Integrity risks can not be eliminated without completely disconnecting.
NEW YORK – Revelations like an Amazon Echo smart speaker accidentally sent a family's private conversation to a familiar highlighting some unexpected risks for new voice activated technology.
According to the Amazon error, an "unlikely" series of accidental mood signals triggered the speaker caused it to start recording and then led it to interpret subsequent conversation as a "send message" request.
There is no way to eliminate these types of Personal Information risks not being completely disconnected. But you can minimize the odds of unpleasant surprises with these tips:
Kill the microphone: Most smart speakers have a physical button to disable the microphone so that a private conversation can not be recorded initially. You can beat it when you have sensitive conversations. The button on the echo turns red; Other devices have similar signals. It is not meaningful to keep the microphone inactive throughout the day. If Echo can not hear you, you will not be able to order more toilet paper or play jazz.
Restricting the Microphone: Disabling the microphone is not practical on a smartphone, but you can restrict which apps have access to it. Go to settings and turn off microphone access to all but important apps like voice recorder or video conferencing. Netflix does not really need voice access;
About this camera: Facebook CEO Mark Zuckerberg pays a piece of tape on his portable camera to prevent spy if someone were to hijack his device. Buy yourself a role. Or use dressing. If you have a home camera connected to the internet, turn the camera to the wall when you're home. Just remember to turn back before leaving, or you're down to the point that you have a security camera.
Block the signals: For smartphones and other gadgets you carry, a Faraday bag that blocks electromagnetic waves can help prevent unwanted espionage. The good will block cellular and other signals, which means that information about privacy-critical information, which your site does not leak either. Just remember, the phone will not get any calls while it's in the bag ̵
Be informed: Apple, Samsung and other engineering companies have been working over the years to ensure that their products work "out of the box" without the user having to go through long manuals and user manuals. The disadvantage is that users are often unaware of everything their gadgets can do, good or bad. Checking reputable online reviews, guidebooks and even instructional videos will help you get the most out of new technology. They will also tell you about some known glitches and risks.
Of course, it is safest to not buy a new gadget in the first place. It may not be useful for smartphones today, but do you really need a smart speaker or a TV connected to the internet? (As it turns out, it's actually hard to buy a TV without "smart" features today, but nothing says you have to connect it at home.)
From toothbrushes to slow kitchen utensils to toys, if companies can dream it up is out there. Companies often release smart gadgets without thinking about the risks and ensuring their security. This makes the devices simple targets for harmful hackers. And it is particularly true with non-known manufacturers or specializing in toys and other non-tech companies.