- cross-posted to:
- hackernews@lemmy.bestiver.se
- privacy@programming.dev
- cross-posted to:
- hackernews@lemmy.bestiver.se
- privacy@programming.dev
An engineer got curious about how his iLife A11 smart vacuum worked and monitored the network traffic coming from the device. That’s when he noticed it was constantly sending logs and telemetry data to the manufacturer — something he hadn’t consented to. The user, Harishankar, decided to block the telemetry servers’ IP addresses on his network, while keeping the firmware and OTA servers open. While his smart gadget worked for a while, it just refused to turn on soon after. After a lengthy investigation, he discovered that a remote kill command had been issued to his device.



There are potential security holes in the device you wrote and posted that comment from, so if they are exploited, can I make the following comment?:
Play stupid games win stupid prizes.
I have stationary I use to write letters to people. I spend about 10 minutes a day writing letters. Paper and pen have no telemetry whatsoever lol