How tech companies deceive you into giving up your data and privacy | Finn Lützow-Holm Myrstad

TED
21 Nov 201812:13

Summary

TLDRThe speaker exposes the privacy and security risks of internet-connected toys like Cayla, which collects personal data, and highlights the lack of consumer protection. They demonstrate how easily Cayla can be hacked, leading to bans and store removals. The talk extends to app privacy, revealing the unrealistic expectations placed on users to read and understand lengthy, complex terms and conditions. The speaker advocates for clearer terms, better enforcement of privacy laws, and prioritizing security to build consumer trust.

Takeaways

  • 🐻 Cayla, an internet-connected toy, was named Toy of the Year but was found to be collecting personal data from children without their or their parents' knowledge.
  • 🔒 The toy's connectivity allowed strangers within range to connect to it, posing a significant security risk to children's privacy.
  • 📱 The speaker highlighted the broader issue of billions of devices expected to be online by 2020, raising concerns about data privacy and security.
  • 📑 The terms and conditions of apps and devices often allow for the collection and use of personal data without clear consent from users.
  • 🌐 The speaker's team conducted an experiment to read out loud the terms of apps on an average phone, taking over 31 hours, emphasizing the impracticality of expecting users to read them.
  • 🚫 Despite the security flaws, Cayla was sold worldwide for over a year after the report, indicating weak enforcement of privacy regulations.
  • 💔 The speaker critiqued the lack of transparency and fairness in how personal data is used, manipulated, and potentially exploited by companies.
  • ❤️ The story of a popular dating app was used to illustrate how personal and intimate data can be exploited, with broad permissions granted to the company in the terms and conditions.
  • 🏦 The implications of data exploitation can lead to financial loss, subconscious manipulation, and discrimination against individuals.
  • 🌟 Positive change can be achieved when companies prioritize privacy, governments enforce regulations, and citizens demand respect for their rights.

Q & A

  • What was Cayla, the toy mentioned in the script, known for?

    -Cayla was a toy that connected to the internet and used speech recognition technology to interact with children, answering their questions and responding like a friend. It was voted toy of the year in various countries.

  • What privacy concerns were raised about Cayla?

    -Cayla raised privacy concerns because it was found to be collecting and potentially sharing personal information from children and their families without proper security measures, allowing anyone with a smartphone to connect to the toy within a certain distance.

  • What actions were taken against Cayla after the investigation?

    -Following the investigation, Cayla was banned in Germany, taken off the shelves by major retailers like Amazon and Wal-Mart, and is now on display at the German Spy Museum in Berlin.

  • How long did it take the speaker's team to read the terms and conditions of an average phone?

    -It took the speaker's team 31 hours, 49 minutes, and 11 seconds to read the terms and conditions of an average phone.

  • Why did the speaker's team read the terms and conditions out loud?

    -The speaker's team read the terms and conditions out loud to demonstrate the unrealistic expectation placed on consumers to read and understand these lengthy and complex documents before using apps.

  • What was the outcome of the speaker's experiment with dating apps?

    -The speaker found that dating apps had a pre-ticked box granting them access to personal pictures and other data, with terms and conditions that allowed for perpetual and irrevocable use of that content.

  • What potential risks were associated with the data collection by dating apps as mentioned in the script?

    -The potential risks included financial loss based on web browsing history, subconscious manipulation through targeted ads during vulnerable moments, and discrimination such as being denied health insurance coverage due to data sold by fitness apps.

  • What change did the dating companies make after the legal complaint?

    -Following the legal complaint, the dating companies changed their policies globally to address the privacy concerns raised by the speaker's team.

  • What is the speaker's call to action for companies, governments, and citizens?

    -The speaker calls for companies to prioritize privacy and security, governments to create a safer internet with up-to-date rules, and citizens to use their voice to remind the world that technology should respect basic rights.

  • What is the main argument the speaker is making about technology and privacy?

    -The main argument the speaker is making is that technology can only benefit society if it respects basic rights, including privacy and security, and that there is a need for change in how data is collected, used, and protected.

Outlines

00:00

🤖 The Dark Side of Smart Toys

The speaker introduces Cayla, an internet-connected toy that was voted toy of the year, highlighting the privacy and security concerns associated with such devices. Cayla uses speech recognition to interact with children but is also capable of collecting personal information, which the company can use for targeted advertising and share with third parties. The toy's Bluetooth connectivity allows anyone within range to connect to it, posing a potential risk to children. The speaker demonstrates this vulnerability by having a colleague connect to Cayla from outside the room and manipulate it to ask a child to come out and play. The toy's security flaws led to it being banned in Germany and removed from major retailers' shelves, but it remained on sale in other parts of the world for over a year after the report was published. The speaker emphasizes the need for better security and privacy regulations for smart devices before they reach the market.

05:02

📱 The Illusion of Informed Consent in App Terms

The speaker discusses the issue of informed consent in the context of app usage, pointing out that users often agree to terms and conditions without fully understanding them. To illustrate this, the speaker's team conducted an experiment where they printed and read aloud the terms of popular apps, which amounted to over 900 pages and took more than 31 hours to read. The speaker argues that achieving informed consent is nearly impossible due to the length and complexity of these terms. They also highlight the imbalance of power that arises when companies gather and use personal information on a massive scale based on users' consent. The speaker calls for more understandable terms and less take-it-or-leave-it approaches to data privacy and security.

10:05

❤️ Privacy Issues in the Dating App Industry

The speaker shares a personal anecdote about creating a profile on a popular dating app for research purposes, despite being newly married. They discovered that the app had a pre-ticked box granting it access to all personal pictures on Facebook, which could number in the thousands. Upon reviewing the app's terms and conditions, they found that users grant the company an irrevocable, perpetual, worldwide license to use their content in any way they see fit. This could lead to personal data being used for financial decisions, subconscious manipulation through targeted ads, or discrimination by selling data to health insurance companies. The speaker concludes by emphasizing the importance of privacy and security in building trust with users and calls for companies to prioritize these aspects to foster loyalty. They also stress the need for governments to ensure a safer internet with up-to-date rules and for citizens to use their voices to advocate for technology that respects basic rights.

Mindmap

Keywords

💡Cayla

Cayla is an internet-connected toy that was voted toy of the year in various countries. It uses speech recognition technology to interact with children, but the script highlights the privacy concerns associated with it, as it collects personal information from children and their families, which can be used for targeted advertising and shared with third parties. This example is central to the video's theme of privacy and security in smart devices.

💡Internet of Things (IoT)

The Internet of Things refers to the network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, and connectivity that enables these objects to connect and exchange data. The script mentions the expected increase in IoT devices, emphasizing the potential security flaws and privacy issues, as illustrated by the Cayla toy example.

💡Speech Recognition Technology

Speech recognition technology allows devices to interpret and respond to human speech. In the context of the video, Cayla uses this technology to interact with children, but it also raises concerns about the data being collected and how it's used, which is a key point in the discussion about privacy and the responsibility of tech companies.

💡Personal Information

Personal information encompasses any data that can be used to identify an individual, such as names, addresses, and online identifiers. The video script discusses how devices like Cayla collect personal information, including recordings of children and their families, which can be exploited for targeted advertising and shared with unnamed third parties.

💡Targeted Advertising

Targeted advertising is a marketing practice that involves using personal information to deliver customized ads to consumers. The script criticizes this practice as it relates to the Cayla toy, which uses collected data to serve targeted ads to children and their families, raising ethical and privacy concerns.

💡Terms and Conditions

Terms and conditions are the contractual agreements between a service provider and its users. The video script points out that users often consent to these terms without fully understanding them, which can lead to the unwitting surrender of personal data. This is exemplified by the Cayla toy's app, which requires parental consent to unspecified changes and data usage.

💡Bluetooth

Bluetooth is a wireless technology standard for exchanging data over short distances. In the script, it is mentioned that Cayla's Bluetooth capabilities allow unauthorized individuals to connect to the toy from a distance, highlighting a significant security vulnerability in the device.

💡Consumer Rights

Consumer rights refer to the protections and legal rights granted to consumers in relation to the products and services they use. The speaker in the video is concerned with protecting these rights, especially in the context of smart devices and apps that may compromise privacy and security.

💡Data Privacy

Data privacy is the practice of protecting personal information from unauthorized access, use, or disclosure. The video script emphasizes the importance of data privacy, as illustrated by the various examples of how personal data is collected, used, and potentially misused by smart devices and apps.

💡Informed Consent

Informed consent is a concept in which an individual voluntarily agrees to a procedure or treatment after being given sufficient information about the risks and benefits. The video argues that achieving informed consent is nearly impossible when it comes to digital services, as terms and conditions are often lengthy and complex, as demonstrated by the experiment where the speaker's team read out loud the terms of an average phone's apps.

💡Dating Apps

Dating apps are mobile applications designed to help individuals find romantic partners. The script discusses the privacy issues related to these apps, which may collect and use personal and intimate information without users fully understanding the implications, as shown by the example of the speaker downloading a popular dating app to investigate its terms and data practices.

Highlights

Cayla, an internet-connected toy, was voted toy of the year but was found to be harvesting personal information.

The toy's speech recognition technology could be exploited to collect data from children and their families.

Cayla's app required parental consent to terms that allowed for data collection and sharing with third parties.

The toy could be connected to by anyone with a smartphone within range, posing a security risk.

A live hack demonstrated how easy it was to connect to Cayla from outside the room.

The company claimed that only IT experts could breach Cayla's security, which was disproven during the live hack.

As a result of the investigation, Cayla was banned in Germany and removed from shelves by major retailers.

The speaker's team read the terms of popular apps aloud, taking over 31 hours, to show the impracticality of user consent.

The dating app investigation revealed that users grant perpetual rights to their content upon joining.

The dating app's terms allowed for the use of personal data in ads and other commercial practices.

The potential misuse of personal data can lead to financial loss, subconscious manipulation, and discrimination.

The dating companies changed their policies globally following a legal complaint filed by the speaker's organization.

The speaker argues that companies should prioritize privacy and security to build trust with users.

Governments are urged to create a safer internet by ensuring enforcement and up-to-date rules.

Citizens are encouraged to use their voice to remind the world that technology should respect basic rights.

Transcripts

play00:13

Do you remember when you were a child,

play00:15

you probably had a favorite toy that was a constant companion,

play00:19

like Christopher Robin had Winnie the Pooh,

play00:21

and your imagination fueled endless adventures?

play00:25

What could be more innocent than that?

play00:28

Well, let me introduce you to my friend Cayla.

play00:34

Cayla was voted toy of the year in countries around the world.

play00:38

She connects to the internet and uses speech recognition technology

play00:41

to answer your child's questions,

play00:43

respond just like a friend.

play00:46

But the power doesn't lie with your child's imagination.

play00:50

It actually lies with the company harvesting masses of personal information

play00:55

while your family is innocently chatting away in the safety of their home,

play01:00

a dangerously false sense of security.

play01:04

This case sounded alarm bells for me,

play01:07

as it is my job to protect consumers' rights in my country.

play01:11

And with billions of devices such as cars,

play01:15

energy meters and even vacuum cleaners expected to come online by 2020,

play01:20

we thought this was a case worth investigating further.

play01:24

Because what was Cayla doing

play01:26

with all the interesting things she was learning?

play01:28

Did she have another friend she was loyal to and shared her information with?

play01:33

Yes, you guessed right. She did.

play01:36

In order to play with Cayla,

play01:38

you need to download an app to access all her features.

play01:42

Parents must consent to the terms being changed without notice.

play01:47

The recordings of the child, her friends and family,

play01:51

can be used for targeted advertising.

play01:54

And all this information can be shared with unnamed third parties.

play01:59

Enough? Not quite.

play02:02

Anyone with a smartphone can connect to Cayla

play02:07

within a certain distance.

play02:09

When we confronted the company that made and programmed Cayla,

play02:14

they issued a series of statements

play02:16

that one had to be an IT expert in order to breach the security.

play02:22

Shall we fact-check that statement and live hack Cayla together?

play02:29

Here she is.

play02:32

Cayla is equipped with a Bluetooth device

play02:35

which can transmit up to 60 feet,

play02:37

a bit less if there's a wall between.

play02:40

That means I, or any stranger, can connect to the doll

play02:45

while being outside the room where Cayla and her friends are.

play02:49

And to illustrate this,

play02:51

I'm going to turn Cayla on now.

play02:53

Let's see, one, two, three.

play02:57

There. She's on. And I asked a colleague

play02:59

to stand outside with his smartphone,

play03:01

and he's connected,

play03:03

and to make this a bit creepier ...

play03:05

(Laughter)

play03:09

let's see what kids could hear Cayla say in the safety of their room.

play03:15

Man: Hi. My name is Cayla. What is yours?

play03:18

Finn Myrstad: Uh, Finn.

play03:20

Man: Is your mom close by?

play03:22

FM: Uh, no, she's in the store.

play03:24

Man: Ah. Do you want to come out and play with me?

play03:27

FM: That's a great idea.

play03:29

Man: Ah, great.

play03:32

FM: I'm going to turn Cayla off now.

play03:34

(Laughter)

play03:39

We needed no password

play03:41

or to circumvent any other type of security to do this.

play03:46

We published a report in 20 countries around the world,

play03:50

exposing this significant security flaw

play03:53

and many other problematic issues.

play03:56

So what happened?

play03:57

Cayla was banned in Germany,

play04:00

taken off the shelves by Amazon and Wal-Mart,

play04:03

and she's now peacefully resting

play04:06

at the German Spy Museum in Berlin.

play04:10

(Laughter)

play04:13

However, Cayla was also for sale in stores around the world

play04:17

for more than a year after we published our report.

play04:21

What we uncovered is that there are few rules to protect us

play04:25

and the ones we have are not being properly enforced.

play04:30

We need to get the security and privacy of these devices right

play04:33

before they enter the market,

play04:36

because what is the point of locking a house with a key

play04:40

if anyone can enter it through a connected device?

play04:45

You may well think, "This will not happen to me.

play04:48

I will just stay away from these flawed devices."

play04:52

But that won't keep you safe,

play04:54

because simply by connecting to the internet,

play04:57

you are put in an impossible take-it-or-leave-it position.

play05:02

Let me show you.

play05:04

Like most of you, I have dozens of apps on my phone,

play05:07

and used properly, they can make our lives easier,

play05:10

more convenient and maybe even healthier.

play05:13

But have we been lulled into a false sense of security?

play05:18

It starts simply by ticking a box.

play05:21

Yes, we say,

play05:23

I've read the terms.

play05:27

But have you really read the terms?

play05:31

Are you sure they didn't look too long

play05:33

and your phone was running out of battery,

play05:35

and the last time you tried they were impossible to understand,

play05:38

and you needed to use the service now?

play05:41

And now, the power imbalance is established,

play05:45

because we have agreed to our personal information

play05:49

being gathered and used on a scale we could never imagine.

play05:53

This is why my colleagues and I decided to take a deeper look at this.

play05:57

We set out to read the terms

play06:00

of popular apps on an average phone.

play06:03

And to show the world how unrealistic it is

play06:07

to expect consumers to actually read the terms,

play06:10

we printed them,

play06:11

more than 900 pages,

play06:14

and sat down in our office and read them out loud ourselves,

play06:19

streaming the experiment live on our websites.

play06:22

As you can see, it took quite a long time.

play06:24

It took us 31 hours, 49 minutes and 11 seconds

play06:29

to read the terms on an average phone.

play06:31

That is longer than a movie marathon of the "Harry Potter" movies

play06:36

and the "Godfather" movies combined.

play06:38

(Laughter)

play06:41

And reading is one thing.

play06:43

Understanding is another story.

play06:45

That would have taken us much, much longer.

play06:49

And this is a real problem,

play06:50

because companies have argued for 20 to 30 years

play06:54

against regulating the internet better,

play06:57

because users have consented to the terms and conditions.

play07:02

As we've shown with this experiment,

play07:04

achieving informed consent is close to impossible.

play07:09

Do you think it's fair to put the burden of responsibility on the consumer?

play07:14

I don't.

play07:15

I think we should demand less take-it-or-leave-it

play07:18

and more understandable terms before we agree to them.

play07:22

(Applause)

play07:23

Thank you.

play07:28

Now, I would like to tell you a story about love.

play07:34

Some of the world's most popular apps are dating apps,

play07:37

an industry now worth more than, or close to, three billion dollars a year.

play07:43

And of course, we're OK sharing our intimate details

play07:47

with our other half.

play07:49

But who else is snooping,

play07:51

saving and sharing our information

play07:54

while we are baring our souls?

play07:56

My team and I decided to investigate this.

play08:00

And in order to understand the issue from all angles

play08:03

and to truly do a thorough job,

play08:07

I realized I had to download

play08:09

one of the world's most popular dating apps myself.

play08:14

So I went home to my wife ...

play08:16

(Laughter)

play08:18

who I had just married.

play08:20

"Is it OK if I establish a profile on a very popular dating app

play08:25

for purely scientific purposes?"

play08:26

(Laughter)

play08:28

This is what we found.

play08:30

Hidden behind the main menu was a preticked box

play08:34

that gave the dating company access to all my personal pictures on Facebook,

play08:40

in my case more than 2,000 of them,

play08:43

and some were quite personal.

play08:46

And to make matters worse,

play08:48

when we read the terms and conditions,

play08:50

we discovered the following,

play08:52

and I'm going to need to take out my reading glasses for this one.

play08:56

And I'm going to read it for you, because this is complicated.

play08:59

All right.

play09:01

"By posting content" --

play09:03

and content refers to your pictures, chat

play09:05

and other interactions in the dating service --

play09:07

"as a part of the service,

play09:08

you automatically grant to the company,

play09:10

its affiliates, licensees and successors

play09:12

an irrevocable" -- which means you can't change your mind --

play09:16

"perpetual" -- which means forever --

play09:19

"nonexclusive, transferrable, sublicensable, fully paid-up,

play09:22

worldwide right and license to use, copy, store, perform,

play09:24

display, reproduce, record,

play09:26

play, adapt, modify and distribute the content,

play09:28

prepare derivative works of the content,

play09:30

or incorporate the content into other works

play09:32

and grant and authorize sublicenses of the foregoing in any media

play09:35

now known or hereafter created."

play09:40

That basically means that all your dating history

play09:44

and everything related to it can be used for any purpose for all time.

play09:50

Just imagine your children seeing your sassy dating photos

play09:55

in a birth control ad 20 years from now.

play10:00

But seriously, though --

play10:01

(Laughter)

play10:04

what might these commercial practices mean to you?

play10:08

For example, financial loss:

play10:11

based on your web browsing history,

play10:13

algorithms might decide whether you will get a mortgage or not.

play10:16

Subconscious manipulation:

play10:19

companies can analyze your emotions based on your photos and chats,

play10:23

targeting you with ads when you are at your most vulnerable.

play10:26

Discrimination:

play10:28

a fitness app can sell your data to a health insurance company,

play10:31

preventing you from getting coverage in the future.

play10:34

All of this is happening in the world today.

play10:37

But of course, not all uses of data are malign.

play10:41

Some are just flawed or need more work,

play10:43

and some are truly great.

play10:47

And there is some good news as well.

play10:51

The dating companies changed their policies globally

play10:54

after we filed a legal complaint.

play10:57

But organizations such as mine

play11:00

that fight for consumers' rights can't be everywhere.

play11:03

Nor can consumers fix this on their own,

play11:06

because if we know that something innocent we said

play11:09

will come back to haunt us,

play11:11

we will stop speaking.

play11:13

If we know that we are being watched and monitored,

play11:16

we will change our behavior.

play11:18

And if we can't control who has our data and how it is being used,

play11:22

we have lost the control of our lives.

play11:26

The stories I have told you today are not random examples.

play11:29

They are everywhere,

play11:31

and they are a sign that things need to change.

play11:34

And how can we achieve that change?

play11:36

Well, companies need to realize that by prioritizing privacy and security,

play11:42

they can build trust and loyalty to their users.

play11:46

Governments must create a safer internet

play11:49

by ensuring enforcement and up-to-date rules.

play11:53

And us, the citizens?

play11:55

We can use our voice

play11:57

to remind the world that technology can only truly benefit society

play12:02

if it respects basic rights.

play12:05

Thank you so much.

play12:07

(Applause)

Rate This

5.0 / 5 (0 votes)

Related Tags
Smart Toy RisksPrivacy ConcernsConsumer RightsData SecurityInternet SafetyTerms and ConditionsCayla ToySmart DevicesDigital PrivacyConsumer Awareness