Anker Highlights What Not To Do When Your Crappy Security Standards Are Exposed

from the bang-up-job,-everybody dept

A few weeks ago, The Verge discovered that Anker, the maker of popular USB chargers and the Eufy line of “smart” cameras, had a bit of a security issue. Despite the fact the company advertised its Eufy cameras as having “end-to-end” military-grade encryption, security researcher Paul Moore and a hacker named Wasabi found it was pretty easy to intercept user video streams.

The researchers found that an attacker simply needed a device serial number to connect to a unique address at Eufy’s cloud servers using the free VLC Media Player. When approached by The Verge, Anker apparently thought the best approach was to simply lie and insist none of this was possible, despite repeated demonstrations that it was very possible:

When we asked Anker point-blank to confirm or deny that, the company categorically denied it. “I can confirm that it is not possible to start a stream and watch live footage using a third-party player such as VLC,” Brett White, a senior PR manager at Anker, told me via email.

Two weeks later, The Verge circled back around to see if Anker had meaningfully addressed the flaw or answered the news outlet’s questions about how the flaw was possible.

It hadn’t. Instead, the company decided to purge its website of nearly all previous promises related to privacy, such as phrases like “we’re taking every step imaginable to ensure your data remains private, with you,” and “your recorded footage will be kept private. Stored locally. With military-grade encryption. And transmitted to you, and only you.”

So basically Anker’s response to proven allegations of flimsy security was to lie and insist the flaw didn’t exist, then delete any references to its past promises on privacy, now proven false. Just some really inspiring work all around, and fairly representative of the “smart” device space in general.

Filed Under: , , , ,
Companies: anker

Rate this comment as insightful
Rate this comment as funny
You have rated this comment as insightful
You have rated this comment as funny
Flag this comment as abusive/trolling/spam
You have flagged this comment
The first word has already been claimed
The last word has already been claimed
Insightful Lightbulb icon Funny Laughing icon Abusive/trolling/spam Flag icon Insightful badge Lightbulb icon Funny badge Laughing icon Comments icon

Comments on “Anker Highlights What Not To Do When Your Crappy Security Standards Are Exposed”

Subscribe: RSS Leave a comment
16 Comments
That One Guy (profile) says:

'I said stop looking behind the curtain!'

If they were looking for less attention I struggle to think of a worse way to do that then desperately trying to bury any promises of how secure their product is shortly after it was exposed as being so trivial to exploit.

As it stand I’m thinking this is going to end up being a case of ‘the coverup is worse than the crime’ as if they’d just admitted that their product wasn’t as secure as advertised but made clear by word and deed they were going to do what they could to fix it people likely would have been understanding and willing to give them the benefit of the doubt. By doubling down and going from outright denials to whitewashing their own statements they just leave people with the impression that they cannot be trusted and will brush problems under the rug rather than fix them.

Kevin P. Neal (profile) says:

Re:

It’s true. “Military-grade encryption” is code for “something isn’t right here”. The military uses the same encryption as everyone else because they want to maximize the number of researchers looking for vulnerabilities. A vendor claiming “military-grade encryption” is like claiming that a brand of water is better because it’s “military-grade water”.

Add Your Comment

Your email address will not be published. Required fields are marked *

Have a Techdirt Account? Sign in now. Want one? Register here

Comment Options:

Make this the or (get credits or sign in to see balance) what's this?

What's this?

Techdirt community members with Techdirt Credits can spotlight a comment as either the "First Word" or "Last Word" on a particular comment thread. Credits can be purchased at the Techdirt Insider Shop »

Follow Techdirt

Techdirt Daily Newsletter

Ctrl-Alt-Speech

A weekly news podcast from
Mike Masnick & Ben Whitelaw

Subscribe now to Ctrl-Alt-Speech »
Techdirt Deals
Techdirt Insider Discord
The latest chatter on the Techdirt Insider Discord channel...
Loading...