Sex toys: The dildo listens with

The Sexbranche puts great hope into networked toys. But when the vibrator listens and the butt is hacked, it is embarrassing – for all parties involved.

Sex toys: The dildo listens with
Content
  • Page 1 — dildo ends with
  • Page 2 — curious dildos are a problem
  • Read on a page

    The Internet of Things is a new category richer: Bugplug. This is a networked sex toy, Dasversehentlich takes more than it should, and may also be nochschlecht protected from attackers. After kitchen, and living-UndKinderzimmern are now bedrooms on it when it comes to persönlicheund in this case Intime information to access.

    The most recent case concerns manufacturer Lovense in Hong Kong. The company offers toys such as dildos and buttplugs, find can be controlled both via an app on ir own smartphone and remotely – for example, if partner or partner is in a different location. Teledildonics means this in industry. As users reported, Android version of Lovense app was listening without SeineKenntnis while using a product and stored an audio file on smartphone.

    Compared to IT portal TheVerge BestätigteLovense, it is "a small bug" (English for error). The app Bieteeine sound function, so that Dildovibrationen can be controlled via microphones of smartphones. To do this, save Kurzzeitigeine cache file that will be deleted after app is closed. But that did not happen in this case. A patch should be Bugbeheben. In no case would files be sent to servers of Lovenseübertragen. You can refore only take it off if you also access smartphone of users.

    On Buttplugsuche in Berlin

    Lovense was already in spotlight a few weeks ago. DerSicherheitsforscher Alex Lomas had figured out how to let company's buttplugs type Hush take over from afar. To demonstrate this, he ran through streets of Berlin and searched for "active" Buttplugs-and actually found one, wait writes.

    Lomas took advantage of Bluetooth function, more precisely BluetoothLow energy (BLE), which is used in many wearables as well as networked sex toys. To put it simply, attack ran like this: The Hush-Buttplugverbindet is over BLE with smartphone and can thus be controlled. If plug loses connection, it switches to search mode. Because re is no vomNutzer given password or only standard pins like 1234, for outsiders at this moment is possible to connect with him – and Ihndann to control. Also security researcher Giovanni Mellini Demonstriertedas.

    Now this attack scenario is like so often eheroretischer nature. BLE works only over short distances and that Jemandwirklich runs through city and Buttplugträger is looking for is unlikely. Nor is it a security breach on part of HerstellersLovense, but rar a general problem with Bluetooth, which also affects completely different devices (Lomas also demonstrates it on hearing aid seinesVaters).

    Software bugs and vulnerable hardware are just two aspects that users and manufacturers of sex toys have to deal with. A third question is which data is collected and disseminated by comparatively neueProduktkategorie. In case of Canadian HerstellersStandard innovation was a US court: re are too many.

    Date Of Update: 15 November 2017, 12:03
    NEXT NEWS