Please disable your adblock and script blockers to view this page

Undocumented backdoor that covertly takes snapshots found in kids? smartwatch


Xplora
Android
SOS
Qihoo 360
Kids Guard
Commerce Department
SIM
Mnemonic
Amazon Web Services
USB
sQ9z5MDI=$
the Ars Orbital Transmission
CNMN Collection WIRED Media Group
Condé Nast


Dan Goodin
Harrison Sand
Xplora
Ars


Norwegian
Qihoo
Chinese

No matching tags


Mnemonic


Norway
China
US
the United States
Germany

No matching tags

Positivity     37.00%   
   Negativity   63.00%
The New York Times
SOURCE: https://arstechnica.com/information-technology/2020/10/a-watch-designed-exclusively-for-kids-has-an-undocumented-spying-backdoor/
Write a review: Ars Technica
Summary

Harrison Sand, a researcher at Norwegian security company Mnemonic, said that commands exist for surreptitiously reporting the watch’s real-time location, taking a snapshot and sending it to an Xplora server, and making a phone call that transmits all sounds within earshot.Sand also found that 19 of the apps that come pre-installed on the watch are developed by Qihoo 360, a security company and app maker located in China. A Qihoo 360 subsidiary, 360 Kids Guard, also jointly designed the X4 with Xplora and manufactures the watch hardware.“I wouldn't want that kind of functionality in a device produced by a company like that,” Sand said, referring to the backdoor and Qihoo 360.In June, Qihoo 360 was placed on a US Commerce Department sanctions list. The phone number for every Xplora watch is determined when it is activated by the parents with a carrier, so no one involved in the manufacturing process would have access to it to duplicate the scenario the researchers created.As the researchers made clear, even if someone with physical access to the watch and the skill to send an encrypted SMS activates this potential flaw, the snapshot photo is only uploaded to Xplora’s server in Germany and is not accessible to third parties. The screen remained off the entire time.”Sand said he didn’t activate the functions for wiretapping or reporting locations, but with additional time, he said, he’s confident he could have.As both Sand and Xplora note, exploiting this backdoor would be difficult, since it requires knowledge of both the unique factory-set encryption key and the phone number assigned to the watch.

As said here by Dan Goodin