May's Blog

If you’ve ever watched an anime where a shadowy org tracks a protagonist’s vitals in real time (hello, NERV), you’ve seen a dramatized version of what wearables are inching toward. The latest swirl around Oura — including reporting about expanded work with the U.S. military and mentions of Palantir in the orbit — has users asking a very grounded question: what, exactly, is my ring telling the world about me?

I contribute to open source, obsess over infosec, and marathon anime on weekends. Let’s unpack the “cloud of wearables” vision, the privacy concerns, and what you can do right now to control your data without tossing your ring into Mount Doom.

What’s happening, and why users are uneasy

Why wearable health data is uniquely sensitive

Your Oura ring isn’t just counting steps. It infers:

Individually, these sound benign. In aggregate, they’re a high-resolution chronicle of behavior, physiology, and sometimes reproductive health. Even if “de-identified,” this kind of data is notoriously easy to re-identify when cross-referenced with other datasets. And in a “cloud of wearables” world — ring + watch + phone + app integrations — correlation power compounds. That’s great for insights, and terrible for privacy if not tightly governed.

The “cloud of wearables” vision: powerful, but widen the threat surface

Pros:

Cons (through a security lens):

What Oura says (and what matters in practice)

From public-facing privacy and security materials, the common themes are:

That’s table stakes. What matters in 2025 is:

Threat models you should actually consider

Practical steps to reduce risk without losing utility

1 Audit and tighten permissions

2 Opt out where possible

3 Control network flows

4 Separate identities and harden accounts

5 Export, review, and prune

6 Prepare a data request template

If you’re in a jurisdiction with GDPR/CCPA rights, you can request details on processing.

Template:

 1Subject: Data Subject Request – Access and Processing Details.
 2Body:
 3Hello Privacy Team,
 4I’m requesting, under applicable law, the following:
 5- A copy of all personal data associated with my account/email.
 6- A list of all categories of data collected, processing purposes, retention periods.
 7- A list of third parties/partners that received my data (categorized by purpose).
 8- Information on any automated decision-making or profiling.
 9- Details on cross-border transfers and safeguards.
10Please provide data in a portable, machine-readable format.
11Regards,
12[Your Name] [Account email]

An open-source and local-first path forward

I’m bullish on wearables, but the stack needs to evolve:

Open-source projects that matter here:

Developers and policymakers: your move

My take

Partnerships with defense-adjacent firms spook people for a reason: incentives and capabilities matter. Even if a company pledges strong privacy, trust hinges on technical architecture and enforceable boundaries. A “cloud of wearables” can be incredible for health — or a panopticon in your pocket. The difference is design, contracts, and transparency.

I still wear sensors. But I treat them like any powerful tool: minimize data I share, sandbox integrations, monitor network chatter, and export/delete on my schedule. That’s the price of admission until local-first, zero-knowledge wearables become the norm.

Your turn

Drop your thoughts. If there’s interest, I’ll publish a step-by-step on setting up Pi-hole/NextDNS specifically for wearables traffic and a deeper dive into BLE security for rings vs watches.

Stay safe and sleep well — ideally with fewer data tentacles than an Eva Unit.

#Application Security #Health Data Protecton #Users Data Protection #Open Source Security