By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
10alert.com10alert.com
  • Threats
    • WordPress ThreatsDanger
    Threats
    A cyber or cybersecurity threat is a malicious act that seeks to damage data, steal data, or disrupt digital life in general. Cyber threats include…
    Show More
    Top News
    All You Need to Know About APTs
    8 months ago
    Avoid infection by dangerous Onion ransomware aka CTB-Locker
    8 months ago
    How Kaspersky Internet Security protects from ransomware
    8 months ago
    Latest News
    Triangulation: Trojan for iOS | Kaspersky official blog
    2 days ago
    Wordfence Intelligence Weekly WordPress Vulnerability Report (May 22, 2023 to May 28, 2023)
    2 days ago
    Safeguards against firmware signed with stolen MSI keys
    4 days ago
    WPDeveloper Addresses Privilege Escalation Vulnerability in ReviewX WordPress Plugin
    4 days ago
  • Fix
    Fix
    Troubleshooting guide you need when errors, bugs or technical glitches might ruin your digital experience.
    Show More
    Top News
    What’s included in the ‘Battle of Shadow and Light’ update for Halo 5: Guardians
    8 months ago
    How to fix printer spooler problems on Windows 10
    8 months ago
    How to fix error 0x80004005 starting VirtualBox VM on Windows 10
    8 months ago
    Latest News
    How automatically delete unused files from my Downloads folder?
    4 months ago
    Now you can speed up any video in your browser
    4 months ago
    How to restore access to a file after EFS or view it on another computer?
    4 months ago
    18 Proven Tips to Speed Up Your WordPress Site and Improve SEO | 2023 Guide
    5 months ago
  • How To
    How ToShow More
    Dynamic data collection with Zaraz Worker Variables
    Dynamic data collection with Zaraz Worker Variables
    1 day ago
    Reduce latency and increase cache hits with Regional Tiered Cache
    Reduce latency and increase cache hits with Regional Tiered Cache
    2 days ago
    Cloudflare is deprecating Railgun
    Cloudflare is deprecating Railgun
    2 days ago
    What is two-factor authentication | Kaspersky official blog
    5 days ago
    Acer refreshes Windows 11 PCs for work and play: Swift Edge 16 and Predator Triton 16
    1 week ago
  • News
    News
    This category of resources includes the latest technology news and updates, covering a wide range of topics and innovations in the tech industry. From new…
    Show More
    Top News
    How to delete all empty folders on Android?
    8 months ago
    How to come up with a signature using an online service?
    8 months ago
    How to turn on screen text on iOS?
    8 months ago
    Latest News
    How to add CPU, GPU, RAM widgets on Windows 11
    2 days ago
    How to create virtual drive (VHD, VHDX, Dev Drive) on Windows 11
    5 days ago
    How to enable Taskbar End Task option to close apps on Windows 11
    5 days ago
    How to check USB4 devices specs from Settings on Windows 11
    5 days ago
  • Glossary
  • My Bookmarks
Reading: Leaky Internet of Things, or How hackers invaded my vibrator
Share
Notification Show More
Aa
Aa
10alert.com10alert.com
  • Threats
  • Fix
  • How To
  • News
  • Glossary
  • My Bookmarks
  • Threats
    • WordPress ThreatsDanger
  • Fix
  • How To
  • News
  • Glossary
  • My Bookmarks
Follow US
Wordpress Threats

Leaky Internet of Things, or How hackers invaded my vibrator

Vitus White
Last updated: 7 October
Vitus White 4 years ago
Share
5 Min Read

Now that even coffee machines are Wi-Fi connected, getting to smart sex toys was only a matter of time. People actually started thinking along those lines quite a while ago: In 1975, American pioneer of information technology, philosopher, and sociologist Ted Nelson offered the world a curious new term: teledildonics. The word denotes a technology that helps couples feel very close together no matter how far apart they are in reality.

Contents
What happened?Tips and conclusions

Hackers can spy on you through your vibrator: https://t.co/7m2mt8FArF pic.twitter.com/KQN5kUT1PW

— The Daily Dot (@dailydot) August 9, 2016

So, how do you make a tool as simple and efficient as a vibrator “new and improved”? Cool features from the gadget world, of course. Today, people can buy sex toys that synchronize with erotic e-books, toys with remote-control features, even ones equipped with a built-in selfie camera … and, well, a lot of other interesting devices.

There are also vibrators for couples: For example, the We-Vibe 4 Plus has been on the market for two years — although it became newsworthy quite recently. This is the tale of developers of very intimate goods who do not value the privacy of their customers.

What happened?

The company that produces the We-Vibe 4 Plus is called Standard Innovation. It claims the device is the number one couples’ vibrator in the world. In comparison to the base model, the We-Vibe 4, the Plus version supports remote control through a mobile app that can be installed on the phones of both partners. Users can create “playlists” — basically, sequences involving vibration intensity and frequency.

All well and good, so far. But the devil is in the details: The same app that keeps a diary of your sex life also shares that intimate data with the developer.

Two New Zealand hackers called @goldfisk and @rancidbacon researched the device and presented their findings at the DEF CON 2016 conference in Las Vegas. They had discovered vulnerabilities in the app. Among other things, criminals can hack it to activate the vibrator. That may not sound as dangerous as hacking a chemical plant or a nuclear power station, but it’s still fairly horrifying to contemplate.

“Unwanted activation of a vibrator is potentially sexual assault” — @RancidBacon, at DEF CON.

Just think: Two million people own We-Vibe 4 Plus devices, and every one of them is at risk.

The hack is still only a theory. But the developer gathering data about device temperature and difference in vibration — that’s really happening. As a result, the company’s employees can easily discern when and how often people use their vibrators, and even which modes they prefer — the widely advertised “echo,” the “cha-cha-cha,” or a personalized playlist.

Standard Innovation president Frank Ferrari told Fusion that the company collects data to improve their devices and understand how people use them. So: For two years, We-Vibe 4 Plus users unwittingly took part in a kind of erotic show for a narrow circle of people — Standard Innovation employees.

We Vibe is collecting realtime about vibrator intensity by JSON callbacks to the server #defcon pic.twitter.com/XJU4NQPbrg

— 0x0i5 (@0x0i5) August 5, 2016

The We-Connect terms and conditions are rather vague and do not explain which data the app collects and for what purpose. At the same time, the company reserves the right to share this information with law enforcement if it is requested. This point is a very big deal: In some countries self-pleasure is illegal.

Tips and conclusions

The Internet-of-Things in general and teledildonics in particular is a very young industry. Developers of smart devices emphasize “cool new features,” often leaving users’ security fairly far down the list of priorities. That’s why we recommend caution when buying smart devices — and especially when it comes to sex toys. Does your vibrator really need to be connected to the Internet?

Why connected #vibrators are bad

Tweet

If not, buy a different kind. But if you’ve already joined the ranks of “lucky” We-Vibe 4 Plus owners, you don’t have to trash it just because the developer overindulges. Instead, you can turn on your phone’s airplane mode when you use the toy — though you’ll have to forgo the remote control.


Source: kaspersky.com

Translate this article

TAGGED: Security, Threats, Vulnerabilities
Vitus White October 7, 2022 September 30, 2019
Share this Article
Facebook Twitter Reddit Telegram Email Copy Link Print

STAY CONECTED

24.8k Followers Like
253.9k Followers Follow
33.7k Subscribers Subscribe
124.8k Members Follow

LAST 10 ALERT

Dynamic data collection with Zaraz Worker Variables
Dynamic data collection with Zaraz Worker Variables
Apps 1 day ago
How to add CPU, GPU, RAM widgets on Windows 11
News 2 days ago
Reduce latency and increase cache hits with Regional Tiered Cache
Reduce latency and increase cache hits with Regional Tiered Cache
Apps 2 days ago
Cloudflare is deprecating Railgun
Cloudflare is deprecating Railgun
Apps 2 days ago
Triangulation: Trojan for iOS | Kaspersky official blog
Threats 2 days ago

Recent Posts

  • Dynamic data collection with Zaraz Worker Variables
  • How to add CPU, GPU, RAM widgets on Windows 11
  • Reduce latency and increase cache hits with Regional Tiered Cache
  • Cloudflare is deprecating Railgun
  • Triangulation: Trojan for iOS | Kaspersky official blog

You Might Also Like

Dynamic data collection with Zaraz Worker Variables
Apps

Dynamic data collection with Zaraz Worker Variables

1 day ago
Cloudflare is deprecating Railgun
Apps

Cloudflare is deprecating Railgun

2 days ago
Threats

Triangulation: Trojan for iOS | Kaspersky official blog

2 days ago
Wordfence Intelligence Weekly WordPress Vulnerability Report (May 22, 2023 to May 28, 2023)
Wordpress Threats

Wordfence Intelligence Weekly WordPress Vulnerability Report (May 22, 2023 to May 28, 2023)

2 days ago
Show More

Related stories

How to Use Cloudflare to Secure Your WordPress Site
How To Starting Chrome from the command line
How to fix error 0x80070057 in Chrome?
Windows 10 How To Disable Slide to Shutdown
Windows search not working (FIX)
How to watch movies and TV series for free on Kinopoisk?
Previous Next

10 New Stories

Wordfence Intelligence Weekly WordPress Vulnerability Report (May 22, 2023 to May 28, 2023)
Safeguards against firmware signed with stolen MSI keys
WPDeveloper Addresses Privilege Escalation Vulnerability in ReviewX WordPress Plugin
How to create virtual drive (VHD, VHDX, Dev Drive) on Windows 11
How to enable Taskbar End Task option to close apps on Windows 11
How to check USB4 devices specs from Settings on Windows 11
Previous Next
Hot News
Dynamic data collection with Zaraz Worker Variables
How to add CPU, GPU, RAM widgets on Windows 11
Reduce latency and increase cache hits with Regional Tiered Cache
Cloudflare is deprecating Railgun
Triangulation: Trojan for iOS | Kaspersky official blog
10alert.com10alert.com
Follow US

© 10 Alert Network. All Rights Reserved.

  • Privacy Policy
  • Contact
  • Customize Interests
  • My Bookmarks
  • Glossary
Go to mobile version
adbanner
AdBlock Detected
Our site is an advertising supported site. Please whitelist to support our site.
Okay, I'll Whitelist
Welcome Back!

Sign in to your account

Lost your password?