
{"id":1314,"date":"2022-09-30T13:04:55","date_gmt":"2022-09-30T11:04:55","guid":{"rendered":"https:\/\/fordaysec.de\/privacy-analysis\/"},"modified":"2024-08-06T08:56:19","modified_gmt":"2024-08-06T06:56:19","slug":"privacy-analysis","status":"publish","type":"page","link":"https:\/\/fordaysec.de\/en\/privacy-analysis","title":{"rendered":"Privacy Analysis"},"content":{"rendered":"\n<div class=\"wp-block-cover alignfull is-light mb-2rem\" style=\"min-height:2rem;aspect-ratio:unset;\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-gray-background-color has-background-dim-100 has-background-dim\"><\/span><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<p class=\"has-text-align-center has-large-font-size\"><\/p>\n<\/div><\/div>\n\n\n<div class=\"yoast-breadcrumbs\"><span><span><a href=\"https:\/\/fordaysec.de\/en\">Home<\/a><\/span> | <span class=\"breadcrumb_last\" aria-current=\"page\">Privacy Analysis<\/span><\/span><\/div>\n\n\n<div class=\"wp-block-group pl-0 pr-0\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-columns mb-0 is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<h3 class=\"wp-block-heading\">PRIVACY ANALYSIS<\/h3>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns mb-0 is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p>The growing ubiquity of \u201csmart\u201d devices in our everyday lives makes it increasingly more difficult for users to retain control over their own data. Especially with Internet of Things (IoT) devices having independent network connections, or with companion apps of smart devices requiring user accounts and sensitive permissions on the smartphone, there is a risk of personally identifiable information (PII) being transmitted to manufacturers and third parties in addition to telemetry and functional data. Particularly when smart devices have their own network connection or the associated companion apps require a user account or sensitive permissions on the smartphone, there is a risk that, in addition to telemetry or functional data, personal or personally identifiable data can be leaked by the app or the device to manufacturers and third parties unnoticed via network traffic. <\/p>\n\n\n\n<p>In our project, we investigate the level of data protection in smart environments systematically based on exploratory studies of modern app-assisted devices. Our focus is on the analysis of data flows which have received only sporadic attention yet, and for which new types of tools need to be developed. Regarding the human factors in everyday technology use, we want to conduct qualitative and quantitative studies on users\u2019 security and privacy perception in smart environments. Our focus here is on the visualization and analysis of data flows that have received only sporadic attention from a data protection perspective to date and for which new types of tools need to be developed. With regard to the human factor in everyday digitization, our subproject also wants to conduct qualitative and quantitative studies on users&#8217; security and data protection awareness.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group teilprojekt-bild\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1116\" height=\"734\" src=\"https:\/\/fordaysec.de\/wp-content\/uploads\/2024\/08\/Bildschirm\u00adfoto-2024-08-06-um-08.54.28.png\" alt=\"\" class=\"wp-image-2029\" srcset=\"https:\/\/fordaysec.de\/wp-content\/uploads\/2024\/08\/Bildschirm\u00adfoto-2024-08-06-um-08.54.28.png 1116w, https:\/\/fordaysec.de\/wp-content\/uploads\/2024\/08\/Bildschirm\u00adfoto-2024-08-06-um-08.54.28-300x197.png 300w, https:\/\/fordaysec.de\/wp-content\/uploads\/2024\/08\/Bildschirm\u00adfoto-2024-08-06-um-08.54.28-1024x673.png 1024w, https:\/\/fordaysec.de\/wp-content\/uploads\/2024\/08\/Bildschirm\u00adfoto-2024-08-06-um-08.54.28-768x505.png 768w\" sizes=\"auto, (max-width: 1116px) 100vw, 1116px\" \/><figcaption class=\"wp-element-caption\">from left to right: Zinaida Benenson, Gaston Pugliese, Felix Freiling<\/figcaption><\/figure>\n<\/div><\/div>\n\n\n\n<p style=\"font-size:28px\"><strong>Contact<\/strong><\/p>\n\n\n\n<p>Prof. Dr.-Ing. Felix Freiling<br>Friedrich-Alexander-Universit\u00e4t Erlangen-N\u00fcrnberg (FAU)<br>Mail: <a href=\"mailto:&#102;&#101;&#108;&#105;x.fr&#101;&#105;ling&#064;cs&#046;fau&#046;d&#101;\">&#102;el&#105;&#120;.freili&#110;&#103;&#064;c&#115;.fau&#046;d&#101;<\/a><br>Phone: +49 (0) 9131 85-69901<\/p>\n\n\n\n<p>Dr. rer. nat. Zinaida Benenson  <br>Mail: <a href=\"mailto:&#122;&#105;n&#097;ida&#046;be&#110;&#101;n&#115;o&#110;&#064;c&#115;.&#102;&#097;u.&#100;e\">zi&#110;a&#105;&#100;&#097;&#046;&#098;e&#110;e&#110;s&#111;n&#064;&#099;&#115;.&#102;au&#046;de<\/a><\/p>\n\n\n\n<p>Dr.-Ing. Gaston Pugliese<br>Mail: <a href=\"mailto:&#103;a&#115;&#116;o&#110;.&#112;ugl&#105;es&#101;&#064;c&#115;.fa&#117;&#046;&#100;e\">&#103;&#097;st&#111;&#110;&#046;p&#117;&#103;&#108;i&#101;se&#064;&#099;&#115;.&#102;&#097;u.&#100;&#101;<\/a><\/p>\n<\/div>\n<\/div>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>The growing ubiquity of \u201csmart\u201d devices in our everyday lives makes it increasingly more difficult for users to retain control&hellip;<\/p>\n","protected":false},"author":4,"featured_media":0,"parent":0,"menu_order":60,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-1314","page","type-page","status-publish"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Privacy Analysis - fordaysec<\/title>\n<meta name=\"description\" content=\"By visualizing data flows, the project aims to make vulnerabilities in Internet of Things devices visible.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/fordaysec.de\/en\/privacy-analysis\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Privacy Analysis - fordaysec\" \/>\n<meta property=\"og:description\" content=\"By visualizing data flows, the project aims to make vulnerabilities in Internet of Things devices visible.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fordaysec.de\/en\/privacy-analysis\" \/>\n<meta property=\"og:site_name\" content=\"fordaysec\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-06T06:56:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/fordaysec.de\/wp-content\/uploads\/2022\/09\/ForDaySec-Logo.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"410\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/fordaysec.de\\\/en\\\/privacy-analysis\",\"url\":\"https:\\\/\\\/fordaysec.de\\\/en\\\/privacy-analysis\",\"name\":\"Privacy Analysis - fordaysec\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fordaysec.de\\\/en#website\"},\"datePublished\":\"2022-09-30T11:04:55+00:00\",\"dateModified\":\"2024-08-06T06:56:19+00:00\",\"description\":\"By visualizing data flows, the project aims to make vulnerabilities in Internet of Things devices visible.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/fordaysec.de\\\/en\\\/privacy-analysis#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/fordaysec.de\\\/en\\\/privacy-analysis\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/fordaysec.de\\\/en\\\/privacy-analysis#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/fordaysec.de\\\/en\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Privacy Analysis\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/fordaysec.de\\\/en#website\",\"url\":\"https:\\\/\\\/fordaysec.de\\\/en\",\"name\":\"fordaysec\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/fordaysec.de\\\/en#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/fordaysec.de\\\/en?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/fordaysec.de\\\/en#organization\",\"name\":\"fordaysec\",\"url\":\"https:\\\/\\\/fordaysec.de\\\/en\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/fordaysec.de\\\/en#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/fordaysec.de\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/ForDaySec-Logo.png\",\"contentUrl\":\"https:\\\/\\\/fordaysec.de\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/ForDaySec-Logo.png\",\"width\":1000,\"height\":410,\"caption\":\"fordaysec\"},\"image\":{\"@id\":\"https:\\\/\\\/fordaysec.de\\\/en#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Privacy Analysis - fordaysec","description":"By visualizing data flows, the project aims to make vulnerabilities in Internet of Things devices visible.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/fordaysec.de\/en\/privacy-analysis","og_locale":"en_US","og_type":"article","og_title":"Privacy Analysis - fordaysec","og_description":"By visualizing data flows, the project aims to make vulnerabilities in Internet of Things devices visible.","og_url":"https:\/\/fordaysec.de\/en\/privacy-analysis","og_site_name":"fordaysec","article_modified_time":"2024-08-06T06:56:19+00:00","og_image":[{"width":1000,"height":410,"url":"https:\/\/fordaysec.de\/wp-content\/uploads\/2022\/09\/ForDaySec-Logo.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/fordaysec.de\/en\/privacy-analysis","url":"https:\/\/fordaysec.de\/en\/privacy-analysis","name":"Privacy Analysis - fordaysec","isPartOf":{"@id":"https:\/\/fordaysec.de\/en#website"},"datePublished":"2022-09-30T11:04:55+00:00","dateModified":"2024-08-06T06:56:19+00:00","description":"By visualizing data flows, the project aims to make vulnerabilities in Internet of Things devices visible.","breadcrumb":{"@id":"https:\/\/fordaysec.de\/en\/privacy-analysis#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fordaysec.de\/en\/privacy-analysis"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/fordaysec.de\/en\/privacy-analysis#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/fordaysec.de\/en"},{"@type":"ListItem","position":2,"name":"Privacy Analysis"}]},{"@type":"WebSite","@id":"https:\/\/fordaysec.de\/en#website","url":"https:\/\/fordaysec.de\/en","name":"fordaysec","description":"","publisher":{"@id":"https:\/\/fordaysec.de\/en#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fordaysec.de\/en?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/fordaysec.de\/en#organization","name":"fordaysec","url":"https:\/\/fordaysec.de\/en","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/fordaysec.de\/en#\/schema\/logo\/image\/","url":"https:\/\/fordaysec.de\/wp-content\/uploads\/2022\/09\/ForDaySec-Logo.png","contentUrl":"https:\/\/fordaysec.de\/wp-content\/uploads\/2022\/09\/ForDaySec-Logo.png","width":1000,"height":410,"caption":"fordaysec"},"image":{"@id":"https:\/\/fordaysec.de\/en#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/fordaysec.de\/en\/wp-json\/wp\/v2\/pages\/1314","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fordaysec.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/fordaysec.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/fordaysec.de\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/fordaysec.de\/en\/wp-json\/wp\/v2\/comments?post=1314"}],"version-history":[{"count":5,"href":"https:\/\/fordaysec.de\/en\/wp-json\/wp\/v2\/pages\/1314\/revisions"}],"predecessor-version":[{"id":2032,"href":"https:\/\/fordaysec.de\/en\/wp-json\/wp\/v2\/pages\/1314\/revisions\/2032"}],"wp:attachment":[{"href":"https:\/\/fordaysec.de\/en\/wp-json\/wp\/v2\/media?parent=1314"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}