logo

Adventures In Smart Buttplug Penetration (testing)

Conference:  Defcon 27

2019-08-01

Summary

The presentation discusses the security posture of teledildonic devices, specifically connected butt plugs, and how they can be compromised by attackers. The speaker explores the different scenarios in which these devices are used and the potential risks associated with them.
  • Teledildonic devices, such as connected butt plugs, are becoming increasingly popular and are used in various scenarios, including long-distance relationships and sex work.
  • The security posture of these devices is important to consider as they can be compromised by attackers, leading to potential privacy violations and other risks.
  • The speaker explores the vulnerabilities at every level of the stack and demonstrates how they can be exploited to compromise these devices and the devices they connect to.
  • The use of these devices in sex work gives legitimacy to the research as people rely on them as tools to make a living.
  • The presentation highlights the need to consider the security of IoT and connected devices in general, as they are often made up of different technologies that people may not fully understand.
The speaker explains how teledildonic devices work, specifically connected butt plugs, and the different scenarios in which they are used. They mention that the company that makes the butt plug has a patent on the concept of tipping money over the internet to control the device. This highlights the potential risks associated with giving control over to strangers and the need to consider the security posture of these devices.

Abstract

Analysts believe there are currently on the order of 10 billions Internet of Things (IoT) devices out in the wild. Sometimes, these devices find their way up people's butts: as it turns out, cheap and low-power radio-connected chips aren't just great for home automation - they're also changing the way we interact with sex toys. In this talk, we'll dive into the world of teledildonics and see how connected buttplugs' security holds up against a vaguely motivated attacker, finding and exploiting vulnerabilities at every level of the stack, ultimately allowing us to compromise these toys and the devices they connect to.

Materials:

Tags:

Post a comment

Related work