Abstract
This is a picture of the Panopticon. I live in a world now, where everybody can observe me without me knowing when I am being observed and when not. So, that’s the threat model I’m primarily aiming at. Last year I was working for a large software company. They had an insurance company as their client. They were trying to get data on people out of the on-board diagnostics. Not only the speed, et cetera, to do pay-as-you-drive insurance, but also the location information from the on-board diagnostics. This is similar to the government U-turn on health privacy that we heard about from Ross. And most of the times, the software that lies in my car (or in my toaster) I do not own or control. It’s owned by the company who manufactured it. Like, the Jeeps that John Deere manufactures, they say that the software is owned by them. The user has no access, no control, nothing to do with it. But forensics is a important concern. If my car (or my toaster) happens to kill me, then the investigator should be able to find out exactly what happened when I was murdered.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
e.g. investigations.
- 2.
Association of Chief Police Officers, UK Forensic guidelines.
- 3.
Feigenbaum and Ford, these proceedings.
- 4.
Wernick and Christianson, 2016, “The Price of Belief : Insuring Credible Trust”, Security Protocols xxiv, discussion.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Das Chowdhury, P. (2017). Self Attestation of Things (Transcript of Discussion). In: Stajano, F., Anderson, J., Christianson, B., Matyáš, V. (eds) Security Protocols XXV. Security Protocols 2017. Lecture Notes in Computer Science(), vol 10476. Springer, Cham. https://doi.org/10.1007/978-3-319-71075-4_10
Download citation
DOI: https://doi.org/10.1007/978-3-319-71075-4_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-71074-7
Online ISBN: 978-3-319-71075-4
eBook Packages: Computer ScienceComputer Science (R0)