Holy crap, is your Fitbit giving away all your fitness data? That鈥檚 what a from cybersecurity researchers at the University of Toronto聽would have you believe. The report tested eight popular wearables to see how secure (or not) they are. Here鈥檚 the list of included devices:
- Fitbit Charge HR
- Apple Watch
- Basis Peak
- Garmin Vivosmart
- Jawbone Up 2
- Withings Pulse O2
- Xiaomi Mi Band
- Mio Fuse
Its findings were a bit more complicated than the headlines (鈥溾) suggest. So what did the researchers find? Not a lot, but the concrete information can be broken into three main categories.聽
#1. Bluetooth Tracking
Should You Be Worried? 狈辞.听
The study claims that because these devices pair with your phone via Bluetooth, it exposes you to potential location tracking. That鈥檚 kinda true, but it鈥檚 not nearly as worrisome as it sounds. Bluetooth radios broadcast over a very short range鈥攁round 30 feet under ideal conditions鈥攕o if someone wanted to track you they would have to be very close to you. Furthermore, none of your personal data is exposed鈥攋ust the name of your Bluetooth device (e.g. FitbitCharge74354B).
So what鈥檚 the big deal? Stores could theoretically use this information to track when a person comes back multiple times. It wouldn鈥檛 know who you were, or anything about you, just that someone who had been there before is there again. Maybe a very sophisticated program could cross-reference that data with who made purchases on that same day, and then, aha! They know who that Fitbit belongs to! But ultimately, why would a company go through that trouble? They already know who you are when you run your credit card. Basically, I give this worry a very large 鈥淵awn鈥 in terms of how worried you should actually be.
For what it鈥檚 worth, the Apple Watch got better ratings than the others because it uses a randomized Bluetooth ID instead of a static one. Should you care? Probably not.
#2. Workout Faking
Should You Be Worried? Not really.聽
A few of the trackers (or their software suites, rather) allow you to tamper with your results. We鈥檙e talking about the Garmin Vivosmart, the Jawbone Up 2, and the Withings Pulse O2 specifically. You could have been sitting on the couch all day, eating pie, and then later say that you did a 10-mile run and have it show up in your fitness profile. I give this a Scary Factor Rating of 0.5 out of 10.聽
The researchers claim that this could be used to lie to insurance companies, if perhaps someone had negotiated a lower policy-rate based on being able to prove activity levels. Well, there aren鈥檛 a whole lot of insurance companies willing to give people a break based on activity-tracker step counts. Workouts are easy enough to fake just by shaking your hand for five minutes. Don鈥檛 believe me? Skip to 2:09 in this video I made for Wired last year.聽
The only thing that gives me pause is that activity tracker data could be used as evidence in a court case. As in: 鈥淚 couldn鈥檛 have been involved in a hit-and-run, your honor, because I was on a Stairmaster at the time, see?鈥 I guess that鈥檚 a little bit scary, but it could easily be fixed by showing that workout activity was added manually instead of via an upload directly from the tracker. So make that update, fitness tracker companies.
In practice, I find this to be a handy feature. I鈥檝e gone for long walks, hikes, or runs, and had my activity tracker run out of batteries, or I forgot to put it on in the morning. Being able to enter in an approximation of what I did helps me keep track of how many calories I burned. It鈥檚 especially great if you swim and your tracker isn鈥檛 waterproof.
#3. Insecure Data Transmission
Should You Be Worried? Maybe a bit.聽
Okay, so this one isn鈥檛 good. Here, researchers studied how the tracker鈥檚 smartphone app sends data to Internet-based servers. Most of the trackers received high marks, with two exceptions. Here鈥檚 what the report says:聽
鈥淭he large exception is the Garmin Connect applications for both Android and iOS, which did not encrypt the transmission of fitness data over the Internet. Garmin Connect only employed HTTPS for account creation and sign on purposes. Withings Health Mate uses HTTPS for most functions save for when a user attempts to share their fitness dashboard with a contact. As a result, important user login session information to Withings鈥 servers is transmitted insecurely.鈥
Withings immediately reacted by pulling that functionality from the app and it鈥檚 working on patching the security hole, whereupon it鈥檒l bring the feature back. The Garmin stuff is a little more troubling. It transmits your user name and some workout details insecurely over the Internet, which means that if someone were looking for it, they might be able to snatch it, particularly if you were connected via a shared Wi-Fi network.聽
The study hasn鈥檛 stated what data, specifically, is included, but if GPS data is in there then that鈥檚 a major problem. As someone who often begins and ends his workouts from his front door, it worries me that someone could find out where I live or even where and when I鈥檓 likely to be running. Garmin has not yet responded to the study, but hopefully it鈥檚 scrambling to patch that vulnerability ASAP.
Overall, these findings aren鈥檛 terribly troubling, but it鈥檚 good to be aware of what the gadgets we wear are sharing without our knowledge.聽