“…These vulnerabilities give the attacker the ability to (1) hijack a drone (stealing it, crashing it, or even harming a person with it), (2) turn on a nearby drone and ask it to stream video and microphone data to spy on a neighbor, (3) take control of a children's toy to insult the child or to have inappropriate conversations with the child, using the trusted voice of the toy, (4) take control of the toy to spy on the household, (5) interact with a stolen/or resold toy to extract sensitive information the child once shared with their toy, (6) take control of Internet-connected cameras to spy on a household, (7) identify the existence of sensitive devices (e.g., vibrators) nearby and obtain private information of a person's intimate decisions, and (8) impersonate a trusted partner and allow an attacker to commit remote sexual assault. We also created videos to illustrate and clarify some of these attacks, including the voice attacks on the dino 1 , a takeover attack on the drone 2 , and attacks on intimate devices 3 .…”