Amazon's Latest Gimmicks Are Pushing the Limits of Privacy

At the end of September, amidst its usual flurry of fall hardware announcements, Amazon debuted two especially futuristic products within five days of each other.

The first is a small autonomous surveillance drone, Ring Always Home Cam, that waits patiently inside a charging dock to eventually rise up and fly around your house, checking whether you left the stove on or investigating potential burglaries.The second is a palm recognition scanner, Amazon One, that the company is piloting at two of its grocery stores in Seattle as a mechanism for faster entry and checkout.
Both products aim to make security and authentication more convenientbut for privacy-conscious consumers, they also raise red flags.

The company also owns Ring, whose smart doorbells have had myriad security issues and have been widely criticized for bringing unprecedented surveillance to traditionally semi-private spaces. Meanwhile, the biometric data that Amazon Go will collect is particularly sensitive, because unlike a password you can't simply change it if a hacker steals it or it gets unintentionally exposed.Amazon has a strong record for maintaining the security of its massive cloud infrastructure, but there have been lapses across the sprawling business.

Ring's Always Home Cam, which integrates with the home security system Ring Alarm, rests in a dock that physically blocks its camera most of the time. When you set up the product you walk it around your house on the different flight paths you want it to take and those become the only places the drone can fly.

The WIRED conversation illuminates how technology is changing every aspect of our livesfrom culture to business, science to design.

Original article
Author: Lily Hay Newman

Lily Hay Newman has recently written 7 articles on similar topics including :
  1. "CD Projekt Red's list of woes gets longer, as hackers claim to have stolen the source code for their most popular games". (February 9, 2021)
  2. "To show how browsers can guard against the speculative execution bug, Google security researchers have shown how an attack would work". (March 12, 2021)
  3. "Better anti-tracking measures have become the norm for Chrome, Firefox, Safari, and other modern browsers. But they still disagree on how exactly they should work". (January 30, 2020)
  4. "A bad code update allowed anyone to easily reveal which accounts posted to Facebook Pagesincluding celebrities and politiciansfor several hours". (January 11, 2020)
  5. "After over a million downloads, the Tekya-infected Android offerings are finally on ice". (March 24, 2020)
  6. "The platform has promised to do better after a string of incidents. But the hardest part might be managing user expectations". (February 28, 2021)
  7. "All computers are completely shut down, one Universal Health Services employee told WIRED". (September 28, 2020)
Posted on  , , ,