tv Shift Deutsche Welle May 29, 2021 8:15am-8:31am CEST
8:15 am
tomorrow is really the stuff that drains, supporters and ports are ready for the champions league final and as the latest sunday w news, i'll have another update for you at the top of the hour. but in the meantime, don't forget, you can get lots more news and information on our website. just go to the w dot com up next is shit, living in the digital age. thanks for watching the news . in the climate change the africa what's where the people here what ideas do they have for their future?
8:16 am
d, w dot com, african megacity. the thing that you can click and enter the w crime fighters are back africa. most successful radio drama theories continue to spend all episodes are available online. course you can share and discuss on the w africa, facebook page, and other social media platforms. and fighters tune in now. me ah, ship special smart home. how risky or intelligent how's it? me who has a mind of its own expert cultural high diary configured its 300 smart programs from south and his family, artificial intelligence, the basement. this has always knows what the height is. how much southern germany looks normal looks can be deceiving. in the morning regina,
8:17 am
welcome home. please be quiet area if nice camera recognizes faces clear to enter the home and opens the door off. if not, it's your computer. where is papa? i was at work but left at 4 55 pm. given the current traffic, like maybe home at 6 50 pm when the hydro is wanted to know whether they should buy new diapers for their daughter radia, they just ask and we need diapers. according to my calculations already has around $3594.00 plus diapers left. i would order more on monday, but inside 5, should i order these now? yes, please. okay, i'll search for the best price and order them likely arrive tomorrow. when the family watches tv smart sensor is dark and the room,
8:18 am
john blaine stone house can neck the smart home noticed that after 6 or 7 times the new one of the ones that this way hold on. i english for the sea and i was so the, every time we turn on the tv and there is too much sunlight, it lowers the plaintiff upon the blind slats, adjust according to the angle of the sun and the tv with contra daddy. booking. the system uses sensors, microphones and cameras, registers everything the found, the shopping sharing cooking and cabin 50 devices are connected, including the tv of an teaching system license line. they communicate with one another and 20 online services such as amazon or google, or use a model homes command center, so to speak, the homeless. this is the heart of the whole thing. a small computer which consumes relatively little power. it operates the i of runs a lot of software hobby. the fighter is my son reckless help like this is firstly
8:19 am
hoping management. secondly, i mainly do for energy efficiency. systems have so much power and reduces the ecological footprint and the one i should be covering my investments as the 15 to 20 years with what is the outside? the res flowerbeds are also watch it. according to weather data recommendations, the law more functions in a similar way. even when the family barbecues on the terrace, the stakes already burned up a t. my vision in a few years, the house will new when i'm hungry was i want to have an order in the delivery service madison systematically. i will do nothing when i open the door except for food. but how much are maintenance and data storage is too much, even if it's 100000000 with much concerned, but don't share the nature of their home estate and getting smarter all the time.
8:20 am
a smart home can make life more comfortable an optimized process. but it can also pose a security risk by t experts at this university show us how simple it is to hack software for a typical home security cameras. i can explain why fi at the university of applied sciences. i'm the near northern germany. i was event at the research assistant, specialize in cyber security. he's going to hack into the camera crunches. that's looking good with. yes, i'm in. there we are to the was course. okay. why did i security vulnerability? because the cameras default settings allowed to be accessed via the internet, the i t specialist was able to hack his way in within minutes, using a program he wrote himself what's terrifying, it's not just how fast he didn't pull him aside. the invasion of privacy,
8:21 am
the camera opened the gateway into the whole network. meaning hackers could spy on every connected device. it applies not only to this camera but essentially to any number of cameras if i you, because the firmware on it are the operating system is use not just for this one, but also by many other camera makers. some of our that's the actual problems that i get your problem. the chink in the armor is functional. as it means the devices are compatible, goes the best as manufacturers to sacrifice security aspects and pay to little attention to firmware settings. the problem is that the problem is that many manufacturers don't need to know there's a problem because they just purchased the firmware. so they probably don't know their way around it or how to secure it. plus there's a cost factor. 20 you a camera isn't going to have a whole lot of security built in to interesting. this app control door lock made by
8:22 am
a leading german friend. the students expected it to be more secure, but they nonetheless managed to hack into its wireless technology. the phone that communicates with a base station that inter and transmit signals to the door lock. hackers could interfere with the base station and bombarded effectively, putting it out of action, which would leave the door unlocked. professor patrick faker has worked for jim needs intelligence. he says, you don't need to be a secret agent or an expert to carry out such attacks that are incredibly easy. it is one thing that you can find you've been in many of the tools we should be. you can long she's even if you haven't got a clue what you're doing twice as much uses the police therefore emphasize prevention and advise people to properly inform themselves about security risk. so that smart has technology doesn't open the door to intruders. the latest,
8:23 am
like if someone has surveillance cameras, they could observe them at home and everybody in the halls of, on the they could watch when people come and go up and go. and more or less compile a profile of their daily routines. a fucking students at the university of applied sciences and, and later on, germany's northeast coast use exercises like these to prepare themselves for careers and cybersecurity making product, the better and more secure, which are more and above all, but educating students. so the companies where they end up working become sensitized for these things and make sure they don't happen. the university inform the manufacturer about the vulnerabilities found in the devices, the students hacked. a few months later, the files were fixed and the sensors and you devices and we attend to the breaches we showed you again. and they no longer work, miss shamburger,
8:24 am
it seems this is the only way you can reach some of the manufacturers and get them to take action. the i teach him to remain ever on the alert, searching for and exposing new sombre vanities me. so what can we do to improve the security of protect our privacy? 3 young researchers looked at digital watch talk as part of their masters degree, which uses machine learning to recognize reports and ward off cyber attack me. this little device to make why fi network safer? it was designed by a student starting from israel in germany. it is, the idea was born by the fact that we're surrounded every day by problematic, smart home devices, like cameras and vacuum cleaners, hope things that have a microphone or a camera and process. personal information are strikingly vulnerable to hackers.
8:25 am
i'm interested after 3 semesters, the study the team developed its 1st prototype, which people can hook up to their rotors at home to help in recall the watchdog. nothing's because it's a device that watches over and protect all the devices in your house when the actual and informs you. think something's wrong. when it was this, the internet of things is becoming part of our everyday lives. the number of intelligent advice from households is rising and we are always online. all these devices rely on our homes, private router. so that's precisely where bit why has the place to watch dog. if there's an attack on the smart home, the user receives the notification on their smartphones and can and the unauthorized access at the touch of a button. the my watch dog is to watch movies in otherwise it learns how these devices normally functions and
8:26 am
machine with the help of machine learning and then determines whether device is operating normally or poorly hired dish, no model or when a threat occurs. and it can look at all kinds of our lucky and i'm with private households. why are i and that's trail application. i never received half a 1000000 euros and funding from japanese ministry of education and research. they develop, watched on here at the tech center for information security. and it was professor and taylor who taught them how to turn in idea and to market ready products. and they said that the end of each semester, students present their project in its current form to a jury, a bit like on dragons. then they have to keep defending their idea time and again and explain how it will make money over the course of a year. and a half, so 3 semesters, it grows more polished before it starts off. it's just a little technical idea. well then it becomes
8:27 am
a prototype which is perfected more and more into at the end of these one and a half years, they actually have something that can be shown to potential investors who can back the start up of the seed. and a lot of them are vital understood. this master's degree program is the only one of its kind in germany test. i see that it's important to turn research into practice . and therefore in research, you can either build a fantastic engine that you keep somewhere to admire or you can put it in a car to drive on the street. and we want to drive to help them turn their ideas into successful products. students and the entrepreneurial cybersecurity master's degree program. i taught to think like start up founders and half of their time attending classes on id and security. the rest of the time as opposed to learning about product development and how to found a business in the program. if attracting more and more students use me,
8:28 am
we darted off with 70 or 80 applicants. now we have over $120.00. they come from the saw land and everywhere in germany, from europe or north america, down to america, india, and pakistan from all over the world. and also considered little i wanted their just to watch, talk to be user friendly as possible. so they made a controllable bias. smartphone didn't need to 1st sit down with the data and turn on your computer. today, people always have their smartphones. so when something happens, when you get a notification on your phone and during the current test page, early users get to try out the prototype for the watch. talk to come out onto the market. alexander, think home on tabatchnik of my life and their team 1st need to find financial backers who buy into their idea. ah,
8:29 am
i tried to reach out to with 700 ac. no, just the fees for the number of the legend. 80 marashi behind the wheel. he customize isn't the trade in cars in his garage because sometimes he might have something can be quite wonderful. red w ah, i can carry effect climate change. i mean, why? why people are thanks in the rain forest, continued the dioxide emissions have risen again. the young people almost of the
8:30 am
29 Views
Uploaded by TV Archive on