2 TB For Life! 65% Off pCloud Lifetime

Uncategorized

Smart devices merit user caution | Many of these internet-connected speaker devices listen constantly for commands and connect to corporate servers…

Associated Press photos
A second generation Echo that controls the blinds as well as televisions and lighting at an Amazon Experience Centers model home in Dallas, Texas. Many of these internet-connected speaker devices listen constantly for commands and connect to corporate servers to carry them out. Typically, they will ignore private chatter and transmit sound recordings only when you trigger the device, such as by pressing a button or speaking a command phrase like ā€œOK Google.ā€ Some gadgets also have a mute button to disable the microphones completely. But there’s no easy way for consumers to verify those safeguards.

Did someone invite a spy into your home over the holidays? Maybe so, if a friend or family member gave you a voicecontrolled speaker or some other smart device.

Itā€™s easy to forget, but everything from internet-connected speakers with voice assistants such as Amazonā€™s Alexa to television sets with built-in Netflix can be always listening ā€” and sometimes watching, too. As with almost all new technology, installing such devices means balancing privacy risks with the conveniences they offer.

The research firm IDC estimates worldwide shipments of 815 million smart speakers, security cameras and other devices in 2019, up 23 per cent from 2018. Many of the sales are for gifts.

You could sidestep the risks altogether by returning the devices right away. But if you decide to keep them – and the artificial intelligence behind them there are a few things you can do to minimize their eavesdropping potential.

ā€¢ THE SPEAKERS LISTEN … AND WATCH

Smart speakers such as Amazonā€™s Echo and Google Home let you check weather and appointments with simple voice commands. Fancier versions come with cameras and screens.

Many of these devices listen constantly for commands and connect to corporate servers to carry them out. Typically, they will ignore private chatter and transmit sound recordings only when you trigger the device, such as by pressing a button or speaking a command phrase like ā€œOK Google.ā€ Some gadgets also have a mute button to disable the microphones completely.

But thereā€™s no easy way for consumers to verify those safeguards. In one case, the Alexa assistant in an Echo device misheard background conversation as a command to send the chatter to an acquitance ā€” and so it did.

One more catch: Voice commands sent over the internet are typically stored indefinitely and may include conversations in the background. They can be sought in lawsuits and investigations.

Reputable companies let you review and delete your voice history, Amazon now lets you request automatic deletions after three or 18 months ā€”but you need to set that up, and thereā€™s no option to keep Amazon from saving your command history at all.

Until recently, tech companies allowed employees and contractors to review the voice interactions for quality control ā€” and some of those details leaked. Following a backlash, many companies are at least making it clearer and easier to opt out of human review. Pay attention to your choices.

If you have kids, set up a passcode for shopping if your speaker allows it. Otherwise, it can be childā€™s play for a kid to order toys and other goodies through Alexa.

As for those screen models, many also have cameras for video chats. When youā€™re not using the device, consider turning it around to face the wall, especially in the bedroom and other private settings. Or stick a bandage or some tape over the camera. It shouldnā€™t be recording, but why tempt fate? ā€¢ SECURITY WITH SECURITY VIDEO Online security cameras let you check in on your pets or kids when youā€™re not home. Amazonā€™s Ring doorbell lets you check whoā€™s at the door without getting up.

Hereā€™s the rub: If you can view video on an app, itā€™s possible that a skilled hacker can, too.

When you use the same password at multiple services, a hacker stealing your password from one place can try it on the camera service, too. So donā€™t reuse password. When available, enable twofactor authentication, which requires you to enter a temporary code sent as a text to ensure itā€™s you.

Again, you might want to turn the camera to face the wall when youā€™re home. Itā€™s a pain, though, and if you forget to turn it back when you leave, it defeats the purpose of having a security camera. ā€¢ ARE SMART LOCKS SMART? Smart locks let you unlock doors with an app, so you can let in guests even when youā€™re not home. Burglars might try to hack the system, though itā€™s often easier for them to just break a window.

As a precaution, disable any capabilities to unlock doors through a smart speaker voice command, especially if you have prankster kids or teens who might want to sneak someone in.

Though digital keys can be convenient for letting in guests and contractors, they can also leave a digital trail. In a child-custody dispute, for instance, your ex might subpoena the records to learn that youā€™ve been staying out late on school nights. If you rent and create a guest key thatā€™s used daily, the landlord might suspect an unauthorized occupant. ā€¢ ABOUT THOSE TVs Many smart TVs and TV streaming devices come with mics for voiceactivated playback controls and video search. That means having audio snippets transmitted over the internet. The same warnings for smart speakers apply here. Thereā€™s a simple fix if you arenā€™t using the internet features on your smart TV: Just donā€™t connect the TV to your Wi-Fi in the first place. Of course, this wonā€™t work if youā€™re not using a separate gadget for streaming video. ā€¢ TOYS THAT TALK Kids might get a kick out of dolls and other toys that talk back. But if the toy is connected to the internet, pay attention to how much control itā€™s giving parents and whether itā€™s letting kids connect to the outside world. You can check online to see if other parents or consumer groups have identified problems.

And be sure to install the latest apps and other software updates, as they may come with fixes for flaws that can otherwise be exploited by hackers.

Q
BREAKING-NEWS.CA