Get Started. It's Free
or sign up with your email address
Privacy by Mind Map: Privacy

1. Leakage

1.1. Causes

1.1.1. HW

1.1.1.1. Mobile sensors leakage

1.1.1.2. Mobile sensors inference

1.1.1.3. Mobile communication protocol

1.1.2. SW

1.1.2.1. The nature of IoT devices(online, time, ...)

1.1.2.2. Data Flow

1.1.2.3. User Attitude towards privacy

1.1.2.4. Malicious Apps

1.1.2.5. Third party apps (Ads)

1.2. Prevention

1.2.1. Anonymity

1.2.1.1. Uses cases

1.2.1.1.1. Datasets

1.2.1.2. Consequence

1.2.1.2.1. Deananymization

1.2.1.2.2. Danger for around people/devices

1.2.1.3. Goals

1.2.1.3.1. Collaborative Filtering

1.2.2. Control

1.2.3. Transparency

1.3. Detection

1.4. Types

1.4.1. Data Flow Analysis

1.4.2. Inter-component communication

1.4.3. Capability Leak

2. Definition

2.1. What

2.2. When

2.3. How

3. Data

3.1. Direct

3.1.1. Location

3.1.2. Device ID

3.1.3. Contacts

3.1.4. Pictures

3.1.5. Video

3.1.6. Audio

3.2. Indirect

3.2.1. Sensors Reading Analysis