{"id":71213,"date":"2020-11-16T12:33:46","date_gmt":"2020-11-16T11:33:46","guid":{"rendered":"https:\/\/www.hiig.de\/?p=71213"},"modified":"2021-10-22T18:33:07","modified_gmt":"2021-10-22T16:33:07","slug":"progress-through-surveillance-technology","status":"publish","type":"post","link":"https:\/\/www.hiig.de\/en\/progress-through-surveillance-technology\/","title":{"rendered":"Progress through (surveillance-) technology?"},"content":{"rendered":"\n<h4 class=\"wp-block-heading\">What your car knows about you and what it should better keep to itself<\/h4>\n\n\n\n<p><i><span style=\"font-weight: 400;\">Mileage status, tire pressure, driving behavior \u2013 nowadays, modern cars already collect these and many other data via built-in sensors and computers. With the help of this information, a complete profile of the driver can be created, but there is still little transparency and awareness of the issue. What happens if hackers access this data, and how far could they go?<\/span><\/i><\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p>In der <a href=\"https:\/\/anchor.fm\/softwarekatastrophen\/episodes\/Wie-die-Software-dem-Piloten-zum-Verhngnis-wurde-ejnvn3\">Podcastfolge \u201eVorsprung durch (\u00dcberwachungs-)Technik?\u201c<\/a> werden die Themen Datenspeicherung und -sicherheit in modernen Autos angesprochen. Viele Menschen sind diesem Thema gegen\u00fcber sehr skeptisch, da bereits in vielen Bereichen des t\u00e4glichen Lebens eine gro\u00dfe Menge Daten gesammelt werden \u2013 z. B. im Internet, beim Arzt oder bei der Bank. Die DSGVO hat die Diskussionen um die Themen Datenschutz und \u00dcberwachung weiter versch\u00e4rft. Fehlende Transparenz in Bezug auf die Datensammlung und -weitergabe f\u00fchrt zu Unwissenheit und Unsicherheit in der Gesellschaft.&nbsp;<\/p>\n\n\n\n<p>Auf den ersten Blick m\u00f6gen technische Assistenzsysteme im Auto, die auf dem Speichern unz\u00e4hliger Daten beruhen, viele praktische Vorteile bieten. Doch was, wenn diese in die falschen H\u00e4nde geraten? Hacker*innen k\u00f6nnen theoretisch von au\u00dfen auf die Bremsen des Autos zugreifen, doch wie gro\u00df ist die Gefahr, dass dies in der Praxis geschieht? Die Experten Florian Sommer und Robin Bolz vom Institut f\u00fcr energieeffiziente Mobilit\u00e4t der Hochschule Karlsruhe sind der Meinung, dass dies h\u00f6chst unwahrscheinlich ist. Doch allein schon die Tatsache, dass es funktioniert, verbreitet Sorgen in der Bev\u00f6lkerung.&nbsp;<\/p>\n\n\n\n<p>Die beiden kl\u00e4ren in der Folge auf, welche Daten \u00fcberhaupt im Auto gespeichert werden und wer Zugriff darauf hat. Scheinbar ist nicht das Speichern an sich kritisch zu bewerten, sondern die m\u00f6gliche Zweckentfremdung der Daten. Abschlie\u00dfend steht im Podcast folgende Frage im Mittelpunkt: Sind wir nicht schon l\u00e4ngst gl\u00e4serne Autofahrer?<\/p>\n\n\n\n<p><em>Die Podcastfolge ist im Rahmen des Seminars \u201eSoftwarekatastrophen\u201c am Karlsruher Institut f\u00fcr Technologie entstanden und somit Bestandteil der Podcastreihe <\/em><a href=\"https:\/\/open.spotify.com\/show\/1YjeGM3d42iQZCfOw0yTkY\"><em>\u201eSoftwarekatastrophen \u2013&nbsp; wie konnte das nur passieren?\u201c<\/em><\/a><\/p>\n\n\n\n<p><strong>Die Interviewpartner:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Daniel B\u00f6sch, Informatikstudent am Karlsruher Institut f\u00fcr Technologie<\/li><li><a href=\"https:\/\/www.hs-karlsruhe.de\/hochschule\/personen-a-z\/user\/florian-sommer\">Florian Sommer<\/a> und <a href=\"https:\/\/www.hs-karlsruhe.de\/hochschule\/personen-a-z\/user\/robin-bolz\">Robin Bolz<\/a>, wissenschaftliche Mitarbeiter am Institut f\u00fcr energieeffiziente Mobilit\u00e4t der Hochschule Karlsruhe Technik und Wirtschaft<\/li><\/ul>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p><strong>Informationen zum Nachlesen:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Die zitierten Schlagzeilen aus dem <a href=\"https:\/\/www.stern.de\/auto\/service\/datenerfassung-im-auto--spione-an-bord-3460754.html\">STERN<\/a>, der <a href=\"https:\/\/www.sueddeutsche.de\/auto\/datenspeicherung-im-auto-sammelwut-ermoeglicht-fernzugriff-1.1840348\">S\u00fcddeutschen Zeitung<\/a>, der <a href=\"https:\/\/www.pcwelt.de\/news\/Datenkrake_Auto_dient_als_Beweismittel_gegen_den_Fahrer-Datenunsicherheit_auf_vier_Raedern-8804783.html\">PC-WELT<\/a> und der <a href=\"https:\/\/www.wiwo.de\/technologie\/mobilitaet\/hackerangriffe-auf-autos-cyberattacken-auf-autos-sind-eine-gefahr-fuer-leib-und-leben\/20471034-2.html\">WirtschaftsWoche<\/a><\/li><li>Die Studie von D. Frassinelli\/S. Park\/S. N\u00fcrnberger: <a href=\"https:\/\/www.computer.org\/csdl\/proceedings-article\/sp\/2020\/349700b184\/1j2LgepkJj2\">Automated Reverse Engineering and Privacy Analysis of Modern Cars<\/a><\/li><li>Eine<a href=\"https:\/\/www.adac.de\/rund-ums-fahrzeug\/ausstattung-technik-zubehoer\/assistenzsysteme\/daten-modernes-auto\/\"> Studie vom ADAC<\/a> zu konkreten Fahrzeugmodellen (Mercedes B-Klasse W246, 2011-2018 und Renault Zoe 2012)<\/li><li><a href=\"https:\/\/www.focus.de\/digital\/dldaily\/sicherheit-auf-der-strasse-sicherheitsexperte-hackt-eigenes-auto-es-war-eine-wirklich-verstoerende-erfahrung_id_10434312.html\">Einblick in die Arbeit eines IT-Sicherheitsexperten<\/a><\/li><li>Projektbeschreibung von <a href=\"https:\/\/www.hs-karlsruhe.de\/ieem\/forschungsprojekte\/secforcars\/\">\u201eSecForCARs\u201c<\/a> (Security For Connected, Autonomous caRs)<\/li><\/ul>\n<div class=\"shariff shariff-align-flex-start shariff-widget-align-flex-start\"><ul class=\"shariff-buttons theme-round orientation-horizontal buttonsize-medium\"><li class=\"shariff-button linkedin shariff-nocustomcolor\" style=\"background-color:#1488bf\"><a href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fwww.hiig.de%2Fen%2Fprogress-through-surveillance-technology%2F\" title=\"Share on LinkedIn\" aria-label=\"Share on LinkedIn\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#0077b5; color:#fff\" target=\"_blank\"><span class=\"shariff-icon\" style=\"\"><svg width=\"32px\" height=\"20px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 27 32\"><path fill=\"#0077b5\" d=\"M6.2 11.2v17.7h-5.9v-17.7h5.9zM6.6 5.7q0 1.3-0.9 2.2t-2.4 0.9h0q-1.5 0-2.4-0.9t-0.9-2.2 0.9-2.2 2.4-0.9 2.4 0.9 0.9 2.2zM27.4 18.7v10.1h-5.9v-9.5q0-1.9-0.7-2.9t-2.3-1.1q-1.1 0-1.9 0.6t-1.2 1.5q-0.2 0.5-0.2 1.4v9.9h-5.9q0-7.1 0-11.6t0-5.3l0-0.9h5.9v2.6h0q0.4-0.6 0.7-1t1-0.9 1.6-0.8 2-0.3q3 0 4.9 2t1.9 6z\"\/><\/svg><\/span><\/a><\/li><li class=\"shariff-button bluesky shariff-nocustomcolor\" style=\"background-color:#84c4ff\"><a href=\"https:\/\/bsky.app\/intent\/compose?text=Progress%20through%20%28surveillance-%29%20technology%3F https%3A%2F%2Fwww.hiig.de%2Fen%2Fprogress-through-surveillance-technology%2F  via @hiigberlin.bsky.social\" title=\"Share on Bluesky\" aria-label=\"Share on Bluesky\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#0085ff; color:#fff\" target=\"_blank\"><span class=\"shariff-icon\" style=\"\"><svg width=\"20\" height=\"20\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 20 20\"><path class=\"st0\" d=\"M4.89,3.12c2.07,1.55,4.3,4.71,5.11,6.4.82-1.69,3.04-4.84,5.11-6.4,1.49-1.12,3.91-1.99,3.91.77,0,.55-.32,4.63-.5,5.3-.64,2.3-2.99,2.89-5.08,2.54,3.65.62,4.58,2.68,2.57,4.74-3.81,3.91-5.48-.98-5.9-2.23-.08-.23-.11-.34-.12-.25,0-.09-.04.02-.12.25-.43,1.25-2.09,6.14-5.9,2.23-2.01-2.06-1.08-4.12,2.57-4.74-2.09.36-4.44-.23-5.08-2.54-.19-.66-.5-4.74-.5-5.3,0-2.76,2.42-1.89,3.91-.77h0Z\"\/><\/svg><\/span><\/a><\/li><li class=\"shariff-button mailto shariff-nocustomcolor\" style=\"background-color:#a8a8a8\"><a href=\"mailto:?body=https%3A%2F%2Fwww.hiig.de%2Fen%2Fprogress-through-surveillance-technology%2F&subject=Progress%20through%20%28surveillance-%29%20technology%3F\" title=\"Send by email\" aria-label=\"Send by email\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#999; color:#fff\"><span class=\"shariff-icon\" style=\"\"><svg width=\"32px\" height=\"20px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 32 32\"><path fill=\"#999\" d=\"M32 12.7v14.2q0 1.2-0.8 2t-2 0.9h-26.3q-1.2 0-2-0.9t-0.8-2v-14.2q0.8 0.9 1.8 1.6 6.5 4.4 8.9 6.1 1 0.8 1.6 1.2t1.7 0.9 2 0.4h0.1q0.9 0 2-0.4t1.7-0.9 1.6-1.2q3-2.2 8.9-6.1 1-0.7 1.8-1.6zM32 7.4q0 1.4-0.9 2.7t-2.2 2.2q-6.7 4.7-8.4 5.8-0.2 0.1-0.7 0.5t-1 0.7-0.9 0.6-1.1 0.5-0.9 0.2h-0.1q-0.4 0-0.9-0.2t-1.1-0.5-0.9-0.6-1-0.7-0.7-0.5q-1.6-1.1-4.7-3.2t-3.6-2.6q-1.1-0.7-2.1-2t-1-2.5q0-1.4 0.7-2.3t2.1-0.9h26.3q1.2 0 2 0.8t0.9 2z\"\/><\/svg><\/span><\/a><\/li><\/ul><\/div>","protected":false},"excerpt":{"rendered":"<p>Mileage status, tire pressure, driving behavior \u2013 nowadays, modern cars already collect these and many other data via built-in sensors and computers. With the help of this information, a complete profile of the driver can be created, but there is still little transparency and awareness of the issue. What happens if hackers access this data, and how far could they go?<\/p>\n","protected":false},"author":209,"featured_media":71212,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[],"tags":[1045,1171,1049,1172,1111],"class_list":["post-71213","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","tag-datenschutz-2","tag-diskrimierung-2","tag-privatsphare","tag-recht-2","tag-uberwachung"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Progress through (surveillance-) technology? &#8211; Digital Society Blog<\/title>\n<meta name=\"description\" content=\"With the help of this information, a complete profile of the driver can be created, but there is still little transparency and awareness of the issue. What happens if hackers access this data, and how far could they go?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hiig.de\/vorsprung-durch-ueberwachungs-technik\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Progress through (surveillance-) technology? &#8211; Digital Society Blog\" \/>\n<meta property=\"og:description\" content=\"With the help of this information, a complete profile of the driver can be created, but there is still little transparency and awareness of the issue. What happens if hackers access this data, and how far could they go?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hiig.de\/vorsprung-durch-ueberwachungs-technik\/\" \/>\n<meta property=\"og:site_name\" content=\"HIIG\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-16T11:33:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-10-22T16:33:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2020\/10\/thisisengineering-raeng-GckgQqyHoa4-unsplash-1200x673.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"673\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Nadine Lahn\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Nadine Lahn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Progress through (surveillance-) technology? &#8211; Digital Society Blog","description":"With the help of this information, a complete profile of the driver can be created, but there is still little transparency and awareness of the issue. What happens if hackers access this data, and how far could they go?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hiig.de\/vorsprung-durch-ueberwachungs-technik\/","og_locale":"en_US","og_type":"article","og_title":"Progress through (surveillance-) technology? &#8211; Digital Society Blog","og_description":"With the help of this information, a complete profile of the driver can be created, but there is still little transparency and awareness of the issue. What happens if hackers access this data, and how far could they go?","og_url":"https:\/\/www.hiig.de\/vorsprung-durch-ueberwachungs-technik\/","og_site_name":"HIIG","article_published_time":"2020-11-16T11:33:46+00:00","article_modified_time":"2021-10-22T16:33:07+00:00","og_image":[{"width":1200,"height":673,"url":"https:\/\/www.hiig.de\/wp-content\/uploads\/2020\/10\/thisisengineering-raeng-GckgQqyHoa4-unsplash-1200x673.jpg","type":"image\/jpeg"}],"author":"Nadine Lahn","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Nadine Lahn","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.hiig.de\/vorsprung-durch-ueberwachungs-technik\/#article","isPartOf":{"@id":"https:\/\/www.hiig.de\/vorsprung-durch-ueberwachungs-technik\/"},"author":{"name":"Nadine Lahn","@id":"https:\/\/www.hiig.de\/#\/schema\/person\/408823b8ef9e98cd0ac7fc6adcfa7826"},"headline":"Progress through (surveillance-) technology?","datePublished":"2020-11-16T11:33:46+00:00","dateModified":"2021-10-22T16:33:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.hiig.de\/vorsprung-durch-ueberwachungs-technik\/"},"wordCount":441,"publisher":{"@id":"https:\/\/www.hiig.de\/#organization"},"image":{"@id":"https:\/\/www.hiig.de\/vorsprung-durch-ueberwachungs-technik\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2020\/10\/thisisengineering-raeng-GckgQqyHoa4-unsplash.jpg","keywords":["datenschutz","Diskrimierung","privatsph\u00e4re","Recht","\u00fcberwachung"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.hiig.de\/vorsprung-durch-ueberwachungs-technik\/","url":"https:\/\/www.hiig.de\/vorsprung-durch-ueberwachungs-technik\/","name":"Progress through (surveillance-) technology? &#8211; Digital Society Blog","isPartOf":{"@id":"https:\/\/www.hiig.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.hiig.de\/vorsprung-durch-ueberwachungs-technik\/#primaryimage"},"image":{"@id":"https:\/\/www.hiig.de\/vorsprung-durch-ueberwachungs-technik\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2020\/10\/thisisengineering-raeng-GckgQqyHoa4-unsplash.jpg","datePublished":"2020-11-16T11:33:46+00:00","dateModified":"2021-10-22T16:33:07+00:00","description":"With the help of this information, a complete profile of the driver can be created, but there is still little transparency and awareness of the issue. What happens if hackers access this data, and how far could they go?","breadcrumb":{"@id":"https:\/\/www.hiig.de\/vorsprung-durch-ueberwachungs-technik\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hiig.de\/vorsprung-durch-ueberwachungs-technik\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hiig.de\/vorsprung-durch-ueberwachungs-technik\/#primaryimage","url":"https:\/\/www.hiig.de\/wp-content\/uploads\/2020\/10\/thisisengineering-raeng-GckgQqyHoa4-unsplash.jpg","contentUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2020\/10\/thisisengineering-raeng-GckgQqyHoa4-unsplash.jpg","width":2560,"height":1435},{"@type":"BreadcrumbList","@id":"https:\/\/www.hiig.de\/vorsprung-durch-ueberwachungs-technik\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.hiig.de\/en\/"},{"@type":"ListItem","position":2,"name":"Progress through (surveillance-) technology?"}]},{"@type":"WebSite","@id":"https:\/\/www.hiig.de\/#website","url":"https:\/\/www.hiig.de\/","name":"HIIG","description":"Alexander von Humboldt Institute for Internet and Society","publisher":{"@id":"https:\/\/www.hiig.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hiig.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.hiig.de\/#organization","name":"HIIG","url":"https:\/\/www.hiig.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hiig.de\/#\/schema\/logo\/image\/","url":"https:\/\/www.hiig.de\/wp-content\/uploads\/2019\/06\/hiig.png","contentUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2019\/06\/hiig.png","width":320,"height":80,"caption":"HIIG"},"image":{"@id":"https:\/\/www.hiig.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.hiig.de\/#\/schema\/person\/408823b8ef9e98cd0ac7fc6adcfa7826","name":"Nadine Lahn"}]}},"_links":{"self":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts\/71213","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/comments?post=71213"}],"version-history":[{"count":5,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts\/71213\/revisions"}],"predecessor-version":[{"id":74523,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts\/71213\/revisions\/74523"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/media\/71212"}],"wp:attachment":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/media?parent=71213"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/categories?post=71213"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/tags?post=71213"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}