- Cooking Mama’s return whips up a fresh batch of memes Tuesday 8:18 PM
- Influencer body-shames model, Photoshops photo of self to ‘prove point’ Tuesday 7:27 PM
- Boosie Badazz goes on transphobic rant about Dwyane Wade’s daughter Tuesday 6:34 PM
- Royal Family’s website accidentally links to porn instead of charity Tuesday 5:39 PM
- Republican senator spreads false conspiracy about coronavirus Tuesday 5:11 PM
- New DNA technology could help exonerate Black man serving life sentence Tuesday 4:24 PM
- ‘SNL’s’ Kenan Thompson to host the White House Correspondents’ Dinner Tuesday 3:58 PM
- Singer Summer Walker dragged for insensitive HIV comments Tuesday 2:39 PM
- This video of a teddy bear getting steam cleaned makes a perfect meme Tuesday 2:27 PM
- Ted Cruz goes on Twitter tirade over proposed vasectomy bill Tuesday 2:22 PM
- Billie Eilish says she’s stopped reading Instagram comments Tuesday 2:13 PM
- Christian group blames satanists for Twitter poll results Tuesday 1:41 PM
- Coronavirus has pandemic-themed video games topping charts Tuesday 12:58 PM
- Bloomberg said kids are drawn to socialism because they think it involves social media Tuesday 12:55 PM
- Jake Paul gives ill-informed advice on how to deal with anxiety Tuesday 12:25 PM
When any device is connected to the internet, two things become true: It’s immediately “smart,” and it’s instantly susceptible to hackers.
The duo attacked the We Vibe 4 Plus, a Bluetooth-enabled couple’s vibrator that comes with a smartphone app and remote control so that you can stimulate your partner “whether they’re in the same room or on a different continent,” the company’s advertising boasts.
The hackers hit the sex toy’s Texas Instruments CC2541 processor with its 2.4ghz Bluetooth chip, exploiting the lack of a certificate to collect information transmitted between the toy and the app. Bluetooth certificate pins establish a secure relationship between devices and users and the lack of one opens devices, including your sex toy, up to hackers.
They also showed just how much information the vibrator’s manufacturers are collecting about your masturbation.
If, for example, you go to high intensity, they’ll know.
They can also track the temperature of the device, information that can tell you a lot about exactly where this thing goes, though the company says it’s not precise enough to know exactly which orifice the toy has entered—or if it’s entered at all. The collected data is then stored and can be used by the company. Frank Ferrari, president of We Vibe maker Standard Innovation Corporation, said in a statement emailed to the Daily Dot that temperature data “is collected purely for hardware diagnostic purposes.”
The hackers assert that this type of intimate data raises privacy and security concerns.
“As teledildonics come into the mainstream, human sexual pleasure has become connected with the concerns of privacy and security already familiar to those who previously only wanted to turn on their lights, rather than their lover,” the hackers explained in the description of their presentation.
“Do you care if someone else knows if you or your lover is wearing a remote control vibrator? Do you care if the manufacturer is tracking your activity, sexual health and to whom you give control? How do you really know who is making you squirm with pleasure? And what happens when your government decides your sex toy is an aid to political dissidents? “
The future is way weirder than anyone predicted.
Clarification: The thermometer in the We Vibe is not precise enough to collect data that can determine whether the device has been inserted in an orifice, according to the company. Further, according to president of the company behind We Vibe, Frank Ferrari, “[t]emperature data is collected purely for hardware diagnostic purposes.”
“The temperature is measured through a thermometer in the Texas Instruments chip itself,” Ferrari said. “Many factors can affect the temperature of the chip. However, any changes in the temperature are not significant or noticeable enough to indicate the location of the product.”
H/T The Register
Patrick Howell O'Neill is a notable cybersecurity reporter whose work has focused on the dark net, national security, and law enforcement. A former senior writer at the Daily Dot, O'Neill joined CyberScoop in October 2016. I am a cybersecurity journalist at CyberScoop. I cover the security industry, national security and law enforcement.