Backlinks
Table of Contents
#ret
1 Voice assistant
- What are we protecting?
- User privacy and data
- User mental space (advertising)
- Peace of mind
- Product and brand
- Protect external agendas
- brand ecosystem, publicity
- User entry points
- User resources (energy)
- Who are we protecting it from, and what are their motivations?
- Data miners
- Money (companies) or personal gain (blackmailers)
- Advertisers
- Money
- Foreign state actors
- Gaining influence
- Physical attackers
- "Alexa, open the pod bay doors." Digital entry point to physical resources
- Misinformed users
- To help
- Accidental users
- !voice assistant actions
- Trolls
- Fun
- DDOSers
- Bot net
- Data miners
- What methods of attacks do we prevent?
- External system hijacking (remote control)
- Unauthorized activation for certain actions
- Exploitation of security vulnerabilities for accessing user data and creating bot nets
- What are the possible effects of these attacks?
- Damaged financial well being
- Damaged emotional well being
- Damaged physical well being
- Damage to company brand / ecosystem
- What are their resources?
- Expertise and platform
- Potential for money
- Which is a commodity
- Exploitable users
- Some have financial resources
- What are our resources?
- Massive company
- Funding
- Workers
- Smart people
- Infrastructure
- Potential for exploitation / damage
- Intended access to our product
- Massive company
- What should we do?
- Educate users
- Authorization
- Multi-step confirmations / actions for potentially damaging actions
- Patch programmatic security vulnerabilities
- Look secure
- High reward for finding vulnerabilities