手机APP下载

您现在的位置: 首页 > 在线广播 > PBS高端访谈 > PBS访谈社会系列 > 正文

智能设备,使我们的生活更轻松也可能容易破解,联邦贸易委员会说

来源:pbs 编辑:sophie   VIP免费外教试听课 |  可可官方微信:ikekenet
 下载MP3到电脑  批量下载MP3和LRC到手机
加载中..

JEFFREY BROWN: Now New technology presents new concerns over privacy in unexpected places.

An ever-expanding array of appliances and household devices has made our lives easier and sometimes safer.

Now connected to the Web, they're becoming known as the Internet of things, baby monitors with cameras, home thermostats, even refrigerators.

These so-called smart devices are programmable and easy to access remotely, both by their owners and, as it turns out, by hackers.

Yesterday, the Federal Trade Commission cited one seller of Web-enabled video cams for its inadequate security protections.

It found that a breach in the company's software allowed hackers to post links to the live video feeds of its customers' security cameras.

Hari Sreenivasan takes the story from there.

HARI SREENIVASAN: Kashmir Hill is a senior editor and writes the technology and privacy column "Not-So Private Parts" at Forbes.com.

Thanks for joining us.

RELATED INFORMATION:Researchers Steer Off Course With Power of 'GPS Spoofing'

Let's start with putting this case in perspective.

The FTC ruling yesterday, is this just limited to one company, or are there are lots of other companies that have this weakens?

KASHMIR HILL, Forbes.com: It's not limited to one company.

There are several device makers who are making products that are connected to the Internet now and there are many that have security vulnerabilities.

Not only is TRENDnet not the only company that has vulnerable devices. It's not the only camera company.

Just a few weeks ago, another company out of China called Foscam had a baby monitor in a Texas family's home that was hacked by somebody who came in and started saying nasty things to a 2-year-old, until the father rushed in and unplugged the baby monitor.

HARI SREENIVASAN: That's horrible.

Now, you said in one of your articles that there's even a search engine to help people find this.

KASHMIR HILL: There is a search engine.

It's called Shodan. It's like Google. But where Google crawls for websites, this actually crawls the Internet looking for connected devices.

And it's found all kinds of things. It's found cars that are connected to the Internet, the cameras that we have heard about, building control systems for Google's headquarters in Australia and power plants and water filtration companies.

There are so many products now that are connected to the Internet, because it's so useful to be able to check on them or control things from afar.

But a lot of times, these products are being designed without good security, so that somebody can, one, see that they're there, and in some cases even go in and control those devices or access their streams.

HARI SREENIVASAN: And you have been one of those people. You hacked into a smart home. Tell us a little bit about that.

KASHMIR HILL: I have been one of those people.

I was talking to security researchers about some research that they had done around home automation systems.

And there was one particular product made by a company called Insteon that had no -- once a person had connected it to their home, it actually has no authentication system.

You didn't need a password to be able to access it.

And in some cases, the systems were showing up in Google search results.

You didn't even need Shodan to get to them. And so I was able to do a very simple Google search.

And I had a list of eight homes around the country where I was able to get in and turn on lights, turn water pumps on and off, potentially open garage doors.

And so, in one case, I called this man in Portland who had one of these systems, and I asked him, do you mind if I see if I can turn your lights on and off? And I did. And he was shocked.

He had no idea that anyone on the Internet could get access to his system.

HARI SREENIVASAN: So, what can someone do?

I mean, as you say, there are so many devices around us that are connected, most of us might not be as conscious about the privacy settings or the security settings on each of these devices and the services that we're using through them.

KASHMIR HILL: Yes, these devices are really convenient and there are a lot of benefits to them.

You know, the big responsibility is with the vendors and companies that make these products.

They need to make them with good security, so that consumers aren't put in this place where they're vulnerable.

Things that consumers can do, one, make sure that if you have a device that connects to the Internet that you can access from somewhere else that it has some kind of username and password attached to it.

If it comes with a default username or password, you should change that, because hackers can figure that out very quickly.

In one case, a hacker -- an anonymous user went through and connected to 400,000 devices on the Internet using default usernames and passwords.

So that's just not secure.

And if you're a very savvy user, you can set up a virtual private network through which your device connects to the Internet, so that somebody who is searching the Internet can't find it.

But I think that is above the technical levels of most consumers.

HARI SREENIVASAN: So is this something where technology is far ahead of any legislation to protect us or regulations?

KASHMIR HILL: At this point, you know, when you buy --

let's say you get tires from a tire company, and those tires are defective in some way, and it causes you to crash, you have the ability to go after that company.

At this point, we're not quite there with software.

We're still trying to figure out what the kind of privacy and security responsibilities are for companies that are providing and making these kinds of products.

The decision by the Federal Trade Commission to, you know, go after an I.P. cam maker that created vulnerable devices is telling.

And so the hope is that companies will avoid making these kind of vulnerable products to avoid getting in trouble with the FTC.

And the hope is that public shaming, appearing in negative news reports, will help.

But I don't know that the law has really caught up with the possibilities here.

HARI SREENIVASAN: All right, Kashmir Hill, thanks so much for joining us.

KASHMIR HILL: My pleasure.

JEFFREY BROWN: And that was Hari appearing from our new New York studio.

重点单词   查看全部解释    
inadequate [in'ædikwit]

想一想再看

adj. 不充分的,不适当的

 
privacy ['praivəsi]

想一想再看

n. 隐私,隐居,秘密

联想记忆
secure [si'kjuə]

想一想再看

adj. 安全的,牢靠的,稳妥的
vt. 固定

联想记忆
default [di'fɔ:lt]

想一想再看

n. 假设值,默认(值), 不履行责任,缺席 v. 默认

联想记忆
tire ['taiə]

想一想再看

n. 轮胎,金属圈
v. 使疲倦,厌烦

 
conscious ['kɔnʃəs]

想一想再看

adj. 神志清醒的,意识到的,自觉的,有意的

联想记忆
smart [smɑ:t]

想一想再看

adj. 聪明的,时髦的,漂亮的,敏捷的,轻快的,整洁的

 
negative ['negətiv]

想一想再看

adj. 否定的,负的,消极的
n. 底片,负

联想记忆
unexpected ['ʌnik'spektid]

想一想再看

adj. 想不到的,意外的

 
control [kən'trəul]

想一想再看

n. 克制,控制,管制,操作装置
vt. 控制

 


关键字: 轻松 智能设备 PBS 破解

发布评论我来说2句

    英语学习推荐

    • 英语听写训练
      听写强化训练系统有听写比对,按句停顿,中文翻译、听写错词提示等特色功能.
    • 可可英语微信:ikekenet
      关注可可英语官方微信,每天将会向大家推送短小精悍的英语学习资料..

    科学美国人60秒

    可可英语官方微信(微信号:ikekenet)

    每天向大家推送短小精悍的英语学习资料.

    添加方式1.扫描上方可可官方微信二维码。
    添加方式2.搜索微信号ikekenet添加即可。