Security is just like the popularization of computer Internet of Things 20 years ago. How to overcome the hurdle of hackers?

Security is just like the popularization of computer Internet of Things 20 years ago. How to overcome the hurdle of hackers?
Compared with ordinary homes, smart homes not only have traditional living functions, but also have construction, network communication, information appliances, equipment automation, provide all-round information interaction functions, and even save money on various energy costs. Smart homes can be said to be the embodiment of Internet of Things under the influence of the Internet. As a "must-have" entrance to smart homes, smart camera equipment has been exposed to extremely serious security risks. This has raised a serious issue for the development of the entire home intelligence. After all, no one wants this smart camera that brings many conveniences and guarantees to life to become a tool for criminals to buy and sell your privacy at will.
The home camera has become another key to open the door. On June 18, the official website of the General Administration of Quality Supervision, Inspection and Quarantine of the People's Republic of China issued a warning on the quality and safety risks of smart cameras, saying that among the 40 batches tested, 32 batches of samples had quality and safety risks, and there was a high probability that the user's monitoring video would be leaked, or the smart camera would be maliciously controlled. According to a report by CCTV News on June 18, cracking the password of smart cameras, invading related systems, and peeking or live-streaming the monitoring content of smart cameras have now formed an illegal industry chain. Entering keywords such as "camera cracking" on the Internet will bring up many related chat groups, all of which claim to be able to crack the IP address of smart cameras and sell scanning and cracking software and privacy-invading camera images to people. In other words, the technical tools for protecting privacy have become the biggest risk of leaking privacy. It is not difficult to imagine that once the lawbreakers master this "exclusive technology", these leaky cameras will become the public key to open the door of the home.
How to deal with the fatal security issues in the 2 billion yuan smart home market? According to public data, there are about 200 million urban households in China. In the next five years, it is expected that at least 5% of households will consider installing security products at home, with an average annual market demand of about 2 billion yuan. But along with the market popularity of the smart home concept, there are also risks in the Internet of Things that security experts have warned about one after another. When it comes to smart homes, these risks become even more terrifying. According to a report by Gigaom, enterprise security research company Synack tested 16 common IoT devices, from Samsung SmartThings devices to Google Nest and Lyric thermostats. The results showed that they all had security issues to varying degrees, among which networked cameras were the least secure. "Convenience" has always been a double-edged sword. The more data you transmit in the Internet of Things, the greater the possibility of information exposure, and the existing security risks have also increased dramatically. Today, the security of the Internet of Things is like computer security in the 1990s. Everything is new, and there are no security standards or methods for security monitoring. In addition to the problems of the device itself, cloud security also needs attention. When different devices are connected together and data is shared through the cloud, new security risks will arise. Therefore, this can be said to be fatal to the current security situation of smart homes. According to industry insiders, it is not impossible to provide users with bank-level security. Smart home manufacturers can use "AES, RSA + dynamic key" encryption technology for their products. With such encryption technology, any time a user issues a command, the information is encrypted and protected, and it is difficult for hackers to crack it. Smart homes have undoubtedly brought more convenience to our lives and changed our original lifestyles. However, if the Internet of Things is rashly connected without encryption protection, smart homes may expose family privacy, causing people to fall into a situation of "being a fish on the chopping board". Only when smart home manufacturers do more security and stability protection measures can the future reputation of the smart home industry be guaranteed.

As a winner of Toutiao's Qingyun Plan and Baijiahao's Bai+ Plan, the 2019 Baidu Digital Author of the Year, the Baijiahao's Most Popular Author in the Technology Field, the 2019 Sogou Technology and Culture Author, and the 2021 Baijiahao Quarterly Influential Creator, he has won many awards, including the 2013 Sohu Best Industry Media Person, the 2015 China New Media Entrepreneurship Competition Beijing Third Place, the 2015 Guangmang Experience Award, the 2015 China New Media Entrepreneurship Competition Finals Third Place, and the 2018 Baidu Dynamic Annual Powerful Celebrity.

<<:  Great Wall Motors has entered a bottleneck period of development: Can an outsider do a good job?

>>:  Who benefits from the double points game?

Recommend

No one is better than this cat at slacking off!

The short Spring Festival holiday passed by like ...

How much does it cost to customize a wedding banquet mini program in Nanyang?

According to industry insiders, mini programs wil...

Strategies to break through the bottleneck in catering marketing!

Let’s first talk about the formation and position...

[3D Tour] Overlooking the national park from space, amazing animals are here!

Your browser does not support the video tag Reali...

Tips on advertising materials and copywriting at Station B!

"Suddenly, as if overnight, a spring breeze ...

WeChat ID can be changed at will? Official: It's just a bug

Recently, there have been a lot of news about WeC...

M8 camera vs 5s

As HTC's latest flagship product this year, th...

What I did after taking over a negative iOS project

Half a year ago, I joined a startup team that had...

Case Analysis | Alipay Huabei’s Marketing Tactics on Double 11 and Double 12

How does Huabei use various content marketing for...

Should I learn Swift or Objective-C directly?

[[120413]] After we released the Swift language l...

Product Operation: How to achieve user growth of tens of millions?

Ever since the concept of user growth became popu...