![]() ![]() For example, a speech-to-text app would receive a user’s spoken words, but would be unable to identify the user’s voice. Possible student response: The DEEProtect system limits or alters raw sensor data before forwarding that data to other apps. How does the DEEProtect system help to protect smartphone users? What is the tradeoff for a greater level of privacy using the DEEProtect system? The 6thSense system continually monitors a smartphone’s sensor activity against these learned behaviors and alerts the user if the system detects unusual activity.ħ. Possible student response: The user trains the 6thSense system to recognize his or her smartphone’s normal sensor behavior during everyday tasks such as calling, Web browsing and driving. How does the 6thSense system help to protect smartphone users? When tested on a pool of 50 PIN numbers, the app correctly deciphered 99.5 percent of keystrokes.Ħ. Possible student response: A recently-built app reported in the Cryptology ePrint Archive in December uses smartphones’ gyroscopes, accelerometers, light sensors and magnetism-measuring magnetometers to guess user PIN numbers. What was the nefarious goal of the app and how successful was it at meeting its goal? What sensors did it use to extract the necessary data? Give an example of an invasive app built by a researcher. Monitoring users’ data over time can indicate directions, speeds and distances of travel, which can be matched with subway and other transit maps.ĥ. Possible student response: Motion sensors can tell if a person is sitting still, walking or riding smoothly. If an app did not have access to GPS, video or screenshots, how could it use a smartphone’s other sensors to spy on a user’s location and movements? Possible student response: Keystrokes can be reconstructed with fairly high accuracy based on the motions, light levels and sounds detected by the smartphone while its user types.Ĥ. If an app did not have access to screen images and keystrokes, how could the app use a smartphone’s other sensors to spy on a user’s messages and passwords? Since motion detectors are not currently permission protected, apps can extract motion sensor data and send it to sophisticated computer programs that can relate that data to specific, potentially invasive information about a user, such as finger taps on certain areas of the screen.ģ. Researchers have proposed that such apps would show a user a camera icon several times, then, once the user is comfortable with the button’s location and function, switch to a video camera icon to gain access to the smartphone’s microphone as well as the camera. For example, an app could trick a distracted user into allowing it to capture imagery and audio data, rather than just imagery data. Other apps could be deceptive in the way that they ask for permission to collect certain data. If similar apps are devised in the future, those apps could pose a potential threat to users. Possible student response: Researchers have designed invasive, proof-of-concept apps that perform some functions while also secretly extracting other sensor data. In what ways can downloaded apps use a smartphone to potentially spy on a user without the user’s knowledge or permission? Motion detectors, such as accelerometers and gyroscopes, are not currently permission-protected.Ģ. These devices can also detect and store data on screen touches and keystrokes, fingerprints, proximity of objects to the screen, light levels, barometric pressure, acceleration, vibration, rotation, magnetic fields, gravity and GPS signals. Possible student response: Smartphones can capture and store images, video and sound (including human speech). ![]() What type of information can smartphones sense and measure? What type of sensors are not currently permission-protected? Finally, all groups should work together to answer the questions below.ġ. Each “section expert” should summarize his or her section of the article so that the new group has a summary of the whole article. Next, assign new groups, each including at least one “section expert” from each of the original four groups. Allow time for each expert group to discuss and summarize its segment. The sections include: “Message revealed,” “Tagalong,” “Sensor safeguards” and “The price of privacy.” Each group should also be assigned to read the introduction. For example, divide your class into four groups, and assign each group a section to become an expert on. ”ĭue to the length of the article, you may want to assign each section of the article to a specific group of students. These question are based on the feature article “ Smartphones overshare.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |