Proceedings of the 2017 Workshop on Internet of Things Security and Privacy 2017
DOI: 10.1145/3139937.3139947
|View full text |Cite
|
Sign up to set email alerts
|

Security & Privacy in Smart Toys

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
24
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 41 publications
(25 citation statements)
references
References 3 publications
1
24
0
Order By: Relevance
“…Furthermore, this pattern of good privacy posture being let down by weak implementation is not unique to the toys in our study. Recently, researchers have shown that in spite of an encryption mechanism intended to preserve the privacy of children's voice recordings in transit, a particular toy's usage of a fixed set of keys made it possible to completely decrypt any voice communication between the toy and its server [8].…”
Section: A Privacy Policy Violationsmentioning
confidence: 99%
“…Furthermore, this pattern of good privacy posture being let down by weak implementation is not unique to the toys in our study. Recently, researchers have shown that in spite of an encryption mechanism intended to preserve the privacy of children's voice recordings in transit, a particular toy's usage of a fixed set of keys made it possible to completely decrypt any voice communication between the toy and its server [8].…”
Section: A Privacy Policy Violationsmentioning
confidence: 99%
“…For instance, some of the toys we examined present content fetched over an unencrypted channel, making them subject to being maliciously replaced by a network attacker. A compromised toy with a speaker can be made to voice distressing audio [60]. Finally, a child can be harmed by any leak of information captured by a smart toy.…”
Section: Introductionmentioning
confidence: 99%
“…12 This is concerning because, once purchased, a child can use any device that their caregiver deems reasonable. Valente and Cardenas (2017) found that carers allow children full access to connected devices aimed at an adult audience, because the functionality is broader than equivalent devices aimed at children. Safeguards in place for children's privacy in particular may be of little value if toys that are marketed to them pale in comparison to technology that is already available in the child's home.…”
Section: Lack Of Claritymentioning
confidence: 99%
“…Children are less likely than a parent or carer to understand the implications of bringing a connected device into the home. Research has shown that children do not always understand that devices with a microphone will record them, or that individuals can subsequently listen to the recordings (Valente and Cardenas (2017)). Although Article 14 of GDPR suggests that privacy policies should be targeted at the users of the product, this does not happen in practice -with only one of the six privacy policies reviewed having a reading age close to the target age of the product (Detective Dot being aimed at children aged 7+).…”
Section: Independence…at the Cost Of Privacy And Security?mentioning
confidence: 99%
See 1 more Smart Citation