Security and privacy: Is one without the other possible?

Issue 3 2025 IoT & Automation, Industrial (Industry)

The contrasting urgency and importance of security and privacy in the consumer and industrial world can be shown in the simple example of an automobile with advanced assisted driving capabilities. Inadequate protection for user privacy could mean that an unauthorised third party could snoop on a log of the car's journeys as the data is in transit between the vehicle and, for example, the driver’s insurer. This might feel intrusive, but usually it will have no important consequences for the driver.

Inadequate security protection, on the other hand, could allow a malicious actor to take over or corrupt the vehicle’s driver assistance system, compromising the driver’s ability to maintain safe operation. The conclusion seems cut-and-dried: privacy protection is a nice-to-have, but security protection is a must-have.

Except this is not really true, for at least two reasons.

First, just because an instance of a breach of privacy might not have important safety consequences does not mean it is not harmful. If a consumer, when buying a car, does not have a clear and explicit understanding that personal data, such as the routes and times of their journeys, their driving style and so on, risk falling into the wrong hands, then the car maker should be under a duty to keep them private. The same should go for any other connected device. After all, no one likes the feeling that they are being spied on.

Secondly, a breach of privacy in settings other than a consumer’s car can have extremely serious consequences. This is even truer for industrial or commercial systems than for consumer products. For example, the control system of an energy generation plant could send data about its spare generation capacity over the energy company’s network. This private information could be commercially valuable to competitors. Malicious actors could even use it to time a cyberattack on a nation’s power grid to cause maximum harm or inconvenience.

The value of data sanitation

So, OEMs have at least a moral duty to protect privacy as much as security. In fact, the basic principles of data privacy are straightforward. If security protection is about keeping people out of an embedded device, privacy protection safeguards the data inside the device. This means:

• Collecting and storing no more data than is necessary for the device to perform its functions.

• Anonymising the data collected or stored.

• Encrypting data at rest and before transmission.

This can be thought of as data sanitation: cleaning up data stores and eliminating the accumulation of ‘waste’, or unnecessary data, to reduce the size of the attack surface open to malicious actors.

Privacy protection built into the FoundriesFactory platform

OEMs could be forgiven for feeling weary about the concept of privacy. After all, is it not just one more thing to implement, besides security, which is already a big enough task?

Privacy protection features add surprisingly little overhead for users of the FoundriesFactory platform, who already benefit from a set of features that support security best practices and the latest regulations, such as the European Union’s Cyber Resilience Act. Secure boot, CVE readiness, security-focused over-the-air updates, and more are integral parts of the FoundriesFactory development and device management flow.

Activating specific privacy features in the platform alongside the security-focused features is straightforward. For example, the Linux microPlatform (LmP) operating system, which underpins the FoundriesFactory platform, can be configured to implement memory randomisation in the Linux kernel.

If a hostile actor were to breach a device’s security protection, the easiest way to inspect the data on the device would be to study the processor’s memory. The LmP uses features in the Linux kernel to break up sequences of data stored in this memory into chunks, and then to randomise the locations in which the chunks are stored, making it difficult for a third party to recombine the data into their original sequence.

Other features supported in the FoundriesFactory system provide additional privacy protections: customer support engineers can provide comprehensive information to customers and training on how to take advantage of it.

So, the takeaway for customers is that if security is important, so is privacy, and tools that support privacy protection are present in the same FoundriesFactory platform that enables management of embedded device security.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Know where your asset is - not was
IoT & Automation Asset Management
To properly prevent loss of movable assets, companies need an early warning system, traceability throughout the chain of custody, and intelligence on parameters such as temperature, humidity, and impact.

Read more...
Layered security for complex spaces
Integrated Solutions Industrial (Industry) Commercial (Industry)
The positive impact of loss prevention and risk management on the bottom line is far more than just a number; it means that assets are physically secure, insurance premiums remain low, and people are protected.

Read more...
Why DIY IoT does not scale
IoT & Automation Transport (Industry) Logistics (Industry)
From fleet management to inventory management, and security monitoring to equipment maintenance, the Internet of Things (IoT) has become an integral part of business operations in almost every sector today.

Read more...
Combining TETRA or DMR with 5G broadband
Infrastructure IoT & Automation
As enterprises face rising complexity and connectivity demands, hybrid networks offer a transformative path, combining the proven reliability of TETRA or DMR with the innovation and coverage of 5G broadband.

Read more...
IoT-driven smart data to stay ahead
IoT & Automation Infrastructure AI & Data Analytics
In a world where uncertainty is constant, the real competitive edge lies in foresight. Businesses that turn real-time data into proactive strategies will not just survive, they will lead.

Read more...
250 000 connected vehicles in Africa
Asset Management Transport (Industry) Logistics (Industry) IoT & Automation
Wialon, the global fleet digitalisation platform created by software developer Gurtam, announced it has reached a record number of 250 000 fleet vehicles and assets connected in Africa.

Read more...
IoT innovation in water mist fire protection
Fire & Safety Products & Solutions IoT & Automation
Marioff, a provider of water mist fire protection, has introduced an Internet of Things (IoT) solution designed for high-pressure water mist systems, enabling real-time monitoring, smart alerts, and centralised control.

Read more...
Protect your smart home devices
IoT & Automation Information Security Smart Home Automation
Voice assistants, kitchen robots, smart lights and many other intelligent devices have become part of our everyday life. However, with the rise of smart technology comes the need for robust protection against potential vulnerabilities.

Read more...
Can AI improve operational challenges?
AI & Data Analytics Industrial (Industry)
AI offers local manufacturers an answer to a growing list of operational challenges. The increasing sophistication of AI solutions could not come at a better time for South African manufacturers, who are grappling with declining sales and the uncertainty of global trade.

Read more...
Cybersecurity a challenge in digitalising OT
Information Security Industrial (Industry)
According to a study by Kaspersky and VDC Research on securing operational technology environments, the primary risks are inadequate security measures, insufficient resources allocated to OT cybersecurity, challenges surrounding regulatory compliance, and the complexities of IT/OT integration.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.