Workflow
贴身“助手”变“内鬼”?
Qi Lu Wan Bao·2025-06-20 21:31

Core Viewpoint - The National Security Department has issued a warning regarding the data leakage risks associated with smart wearable devices, urging the public to avoid using them in sensitive areas [2][8]. Group 1: Market Overview - The global wrist-worn device market is projected to ship 190 million units in 2024, with China accounting for 61.16 million units, reflecting a year-on-year growth of 19.3%, making it the largest market for wrist-worn devices [2][3]. Group 2: Security Risks - Smart wearable devices, equipped with cameras, microphones, and location tracking, pose significant data leakage risks, as they can collect sensitive biometric and health data [2][3]. - Cloud storage associated with these devices has vulnerabilities, including potential hacking, system flaws, and foreign espionage, which can lead to unauthorized access to stored information [3]. - Bluetooth and Wi-Fi connections used by these devices are susceptible to security threats, with reports indicating that some Bluetooth earphones can be exploited for tracking and eavesdropping [3][4]. Group 3: Children's Smart Watches - The market penetration of children's smart watches in China is approximately 30%, with one in three children owning such devices, raising concerns about their security [5][6]. - Tests have revealed that some children's smart watches have privacy vulnerabilities, allowing malicious software to access sensitive information without user consent [5][6]. Group 4: Technological Concerns - Experiments have demonstrated that smart glasses can pose privacy risks by using facial recognition technology to gather personal information from public databases [6][7]. - A security flaw in a mixed reality headset allowed hackers to infer user input data, highlighting the potential for new types of attacks on wearable technology [7]. Group 5: Recommendations for Security - The National Security Department recommends prohibiting the use of smart wearable devices in sensitive areas and implementing strict access controls [8]. - Users are advised to purchase devices from reputable sources, regularly update software, manage permissions carefully, and avoid storing sensitive information on these devices [8].