630
you are viewing a single comment's thread
view the rest of the comments
[-] obinice@lemmy.world 27 points 1 year ago

They're light bulbs. What data can they possibly hold on the users beyond how bright they like their bulbs.

[-] local_taxi_fix@lemmy.world 57 points 1 year ago

What times your lights are on or off can expose more than you might think over time. It reveals when you're gone for work, your sleep schedule, how many days a year you spend at home vs traveling/elsewhere, when you stay up late, etc.

But it gets worse. If you give Hue your email or install the app then now you can be uniquely id'd across other products. Hue will sell that data to some advertising agency, who also buys data from Google, Facebook, etc. Now your usage data from other systems can be combined with the Hue data and used to more even more accurately track your day and behaviors.

[-] sebinspace@lemmy.world 13 points 1 year ago

Big data is a fascinating field, if not completely horrifying.

[-] electromage@lemm.ee 3 points 1 year ago

Also when the keys are inevitably discovered on an unsecured S3 bucket, everyone will have it! In addition to your billing information and other PII.

In addition to what the other commenters have said: They don't just sell light bulbs but also motion sensors that can even measure temperature.

So they wouldn't just be able to tell which room you're in at any given time but may also be able to tell when and for how long you shower or how often you cook food in the kitchen based on slight temperature changes.

And if you wanna get really paranoid: Hue Sync analyzes what's on your screen and synchronizes lights accordingly. Who knows what is really going on there if they pull this kinda shit lol

[-] LrdThndr@lemmy.world 3 points 1 year ago

It’s also not about what data they hold, but what data they have access to.

To you, it’s a light bulb, but internally, it’s a network-connected microcontroller, meaning it’s also connected to everything else in your network.

It theoretically could scan and exploit any number of security holes in other devices, including but not limited to phones and desktops.

Even if the manufacturer is ethical with it, other nefarious actors can use it as an attack point to try to gain deeper access. Some of these devices run a full Linux install internally, and if you know how, you can even get a shell session open on them.

this post was submitted on 22 Sep 2023
630 points (100.0% liked)

Technology

59517 readers
2765 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS