What You Should consider When thinking About Gifting Smart speaker in This season
AILSA CHANG, HOST:
Whether you let in the shops on Black Friday or scans Cyber Monday deals today, ‘ s face it. Holiday shopping season is already in full swing. But before you buy on, smart speaker, or fitness trackers Lily Hay Newman wants you to think twice. She says, you should know what you can get people in before you pack the box. Newman is the security reporter for Wired, and I asked you what you want, like a warning.
LILY HAY NEWMAN: I think it was kind of a cumulative thing over time. I have a ton of stories and a lot of reporting’ve written about the Internet of things, security and privacy.
CHANG: the Internet of things – do you think that Internet-connected devices?
NEWMAN: Internet-connected – exactly. And I’ve also received a lot of Internet-connected devices and kind of felt stuck with them and didn’t know what to do with them, because I will want to use me. As it is, I can try to return it? I recognize the person? I boom noob ^ _ ^ it?
CHANG: It is so cumbersome.
NEWMAN: Yes. You’re kind of in a quandary.
CHANG: OK, so you don’t warn people, it is just cheap, off-brand devices, we could talk about that at the end of all of the types of information to collect about you. Quite a lot is made of big companies like Google, Apple, Amazon. Let me just ask you, how much can you say to the people, what will you do with the data that you collect?
NEWMAN: Now, a big part of the problem is that it is quite unclear, and there are many different examples of big companies and small companies with data in such a way that at the end surprising the user. For example, virtually all of the major smart assistant-the manufacturer was in a situation where the consumer does not really recognize that you talk with the audio-snippets of people, to check their devices, such as machine learning, that the work on the device make and make it better, which, in a way, is a good service. But it involves human-to-human – you know, someone to hear what they said…
CHANG: that’s Right.
NEWMAN: …This is exactly the concern. And the company said most, well, that’s just how machine learning works at this point. It includes some of these human input. And the customers were like, OK, well, we knew that, you know? So…
CHANG: Why are you feed up with my voice…
NEWMAN: that’s Right.
CHANG: …of the machine brain? Well, what about things that which children use? As I could see, Internet-connected toys, or fitbit’s end up on some children’s wish lists. In fact, I can already hear colleagues, to see for their children, the wish lists already. What kind of precautions you could take to protect children’s privacy?
NEWMAN: There are some devices with Internet connection, which are tailor-made for children. They include additional privacy and security settings, so there are limits to the kind of data that can capture the device. But I also think that it is a big Problem with this donation of equipment to children, not to weigh because children are necessarily in a position the advantages and disadvantages with the device. And if the adults in your life the promotion of the use of these devices, then you are going to think it’s safe to.
CHANG: So, what is the best etiquette is to give someone one of these devices? I mean, do you think I should ask first before I actually someone one of these devices, or should I receipt a gift?
NEWMAN: Yes. I like all of these options. I mean, I think with a gift receipt, you can choose whether you want to actually you, or ask you, or, you know, someone close to you, well, the one you want to have? Which Model? What are the features that they are looking for? Things like that.
CHANG: but you will only be regifting at the end of it or throw it anyway.
NEWMAN: Yes, and, I mean,…
CHANG: Who wants that?
NEWMAN: I’m ashamed to say that I regifted devices with an Internet connection. I swear am it from now on.
CHANG: you are a promise to public broadcasting.
NEWMAN: I’ve never – Yes. Not anymore.
CHANG: Lily Hay Newman includes information security, digital privacy, and hacking for Wi-Fi. Thank You.
NEWMAN: thank you for the invitation.
NPR transcripts are created on a rush deadline by Verb8tm, Inc., a NPR the contractor and produced using a private transcription developed with NPR. This text may not be updated in its final form and may be or revised in the future. Accuracy and availability may vary. The authoritative record of NPR’s programming is the audio recording.
Released on Mon, 02 Dec 2019 23:10:00 +0000