Exploring vulnerabilities in Smart Sex Toys, the exciting side of IoT research

Collapse
X
 
  • Time
  • Show
Clear All
new posts
  • aNullValue
    Moderator
    • Jun 2019
    • 584

    #1

    Exploring vulnerabilities in Smart Sex Toys, the exciting side of IoT research

    Title: Exploring vulnerabilities in Smart Sex Toys, the exciting side of IoT research

    Description:
    Smart sex toys are a huge topic – and we’re not talking about their size! The Internet of Things (IoT) has triggered many personal items to become connected and smart, watches, toothbrushes, glasses and even toilets, to name just a few. The adult toy market has not been left behind with new models of toys that include the opportunity to connect them to the Internet and allow them to be remotely controlled.

    IoT devices and their vulnerabilities are frequently discussed in the media, and sex toys are not the exception. Many of them have holes in them. Keep focused, we mean holes and bugs in the software. This is despite the sensitivity of the extremely personal information they handle.
    We analyzed the security of the Android applications that control the most frequently purchased models of connected sexual pleasure devices, to determine the extent to which the confidentiality of user data could be vulnerable. Our research revealed interesting security flaws derived from both the implementation of the application and the design of the device, affecting the storage and processing of information.

    If you’re one of the many users who have a smart sex toy connected to the internet, or plan to buy one, you cannot miss this talk, it may have you shaking in your seat. Our presentation may make you reconsider connecting it ever again or not purchasing one at all.

    Speaker(s): Denise Giusto Bilic

    Location: IoT Vlg / IOT Vlg

    Discord: https://discord.com/channels/7082082...34565604655114

    Event starts: 2020-08-07 12:15 (12:15 PM) PDT (UTC -07:00)

    Event ends: 2020-08-07 13:00 (01:00 PM) PDT (UTC -07:00)

    For the most up-to-date information, please either visit https://info.defcon.org, or use HackerTracker, which is available for iOS and Android. This is an automated message, and this data was last modified 2020-08-08T02:58 (UTC).
    Starts
    August 7, 2020 12:15
    Ends
    August 7, 2020 13:00
    Location
    IoT Vlg / IOT Vlg
    Last edited by aNullValue; August 7, 2020, 22:23.
Working...