Posted on 02/03/2016 5:25:38 PM PST by BenLurkin
Cybersecurity researchers at the University of Toronto examined eight popular wrist-worn trackers. They tested how they communicate with mobile apps and even upload and store a user's workout information on manufacturers' computer servers.
The researchers conclude that several models expose users to potential internet snoops and hackers even when devices aren't being used for exercise and mobile apps are turned off.
Each of the devices uses Bluetooth technology that emits a signal and a unique ID that can be detected even when the tracker is not paired with a mobile phone.
This "can leave their wearers exposed to long -term tracking of their location," concludes the Open Effect / Citizen Lab research report released Tuesday.
To demonstrate, Hilts accompanied CBC News to Yorkdale Shopping Centre in suburban Toronto. He used his own mobile phone to scan for Bluetooth signals. He detected many devices, including a Garmin Vivoactive Smartwatch worn by squash enthusiast Mike Maiola.
...
In addition, Hilts says other devices have vulnerabilities that could allow a user with a bit of technical know-how to tamper with their fitness information to log bogus workout results.
This is concerning, says Hilts, because fitness tracker data is increasingly being relied on as evidence in court, or as a basis for rewards or discounts tied to corporate wellness programs and health insurance policies.
(Excerpt) Read more at cbc.ca ...
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.