{"id":14599,"date":"2019-02-14T10:45:02","date_gmt":"2019-02-14T18:45:02","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/02\/14\/news-8348\/"},"modified":"2019-02-14T10:45:02","modified_gmt":"2019-02-14T18:45:02","slug":"news-8348","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2019\/02\/14\/news-8348\/","title":{"rendered":"Don\u2019t Get Your Valentine an Internet-Connected Sex Toy"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5c631d5f210b35696012a277\/master\/pass\/Hack-SexToy.jpg\"\/><\/p>\n<p><strong>Credit to Author: Emily Dreyfuss| Date: Thu, 14 Feb 2019 15:02:40 +0000<\/strong><\/p>\n<p><span class=\"lede\">Happy Valentine\u2019s Day! <\/span>Since it\u2019s 2019, you and a partner could celebrate by installing an app on your phone that lets you control a vibrator your partner discreetly wears in their underwear all day. I mean, if you wanted to! Thanks to the burgeoning industry of teledildonics, as internet-connected sexual pleasure products are known, there\u2019s a wealth of innovative options: vibrating WiFi-enabled butt plugs, webcam-connected dildos, even the <a href=\"https:\/\/www.wired.com\/story\/ose-vibrator-ces-controversy\/\">CES-banned Ose vibrator<\/a> uses AI to provide biofeedback. That\u2019s all good\u2014pleasure is great!\u2014but like all internet-of-things devices, smart sex toys are also incredibly vulnerable. From over-exuberant manufacturers who slurp up data to security flaws that hackers could exploit, teledildonics can be a privacy nightmare.<\/p>\n<p>\u201cPrivacy counts across everything, and when it comes to connected sex toys it seems like it should count even more,\u201d says Jen Caltrider, content strategy lead at the Mozilla Foundation.<\/p>\n<p class=\"paywall\">That\u2019s why this month Mozilla released a special <a href=\"https:\/\/foundation.mozilla.org\/en\/privacynotincluded\/categories\/valentines-day\/\" target=\"_blank\">Valentine\u2019s Day section<\/a> of its \u201cPrivacy Not Included\u201d guide, featuring romantic gadgets like smart beds, fitness trackers, and yes, teledildonics. Carltrider explains that they picked products based on what seemed popular online, while also trying to be inclusive of all sexual orientations, genders, and physical abilities.<\/p>\n<p class=\"paywall\">So what makes for a cyber-safe sex toy? According to Mozilla, you&#x27;ll want to look out for things like whether the product uses encryption, automatic security updates, strong password requirements (where applicable), an accessible privacy policy, and a way for the company to manage security vulnerabilities in its products. Mozilla considers these five things <a href=\"https:\/\/medium.com\/read-write-participate\/minimum-standards-for-tackling-iot-security-70f90b37f2d5\" target=\"_blank\">minimum security standards<\/a> for connected devices. And like its <a href=\"https:\/\/www.wired.com\/story\/mozilla-privacy-not-included-internet-connected-toys\/\">other<\/a> <a href=\"https:\/\/www.wired.com\/story\/dont-gift-internet-connected-toys\/\">gift guides<\/a>, Mozilla highlights products that appear to meet that baseline with a badge.<\/p>\n<p class=\"paywall\">Of the 18 items that Mozilla assessed\u2014a small fraction of what\u2019s actually out there\u2014half didn\u2019t pass muster. Of those that did, only six could really be called teledildonic: the Lioness Vibrator, the We-Vibe Sync, and four pleasure devices from Lovense. (Mozilla counts the <a href=\"https:\/\/foundation.mozilla.org\/en\/privacynotincluded\/products\/lovense-nora-max\/\" target=\"_blank\">Lovense Nora and Max<\/a>, which work together, as two products.)<\/p>\n<p class=\"paywall\">\u201cAt the end of the day, this can be serious,\u201d Caltrider says. \u201cThese [devices] exist in the world, they&#x27;re likely to be gifts, and so we wanted to get people to sit back and think, <em>What are the privacy implications?<\/em>\u201d<\/p>\n<p class=\"paywall\">Experts have been raising the alarm about <a href=\"https:\/\/www.wired.com\/story\/the-next-security-risk-may-be-your-vibrator\/\">teledildonic security risks<\/a> for years. Poor teledildonic security could enable not just an invasion of your most intimate information but even, hypothetically, remote-controlled assault, wherein an attacker takes over the remote app of a sex toy without its user\u2019s consent. Right now the only confirmed hacks have been done by security researchers studying these devices, but experts WIRED spoke to believe that the possibility of such attacks is real\u2014and caution that it could be hard to even know if one had occurred.<\/p>\n<p class=\"paywall\">\u201cIn the IoT space, [teledildonics] is one of the biggest threats that exists,\u201d says Amie Stepanovich, US policy manager at the nonprofit advocacy group Access Now. Researchers have demonstrated how easy it is to hack into popular products time and again. \u201cThese devices, like other IoT devices, are being produced by companies that have never connected products to the internet before,\u201d Stepanovich says. Most have never had to worry about the pitfalls of big data collection or internet security.<\/p>\n<p class=\"paywall\">In Mozilla\u2019s review, the products that failed, failed hard. Take the <a href=\"https:\/\/foundation.mozilla.org\/en\/privacynotincluded\/products\/vibratissimo-panty-buster\/\" target=\"_blank\">Vibratissimo Panty Buster<\/a>. Mozilla writes that \u201cthis product seems to be made only for those who enjoy the thrill of potentially having their smart sex toy hacked.\u201d Caltrider was baffled by how bad it was at protecting users. \u201cThe Vibratissmoo doesn\u2019t even have a privacy policy!\u201d she said in an interview with WIRED. An <a href=\"https:\/\/drive.google.com\/file\/d\/1Ux9y2jIpkcHXPbRKDPl74xAcmTlDI0Qp\/view\" target=\"_blank\">independent report<\/a> commissioned by Mozilla last year concluded that \u201cthe Vibratissimo Panty Buster vendor seems to have no regards for security.\u201d Its problems are numerous: the device allows for remote access without consent, there\u2019s no encryption, and it connects via insecure Bluetooth. Amor Gummiwaren GmbH, the vendor, did not respond to requests for comment.<\/p>\n<p class=\"paywall\">Bluetooth is a <a href=\"https:\/\/www.wired.com\/story\/turn-off-bluetooth-security\/\">recurring pain point<\/a> for IoT security. The technology has been plagued by poor security from the beginning, and what security protocols have been put in place to make Bluetooth safer are inadequate or sometimes poorly rolled out. <a href=\"https:\/\/www.makeuseof.com\/tag\/3-ways-bluetooth-device-security-risk\/\" target=\"_blank\">Researchers note<\/a> that old versions of Bluetooth that have been abandoned because of security risks are often still used. But even the newest versions lack robust encryption, and have flaws that let savvy bad actors within range spy on connected devices.<\/p>\n<p>\u201cEven simply opening the Bluetooth explorer on your phone will reveal nearby smart adult devices that are powered on.\u201d<\/p>\n<p name=\"inset-left\" class=\"inset-left-component__el\">Ken Munro, Pen Test Partners<\/p>\n<p class=\"paywall\">\u201cOur research has shown no Bluetooth adult toys that implement secure \u2018bonding\u2019 when connecting to a phone. This makes hijack possible,\u201d said Ken Munro, a researcher at security firm Pen Test Partners, in an email to WIRED. \u201cWe\u2019ve seen problems with the mobile apps that the smart toy uses. These can allow hackers remote access to very personal and intimate data over the internet, in some circumstances.\u201d<\/p>\n<p class=\"paywall\">As far as Munro is concerned, you might not want to purchase any of these smart toys, \u201cunless you are comfortable with others nearby knowing you have one and are using it,\u201d he says. \u201cEven simply opening the Bluetooth explorer on your phone will reveal nearby smart adult devices that are powered on.\u201d<\/p>\n<p class=\"paywall\">When Bluetooth is used to hack into and take over a sex toy, it\u2019s called \u201cscrewdriving\u201d\u2014a term coined by Pen Test Partners in 2017, when its researchers discovered that the <a href=\"https:\/\/www.pentestpartners.com\/security-blog\/screwdriving-locating-and-exploiting-smart-adult-toys\/\" target=\"_blank\">Lovense Hush butt plug<\/a> could be found and remotely controlled via Bluetooth.<\/p>\n<p class=\"paywall\">The Lovense Hush, along with three other Lovense products, now meets Mozilla\u2019s minimum security standards. \u201cLovense had some problems,\u201d Caltrider says. \u201cThey had one of their toys hacked but they learned from it. There&#x27;s a link on their page that takes you to the Pen Test Partners group. It was an eye-opening thing for them.\u201d<\/p>\n<p class=\"paywall\">Lovense COO Joris Guisado told WIRED the hack had been good for the company and the industry. \u201cThese kinds of events showed us and everyone else that the standards were not high enough and made us realize we had some work to do to change that,\u201d Guisado said. According to him, the company reached out directly to the white hat hackers who had demonstrated the vulnerability in the company\u2019s butt plug, as well as to other researchers, and began working with them directly to improve their security.<\/p>\n<p class=\"paywall\">\u201cThey helped us put in place a vulnerability disclosure program, and we started to work with a few private Pen Testers,\u201d Guisado said. He wasn\u2019t able to point out the exact changes that the company made in response to the researchers in time for publication, but noted that Lovense has created \u201creally clear privacy policies that we keep updating, a completely offline mode to use our app locally, and an opt-out option to sharing anonymous data.\u201d Mozilla&#x27;s guide also notes Lovense uses encryption, has automatic security updates, and requires users to update the default password in order to use any remote functionality. That\u2019s about as good as it gets right now.<\/p>\n<p class=\"paywall\">For devices that don\u2019t have good basic security, there\u2019s often very little users can do to make them safer. \u201cCheck for updates for the product, as security patches may have been issued since your product was manufactured,\u201d Munro says. \u201cMake sure you use strong, unique passwords for your user accounts on the app that you control the toy with.\u201d<\/p>\n<p class=\"paywall\">But it shouldn\u2019t be on you to make these toys safe\u2014companies should make them safe by default. As they fumble along and learn, watchdogs like <a href=\"https:\/\/internetofdon.gs\/\" target=\"_blank\">Internet of Dongs<\/a> have sprung up in an attempt to keep track of the risks and help consumers. But sex toy companies, like most IoT companies, are still largely left to police themselves.<\/p>\n<p>\u201cEspecially when technology is a gift there needs to be a path to make sure the person who is using the product is the person who is in control of the data generated by the product.\u201d<\/p>\n<p name=\"inset-left\" class=\"inset-left-component__el\">Amie Stepanovich, Access Now<\/p>\n<p class=\"paywall\">In 2017, the makers of the We-Vibe vibrators (whose Sync vibrator now has a Mozilla \u201cmeets the minimum\u201d badge) agreed to <a href=\"https:\/\/www.npr.org\/sections\/thetwo-way\/2017\/03\/14\/520123490\/vibrator-maker-to-pay-millions-over-claims-it-secretly-tracked-use\" target=\"_blank\">pay $3.75 million<\/a> in a class action settlement, after two customers sued the company for allegedly tracking data about how the devices were used\u2014including vibration intensity and temperature\u2014without their knowledge. Later that year, Stepanovich and her colleagues <a href=\"https:\/\/www.theregister.co.uk\/2017\/04\/27\/ftc_urged_to_probe_easily_penetrated_tellyenabled_teledildonic_toy\/\" target=\"_blank\">urged the Federal Trade Commission<\/a> to investigate the webcam-connected Siime Eye vibrator, after researchers at Pen Test Partners realized it would be trivial for voyeurs to access its live feeds.<\/p>\n<p class=\"paywall\">But progress on specific regulation for teledildonics\u2014such as clear laws dealing with the possibility of remote-controlled assault, teledildonic <a href=\"https:\/\/www.wired.com\/story\/jeff-bezos-sextortion-allegation\/\">sextortion<\/a>, or required security protocols for vendors\u2014has been slow, experts say. Stepanovich says no one is holistically keeping track of what internet-of-things regulations are being proposed across the US, let alone those that are specifically about sexual products. In her opinion, the first step needs to be strengthening internet-of-things protections generally.<\/p>\n<p class=\"paywall\">Even to get policymakers to care has been a struggle. \u201cThere is a lot of judgment leveled against the people who would want to use these without considering that they could have benefits for people, not only people in long distance relationships but even people in rehabilitation from former sexual traumas,\u201d says Stepanovich. Of all the issues she\u2019s worked on at Access Now, she says, teledildonics has been the most plagued by \u201cslut-shaming\u201d and \u201cvictim blaming\u201d from those who say that people willing to use devices like this are bringing the risk onto themselves.<\/p>\n<p class=\"paywall\">None of the experts WIRED spoke to were aware of any real-world incidents of hacking into smart sex toys. \u201cBecause there likely has not been a real world situation yet we still have time to prevent and anticipate the consequences,\u201d says Stepanovich. But don\u2019t sigh in relief just yet. Munro notes it would be really hard to know if this had happened, unless hackers had taken the data and used it in a sextortion scheme. \u201cIt\u2019s perhaps more likely that data is being gathered covertly for the gratification of the attacker,\u201d he says.<\/p>\n<p class=\"paywall\">Since so many toys are given as gifts from one intimate partner to another, often the person using the device is not even in control of its set-up, notes Caltrider. Stepanovich agrees this raises the stakes and likelihood for abuse. \u201cA lot of times technology is used to oppress people in certain types of abusive relationships, so especially when technology is a gift there needs to be a path to make sure the person who is using the product is the person who is in control of the data generated by the product,\u201d she says. She\u2019d like to see companies bake in the ability for a person to stop the flow of data to and from their device at any time.<\/p>\n<p class=\"paywall\">There\u2019s a lot of work left to do to make teledildonics secure, from updating laws, to encouraging threat disclosure programs, to making sure companies include basic security protocols. For now, Mozilla\u2019s gift guide is a pretty good place to start if you want a smart sex toy but don\u2019t want your kinks and proclivities exposed for all to see.<\/p>\n<p class=\"paywall\">You\u2019ve been warned!<\/p>\n<p class=\"related-cne-video-component__dek\">Hacker and security researcher Samy Kamkar takes a look at a variety of hacking scenes from popular media and examines their authenticity.<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/internet-connected-sex-toys-security\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5c631d5f210b35696012a277\/master\/pass\/Hack-SexToy.jpg\"\/><\/p>\n<p><strong>Credit to Author: Emily Dreyfuss| Date: Thu, 14 Feb 2019 15:02:40 +0000<\/strong><\/p>\n<p>Mozilla expands its \u201cPrivacy Not Included\u201d gift guide to the bedroom: It\u2019s all sexy fun and games until someone hacks a WiFi-enabled butt plug.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714],"class_list":["post-14599","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14599","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=14599"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14599\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=14599"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=14599"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=14599"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}