Your hand-drawn IoT characters are very expressive, and the organic lines really soften what is often depicted as staid & blocky (I'm thinking of most tech icons I've seen over the years). I agree with @DeletedUser that if you can find ways to differentiate between the devices and make them each a unique personality you can really make this a fun way to discuss the critical security topics surrounding each device.
Thanks for the feedback! Glad frog dissection is more universal than I realized. :D I would love technical suggestions on surveillance layers. I am a non-technical visual designer, so that's where I'm approaching this challenge from. Identifying a user as the frog and showing tech providers as the dissectors was my primary goal, but I could see expanding on the idea to be more specific.
Hi Robyn Hwang - I may have oversold my knowledge of cybersecurity. ;) While I do work in the industry, mine is a non-technical role in marketing and design. So my knowledge of the tech is pretty general and simplified. My reasoning for this concept is more abstract and I really enjoy the idea of getting beneath the surface and exploring what's not immediately visible. When we interact online, we do it for obvious reasons - shopping, paying bills, communicating, reading/watching, etc. But while we are doing that, the surveillance is occurring in secret, basically. We don't see it or even realize its happening outside of a EULA or site roadblocks (seen since GDPR went into effect). I suppose connections could be drawn between specific methods for that surveillance in the anatomy of the frog (IE the muscles as connecting various pieces of the surveillance apparatus). Would appreciate any technical help anyone can provide on that and I will also look for more ideas among the entries here.