Skip to main content

Vibrator manufacturing company 'collected users' data' | Daily Mail Online

xxx

A class-action lawsuit filed earlier this week claims that vibrator manufacturing company Lovense, based in Hong Kong, has been collecting data on customers… Among these details are ‘the date and time of each use and the selected vibration settings’.

From Vibrator manufacturing company 'collected users' data' | Daily Mail Online

xxx

I was please to read that “the suit does not name any of the plaintiffs”. No kidding. But kidding aside, this example provides a stark illustration of what happens when there is no fundamental identity — and therefore trust, reputation and privacy — platform in place. And what’s more, it also tells us that the identity platform cannot be the kind of unsophisticated, basic platform that (for example) banks deploy. There’s a world of difference between logging in to the bank, where I need to prove that I am Dave Birch, and logging in to the sex toy 

Comments

Popular posts from this blog

We could fix mobile security, you know. We don't, but we could

Earlier in the week I blogged about mobile banking security , and I said that in design terms it is best to assume that the internet is in the hands of your enemies. In case you think I was exaggerating… The thieves also provided “free” wireless connections in public places to secretly mine users’ personal information. From Gone in minutes: Chinese cybertheft gangs mine smartphones for bank card data | South China Morning Post Personally, I always use an SSL VPN when connected by wifi (even at home!) but I doubt that most people would ever go to this trouble or take the time to configure a VPN and such like. Anyway, the point is that the internet isn’t secure. And actually SMS isn’t much better, which is why it shouldn’t really be used for securing anything as important as home banking. The report also described how gangs stole mobile security codes – which banks automatically send to card holders’ registered mobile phones to verify online transactions – by using either a Trojan...