Betrayed by the Guardian: Security and Privacy Risks of Parental Control
Solutions
- URL: http://arxiv.org/abs/2012.06502v1
- Date: Fri, 11 Dec 2020 17:06:00 GMT
- Title: Betrayed by the Guardian: Security and Privacy Risks of Parental Control
Solutions
- Authors: S. Ali, M. Elgharabawy, Q. Duchaussoy, M. Mannan, A. Youssef
- Abstract summary: We present an experimental framework for systematically evaluating security and privacy issues in parental control software and hardware solutions.
Our analysis uncovers pervasive security and privacy issues that can lead to leakage of private information, and/or allow an adversary to fully control the parental control solution.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: For parents of young children and adolescents, the digital age has introduced
many new challenges, including excessive screen time, inappropriate online
content, cyber predators, and cyberbullying. To address these challenges, many
parents rely on numerous parental control solutions on different platforms,
including parental control network devices (e.g., WiFi routers) and software
applications on mobile devices and laptops. While these parental control
solutions may help digital parenting, they may also introduce serious security
and privacy risks to children and parents, due to their elevated privileges and
having access to a significant amount of privacy-sensitive data. In this paper,
we present an experimental framework for systematically evaluating security and
privacy issues in parental control software and hardware solutions. Using the
developed framework, we provide the first comprehensive study of parental
control tools on multiple platforms including network devices, Windows
applications, Chrome extensions and Android apps. Our analysis uncovers
pervasive security and privacy issues that can lead to leakage of private
information, and/or allow an adversary to fully control the parental control
solution, and thereby may directly aid cyberbullying and cyber predators.
Related papers
- How the Internet Facilitates Adverse Childhood Experiences for Youth Who Self-Identify as in Need of Services [1.2564343689544843]
Youth implicated in the child welfare and juvenile justice systems are considered the most vulnerable Children in Need of Services (CHINS)
We identified 1,160 of these at-risk youth who sought support via an online peer support platform.
Our study calls for tailored support systems to promote safe online spaces and foster resilience to break the cycle of adversity.
arXiv Detail & Related papers (2024-10-21T20:59:11Z) - Security Advice for Parents and Children About Content Filtering and
Circumvention as Found on YouTube and TikTok [2.743215038883957]
We examine the advice available to parents and children regarding content filtering and circumvention as found on YouTube and TikTok.
Our results show that of these videos, roughly three-quarters are accurate, with the remaining one-fourth containing factually incorrect advice.
We find that videos targeting children are both more likely to be incorrect and actionable than videos targeting parents, leaving children at increased risk of taking harmful action.
arXiv Detail & Related papers (2024-02-05T18:12:33Z) - Protecting User Privacy in Online Settings via Supervised Learning [69.38374877559423]
We design an intelligent approach to online privacy protection that leverages supervised learning.
By detecting and blocking data collection that might infringe on a user's privacy, we can restore a degree of digital privacy to the user.
arXiv Detail & Related papers (2023-04-06T05:20:16Z) - Privacy Explanations - A Means to End-User Trust [64.7066037969487]
We looked into how explainability might help to tackle this problem.
We created privacy explanations that aim to help to clarify to end users why and for what purposes specific data is required.
Our findings reveal that privacy explanations can be an important step towards increasing trust in software systems.
arXiv Detail & Related papers (2022-10-18T09:30:37Z) - "Money makes the world go around'': Identifying Barriers to Better
Privacy in Children's Apps From Developers' Perspectives [28.40988446675355]
The industry for children's apps is thriving at the cost of children's privacy.
These apps routinely disclose children's data to multiple data trackers and ad networks.
We used a mixed-methods approach to investigate why this is happening and how developers might change their practices.
arXiv Detail & Related papers (2021-11-29T15:27:55Z) - Understanding parents' perceptions of children's cybersecurity awareness
in Norway [3.590867023672793]
We conducted a study with 25 parents living in Norway with children aged between 10 to 15.
Results include a list of cybersecurity awareness needs for children from a parental perspective, a list of learning resources for children, and a list of challenges for parents to ensure cybersecurity at home.
Future research should focus on defining cybersecurity theories and practices that contribute to children's and parents' awareness about cybersecurity risks, needs, and solutions.
arXiv Detail & Related papers (2021-08-05T10:42:49Z) - GPSPiChain-Blockchain based Self-Contained Family Security System in
Smart Home [4.559456155058217]
This paper presents a blockchain based family security system for tracking the location of consenting family members' smart phones.
The locations of the family members' smart phones are logged and stored in a private blockchain which can be accessed through a node installed in the family home on a computer.
The data for the whereabouts of family members stays within the family unit and does not go to any third party.
arXiv Detail & Related papers (2021-02-13T09:06:19Z) - Privacy and Robustness in Federated Learning: Attacks and Defenses [74.62641494122988]
We conduct the first comprehensive survey on this topic.
Through a concise introduction to the concept of FL, and a unique taxonomy covering: 1) threat models; 2) poisoning attacks and defenses against robustness; 3) inference attacks and defenses against privacy, we provide an accessible review of this important topic.
arXiv Detail & Related papers (2020-12-07T12:11:45Z) - More Than Privacy: Applying Differential Privacy in Key Areas of
Artificial Intelligence [62.3133247463974]
We show that differential privacy can do more than just privacy preservation in AI.
It can also be used to improve security, stabilize learning, build fair models, and impose composition in selected areas of AI.
arXiv Detail & Related papers (2020-08-05T03:07:36Z) - Smart Home, security concerns of IoT [91.3755431537592]
The IoT (Internet of Things) has become widely popular in the domestic environments.
People are renewing their homes into smart homes; however, the privacy concerns of owning many Internet connected devices with always-on environmental sensors remain insufficiently addressed.
Default and weak passwords, cheap materials and hardware, and unencrypted communication are identified as the principal threats and vulnerabilities of IoT devices.
arXiv Detail & Related papers (2020-07-06T10:36:11Z) - Secure Byzantine-Robust Machine Learning [61.03711813598128]
We propose a secure two-server protocol that offers both input privacy and Byzantine-robustness.
In addition, this protocol is communication-efficient, fault-tolerant and enjoys local differential privacy.
arXiv Detail & Related papers (2020-06-08T16:55:15Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.