Sphero BB-8 Robot

Sphero BB-8 Robot

Review date: Nov. 1, 2018

|
|

Mozilla says

|
People voted: Not creepy
“This is the droid you are looking for,” says the website. Impossible to argue with that. Who doesn't want a little BB-8 droid they can control with their phone via Bluetooth? Or send the little guy out to patrol on his own. It also comes with something called “holographic simulation” which seems very important to help the Resistance. Hopefully there is no Dark Side here.

What could happen if something goes wrong?

Security researchers found it wasn't hard to hack into and take control of Sphero robots. However, if someone did, there's not much they could do except maybe torment your cat.
mobile Privacy Security A.I.

Can it snoop on me? information

Camera

Device: No

App: Yes

Microphone

Device: No

App: Yes

Tracks location

Device: No

App: Yes

What can be used to sign up?

What data does the company collect?

How does the company use this data?

How can you control your data?

What is the company’s known track record of protecting users’ data?

Average

Can this product be used offline?

Can’t Determine

User-friendly privacy information?

Yes

Links to privacy information

Does this product meet our Minimum Security Standards? information

Unknown

Encryption

Can’t Determine

We reached out to the company to ask if they used encryption in their device, as we did with every company in this guide. Here is their response: “Sphero is not interested in releasing any of these details you have requested.”

Strong password

Can’t Determine

Security updates

Yes

Manages vulnerabilities

Yes

Privacy policy

Yes

Does the product use AI? information

Can’t Determine

Is this AI untrustworthy?

Can’t Determine

What kind of decisions does the AI make about you or for you?

Is the company transparent about how the AI works?

Can’t Determine

Does the user have control over the AI features?

Can’t Determine


News

Assessment of the Privacy and Security of Smart Toys Marketed to Children
Top 10 VPN
We assessed the privacy and security of six different toys and devices marketed to children. We were able to compromise all of these devices and found critical vulnerabilities that could impact the security or safety of a child in five of these devices

Comments

Got a comment? Let us hear it.