Mom, My Barbie Needs A Better Firewall
0
But beyond the ethical implications of marketing to kids is the more pressing lack of security and privacy standards apparent in most IOT devices. As hacked automobiles, tea kettles and refrigerators all perfectly illustrate, companies are so eager to cash in on the connected age that they "forget" about securing the end user. And now, as the Vtech hack recently illuminated, your kids' toys are no exception. Neither is Hello (I'm an NSA operative) Barbie.
A security researcher last week found it rather trivial to modify the doll to "access system information, Wi-Fi network names, its internal mac address, and account IDs," noting it would be easy to change what's collected and even where that data is stored. Granted, in Skynet Barbie's case, this requires physically obtaining the doll and torturing it. But the physical security of Barbie is only half the equation. Data's also obviously stored in the cloud, and Barbie's shiny new privacy policy warns kids this data can all be subpoenaed (so be good for goodness' sake):
"There are all sorts of issues about where that info is going, who’s listening and what it’s being used for and how it might come back to haunt you,” said Lori Andrews, Professor IIT Kent College of Law. Andrews describes the doll as a miniature surveillance device that can also record whatever else is going on in the room. The lengthy Barbie privacy statement discloses the company will report “a conversation that raises concern about the safety of a child or others”. “The company has said it’s going to take on the role of alerting the authorities,” said Andrews. “And in their privacy statement they also say they’re going to respond to legal subpoenas."Here you were thinking you were just buying your child a Barbie. Little did you know you were providing an internal mole for use in future custody hearings. And again, like the Vtech hack reiterates, physical security of the toy itself is only a small part of the equation. Companies are so damn enamored with the lure of the Internet-of-whatsa-doodles, they tend to not only forget to secure the device, the transmission, and the storage, but they very often hungrily collect way more data than is actually necessary. The end result is a modern household full of toys, appliances and devices guarded by what's at best paper-mache grade security standards.
Permalink | Comments | Email This Story