リーディングビュー

An AI Toy Exposed 50K Logs of Its Chats With Kids To Anyone With a Gmail Account

🤖 AI Summary

**AIおもちゃ「Bondu」のプライバシー漏洩事件まとめ(日本語)**

- **対象製品**:子ども向けのぬいぐるみ型AIトイ「Bondu」。AIチャット機能で子どもが対話できる想像上の友達として設計されている。
- **発見者**:セキュリティ研究者ジョセフ・サッカーとウェブセキュリティ研究者ジョエル・マルゴリス。
- **問題点**:Bonduが提供する保護者用ウェブポータルに、Google(Gmail)アカウントでログインすれば誰でもアクセスできる設定の不備があった。
- **漏洩内容**
- 子どもの名前・誕生日・家族構成など個人情報
- 親が設定した「子どもの目標」や「目的」
- 子どもとBonduの会話履歴・要約(50,000件以上)
- ニックネーム、好き嫌い、好きなおやつや踊りなどプライベートな情報
- **発覚の経緯**:実際のハッキングは行わず、任意のGoogleアカウントでログインしただけで上記データが閲覧可能であることを確認。
- **企業側の対応**:報告を受けた直後に問題のコンソールを数分で停止し、翌日には適切な認証機構を導入した新バージョンを再公開。
- **CEOの声明**:プライバシーを真剣に受け止め、ユーザーに対しセキュリティ対策を周知。外部のセキュリティ企業を雇い、継続的にシステム監査を実施すると発表。

**要点**:Bonduの管理画面が認証なしで公開されていたため、Gmailアカウントさえあれば子どもたちの会話履歴や個人情報が誰でも閲覧できた。問題が指摘されるとすぐに対策が取られたが、AI搭載玩具のプライバシー保護の重要性が改めて浮き彫りになった。
An anonymous reader quotes a report from Wired: Earlier this month, Joseph Thacker's neighbor mentioned to him that she'd preordered a couple of stuffed dinosaur toys for her children. She'd chosen the toys, called Bondus, because they offered an AI chat feature that lets children talk to the toy like a kind of machine-learning-enabled imaginary friend. But she knew Thacker, a security researcher, had done work on AI risks for kids, and she was curious about his thoughts. So Thacker looked into it. With just a few minutes of work, he and a web security researcher friend named Joel Margolis made a startling discovery: Bondu's web-based portal, intended to allow parents to check on their children's conversations and for Bondu's staff to monitor the products' use and performance, also let anyone with a Gmail account access transcripts of virtually every conversation Bondu's child users have ever had with the toy. Without carrying out any actual hacking, simply by logging in with an arbitrary Google account, the two researchers immediately found themselves looking at children's private conversations, the pet names kids had given their Bondu, the likes and dislikes of the toys' toddler owners, their favorite snacks and dance moves. In total, Margolis and Thacker discovered that the data Bondu left unprotected -- accessible to anyone who logged in to the company's public-facing web console with their Google username -- included children's names, birth dates, family member names, "objectives" for the child chosen by a parent, and most disturbingly, detailed summaries and transcripts of every previous chat between the child and their Bondu, a toy practically designed to elicit intimate one-on-one conversation. More than 50,000 chat transcripts were accessible through the exposed web portal. When the researchers alerted Bondu about the findings, the company acted to take down the console within minutes and relaunched it the next day with proper authentication measures. "We take user privacy seriously and are committed to protecting user data," Bondu CEO Fateen Anam Rafid said in his statement. "We have communicated with all active users about our security protocols and continue to strengthen our systems with new protections," as well as hiring a security firm to validate its investigation and monitor its systems in the future.

Read more of this story at Slashdot.

  •  

Amazon is Ending Its Palm ID System for Retail, Amazon One, as It Closes Physical Stores

🤖 AI Summary

**要約(日本語)**

- **Amazon Oneのサービス終了**
- Amazonは、店舗向けの手掌認証システム「Amazon One」を2026年6月3日をもって終了することを発表。
- 終了の理由は「顧客利用が限定的だった」ためで、サービス停止後はすべての利用者データを安全に削除する。

- **実店舗事業の縮小と連動**
- 同時に、全米のAmazon Go・Amazon Fresh店舗(計72店)をすべて閉店する方針を示した。
- 今後はWhole Foods Marketへの注力と、Amazon.com経由の食料品配達にリソースをシフトする。

- **Amazon Oneの概要**
- 2020年に導入され、会員が手のひらをかざすだけで店内入店や支払いができる仕組み。
- 主に「Just Walk Out」技術と組み合わせ、レジ不要で買い物できる体験を提供していたが、利用者が伸びなかった。

**結論**
Amazonは実店舗実験の大幅な見直しの一環として、手掌認証サービスと多くの実店舗を閉鎖し、デジタル・物流中心の事業へと再集中する方針です。
Amazon is discontinuing its Amazon One palm recognition ID system for stores later this year, the company informed users. From a report: The company will discontinue Amazon One services at retail businesses on June 3, 2026, according to a support page for the service and email messages to customers. "In response to limited customer adoption, we're discontinuing Amazon One, our authentication service for facility access and payment," an Amazon spokesperson said. "All customer data associated with Amazon One will be securely deleted after the service ends." The move coincides with a sweeping pullback from Amazon's physical retail experiments. Amazon announced Tuesday that it's closing all of its Amazon Go and Amazon Fresh locations, a total of 72 stores nationwide, concentrating its efforts instead on its Whole Foods Market locations and grocery delivery from Amazon.com. Amazon One launched in 2020 as a way to help speed up in-store entry and payments, identifying customers who opted-in and eliminating the need for them to present a credit card to pay. It often worked in conjunction with the company's Just Walk Out technology, which uses cameras and sensors to let customers avoid using a checkout line.

Read more of this story at Slashdot.

  •  

SoundCloud Data Breach Impacts 29.8 Million Accounts

🤖 AI Summary

**サマリー(日本語)**

- **被害規模**:SoundCloudで約2,980万件(全ユーザーの約20%)のアカウント情報が流出。
- **流出データ**:メールアドレスと、公開プロフィールにすでに掲載されていた情報のみ。パスワードや金融情報は含まれなかった。
- **発覚と対応**:不正アクセスは12月15日に確認され、VPN経由で「403 Forbidden」エラーが多数報告されたことから、SoundCloudはインシデント対応手順を発動。調査の結果、機密データは取得されていないことを公表。
- **攻撃者**:ShinyHuntersという身代金要求を行うハッカー集団が関与。攻撃後、同集団はSoundCloud自体やユーザー、従業員、パートナーに対してメール大量送信による嫌がらせと身代金要求を実施。
- **公式声明**:1月15日のアップデートで、脅威アクターが「要求を行い、メールでの嫌がらせを行った」ことを認め、被害はメールアドレスと公開情報に限定されると再確認した。

**要点**:パスワードや金銭情報は漏えていないものの、膨大な数のメールアドレスが外部に流出し、ShinyHuntersによる extortion(身代金要求)とメール嫌がらせが問題となった。SoundCloudはインシデント対応を行い、被害内容を公表している。
A data breach at SoundCloud exposed information tied to 29.8 million user accounts, according to Have I Been Pwned. While SoundCloud says no passwords or financial data were accessed, attackers mapped email addresses to public profile data and later attempted extortion. BleepingComputer reports: The company confirmed the breach on December 15, following widespread reports from users who were unable to access SoundCloud and saw 403 "Forbidden" errors when connecting via VPN. SoundCloud told BleepingComputer at the time that it had activated its incident response procedures after detecting unauthorized activity involving an ancillary service dashboard. "We understand that a purported threat actor group accessed certain limited data that we hold," SoundCloud said. "We have completed an investigation into the data that was impacted, and no sensitive data (such as financial or password data) has been accessed. The data involved consisted only of email addresses and information already visible on public SoundCloud profiles." While SoundCloud didn't provide further details regarding the incident, BleepingComputer learned that the breach affected 20% of all SoundCloud users, roughly 28 million accounts based on publicly reported user figures (SoundCloud later published a security notice confirming the information provided by BleepingComputer's sources). After the breach, BleepingComputer also learned that the ShinyHunters extortion gang was responsible for the attack, with sources saying that the threat group was also attempting to extort SoundCloud. This was confirmed by SoundCloud in a January 15 update, which said the threat actors had "made demands and deployed email flooding tactics to harass users, employees, and partners."

Read more of this story at Slashdot.

  •  
❌