Skip to main content

The context you need, when you need it

When news breaks, you need to understand what actually matters — and what to do about it. At Vox, our mission to help you make sense of the world has never been more vital. But we can’t do it on our own.

We rely on readers like you to fund our journalism. Will you support our work and become a Vox Member today?

Join now

Breaking the IoT Connection

If we keep moving in the direction of letting everything just start connecting to everything else, just because it can, we’re in for some very difficult challenges.

look525/iStock

A version of this essay was originally published at Tech.pinions, a website dedicated to informed opinions, insight and perspective on the tech industry.


In many ways, the current obsession with the Internet of Things is understandable. The tech press is constantly on the lookout for something cool and fresh to write about, and IoT is this year’s hot topic. Plus, the idea of connecting essentially everything to everything is pretty compelling at a conceptual level.

However, there are some harsh realities that really shouldn’t and can’t be ignored. Whether we want to admit it or not, anything that gets connected to either a wired or wireless network has the potential to be — and probably at some point will be — hacked. Whether it’s a security camera we install in our homes, a connected module inside our new cars, or an automated building HVAC (heating, ventilation, air conditioning) system within the buildings we work or visit, the threat is there.

Unscrupulous individuals could leverage the connection to these devices to either cause functional difficulties on the devices or systems themselves, or simply to use them as a backdoor entry into other devices on a connected network and create problems there. We’ve already seen incidents of individuals who have shown that they can “break” into various car systems to cause potentially lethal issues to motionless or even moving cars. It has also been reported that some of the bigger hack attacks on large corporations actually came through seemingly innocuous devices (like connected HVAC systems) sitting on their networks.

Of course, security-related issues for connected devices are nothing new. We’ve been reading and hearing about computer-based hackers for several decades now. But what is new is the amount and range of devices being connected to a network. With IoT, the number of connected devices goes through the roof. On the one hand, you could argue that this makes the likelihood of an attack on any particular device go down. However, the overall attack surface is increasing so much that it’s creating an extremely attractive target for the more sophisticated, organized and aggressive hackers now initiating these attacks.

A big part of the problem is that most of these new IoT devices are not being brought to market with a robust security model in mind. Instead, the focus is on offering simple connectivity in order to give them new functionality, with easy access being a core part of this new capability. Combine this with all the well-intended efforts that have been introduced over the last several years to make networking easier, and you’ve got the recipe for a potential disaster.

Another key part of the issue is that it’s difficult to think through all the potential scenarios that these kinds of IoT devices might be put through. What we really need are extremely simple tools that can tell us things like what kind of information is being broadcast around our networks; what sorts of “requests” for information are being sent to our networks, how to block and/or stop this kind of information, straightforward explanations of what it all means, and so on.

At the same time, despite the potential hit on convenience and ease of use this might entail, we need to give serious consideration to making more network and communication settings “off” by default. Admittedly, this a different (and difficult) mindset for most vendors to adopt, but I’m concerned that if we keep moving in the direction of letting everything just start connecting to everything else, just because it can, we’re in for some very difficult challenges.

As technological improvements around IoT connectivity start moving faster, it’s not only worth our while, but essential for us to step back and start thinking about what the implications really are and will be. There will always be trade-offs between convenience and capability and ease-of-use and privacy, and sometimes and for some people, those trade-offs will be worth accepting.

However, for many, the potential risks outweigh any minor potential rewards. If vendors — and the tech industry overall — really want IoT to reach the kind of potential that many believe it has, they’re going to have to put security (along with clear explanations of security issues and settings) at the forefront of their efforts.


Bob O’Donnell is the founder and chief analyst of Technalysis Research LLC, a technology consulting and market research firm that provides strategic consulting and market research services to the technology industry and professional financial community. Reach him @bobodtech.

This article originally appeared on Recode.net.

See More:

More in Technology

Technology
The case for AI realismThe case for AI realism
Technology

AI isn’t going to be the end of the world — no matter what this documentary sometimes argues.

By Shayna Korol
Politics
OpenAI’s oddly socialist, wildly hypocritical new economic agendaOpenAI’s oddly socialist, wildly hypocritical new economic agenda
Politics

The AI company released a set of highly progressive policy ideas. There’s just one small problem.

By Eric Levitz
Future Perfect
Human bodies aren’t ready to travel to Mars. Space medicine can help.Human bodies aren’t ready to travel to Mars. Space medicine can help.
Future Perfect

Protecting astronauts in space — and maybe even Mars — will help transform health on Earth.

By Shayna Korol
Podcasts
The importance of space toilets, explainedThe importance of space toilets, explained
Podcast
Podcasts

Houston, we have a plumbing problem.

By Peter Balonon-Rosen and Sean Rameswaram
Technology
What happened when they installed ChatGPT on a nuclear supercomputerWhat happened when they installed ChatGPT on a nuclear supercomputer
Technology

How they’re using AI at the lab that created the atom bomb.

By Joshua Keating
Future Perfect
Humanity’s return to the moon is a deeply religious missionHumanity’s return to the moon is a deeply religious mission
Future Perfect

Space barons like Jeff Bezos and Elon Musk don’t seem religious. But their quest to colonize outer space is.

By Sigal Samuel