Hackers or Technology Vendors: spot the difference?

Recently, I have attended a number of events and listened to some wonderful technical minds explaining to me how various new technologies are configured to exfiltrate (by default) significant data; both user and device generated, and send it back to the suppliers and partners of such technology. It's not just smart phones and tablets but increasingly everything from washing machines to robot dolls and from smart TVs to CCTV. The reason given by technology vendors for doing this is that it helps them to develop better solutions. However, many believe the actual reason to be that, once aggregated, this data can be monetized in many different ways to give the technology companies and those to w

Archive
Search by Tags