The German government has banned a hi-tech doll that has given U.S. privacy groups and Red Siege founder, Tim Medin, concerns for years.
The My Friend Cayla doll, which remains on sale in the U.S., violates a portion of the German statute that “prohibits the possession, production, distribution, importation or otherwise of transmitters or other telecommunications equipment … which in appearance mimic another object or which are disguised.”
In short, the blond-haired, Bluetooth connected doll gives no information that it collects and transmits everything it hears. Used as intended, children can interact with Cayla through an app or through voice commands.
“The toy had many strong security features to ensure a normal child using the doll would not stumble into inappropriate content,” Medin said. “However, other development choices would allow a nefarious user to gain access to the device that could be dangerous.”
In 2015, Medin purchased My Friend Cayla doll and expressed concern about some of the security and privacy features in a blog post.
“Any, and I mean ANY system with Bluetooth (tablet, phone…or laptop) can connect to this device and use it as a speaker or as a remote mic. The toy is essentially a cute bluetooth headset,” Medin concluded. “Anyone within range can use this toy to listen to and communicate with a kiddo. Again, the only protection here is that only one device can be connected at a time. This is not a safe mechanism to protect someone from communicating with my child.”
As internet-connected toys become more common, it is incumbent on developers to institute best practices to prevent security concerns and safeguard the scores of children who will play with devices like the My Friend Cayla dolls.
Related StoriesView More
Attacking SAML implementations
By Red Siege | November 2, 2021
SAML and SAML Attacks Recently a client mentioned that they wanted me to pay particular attention to the SAML authentication on an app I was going to be testing. It’s […]Learn More
Bypassing Signature-Based AV
By Red Siege | August 25, 2021
If you want to execute arbitrary code on an endpoint during a penetration test, red team, or assumed breach, chances are you’ll have to evade some kind of antivirus solution. […]Learn More
Sans Core Netwars Tournament of Champions Europe
By Red Siege | August 9, 2021
From Justin Palk, Security Consultant: I’ll be honest, it feels good to win. Popping a shell sends a shiver down my spine. But getting into a duel with another team […]Learn More