Locked smartphone indicates privacy
26.06.2019

Privacy protection begins in one’s own (sub)network

At Conntac, we provide support for Internet access problems so that our clients’ customers can be online at all times. But more important than functioning internet access is the privacy and security of the users. And we take care of that too. For years we have been actively involved in the research and standardisation of Internet technologies and protocols.

Recently, a Request for Comment (RFC – the Internet Protocol Standards) was published describing how internet-enabled devices may be violating the privacy of their users without them being aware of it. The title of the RFC is “Privacy Considerations for Protocols Relying on IP Broadcast or Multicast” (RFC 8386) and was co-authored by Conntac team members.

The problem described by the RFC is that billions of devices use protocols that share information with other devices on the same local area network (LAN), e.g. at home, but also in the office, café, airport or hotel. Often these protocols use information such as the name of the device to make themselves known and this is the crux of the problem and where users come in, as research shows that they often include their own name in the device name. This means that anyone connected to the same Wi-Fi, for example, can easily find out the name of many users. This in itself is suboptimal, but other protocols distribute further information that is harmless in isolation, but now this information can be linked to a person. If someone now adds Google, Facebook, LinkedIn and other sources of information, one can often create a very accurate profile of a user on the same LAN. And it all starts with the name of your own device. A blueprint for digital stalking!

Optimise customer service whitepaper is being read on a tablet.
Whitepaper

Factors influencing speed test results in the home network

In our whitepaper, you can find out why customers are not achieving their contract speed.
Optimise customer service whitepaper is being read on a tablet.

Safe surfing with these tips

This sounds scary at first, especially if you are a user who often uses networks that you don’t completely trust. But the good news is that you can protect yourself as a user relatively easily: you should never give your internet-connected devices a name that includes your own name! For those who want to take action right now, we have created a list of websites that explain how to find out and change the device name for some operating systems.

Keep surfing safely! Your Conntac team.

 

Author Image

Discover more

BLOG

Read the latest industry news and other exciting topics every week!

Lit lightbulb on blue background

Media

Discover our media library: white papers, online talks and more

Graphic media library - woman looking at a tablet.

Career

Start your career at Conntac?

Collage - Conntac team members working

Events

Meet us in person or virtually!

Interactive 3D exhibition stand from Conntac

Related articles

card_image

6G – Opportunities and Challenges

28.02.2024

The introduction of 6G marks a significant step in the evolution...

read more
card_image

Advantages of fibre optics

23.02.2024

The demand for fibre optic connections is gaining momentum in Germany....

read more
card_image

10 tips for better WiFi at home

02.02.2024

In a world that is increasingly characterised by digital networking, reliable...

read more