{"id":4457,"date":"2015-01-14T15:00:28","date_gmt":"2015-01-14T20:00:28","guid":{"rendered":"http:\/\/me-en.kaspersky.com\/blog\/?p=4457"},"modified":"2017-09-24T18:37:37","modified_gmt":"2017-09-24T14:37:37","slug":"ces-2015-report","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/ces-2015-report\/4457\/","title":{"rendered":"CES 2015: Four Scary Key Tech Trends"},"content":{"rendered":"<p>CES 2015 was a superb event in terms of the amount of new technologies per square foot, which have been referred to numerous times by reporters for tech websites. As for me, a person fully immersed in the world of information security, the show resulted in mixed feelings.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2015\/01\/05111810\/CES_2015-1024x767-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-7160\" src=\"https:\/\/me-en.kaspersky.com\/blog\/files\/2015\/01\/CES_2015-1024x767-1-1024x767.png\" alt=\"CES_2015\" width=\"1024\" height=\"767\"><\/a><\/p>\n<p>On the one hand, CES demonstrated key trends that await us 5 to 10 years from now: smart homes, connected cars, virtual reality and biometric\/healthcare body sensors \u2013 the so-called \u2018Internet of Things\u2019 at its best.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">257 gadgets in three minutes at <a href=\"https:\/\/twitter.com\/hashtag\/CES2015?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#CES2015<\/a> <a href=\"http:\/\/t.co\/iCipCcwfED\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/iCipCcwfED<\/a> <a href=\"http:\/\/t.co\/bcjrhw3MLb\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/bcjrhw3MLb<\/a><\/p>\n<p>\u2014 The Verge (@verge) <a href=\"https:\/\/twitter.com\/verge\/status\/553961192168128512?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">January 10, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>On the other hand, the degree of offhandedness with which developers and vendors treat users\u2019 data was striking. Beside scarce exceptions, I noted an absolute negligence towards important aspects like privacy, security and encryption.<\/p>\n<p>The market is eager to move forward, continually preaching the \u2018Internet of Things\u2019 mantra. Relevant questions like \u2018What kind of data will be collected?\u2019, \u2018Who will be receiving the data and how?\u2019 and, of course, the main question, \u2018Will we be asking a user whether s\/he is keen on giving away data?\u2019, are either being ignored or asked in the manner that a vendor wants them to be asked.<\/p>\n<p>https:\/\/plus.google.com\/116816299317552146445\/posts\/fj1GbdvSVpp<\/p>\n<p>Every time I would propose these simple questions in the hallways of CES, I would get a strong feeling that I was actually in the midst of star troopers whom Emperor Palpatine has just ordered to execute \u2018Order 66.\u2019 In the best scenarios, people would take me for a madman saying, \u201cDude, what are you talking about? We are talking about a multi-billion dollar market \u2013 users will have to accept privacy violations, anyway!\u201d<\/p>\n<p>Quite likely, they will. However, when it comes to me, I am really enraged by any attempt to steal my right to privacy. This is why I decided to write this post and, hopefully, draw your attention to four controversies related to CES\u2019 key tech trends.<\/p>\n<h3><strong>1. <\/strong><strong>Driverless <\/strong><strong>cars<\/strong><\/h3>\n<p>To be honest, I don\u2019t think we really need driverless cars that much. The key marketing message that this strategy relies on is decreasing the human factor in car accidents and, ultimately, eliminating them all together. Well this looks like a very legitimate reason, but there are also several issues.<\/p>\n<p>https:\/\/twitter.com\/thegooglecar\/status\/535590615988195328<\/p>\n<p>The first problem concerns the labor market and employment. Obviously, the first to jump in line with organizations eager to use driverless cars will be taxi companies. In New York alone, the taxi fleet includes about 40 thousand cars. In the entire world the number is unimaginable, but we can safely add three more digits to make up a plausible number.<\/p>\n<p>If millions of low-wage employees were deprived of this hard but honest job, this would significantly contribute to a growing crime rate all over the world. Curiously, I have not seen any analytical reports addressing these two closely interconnected trends.<\/p>\n<p>http:\/\/instagram.com\/p\/xh76IaRpV3\/<\/p>\n<p>However, the situation presented above represents just a part of a bigger problem. In order for driverless cars to exist, the stats are crucial \u2013 and this statistical information would consist of zillions of gigabytes of data regarding routes, users, traffic loads and the like.<\/p>\n<p>The driverless car, contrary to how the common user sees it, does not \u2018learn\u2019 to drive on its own: it merely operates with the statistical data to generate behavioral patterns, depending on the surrounding environment and conditions. These patterns result from the analysis of an enormous quantity of accomplished scenarios. Who will \u2018feed\u2019 all of this data to computers? Of course, \u2018we the users\u2019 will since there\u2019s no one else to do it.<\/p>\n<p>All of the data about our transportation habits, i.e. the way we act, where we turn, and, most importantly, where and when we go, will be sent to\u2026 umm, somewhere.<\/p>\n<p>http:\/\/instagram.com\/p\/xh8ZvMRpWn\/<\/p>\n<p>For quite a long time, this fact never provoked any questions. But <a href=\"http:\/\/www.businessinsider.com\/nevada-bans-uber-2014-11\" target=\"_blank\" rel=\"noopener nofollow\">the recent Uber debacle<\/a> proved that this ignorance would not last for long: people cannot help but care that some undefined agent is able to detect their precise locations in real time. And, even more alarming, this agent can also accumulate the ENTIRE history of translocations in a person\u2019s ENTIRE lifetime.<\/p>\n<p>In theory, the developer of driverless cars and taxis would try to protect user data from scammers. But the stakes are really high, so this attempt may ultimately be unsuccessful. The problem now lies in whether or not to trust the service providers. Offering data security and protection is a complex and science-intensive business where the majority of service providers just lack competence. Trusting their ability to properly secure data is like trusting a child with a million dollars.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Driverless cars \u2013 what's to come? <a href=\"https:\/\/t.co\/XERAi2e9NM\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/XERAi2e9NM<\/a> via <a href=\"https:\/\/twitter.com\/kaspersky?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">@kaspersky<\/a> <a href=\"http:\/\/t.co\/y16EjoGTnW\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/y16EjoGTnW<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/544530038725419008?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">December 15, 2014<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>I am not saying that driverless cars are all that bad. I only want to convey the message that, before deploying and commercializing this tech, one should ensure that there is legislation in place to protect collected user data and that service providers offer users a reliable and transparent means of fully wiping out the data from the providers\u2019 databases should there be a need.<\/p>\n<h3><strong>2. <\/strong><strong>Drones<\/strong><\/h3>\n<p>This year CES was packed with drones. These little robots have become more and more affordable, and are available now for as little as $199 \u2013 $499. The majority of drones are equipped with cameras (or are GoPro or smartphone-mountable). Everything is in place\u2014smart stabilization algorithms, sensor-based piloting and navigation systems\u2014and continues to evolve, except one thing: the regulation of flights and legislation on the violation of privacy.<\/p>\n<p>A quick search on YouTube provides enough evidence supporting that drones are frequently used for mischief, including spying through the windows, stealth surveillance and many not-so-childish pranks. This topic was covered well by the journalist John Oliver:<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/K4NRJoCNHIs?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span><\/p>\n<p>Given the fact that there is no proper regulation for drones, they could potentially be used in practically any scenario. So don\u2019t be surprised if one day you discover a couple of drones hovering opposite your balcony and recording videos.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Are <a href=\"https:\/\/twitter.com\/hashtag\/drones?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#drones<\/a> as scary as they seem? <a href=\"https:\/\/t.co\/6jqha7bonz\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/6jqha7bonz<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/security?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#security<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/privacy?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#privacy<\/a> <a href=\"http:\/\/t.co\/N4Puv6NRZ0\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/N4Puv6NRZ0<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/552497356210704384?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">January 6, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Today, drones are no big threat. But this is just for now since the tech has not evolved dramatically. And we all know how fast tech evolves, don\u2019t we?<\/p>\n<h3><strong>3. <\/strong><strong>Healthcare\/fitness sensors<\/strong><\/h3>\n<p>I encountered 17 companies offering fitness trackers at CES this year. Needless to say, there are way more of them. Fitness bands capable of counting steps, heart rate or other biometric parameters are produced by dozens of major vendors and small start-ups, and are widely available on the market.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">How fitness has become smarter, better, faster, stronger \u2026 and more connected <a href=\"http:\/\/t.co\/RLHFrrs0RU\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/RLHFrrs0RU<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/TechTimeMachine?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#TechTimeMachine<\/a><\/p>\n<p>\u2014 Mashable (@mashable) <a href=\"https:\/\/twitter.com\/mashable\/status\/551887106860396545?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">January 4, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>I was an early adopter of this type of gadget. After having spent a couple of years with these gizmos, I am fully positive they are completely useless for fitness purposes.<\/p>\n<div class=\"pullquote\">Life is way simpler than this. If you want to go jogging, just go for it. Want to slim down? Just stop eating junk and jog even harder.<\/div>\n<p>As soon as the initial \u2018wow\u2019 effect fades away, the reality sinks in and you realize that life is way simpler than this. If you want to go jogging, just go for it: treadmills at the gym can tell you how many miles you ran. Want to slim down? Just stop eating junk and jog even harder. A coach or specialized website can help you to develop your own personalized routine.<\/p>\n<p>No fitness band is a cure-all for your problems \u2013 you won\u2019t be a better runner just by wearing it. But the problem with the sensors is not their mere existence, but the data that they generate. The latter is beneficial for many third parties.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Fitness tracking apps &amp; wearables vs <a href=\"https:\/\/twitter.com\/hashtag\/privacy?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#privacy<\/a>. Guess who wins? <a href=\"https:\/\/t.co\/YjIZv2vQVa\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/YjIZv2vQVa<\/a> <a href=\"http:\/\/t.co\/LfMqqWGBES\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/LfMqqWGBES<\/a><\/p>\n<p>\u2014 Eugene Kaspersky (@e_kaspersky) <a href=\"https:\/\/twitter.com\/e_kaspersky\/status\/528237276128501761?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">October 31, 2014<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>All of the relevant questions would seem quite innocent, but today, one can identify a person based on the analysis of an array of biometric data.<\/p>\n<p>This is not necessarily bad. For example, this approach may end up as a means of replacing obsolete password-based authentication methods. The real problem is that anyone might be using our \u2014 yes, our! \u2014 personal data precisely now, but it\u2019s not us.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>The real problem is that anyone might be using our #personaldata precisely now, but it\u2019s not us.<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F7AKe&amp;text=The+real+problem+is+that+anyone+might+be+using+our+%23personaldata+precisely+now%2C+but+it%26%238217%3Bs+not+us.\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>So one more question arises: how well will this data be protected? We are all sick and tired of hearing the news over and over again: some bad people have stolen batches of data from an honest megacorporation which just so happened to have collected an enormous amount of personal data from its customers.<\/p>\n<h3><strong>4. <\/strong><strong>Smart <\/strong><strong>homes<\/strong><\/h3>\n<p>Another key trend evident at CES 2015 was the next generation of homes where lighting, HVAC, locks, fridges, stoves and everything you can find in an average home, is connected and equipped with a controller deployed on a mobile device.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">A fascinating story how <a href=\"https:\/\/twitter.com\/JacobyDavid?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">@JacobyDavid<\/a> hacked his smart home <a href=\"https:\/\/t.co\/ckTyeMVLUp\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/ckTyeMVLUp<\/a> <a href=\"http:\/\/t.co\/q4LiqsBnA4\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/q4LiqsBnA4<\/a><\/p>\n<p>\u2014 Eugene Kaspersky (@e_kaspersky) <a href=\"https:\/\/twitter.com\/e_kaspersky\/status\/515189019617918976?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">September 25, 2014<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Again, this coin is two-sided. What connected home advocates usually show off at trade events is the apparent convenience of such technology at home. But the reverse side of the coin is that, in fact, everything can be hacked. No system is 100% secure \u2013 the likes of Stuxnet, Gauss and Duqu serve as a continuous reminder that even uranium enrichment centrifuges are not safe from trespassers.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Who is to blame for \u201chacked\u201d private web cameras? <a href=\"https:\/\/t.co\/1A3deNQCEQ\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/1A3deNQCEQ<\/a> <a href=\"http:\/\/t.co\/r4B079ile0\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/r4B079ile0<\/a><\/p>\n<p>\u2014 Eugene Kaspersky (@e_kaspersky) <a href=\"https:\/\/twitter.com\/e_kaspersky\/status\/536161207065931776?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">November 22, 2014<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>In the event of a hacker breaking into your connected home, the culprit may get access to everything you have, from the history of your fridge\u2019s \u2018correspondence\u2019 with Wal-Mart, to telemetric data, surveillance videos, credit card numbers and tons of confidential data unthinkable for an average mortal.<\/p>\n<p>Today, the most paranoid users even use tape to cover his or her laptop webcams, just because it has been proven that someone can spy through a remote connection. If we discuss smart homes, you will quickly run out of tape patching all of the sources of data.<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/E8zandvQvUc?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span><\/p>\n<p>P.S. Having returned from CES 2015, I started to better understand Ray Bradbury who, decades ago, preached that tech innovations do not play a major role in humanity\u2019s cultural and intellectual development, comfort and, most importantly, happiness. Really, there is nothing wrong with turning off the lights with an old-fashioned switch. Manually.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CES 2015 was a superb event in terms of the amount of new technology per square foot. But, from an information security standpoint, it did not appear all that positive.<\/p>\n","protected":false},"author":7,"featured_media":4458,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[882,883,487,261,825,849,363,43,97,630],"class_list":{"0":"post-4457","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-ces-2015","9":"tag-driverless-cars","10":"tag-drones","11":"tag-encryption","12":"tag-fitness-trackers","13":"tag-future","14":"tag-personal-data","15":"tag-privacy","16":"tag-security-2","17":"tag-smart-home"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/ces-2015-report\/4457\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/ces-2015-report\/4517\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/ces-2015-report\/5001\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/ces-2015-report\/5308\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/ces-2015-report\/5454\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/ces-2015-report\/6621\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/ces-2015-report\/7159\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/ces-2015-report\/6630\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/ces-2015-report\/6621\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/ces-2015-report\/7159\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/ces-2015-report\/7159\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/ces-2015\/","name":"CES 2015"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/4457","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=4457"}],"version-history":[{"count":1,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/4457\/revisions"}],"predecessor-version":[{"id":6474,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/4457\/revisions\/6474"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/4458"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=4457"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=4457"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=4457"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}