Did someone invite a spy into your home over the holidays? Maybe so, if a friend or family member gave you a voice-controlled speaker or some other smart device.
It is easy to forget, but everything from Internet-connected speakers with voice assistants such as Amazon’s Alexa to TV sets with built-in Netflix can be always listening — and sometimes watching, too. As with almost all new technology, installing such devices means balancing privacy risks with the conveniences they offer.
Research firm International Data Corp has estimated that worldwide shipments of smart speakers, security cameras and other devices last year totaled 815 million, up 23 percent from 2018.
Many of the sales are for gifts.
You could sidestep the risks altogether by returning the devices right away, but if you decide to keep them — and the artificial intelligence behind them — there are a few things you can do to minimize their eavesdropping potential.
SPEAKERS LISTEN
Smart speakers such as Amazon’s Echo and Google Home let you check weather and appointments with simple voice commands. Fancier versions come with cameras and screens.
Many of these devices listen constantly for commands and connect to corporate servers to carry them out. Typically, they will ignore private chatter and transmit sound recordings only when you trigger the device, such as by pressing a button or speaking a command phrase such as: “OK Google.”
Some gadgets also have a mute button to disable the microphones completely.
However, there is no easy way for consumers to verify those safeguards. In one case, the Alexa assistant in an Echo device misheard background conversation as a command to send the chatter to an acquaintance — and so it did.
One more catch: Voice commands sent over the Internet are typically stored indefinitely and might include conversations in the background. They can be sought in lawsuits and investigations.
Reputable companies let you review and delete your voice history: Amazon now lets you request automatic deletions after three or 18 months — but you need to set that up and there is no option to keep Amazon from saving your command history at all.
Until recently, tech companies allowed employees and contractors to review the voice interactions for quality control — and some of those details leaked. Following a backlash, many companies are at least making it clearer and easier to opt out of human review. Pay attention to your choices.
If you have children, set up a passcode for shopping if your speaker allows it. Otherwise, it can be child’s play for a kid to order toys and other goodies through Alexa.
As for those screen models, many also have cameras for video chats. When you are not using the device, consider turning it around to face the wall, especially in the bedroom and other private settings. Or stick a bandage or some tape over the camera. It should not be recording, but why tempt fate?
SECURITY WITH CAMERAS
Online security cameras let you check in on your pets or kids when you are not home. Amazon’s Ring doorbell lets you check who is at the door without getting up.
Here is the rub: If you can view video on an app, it is possible that a skilled hacker can, too.
When you use the same password for multiple services, a hacker stealing your password from one place can try it on the camera service, too. So do not reuse passwords.
When available, enable two-factor authentication, which requires you to enter a temporary code sent as a text to ensure it is you.
Again, you might want to turn the camera to face the wall when you are home. However, that is a pain and if you forget to turn it back when you leave, it defeats the purpose of having a security camera.
ARE SMART LOCKS MART?
Smart locks let you unlock doors with an app so you can let in guests, even when you are not home. Burglars might try to hack the system, although it is often easier for them to just break a window.
As a precaution, disable any capabilities to unlock doors through a smart speaker voice command, especially if you have prankster kids — or teens who might want to sneak someone in.
Although digital keys can be convenient for letting in guests and contractors, they can also leave a digital trail.
For instance, in a child-custody dispute, your ex might subpoena the records to learn that you have been staying out late on school nights. If you rent and create a guest key that is used daily, the landlord might suspect an unauthorized occupant.
ABOUT THOSE TVS
Many smart TVs and TV streaming devices come with microphones for voice-activated playback controls and video search. That means that audio snippets can be transmitted over the Internet.
The same warnings for smart speakers apply here.
There is a simple fix if you are not using the Internet features on your smart TV: Just do not connect the TV to your Wi-Fi in the first place. Of course, this will not work if you are not using a separate gadget for streaming video.
TOYS THAT TALK
Kids might get a kick out of dolls and other toys that talk back.
However, if the toy is connected to the Internet, pay attention to how much control it is giving parents and whether it is letting kids connect to the outside world. You can check online to see if other parents or consumer groups have identified problems.
In addition, be sure to install the latest apps and other software updates, as they might come with fixes for flaws that can otherwise be exploited by hackers.
Chinese state-owned companies COSCO Shipping Corporation and China Merchants have a 30 percent stake in Kaohsiung Port’s Kao Ming Container Terminal (Terminal No. 6) and COSCO leases Berths 65 and 66. It is extremely dangerous to allow Chinese companies or state-owned companies to operate critical infrastructure. Deterrence theorists are familiar with the concepts of deterrence “by punishment” and “by denial.” Deterrence by punishment threatens an aggressor with prohibitive costs (like retaliation or sanctions) that outweigh the benefits of their action, while deterrence by denial aims to make an attack so difficult that it becomes pointless. Elbridge Colby, currently serving as the Under
The Ministry of the Interior on Thursday last week said it ordered Internet service providers to block access to Chinese social media platform Xiaohongshu (小紅書, also known as RedNote in English) for a year, citing security risks and more than 1,700 alleged fraud cases on the platform since last year. The order took effect immediately, abruptly affecting more than 3 million users in Taiwan, and sparked discussions among politicians, online influencers and the public. The platform is often described as China’s version of Instagram or Pinterest, combining visual social media with e-commerce, and its users are predominantly young urban women,
Most Hong Kongers ignored the elections for its Legislative Council (LegCo) in 2021 and did so once again on Sunday. Unlike in 2021, moderate democrats who pledged their allegiance to Beijing were absent from the ballots this year. The electoral system overhaul is apparent revenge by Beijing for the democracy movement. On Sunday, the Hong Kong “patriots-only” election of the LegCo had a record-low turnout in the five geographical constituencies, with only 1.3 million people casting their ballots on the only seats that most Hong Kongers are eligible to vote for. Blank and invalid votes were up 50 percent from the previous
Japanese Prime Minister Sanae Takaichi lit a fuse the moment she declared that trouble for Taiwan means trouble for Japan. Beijing roared, Tokyo braced and like a plot twist nobody expected that early in the story, US President Donald Trump suddenly picked up the phone to talk to her. For a man who normally prefers to keep Asia guessing, the move itself was striking. What followed was even more intriguing. No one outside the room knows the exact phrasing, the tone or the diplomatic eyebrow raises exchanged, but the broad takeaway circulating among people familiar with the call was this: Trump did