Are smart devices listening and collecting data about us? We raise privacy concerns. Protect yourself by being aware and taking precautions.
We are surrounded by smart devices. It all started with cellphones but now we have smart speakers, smart TVs, smart cameras, smart refrigerators, there is even a smart microwave. It seems like many new appliances and home devices are incorporating some type of assistant, so we can give it orders and it can aid us in some way or another. The big question is: Are these devices listening to more than just our requests? How much privacy can we expect in our own homes? Let’s break it down by device.
Smart TVs come in different flavors, but the principle is the same. It has some kind of operating system just like a computer and it’sconnected to the internet. This operating system allows it to install apps for streaming services like Netflix or other functions and of course, many of themnow come equipped with a microphone so you can just command it with your voice.
The main problem with smart TVs is that they do collect vast amounts of data about the shows you are watching and the streaming apps you are using. This technology is called Automatic Content Recognition (ACR) and as its name implies, it identifies and shares information about the shows, videos, series, DVDs and even YouTube videos you are watching, and sends them to third parties. TV and streaming companies say that this information is used to provide you with a better experience and content recommendations, but the reality is that once these companies understand your likes and dislikes, they can pinpoint and target advertising to you and your family.
How do you turn these features off? The bad news is that you can’t completely; unless you disconnect your TV from the internet. Each brand has its own way for you to opt-out of the data collection based on their privacy settings. Since there are so many brands, my recommendation is to do a simple search for “turn off data collection for (Brand, Model) TV” and you should get a simple guide on how to do it. This article also lists a few of the brands and steps to turn it off.
Since the smart TV is basically a computer, it can also be hacked. Although the risk is not as prevalent since most people have some type of protection in their house in the form of an internet router with some firewall functionality, it’s not to be discounted. Previously reported vulnerabilities in some of these TV OS platforms have been patched but if you know anything about the history of security and computing devices, new ones will be found.
The FBI recently warned about hackers potentially taking control of your insecure TV, changing channels and even showing inappropriate videos on the screen. Potentially, it could be used as a jump-off point to try to get into your computer and even turning on the microphone to spy on you. How real are these threats? If the FBI is warning about them, they are as real as they get.
They all have cute and seemingly innocent names such as Alexa, Siri, and Google but their purpose is to listen to their wake word. In the case of the Amazon Echo that word is “Alexa”, for Siri it’s “Hey Siri” and for Google it’s “Hey Google”. Those words can be changed but you get the idea.
Once the wake word is heard, then the device awaits yourcommand or question. What’s the problem with all this? It’s been reported thatsmart speakers can mistake conversation or even background noise for their wakeword and start listening.
There have been reported cases of these speakers recordingrandom conversations and even sending them to third parties. It’s bound tohappen but it’s rare. The reason these reports make the news is because theyare not a frequent occurrence. With tens of millions of these units in homesacross the world, if this would happen more often, there would be way more newsabout it.
The real potential issue are the human reviewers. Humanreviewers? Yes, all artificial intelligence systems need to be trained and someof this training needs to be done by humans. This means that some of yourrecordings could end up being heard by the techs that are working to improvethese smart speakers.
Review your history and see what’s been recorded. Where and how? If youfind something you don’t like, you can delete it.
If you have any fears of the speakers listening in when theyare not supposed to, you can always use their mute button, so the microphone isdeactivated. It takes away from the convenience but it sure adds to peace ofmind.
There are many anecdotes of our phones spying on us and listening in to what we are saying. Some of them are true and some not butthere are very real concerns. The truth? They are but not necessarily how you might think.
The common thought is that phones are listening to us speak and then later targeting ads based on conversations, but evidence suggeststhat’s not the case. The reality is that our behavior, our searches online and even our physical location show more about our interests than we can imagine.
The advanced and secret algorithms for these companies harvest that information and create advertising profiles of us and people likeus that can be targeted and retargeted. What does that mean?
When you visit a site about a product and that product showsup in your searches and follows you around, it’s called retargeting. Thewebsite places a “cookie” in your browser, which is basically an identifier that says, hey, I was looking at this Nike shoe on this website.
These sites are part of gigantic ad exchanges that trade onthat information so when you visit another site and you have that cookie inyour browser, the site knows to show you ads from the provider you werebrowsing.
Why do companies do it? Simple, because it works.
Other ways that your phones spy on you is through third-party apps, these apps can go as far as recording your screen to see how you are using them. Although the Android marketplace and the Apple app store do a decent job of filtering bad actors, from time to time, you see news of malicious apps collecting your data and using it for nefarious purposes.
How do you protect yourself against this? You really can’tbut you can mitigate this by not installing apps from suspicious third partiesand doing a little bit of due diligence by visiting the app’s website andreviews before installing it. Not many people do this.
We’ve seen the terrifying videos of smart cameras beinghacked and the privacy of the people that own them being compromised. This isvery scary. Inviting bad actors to your home from who knows where. Some ofthese devices seem to be violating the very premise of their existence - whichis making us feel safer.
If you’ve been on the internet long enough, your personalinformation is likely to have been hacked one way or the other. This doesn’tspeak about your data security policies or about your level of care. The realityis that way too many third parties have been compromised and your data has beencompromised along with it. What does this have to do with the cameras? Verysimple.
Hackers use the available databases of usernames andpasswords and try them on popular security sites such as camera providers.Eventually, they find a match so they login to your account remotely. Simple.
Since these devices bypass your firewall to be able to sendvideo and audio back to the app or the provider’s website, a hacker sittinganywhere in the world could be watching the camera stream from your home.
How do you know if your information has been hacked and made public? It’s not 100% but if you enter your e-mail on this website, it will tell you if it’s been a part of one of the major reported hacks. I say reported because there are many hacks that go unreported, I can venture to say that this is the case for the majority. Yes, it’s a wild, wild west on the internet.
A simple way to protect yourself is to download a chrome extension called password checkup extension by Google. How does it work? Whenever you enter a username and password combination on a website, Google checks against its database of data breaches and it notifies you with a big red warning box that the username and password combination you are about to use is not safe.
In conclusion, your information is being used not necessarily against you, but it’s being used to target you, retarget you, sell to you and package your preferences and interests and sell those to third parties. Every device does it in their own way, but they all do it. Welcome to 1984, I mean 2020.