There is no way to eliminate privacy risks if you do not completely deduct. However, they can minimize the likelihood of unpleasant surprises for privacy.
NEW YORK – The revelations that an intelligent Amazon Echo spokesperson inadvertently forwards a family's private entertainment to a friend highlight some unexpected risks of new voice-enabled technologies.
According to Amazon The error was an "unlikely" series of unintentional vocal queues that triggered the speaker, causing him to begin recording and then interpret him as a "send message" request.
There is no way to eliminate this type of privacy risk just before complete removal. However, with these tips, you can minimize the likelihood of unpleasant surprises for privacy:
Kill the Microphone: Most smart speakers have a physical button to disable the microphone so that private conversation can not be recorded , You can do this in sensitive conversations. The button on the echo turns red; Other devices have similar hints. It does not make sense to leave the microphone off all day long. If the echo can not hear you, it can no longer give you toilet paper or play soft jazz.
Limit the microphone: Disabling the microphone is not practical on a smartphone, but you can limit which apps have access to it. Enter the settings and disable microphone access to all major applications, such as: As voice recorder or video conferencing. Netflix does not require voice access. You can simply enter the name of the show you are looking for
About this camera: Facebook boss Mark Zuckerberg is known to place a piece of tape over his laptop's camera to prevent anyone hacking his device. Buy yourself a role. Or use bandages. If you have a home camera connected to the internet, turn the camera on the wall when you are home. Remember to turn it back before you leave, or you can beat the point of having a surveillance camera.
Block the Signals: For smartphones and other devices you carry with you, a "Faraday Bag" that blocks electromagnetic waves can help prevent unwanted spying. The good block cellular and other signals, which means that confidential information such as your location is not leaked. Remember, your phone will not receive calls while it's in your pocket ̵
Ask: Over the years, Apple, Samsung and other technology companies have been working to make their products work "out of the box" without the need for users to sift through long instructions and user guides. The disadvantage is that users often do not know what their devices can do, whether good or bad. Reviewing serious online reviews, tutorials, and even instructional videos lets you get the most from new technology. They will also tell you about known malfunctions and risks.
Of course, the safest approach is not to buy a new device. This may not be practical for smartphones these days, but do you really need a smart speaker or a TV connected to the internet? (As it turns out, it's actually difficult to buy a TV without "smart" capabilities today, but there's no telling you need to plug it in at home.)
From toothbrushes, to slow cookers, to toys, if it's business It's out there. Companies often publish smart devices without worrying about risks and ensuring their safety. This makes the devices targets for malicious hackers. And this is especially true for manufacturers who are not well known or have specialized in toys and other non-tech companies.