The risks of toys with an Internet connection
The risks of toys with an Internet connection they are several and, at present, they have become a controversial subject among the parents for violating the right to privacy. This is the case of the Cayla doll and the i-Que robot, two innocent a priori toys, but which entail a great risk.
As indicated by the Organization of Consumers and Users, OCU, both products have an Internet connection and present important flaws that allowed other people access making possible the assault on the privacy of minors.
Failures in the safety of toys with Internet connection
These two cases have been the subject of study by the Norwegian Consumers Council, Forbrukerradet, which has demonstrated how control of these toys can be accessed by taking advantage of their connection. Once he hacker It manages to establish a connection with these products, the privacy of the child is in danger.
In this way, those who access the control of these toys through their Internet connection can record conversations with children and even hold talks with them making the doll say the words. A very dangerous tool that can cause the child is chatting with a stranger without realizing it and without the parents have evidence of it, since it is the figure who really talks.
Safety tips for toys with an Internet connection
In these cases it becomes evident the need to establish some basic rules with which to avoid these problems derived from the Internet connection of toys with an internet connection.
1. You have to know about the limits of this product and if for example it has elements or cameras to interact with the smallest and that in case of hacking could allow the pedophile to take pictures of the children.
2. Accept that these toys require more attention than the rest. We will have to monitor the conversations that the child has with those dolls that have an Internet connection to check strange things such as the child telling him where he lives or in what park he plays, since this could mean that he is talking to a real person who has dangerous intentions.
As regards gifts of other products with an internet connection such as smartphones and tablets, a series of preventions must also be taken into account:
1. Decide if the child really needs these products. Perhaps it is not yet time to give one of these mobile devices to the children and we have to wait a little longer to be able to grant them.
2. Set access filters as passwords that make remote access of hackers more difficult.
3. Install programs that prevent the entry of viruses and other Trojan programs that violate device security.
4. Take into account advice as never be naked in front of the camera of the mobile, computer or tablet as it may be being manipulated by another person who is worth of this function to take pictures without consent.
Damián Montero