Sphero BB-8 Robot

Sphero BB-8 Robot

Review date: 11/01/2018

“This is the droid you are looking for,” says the website. Impossible to argue with that. Who doesn't want a little BB-8 droid they can control with their phone via Bluetooth? Or send the little guy out to patrol on his own. It also comes with something called “holographic simulation” which seems very important to help the Resistance. Hopefully there is no Dark Side here.

What could happen if something goes wrong

Security researchers found it wasn't hard to hack into and take control of Sphero robots. However, if someone did, there's not much they could do except maybe torment your cat.

Privacy

Can it snoop on me?

Camera

Device: No

App: Yes

Microphone

Device: No

App: Yes

Tracks Location

Device: No

App: Yes

What is required to sign up?

What data does it collect?

How does it use this data?

How can you control your data?

What is the company’s known track record for protecting users’ data?

Average

Can this product be used offline?

Can’t determine

User friendly privacy information?

Yes

Links to privacy information

Security

Does this product meet our Minimum Security Standards?

Unknown

Encryption

Can’t determine

We reached out to the company to ask if they used encryption in their device, as we did with every company in this guide. Here is their response: “Sphero is not interested in releasing any of these details you have requested.”

Strong password

Can’t determine

Security updates

Yes

Manages vulnerabilities

Yes

Privacy policy

Yes

Artificial Intelligence

Does the product use AI?

Can’t Determine

Does the AI use your personal data to make decisions about you?

Can’t Determine

Does the company allow users to see how the AI works?

Can’t Determine

Company contact info

Phone Number

(888) 977-43769

Live Chat

No

Twitter

sphero

Updates

Assessment of the Privacy and Security of Smart Toys Marketed to Children
Top 10 VPN
We assessed the privacy and security of six different toys and devices marketed to children. We were able to compromise all of these devices and found critical vulnerabilities that could impact the security or safety of a child in five of these devices

Related products