Did someone invite a spy into your home over the holidays? Maybe so, if a friend or family member gave you a voice-controlled speaker or some other smart device.
It is easy to forget, but everything from Internet-connected speakers with voice assistants such as Amazon’s Alexa to TV sets with built-in Netflix can be always listening — and sometimes watching, too. As with almost all new technology, installing such devices means balancing privacy risks with the conveniences they offer.
Research firm International Data Corp has estimated that worldwide shipments of smart speakers, security cameras and other devices last year totaled 815 million, up 23 percent from 2018.
Many of the sales are for gifts.
You could sidestep the risks altogether by returning the devices right away, but if you decide to keep them — and the artificial intelligence behind them — there are a few things you can do to minimize their eavesdropping potential.
SPEAKERS LISTEN
Smart speakers such as Amazon’s Echo and Google Home let you check weather and appointments with simple voice commands. Fancier versions come with cameras and screens.
Many of these devices listen constantly for commands and connect to corporate servers to carry them out. Typically, they will ignore private chatter and transmit sound recordings only when you trigger the device, such as by pressing a button or speaking a command phrase such as: “OK Google.”
Some gadgets also have a mute button to disable the microphones completely.
However, there is no easy way for consumers to verify those safeguards. In one case, the Alexa assistant in an Echo device misheard background conversation as a command to send the chatter to an acquaintance — and so it did.
One more catch: Voice commands sent over the Internet are typically stored indefinitely and might include conversations in the background. They can be sought in lawsuits and investigations.
Reputable companies let you review and delete your voice history: Amazon now lets you request automatic deletions after three or 18 months — but you need to set that up and there is no option to keep Amazon from saving your command history at all.
Until recently, tech companies allowed employees and contractors to review the voice interactions for quality control — and some of those details leaked. Following a backlash, many companies are at least making it clearer and easier to opt out of human review. Pay attention to your choices.
If you have children, set up a passcode for shopping if your speaker allows it. Otherwise, it can be child’s play for a kid to order toys and other goodies through Alexa.
As for those screen models, many also have cameras for video chats. When you are not using the device, consider turning it around to face the wall, especially in the bedroom and other private settings. Or stick a bandage or some tape over the camera. It should not be recording, but why tempt fate?
SECURITY WITH CAMERAS
Online security cameras let you check in on your pets or kids when you are not home. Amazon’s Ring doorbell lets you check who is at the door without getting up.
Here is the rub: If you can view video on an app, it is possible that a skilled hacker can, too.
When you use the same password for multiple services, a hacker stealing your password from one place can try it on the camera service, too. So do not reuse passwords.
When available, enable two-factor authentication, which requires you to enter a temporary code sent as a text to ensure it is you.
Again, you might want to turn the camera to face the wall when you are home. However, that is a pain and if you forget to turn it back when you leave, it defeats the purpose of having a security camera.
ARE SMART LOCKS MART?
Smart locks let you unlock doors with an app so you can let in guests, even when you are not home. Burglars might try to hack the system, although it is often easier for them to just break a window.
As a precaution, disable any capabilities to unlock doors through a smart speaker voice command, especially if you have prankster kids — or teens who might want to sneak someone in.
Although digital keys can be convenient for letting in guests and contractors, they can also leave a digital trail.
For instance, in a child-custody dispute, your ex might subpoena the records to learn that you have been staying out late on school nights. If you rent and create a guest key that is used daily, the landlord might suspect an unauthorized occupant.
ABOUT THOSE TVS
Many smart TVs and TV streaming devices come with microphones for voice-activated playback controls and video search. That means that audio snippets can be transmitted over the Internet.
The same warnings for smart speakers apply here.
There is a simple fix if you are not using the Internet features on your smart TV: Just do not connect the TV to your Wi-Fi in the first place. Of course, this will not work if you are not using a separate gadget for streaming video.
TOYS THAT TALK
Kids might get a kick out of dolls and other toys that talk back.
However, if the toy is connected to the Internet, pay attention to how much control it is giving parents and whether it is letting kids connect to the outside world. You can check online to see if other parents or consumer groups have identified problems.
In addition, be sure to install the latest apps and other software updates, as they might come with fixes for flaws that can otherwise be exploited by hackers.
The 75th anniversary summit of NATO was held in Washington from Tuesday to Thursday last week. Its main focus was the reinvigoration and revitalization of NATO, along with its expansion. The shadow of domestic electoral politics could not be avoided. The focus was on whether US President Biden would deliver his speech at the NATO summit cogently. Biden’s fitness to run in the next US presidential election in November was under assessment. NATO is acquiring more coherence and teeth. These were perhaps more evident than Biden’s future. The link to the Biden candidacy is critical for NATO. If Biden loses
Shortly after Hu Jintao (胡錦濤) stepped down as general secretary of the Chinese Communist Party (CCP) in 2012, his successor, Xi Jinping (習近平), articulated the “Chinese Dream,” which aims to rejuvenate the nation and restore its historical glory. While defense analysts and media often focus on China’s potential conflict with Taiwan, achieving “rejuvenation” would require Beijing to engage in at least six different conflicts with at least eight countries. These include territories ranging from the South China Sea and East China Sea to Inner Asia, the Himalayas and lands lost to Russia. Conflicts would involve Taiwan, the Philippines, Vietnam, Malaysia,
The Sino-Indian border dispute remains one of the most complex and enduring border issues in the world. Unlike China’s borders with Russia and Vietnam, which have seen conflicts, but eventually led to settled agreements, the border with India, particularly the region of Arunachal Pradesh, remains a point of contention. This op-ed explores the historical and geopolitical nuances that contribute to this unresolved border dispute. The crux of the Sino-Indian border dispute lies in the differing interpretations of historical boundaries. The McMahon Line, established by the 1914 Simla Convention, was accepted by British India and Tibet, but never recognized by China, which
In a recent interview with the Malaysian Chinese-language newspaper Sin Chew Daily, former president Ma Ying-jeou (馬英九) called President William Lai (賴清德) “naive.” As always with Ma, one must first deconstruct what he is saying to fully understand the parallel universe he insists on defending. Who is being “naive,” Lai or Ma? The quickest way is to confront Ma with a series of pointed questions that force him to take clear stands on the complex issues involved and prevent him from his usual ramblings. Regarding China and Taiwan, the media should first begin with questions like these: “Did the Chinese Nationalist Party (KMT)