risk Factory: Inside the Mind of a Hacker
 
Risk Factory The 2014 Numbers
Risk Factory The 2014 NumbersRisk Factory The 2014 Numbers
Risk Factory The 2014 Numbers
 
Risk Factory Information Security Coordination Challenges & Best Practice
Risk Factory Information Security Coordination Challenges & Best PracticeRisk Factory Information Security Coordination Challenges & Best Practice
Risk Factory Information Security Coordination Challenges & Best Practice
 
Risk Factory Big Daddy Digs Big Data
Risk Factory Big Daddy Digs Big DataRisk Factory Big Daddy Digs Big Data
Risk Factory Big Daddy Digs Big Data
 
Risk Factory: Top 10 Risks 2013
Risk Factory: Top 10 Risks 2013Risk Factory: Top 10 Risks 2013
Risk Factory: Top 10 Risks 2013
 
Risk Factory: Getting a Grip on Mobile Devices
Risk Factory: Getting a Grip on Mobile DevicesRisk Factory: Getting a Grip on Mobile Devices
Risk Factory: Getting a Grip on Mobile Devices
 
Risk Factory: PCI - The Essentials
Risk Factory: PCI - The EssentialsRisk Factory: PCI - The Essentials
Risk Factory: PCI - The Essentials
 
Risk Factory: How to Implement an Effective Incident Response Programme
Risk Factory: How to Implement an Effective Incident Response ProgrammeRisk Factory: How to Implement an Effective Incident Response Programme
Risk Factory: How to Implement an Effective Incident Response Programme
 
Risk Factory: Beyond Data Leakage
Risk Factory: Beyond Data LeakageRisk Factory: Beyond Data Leakage
Risk Factory: Beyond Data Leakage
 
Risk Factory: Security Lessons From the Online Adult Entertainment Industry
Risk Factory: Security Lessons From the Online Adult Entertainment IndustryRisk Factory: Security Lessons From the Online Adult Entertainment Industry
Risk Factory: Security Lessons From the Online Adult Entertainment Industry
 
Risk Factory: Let's Get Physical
Risk Factory: Let's Get PhysicalRisk Factory: Let's Get Physical
Risk Factory: Let's Get Physical
 
Risk Factory: PCI Shrink to Fit
Risk Factory: PCI Shrink to FitRisk Factory: PCI Shrink to Fit
Risk Factory: PCI Shrink to Fit
 
Risk Factory: PCI Compliance in the Cloud
Risk Factory: PCI Compliance in the CloudRisk Factory: PCI Compliance in the Cloud
Risk Factory: PCI Compliance in the Cloud
 
Risk Factory: Database Security: Oxymoron?
Risk Factory: Database Security: Oxymoron? Risk Factory: Database Security: Oxymoron?
Risk Factory: Database Security: Oxymoron?
 
Risk Factory: Modems the Forgotten Back Door
Risk Factory: Modems the Forgotten Back DoorRisk Factory: Modems the Forgotten Back Door
Risk Factory: Modems the Forgotten Back Door
 
Risk Factory How to Steal an Identity
Risk Factory How to Steal an IdentityRisk Factory How to Steal an Identity
Risk Factory How to Steal an Identity
 
Risk Factory: The State of Electronic Eavesdropping
Risk Factory: The State of Electronic EavesdroppingRisk Factory: The State of Electronic Eavesdropping
Risk Factory: The State of Electronic Eavesdropping
 

Último

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 

Último (20)

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 

Risk Factory Geo-location Security Issues & Best Practices

  • 1. Geo-Location Security: Issues & Best Practices
  • 2. “Her father had taught her about a dog's paws. Whenever her father was alone with a dog in a house he would lean over and smell the skin at the base of its paw. This, he would say, as if coming away from a brandy snifter, is the greatest smell in the world! A bouquet! Great rumours of travel! It's a cathedral! her father had said, so-and-so's garden, that field of grasses, a walk through cyclamen--a concentration of hints of all the paths the animal had taken during the day.” Michael Ondaatje, The English Patient
  • 3. Getting to Know You • 07774 23X XXX • 07940 47X XXX • 07761 55X XXX • 07459 13X XXX
  • 6. How Satellite tracking Web browsing Mobile phone GPS devices RFID tags Credit / debit card transactions Geo tags photos / postings Proximity readers
  • 7. How A desktop browser is likely to use WiFi (accurate to 20m) or IP Geolocation which is accurate to the city or post code depending on your ISP. Mobile devices tend to use triangulation techniques such as GPS (accurate to 10m and only works outside), WiFi and GSM/CDMA cell IDs (accurate to 1000m).
  • 8. Browser Based The Geolocation API is default in the following desktop browsers: •Firefox 3.5+ •Chrome 5.0+ •Safari 5.0+ •Opera 10.60+ •Internet Explorer 9.0+ •And for updates on earlier versions for all of the above
  • 9. App Based And the W3C Geolocation API on mobile devices: •Android 2.0+ •iPhone 3.0+ •Opera Mobile 10.1+ •Symbian (S60 3rd & 5th generation) •Blackberry OS 6 •Maemo
  • 10. Detailed Of Data Captured
  • 15. Business Uses A US-based car rental company started using deployed GPS tracking devices to monitor driving speeds of its customers. If a customers car exceeded 79 miles per hour for 2 continuous minutes, they were charged an additional $150 (without their consent).
  • 16. Example A French Insurance company used both mobile phone and car GPS data to track sales executive locations and cross reference to their expense accounts. Policy resulted in 21 employee dismissals and the identification of over .5 million euro in false claims.
  • 17. Example Earlier this year, a large New York-based charity used geo-location data from Grindr to identify homosexuals working in their offices. 4 employees were fired for “inappropriate behavior.”
  • 19. Lay of the Land
  • 20. Every Word You Say • Tracking customers • Tracking employees • Tracking competitors • Tracking subjects
  • 21. Every Single Day • Competitive Intelligence – Location of executives easily disclose activities such as mergers and acquisitions or real estate sittings. • Targeting Intelligence – Location of subjects by private detectives – Location of subjects by the media
  • 23. Can Someone Own Your Whereabouts?
  • 24. Can’t You See, You Belong To Me?
  • 26. Every Law You Break
  • 27. Every Arm You Break
  • 30.
  • 31.
  • 32. Every Word You Say • How the app exposes the users is not the problem. • How Google Maps, Facebook and Foursquare expose the users without their knowledge is the problem. • Opt out is the default not opt in. • Social networking business model = get everyone to share everything • Your personal information (your life) is their product
  • 33. I’ll Be Watching You "If you have something that you don't want anyone to know, maybe you shouldn't be doing it in the first place," Former Google CEO: Eric Schmidt
  • 34. Industry Response User beware !
  • 36. Every IP You Fake
  • 38.
  • 39.
  • 41. Understand the Data • Where you go • Where you went • What you do • What you did • Forever
  • 43. Regulatory Conundrum Geo-location data falls under special category of data subject to E-Privacy Directive. To comply you must either: – Obtain prior consent - or: – Process the data anonymously (Good luck as this includes UDID, IMEI, Mac or IP addresses)
  • 44. Best Practices? Information Security Governance Framework  Policies  Identification, Classification & Marking  Prior Consent  Identifier Sanitisation (UDID, IMEI, IPs)  Privacy Statements  Limited Retention  Testing & Auditing
  • 45. Find the Browser Secrets
  • 48. DIY Apple Safari: • Go to the ‘Display a menu of General Safari settings’ • Go to ‘Preferences’ • Go to ‘Security’ • Uncheck ‘Allow websites to ask for location information’ Comodo Dragon: • Go to the ‘Customize and control Comodo Dragon' icon • Go to ‘Options’ • Go to ‘Under the Bonnet’ • Choose ‘Content Settings’ • Choose ‘Location’ • Check ‘Do not allow any site to track my physical location’ Facebook: • Go to Privacy Settings • Click ‘Custom’ • Click ‘Custom Settings’ • Disable ‘Places I check in’ • Disable ‘People here now’ • Disable ‘Friends can check me in to places’
  • 49. DIY Google Chrome: • Go to the ‘Customize and control Google Chrome’ icon • Go to ‘Options’ • Go to ‘Under the Bonnet’ • Choose ‘Content Settings’ • Choose ‘Location’ • Check ‘Do not allow any site to track my physical location’ Google GMail: • Scroll down on your GMail page until your reach 'Last account activity: • Hit 'Details' • Scroll down • Check 'Never show an alert for unusual activity' Google Toolbar: • Go to the ‘Adjust Toolbar options’ icon • Go to Tools • Uncheck ‘My Location’ • Hit 'Save'

Notas del editor

  1. “ Her father had taught her about a dog's paws. Whenever her father was alone with a dog in a house he would lean over and smell the skin at the base of its paw. This, he would say, as if coming away from a brandy snifter, is the greatest smell in the world! A bouquet! Great rumours of travel! It's a cathedral! her father had said, so-and-so's garden, that field of grasses, a walk through cyclamen--a concentration of hints of all the paths the animal had taken during the day.” I found this very true – my dogs day could be determined from the way she smelled- laying in the sun, swimming… I got to know my dog this way. These days = we implant GPS chips in our dogs. Is the same true for humans? Can you get to know a person by learning where they have been all day???? © 2005 Orthus Ltd
  2. So I found 4 attendees (here in this room today) who participate in social network geo tagging © 2005 Orthus Ltd
  3. 0774 - I saw you were in Kensington a few weeks ago coming out of the Olympia the same day as the Adult Erotica Show 2012 I remember because I was in Notting Hill that day and I saw 0794 was there – I thought that was odd because I had just called his office and they said he was out sick. I also noticed 0776 goes to St. Mary’s in Earl’s Court. I take my kids to day school there and noticed that you go there every Monday night. Don’t they hold AA meetings in the basement on Monday nights? And 0745 - Did you loose your phone? Because every night it shows you on Brompton Street in Soho…. By the way, how’s your wife??? Anyway – I think I now know most of you a little bit better. Though you may question that. The question every business is asking itself these days is: Where are you Why???? Two reasons: © 2005 Orthus Ltd
  4. What DHL pioneered with the 24/7 tracking of parcels – Businesses are now doing with people Nonetheless, businesses using geo data are struggling © 2005 Orthus Ltd
  5. Technology allows real time location of users © 2005 Orthus Ltd
  6. Technology allows real time location of users © 2005 Orthus Ltd
  7. Threats to Business © 2005 Orthus Ltd
  8. Threats to Business © 2005 Orthus Ltd
  9. Threats to Business © 2005 Orthus Ltd
  10. Threats to Business © 2005 Orthus Ltd
  11. Law enforcement favorite © 2005 Orthus Ltd
  12. Threats to Business © 2005 Orthus Ltd
  13. Threats to Business © 2005 Orthus Ltd
  14. © 2005 Orthus Ltd
  15. © 2005 Orthus Ltd
  16. Every single one of these uses resulted in law suits Judged – in favour of the companies… © 2005 Orthus Ltd
  17. Cept this one…. FTC 24.5 million fine = PAID with the proviso that they don’t admit their guilt. Ask yourself: Why is Google interested in mapping? Because if you write the map = you define the reality © 2005 Orthus Ltd
  18. Shortest distance between 2 points is a straight line A straight line drawn by Google will take you passed Starbucks. NYC: Nike/Starbucks projects © 2005 Orthus Ltd
  19. Can = reduced costs and increased revenue For businesses – it doesn’t get any better than that !!!! © 2005 Orthus Ltd
  20. Threats to Business © 2005 Orthus Ltd
  21. Businesses selling geo data are not struggling Companies are just taking it - © 2005 Orthus Ltd
  22. Threats to Business © 2005 Orthus Ltd
  23. Can someone “own” your whereabouts? A: YES ! © 2005 Orthus Ltd
  24. Geo data = cash Our lives are being mapped for money. Where you go Where you went What you do What you did THIS IS BIG BUSINESS © 2005 Orthus Ltd
  25. On the PII location data valuable for Burglary Stalking ID Theft … Kidnapping © 2005 Orthus Ltd
  26. What’s going on here??? © 2005 Orthus Ltd
  27. What’s going on here??? © 2005 Orthus Ltd
  28. On the personal side – this data is EXTREMELY © 2005 Orthus Ltd
  29. iTunes store 1.99 Funny and creepy Provokes laughter & tears Novelty or tool for rapists Dependent on the user… Wake up call about privacy Sonar/radar = depicting pole dancers Standard geo app based on maps app Published publically visible Facebook profiles through Foursquare Find a girl in a pub nearby Tap picture for information © 2005 Orthus Ltd
  30. Name: Zoe Looks like my kinda girl. 24 single Likes to party been on vacation in Ibiza Went to Stonebrook high school Then St Johns University Lives in Hammersmith Favorite actress: Keira Knightley Favorite movie Gone with the Wind Favorite Book: 50 Shades of Grey Has weakness for Margaritas…. Loves Lady Gaga Tap her photo album… © 2005 Orthus Ltd
  31. Leaving security to the user © 2005 Orthus Ltd
  32. Where’s the leadership © 2005 Orthus Ltd
  33. Leaving security to the user © 2005 Orthus Ltd
  34. Leaving security to the user © 2005 Orthus Ltd
  35. Leaving security to the user © 2005 Orthus Ltd
  36. Threats to Business © 2005 Orthus Ltd
  37. Leaving security to the user © 2005 Orthus Ltd
  38. © 2005 Orthus Ltd
  39. Once again we are behind the curve on this issue Like wireless, cloud computing, credit card data, medical records etc…. © 2005 Orthus Ltd
  40. © 2005 Orthus Ltd
  41. Its this simple: Geo data = PII – AND MUST BE PROTECTED AS SUCH 33B Sinclair Gardens - 6:30 – 5 blocks west to Shepard's Bush tube - © 2005 Orthus Ltd
  42. © 2005 Orthus Ltd
  43. © 2005 Orthus Ltd
  44. Threats to Business © 2005 Orthus Ltd
  45. Threats to Business © 2005 Orthus Ltd
  46. Threats to Business © 2005 Orthus Ltd
  47. We’re here as professionals. But this is personal Where you go Where you went What you do What you did It doesn’t get any more personal than that © 2005 Orthus Ltd