{"id":6871,"date":"2018-02-28T16:21:00","date_gmt":"2018-02-28T08:21:00","guid":{"rendered":"https:\/\/version-2.com\/?p=6871"},"modified":"2020-06-18T17:53:28","modified_gmt":"2020-06-18T09:53:28","slug":"privacy-by-design-can-you-create-a-safe-smart-home","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2018\/02\/privacy-by-design-can-you-create-a-safe-smart-home\/","title":{"rendered":"Privacy by Design: Can you create a safe smart home?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"6871\" class=\"elementor elementor-6871\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-27bdf1c9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"27bdf1c9\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;7bf10e1&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;],&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-75f30a66\" data-id=\"75f30a66\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-52793d62 elementor-widget elementor-widget-text-editor\" data-id=\"52793d62\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" src=\"\/wp-content\/uploads\/2020\/04\/SmartHome_IoT-623x432-1.jpg\" alt=\"\" width=\"623\" height=\"432\" \/>\n<p>The Internet of Things (<a href=\"https:\/\/www.welivesecurity.com\/tag\/internet-of-things\/\" target=\"_blank\" rel=\"noreferrer noopener\">IoT<\/a>) is, for many, about devices we connect to a network for convenience, such as thermostats, light switches, connected cars and\u00a0<a href=\"https:\/\/www.welivesecurity.com\/2015\/12\/15\/5-things-connected-toys\/\" target=\"_blank\" rel=\"noreferrer noopener\">interactive toys<\/a>\u00a0for our kids.<\/p>\n<p>While the IoT is indeed a marvelous invention, designed to make daily digital life even easier, how safe is it in terms of protecting your privacy?<\/p>\n<p>Alongside an ESET researcher team, I investigated some of the more popular IoT devices on the market today with the aim of creating a basic \u2018smart home\u2019 that mimics the connectable objects likely to be found in a typical household.<\/p>\n<p>Notions of interconnectivity and the \u2018smart home\u2019 are now rarely seen as the main focus of science fiction narrative, but assumed as background. Today, the IoT makes the \u2018smart home\u2019 not only achievable, but in some respects commonplace.<\/p>\n<p>But how plausible is it to create your own \u2018smart home\u2019? Many issues can crop up when trying to create your own interconnected dwelling space. One of the challenges facing even the most basic implementation of a \u2018smart home\u2019 is interoperability between devices provided by different manufacturers to provide a harmonious, unified experience\u2026 or as close as possible!<\/p>\n<p>We purchased a few IoT devices that could be deemed as essential for the creation of a type of starter kit for anyone wanting the convenience of an interconnected experience in their home. We also purchased a virtual personal assistant (a device that takes verbal commands and can control many of the devices purchased; in fact, a \u2018smart home\u2019 may actually start with a device like this and then expand functionally with additional IoT devices).<\/p>\n<p><strong>Privacy concerns<\/strong><\/p>\n<img decoding=\"async\" src=\"\/wp-content\/uploads\/2020\/04\/IoT_illustration_FB_1200x628px_02B-300x157-1.jpg\" alt=\"\" width=\"300\" height=\"157\" \/>\n<p>The main area of concern was constructing a \u2018smart home\u2019 that did not\u00a0<a href=\"https:\/\/www.welivesecurity.com\/2016\/01\/05\/consumers-cautious-iot-device-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">compromise on privacy<\/a>.<\/p>\n<p>In that respect, there was unease that the devices in the home could potentially collect private data. Of course, we understood the need for most devices and services to collect basic personal details. Worryingly, however, we found that companies often used the term \u201cbut not limited to\u201d, meaning they might collect more than what was on the applicable privacy policy.<\/p>\n<p>In total, the team tested twelve products from seven vendors, including one product that we have not included in the final report due to discovery of significant vulnerabilities. As a security company, we value the commitment to responsible disclosure and the collaborative nature of the IT security industry \u2014 therefore, we notified the company in question with specific details of the device\u2019s shortcomings and will not publish these details until the vendor has had time to rectify the issues.<\/p>\n<p>While each device tested led to some privacy issues, it was the role of voice-activated intelligent assistants that raised the most concerns. This is due, among other things, to concerns the fear of oversharing of data by commercial services, insufficient protection of stored personal data, and the possibility of interception of digital traffic by cybercriminals or the mischievous.<\/p>\n<p><strong>Can you create a safe smart home?<\/strong><\/p>\n<p>The answer is\u2026 possibly. No device or software is guaranteed to be secure or immune to potential vulnerabilities. However, a company\u2019s security culture can be judged based on its reaction to vulnerabilities when they are disclosed. Some of the devices tested had vulnerabilities that have been dealt with quickly with new software and firmware. When vulnerabilities are not fixed promptly (or at all), then choosing an otherwise equivalent device would be an appropriate response. But with sound\u00a0<a href=\"https:\/\/www.welivesecurity.com\/2017\/10\/26\/secure-your-router-prevent-iot-threats\/\" target=\"_blank\" rel=\"noreferrer noopener\">judgement and caution<\/a>, it is possible to start a basic \u2018smart home\u2019.<\/p>\n<p><strong>Conclusion<\/strong><\/p>\n<p>At its inception, the goal of this project was to create a basic \u2018smart home\u2019 that mimics something that could end up in typical household. The concern from our research team was \u201cwhat if we don\u2019t find any issues?\u201d Alas, this was not the case, and in fact the conclusion that I have written is different from what we had envisioned at the start.<\/p>\n<p>The potential for home, lifestyle, health and even browsing data collected by internet service providers to be available to a single entity should only be permitted after due consideration for the consequences.<\/p>\n<p>A full list of the tested devices, along with a more technical breakdown of the products, may be found in the white paper:\u00a0<a href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2018\/02\/ESET_MWC2018_IoT_SmartHome.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">IoT and Privacy by Design in the Smart Home<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><strong>About Version 2 Limited<\/strong><\/p>\n<p>Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>About ESET<\/strong><\/p>\n<p>Founded in 1992, ESET is a global provider of security software for enterprises and consumers. ESET\u2019s award-winning, antivirus software system, NOD32, provides real-time protection from known and unknown viruses, spyware, rootkits and other malware. ESET NOD32 offers the smallest, fastest and most advanced protection available, with more Virus Bulletin 100 Awards than any other antivirus product. ESET was named to Deloitte\u2019s Technology Fast 500 five years running, and has an extensive partner network, including corporations like Canon, Dell and Microsoft. ESET has offices in Bratislava, SK; Bristol, U.K.; Buenos Aires, AR; Prague, CZ; San Diego, USA; and is represented worldwide in more than 100 countries.\u00a0<\/p>\n<!-- \/wp:paragraph -->\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>The Internet of Things (IoT) is, for many, about device [&hellip;]<\/p>\n","protected":false},"author":143524195,"featured_media":6873,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[131,40,61,102],"tags":[41,163],"class_list":["post-6871","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-v2","category-eset","category-press-release","category-year2018","tag-eset","tag-163"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Privacy by Design: Can you create a safe smart home? - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/version-2.com\/zh\/2018\/02\/privacy-by-design-can-you-create-a-safe-smart-home\/\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Privacy by Design: Can you create a safe smart home? - Version 2\" \/>\n<meta property=\"og:description\" content=\"The Internet of Things (IoT) is, for many, about device [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/version-2.com\/zh\/2018\/02\/privacy-by-design-can-you-create-a-safe-smart-home\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2018-02-28T08:21:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-06-18T09:53:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/04\/SmartHome_IoT-623x432-1.jpg?fit=623%2C432&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"623\" \/>\n\t<meta property=\"og:image:height\" content=\"432\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"version2hk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"version2hk\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2018\\\/02\\\/privacy-by-design-can-you-create-a-safe-smart-home\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2018\\\/02\\\/privacy-by-design-can-you-create-a-safe-smart-home\\\/\"},\"author\":{\"name\":\"version2hk\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\"},\"headline\":\"Privacy by Design: Can you create a safe smart home?\",\"datePublished\":\"2018-02-28T08:21:00+00:00\",\"dateModified\":\"2020-06-18T09:53:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2018\\\/02\\\/privacy-by-design-can-you-create-a-safe-smart-home\\\/\"},\"wordCount\":920,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2018\\\/02\\\/privacy-by-design-can-you-create-a-safe-smart-home\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/SmartHome_IoT-623x432-1.jpg\",\"keywords\":[\"ESET\",\"2018\"],\"articleSection\":[\"Version 2 Limited\",\"ESET\",\"Press Release\",\"2018\"],\"inLanguage\":\"zh-HK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2018\\\/02\\\/privacy-by-design-can-you-create-a-safe-smart-home\\\/\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2018\\\/02\\\/privacy-by-design-can-you-create-a-safe-smart-home\\\/\",\"name\":\"Privacy by Design: Can you create a safe smart home? - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2018\\\/02\\\/privacy-by-design-can-you-create-a-safe-smart-home\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2018\\\/02\\\/privacy-by-design-can-you-create-a-safe-smart-home\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/SmartHome_IoT-623x432-1.jpg\",\"datePublished\":\"2018-02-28T08:21:00+00:00\",\"dateModified\":\"2020-06-18T09:53:28+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2018\\\/02\\\/privacy-by-design-can-you-create-a-safe-smart-home\\\/#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/version-2.com\\\/zh\\\/2018\\\/02\\\/privacy-by-design-can-you-create-a-safe-smart-home\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2018\\\/02\\\/privacy-by-design-can-you-create-a-safe-smart-home\\\/#primaryimage\",\"url\":\"https:\\\/\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/SmartHome_IoT-623x432-1.jpg\",\"contentUrl\":\"https:\\\/\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/SmartHome_IoT-623x432-1.jpg\",\"width\":623,\"height\":432},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2018\\\/02\\\/privacy-by-design-can-you-create-a-safe-smart-home\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Privacy by Design: Can you create a safe smart home?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\",\"name\":\"version2hk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"caption\":\"version2hk\"},\"sameAs\":[\"http:\\\/\\\/version2xfortcom.wordpress.com\"],\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/version2hk\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Privacy by Design: Can you create a safe smart home? - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/version-2.com\/zh\/2018\/02\/privacy-by-design-can-you-create-a-safe-smart-home\/","og_locale":"zh_HK","og_type":"article","og_title":"Privacy by Design: Can you create a safe smart home? - Version 2","og_description":"The Internet of Things (IoT) is, for many, about device [&hellip;]","og_url":"https:\/\/version-2.com\/zh\/2018\/02\/privacy-by-design-can-you-create-a-safe-smart-home\/","og_site_name":"Version 2","article_published_time":"2018-02-28T08:21:00+00:00","article_modified_time":"2020-06-18T09:53:28+00:00","og_image":[{"width":623,"height":432,"url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/04\/SmartHome_IoT-623x432-1.jpg?fit=623%2C432&ssl=1","type":"image\/jpeg"}],"author":"version2hk","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"version2hk","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"5 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/version-2.com\/zh\/2018\/02\/privacy-by-design-can-you-create-a-safe-smart-home\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/2018\/02\/privacy-by-design-can-you-create-a-safe-smart-home\/"},"author":{"name":"version2hk","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db"},"headline":"Privacy by Design: Can you create a safe smart home?","datePublished":"2018-02-28T08:21:00+00:00","dateModified":"2020-06-18T09:53:28+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/zh\/2018\/02\/privacy-by-design-can-you-create-a-safe-smart-home\/"},"wordCount":920,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/version-2.com\/zh\/2018\/02\/privacy-by-design-can-you-create-a-safe-smart-home\/#primaryimage"},"thumbnailUrl":"https:\/\/version-2.com\/wp-content\/uploads\/2020\/04\/SmartHome_IoT-623x432-1.jpg","keywords":["ESET","2018"],"articleSection":["Version 2 Limited","ESET","Press Release","2018"],"inLanguage":"zh-HK"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/zh\/2018\/02\/privacy-by-design-can-you-create-a-safe-smart-home\/","url":"https:\/\/version-2.com\/zh\/2018\/02\/privacy-by-design-can-you-create-a-safe-smart-home\/","name":"Privacy by Design: Can you create a safe smart home? - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/version-2.com\/zh\/2018\/02\/privacy-by-design-can-you-create-a-safe-smart-home\/#primaryimage"},"image":{"@id":"https:\/\/version-2.com\/zh\/2018\/02\/privacy-by-design-can-you-create-a-safe-smart-home\/#primaryimage"},"thumbnailUrl":"https:\/\/version-2.com\/wp-content\/uploads\/2020\/04\/SmartHome_IoT-623x432-1.jpg","datePublished":"2018-02-28T08:21:00+00:00","dateModified":"2020-06-18T09:53:28+00:00","breadcrumb":{"@id":"https:\/\/version-2.com\/zh\/2018\/02\/privacy-by-design-can-you-create-a-safe-smart-home\/#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/version-2.com\/zh\/2018\/02\/privacy-by-design-can-you-create-a-safe-smart-home\/"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/2018\/02\/privacy-by-design-can-you-create-a-safe-smart-home\/#primaryimage","url":"https:\/\/version-2.com\/wp-content\/uploads\/2020\/04\/SmartHome_IoT-623x432-1.jpg","contentUrl":"https:\/\/version-2.com\/wp-content\/uploads\/2020\/04\/SmartHome_IoT-623x432-1.jpg","width":623,"height":432},{"@type":"BreadcrumbList","@id":"https:\/\/version-2.com\/zh\/2018\/02\/privacy-by-design-can-you-create-a-safe-smart-home\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/zh\/"},{"@type":"ListItem","position":2,"name":"Privacy by Design: Can you create a safe smart home?"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db","name":"version2hk","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","caption":"version2hk"},"sameAs":["http:\/\/version2xfortcom.wordpress.com"],"url":"https:\/\/version-2.com\/zh\/author\/version2hk\/"}]}},"jetpack_featured_media_url":"https:\/\/version-2.com\/wp-content\/uploads\/2020\/04\/SmartHome_IoT-623x432-1.jpg","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-1MP","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/6871","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/143524195"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=6871"}],"version-history":[{"count":5,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/6871\/revisions"}],"predecessor-version":[{"id":15535,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/6871\/revisions\/15535"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media\/6873"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=6871"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=6871"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=6871"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}