Your health data is one of most important pieces of a data that is personal and confidential to you. Through the advent of sensor innovations we are finding many more devices gathering this data such as your fitness bands, smartwatch, even phone counting your steps automatically without you having to do anything. This is only the beginning we are starting to see innovations in medical and wellness monitoring from all sorts of devices such as toothbrushes which can detect cancer, to patches you wear that monitor UV exposure or hydration. Innovations in microfluidic technologies are enabling analysis of your blood, sweat, and urine at price points where it can reach consumers hands in both developed and developing countries.
This data, if used correctly, will keep us more informed of what’s happening inside and outside our bodies and give us alert with the right information at the right time to make informed decisions. Taking it one step further, mobile and cloud platforms can enable a holistic system of health to inform close trusted family/friend circle about changes in health to help individuals make the right lifestyle choices. It will also help caregivers know the right time to intervene, potentially staving off a more severe condition.
Unfortunately, as with any technological innovation, it can also have potential malicious uses resulting in substantial financial and social consequences:
Insurance providers could use the data to increase premiums or cancel policies
Informed employers may choose healthier candidates (to keep costs down)
Dating applications could add medical filters
But how is the data being handled from when it gets created at the source? Is it being guarded all the way from the sensor to the phone, to the cloud? What happens to your data in the cloud? Is it shared with 3rd parties? Have you read to read the Terms and Conditions for each of your digital devices to understand the answers to these questions? In this blog, we will aim to address some of the basic vulnerabilities of data as it travels from sensor -> phone -> cloud and explore a method to safeguard it as well as talk about some the initiatives taking place to help safeguard our health data.
Threats and Hacks
There are two threat vectors that we will address in this video:
Screen Scrape Attacks
Screen scrape attacks leverage the ability to “record” the frame buffer of the screen of a device to steal the data as an app renders to the screen. This technique has been used to steal everything from passwords to high value video content. The video below demonstrates this threat: