@article{Almeida_Mateus-Coelho_Lopes_2021, title={Paranoid Operating System: Wearable Trackers: Wearable Trackers}, volume={1}, url={https://aris-journal.com/aris/index.php/journal/article/view/4}, DOI={10.56394/aris2.v1i1.4}, abstractNote={<p><span data-contrast="auto">Throughout human evolution, communication has always played a central role in favor of the development and approximation of the species. </span><span data-ccp-props="{"134233117":true,"134233118":true,"201341983":1,"335551550":6,"335551620":6,"335559739":0,"335559740":360}"> </span></p> <p><span data-contrast="auto">Within this project, the main objective is to analyze different wearable devices (more specifically fitness tracking devices) with the intention of presenting the strengths and weaknesses related to the security and privacy frameworks that these devices make use of.</span><span data-ccp-props="{"134233117":true,"134233118":true,"201341983":1,"335551550":6,"335551620":6,"335559739":0,"335559740":360}"> </span></p> <p><span data-contrast="auto">To reach these objectives some devices will be acquired for testing, starting from the earliest point of the communication (Bluetooth connection) until the latter states (communications through the Internet).</span><span data-ccp-props="{"201341983":0,"335559739":200,"335559740":276}"> </span></p> <p><span data-contrast="auto">“Paranoid” operating systems and methodologies have been developed and studied over the years, both for mobile and desktop systems in order to maintain the security and anonymity of their users, and although related studies have been in existence for some time, this proposal aims to develop an answer to a theme not very distinct, but more specific and modern “Paranoid OS: Wearable Trackers”.</span><span data-ccp-props="{"201341983":0,"335559739":200,"335559740":276}"> </span></p> <p><span data-contrast="auto">It is with this purpose in mind that the path taken by this technology will be presented in this document, considering what are the communication protocols, what data goes through these communication channels and finally where is the user’s data.</span><span data-ccp-props="{"201341983":0,"335559739":200,"335559740":276}"> </span></p>}, number={1}, journal={ARIS2 - Advanced Research on Information Systems Security}, author={Almeida, Afonso and Mateus-Coelho, Nuno and Lopes, Nuno}, year={2021}, month={Dec.}, pages={24–40} }