Hacker News new | past | comments | ask | show | jobs | submit login

An example: I decided to build a simple temperature monitor to see what I could do about energy use. Simply put, it's the easiest way to tell when the heating system is kicking in and for how long when you're dealing with decades old technology. What I discovered was interesting. In addition to telling me the expected, it showed things like: when I went to bed at night, when I got up in the morning, and even when I got up in the middle of the night and for how long. The times weren't exact, but it provided pretty good estimates for an indirect measurement using a very crude instrument.

Now imagine what could be inferred from your meat grilling data.

I am not saying that that people go around doing nefarious things with your meat grilling data. In fact, there is a very good chance that it is not even being collected. Yet we live in a world that is hungry for data of virtually any type and in any form, which makes both data collection and nefariousness a possibility when that data is being handled by an Internet connected device. Personally, I find that possibility creepy - even if no harm is being done.






Guidelines | FAQ | Support | API | Security | Lists | Bookmarklet | Legal | Apply to YC | Contact

Search: