Image: Call It should not be so that inviting smart technology in our homes to protect against potential threats can…
It should not be so that inviting smart technology in our homes to protect against potential threats can instead lead to serious breaches of individual integrity, but reports of such user confidence violations are becoming more common. Now, the Amazon Ring security cameras have been branded for it.
A survey from Intercept’s Sam Biddle published Thursday alleged that owners of Ring security cameras may have been spied on by employees of the company, a claim Ring denies. With reference to sources familiar with Ring’s privacy practices, the Intercept reported that employees allegedly received “high privileged access” could access video recordings as well as ring cameras in or outside a person’s home, depending on where they were located, with just that person’s email. -postadress. Per the intercept:
Despite its mission to keep people and their properties safe, the company’s processing of customer video products has been anything but that people who are familiar with the company’s practice told The Intercept. As of 2016, Ring’s Ukrainian research and development team provided almost an improper access to a folder on Amazon’s S3 cloud storage service that contained every video created by each ring camera around the world. This would mean a huge list of highly sensitive files that can be easily browsed and viewed. Downloading and sharing these customer files would have required a little more than one click.
According to the Intercept, this high-level access to the company’s law in Ukraine was partly due to errors in Ring’s object and face recognition technology and in an attempt to improve its product. Having previously reported such alleged employee access in December, the information in its own report said users early on complained about triggered warnings of such innocent activities as a fitting car.
The information also stated that it was the founders Jamie Siminoff who in 2016 granted the company’s engineers in Ukraine “administrative access to Ring’s web-based interfaces where customer videos could be streamed, due to multiple people being present or informed of the meeting”. But, by the way, Siminoff told us that he did not revoke such a meeting and “that he delegated to senior executives the decision to make customer videos available there.”
Although both reports cited employees who said they were not aware that the obvious asset was being used for anything cruel, it is still worrying. A call spokesman issued the following statement to Gizmodo via email:
We have strict guidelines for all our team members. We implement systems to limit and review access to information. We hold our team members to a high ethical standard and anyone who violates our policy faces discipline, including dismissal and any legal and criminal sanctions. In addition, we have zero tolerance for abuse of our systems and if we find bad players who have been involved in this behavior, we will take quick action against them.
In particular, absent from an almost identical statement from the company issued to the Section, the company is demanding that “Ring employees not have access to life rays from Ring products.” If Gizmodo asked if this was apparently the case before or after reporters began to investigate the alleged worker’s access to life rays, a spokesman said: “Do not call employees and have never had access to customer flows.” A spokesman did not respond to additional issues of employee or entrepreneur access to life rays or sensitive user data.
This is not the first time Ring has been accused of serious violations of privacy. The information previously reported in May that the company – acquired by Amazon last year in an agreement valued at about $ 1 billion – through a security error allowed users logged into the ringing app to retain access to the account even if the password was changed. While the company said it had changed the function in January, the problem remained.
It should not be too much to ask if having a security device in your home does not, compromising it.