The 5/3 Virtualization Security Podcast had a very special guest, a teenager. This surprise guest told us about how she and her friends use their smartphones and cloud services such as FaceBook, Twitter, SMS, etc. For the panelist, it gave us a new look at our existing problems; expanding our viewpoint for end-user computing security, cloud security, and expectations of privacy.So how do teenager’s use their end-user computing devices? Their gateways to the cloud? Perhaps just a little differently than we do as adults.  But this teenager seemed to be a bit more conscious about what is placed on her device on into the cloud. Here are the expectations she has when using here device:

  • SMS or Text Messages sent to her friends are private (not only between her friends and herself, but from others)
  • Anything placed on FaceBook is private if marked so
  • Anything on the actual device is shared with her friends whether that be pictures, contacts, or just the device itself

This gets into the concept of expectation of privacy which many people have when they start to use their devices whether that be their office desktop, personal phone, tablet, or other end user computing device. The answer to this is, whomever owns the device has a right to inspect that device at anytime. Therefore, there is no expectation of privacy when using any non-personal device.

But is there an expectation of privacy when using a cloud service, the feeling of the teenager was eye-opening, for her, there is none, there is the belief that once it is on Facebook it will be read, but for telephone services such as SMS, there is an expectation of privacy. As well as a giving and taking of trust. When the phone is exchanged between friends to use perhaps for SMS, there is a giving of trust, that the friend will hold whatever is seen in confidence, but also what they do is not going to be above and beyond the acceptable daily drama of a teenager’s life.

However, look at how you and your family use their devices, I for one let me wife use my iPhone and I use hers from time to time. But there is a level of Trust established.

But what measures does a teenager take to protect their data?

  • Do not put anything up on Facebook that would be considered embarrassing not only for themselves but for others.
  • Do not share your smartphone with someone you do not trust
  • Secondary password requests are filled in with random, non-personal,  but memorable data. Such secondary passwords are for questions like Mother’s Maiden Name, etc.

We even discussed the possibilities multiple accounts so that things done in one, such as playing a game, do not impact their true account. Which lead to an interesting discussion on delegate users and false data in accounts.

Definitely an interesting view of the world, data is shared, there is some expectation of privacy but only between trusted parties, yet at the same time wariness when it comes to cloud services.

Share this Article:

Share Button
Edward Haletky (377 Posts)

Edward L. Haletky, aka Texiwill, is the author of VMware vSphere(TM) and Virtual Infrastructure Security: Securing the Virtual Environment as well as VMware ESX and ESXi in the Enterprise: Planning Deployment of Virtualization Servers, 2nd Edition. Edward owns AstroArch Consulting, Inc., providing virtualization, security, network consulting and development and The Virtualization Practice where he is also an Analyst. Edward is the Moderator and Host of the Virtualization Security Podcast as well as a guru and moderator for the VMware Communities Forums, providing answers to security and configuration questions. Edward is working on new books on Virtualization.

[All Papers/Publications...]

Connect with Edward Haletky:


Related Posts:

2 comments for “Teenager’s View of Cloud Security: Expectations of Privacy

Leave a Reply

Your email address will not be published. Required fields are marked *


one + 3 =