Oura 表示其会收到政府对用户数据的调取要求。
Oura says it gets government demands for user data

原始链接: https://this.weekinsecurity.com/oura-says-it-gets-government-demands-for-user-data-will-it-share-how-many/

可穿戴健康设备公司 Oura 正因其数据隐私做法面临越来越多的审视。在与美国国防部和 Palantir 达成备受争议的合作关系后,外界对其保护用户敏感健康数据(包括心率、睡眠模式和位置信息)的能力产生了担忧。 相关报道显示,Oura 的数据并非端到端加密,这意味着信息可能会被公司员工、黑客或政府机构截获或访问。尽管 Oura 承认收到过政府的数据请求,但拒绝披露这些请求的频率或性质。尽管 Oura 在八个月前曾承诺评估发布透明度报告(这是大型科技公司展示问责制的标准做法),但此后对该问题保持沉默。 作为一家拥有超过 550 万用户、估值 110 亿美元的行业领军企业,Oura 面临着放弃其不透明做法的巨大压力。专家认为,如果没有一份正式的透明度报告,该公司就无法充分证明其有效地抵制了过度的政府监控,从而使客户的私人健康数据处于脆弱境地。

Hacker News 上的一场讨论凸显了人们对健康追踪戒指公司 Oura 日益增长的隐私担忧。讨论核心在于近期的一份报告,该报告披露 Oura 会收到政府的数据调取请求,这引发了人们呼吁其提高对合规频率的透明度。 用户对 Oura 的数据安全实践表示了强烈的怀疑。一位评论者指出,Oura 的数据并非端到端加密,这意味着信息在从设备传输到公司服务器的过程中可能被获取。其他人则对可穿戴设备市场缺乏以隐私为中心的替代方案表示遗憾,并指出大多数健康追踪器要求用户通过强制性应用程序,将敏感数据提供给不符合 HIPAA 标准的数据中介。该讨论帖强调了科技界消费者群体中更广泛的挫败感:他们渴望全面的健康监测,但又不愿为了现行的“监控资本主义”模式而牺牲数据主权。
相关文章

原文

Last year, health wearable maker Oura became embroiled in a social media shitstorm after inking a deal with the Department of Defense and Palantir. Some customers feared their data would end up in the clutches of the Trump administration. The scandal blew up so much that my partner, an Oura ring user, drew my attention to it.

Oura rings are health-monitoring hardware wearables worn on a finger. These battery powered rings keep track of a person's health data, like heart rate, sleep patterns, menstrual cycles, and dozens of other data points, including their location. Oura keeps a lot of sensitive information about its users on its servers.

As a security and privacy nerd reporter, and the partner of someone who uses hers, I wondered: Where does all that data go, and how does it get there? You might assume it doesn't matter. But the way that companies set up their products and servers makes all the difference between whether governments (or hackers) can also access that user data.

This was a good opportunity to dig into how Oura rings work, how they send data and how the data is stored, and who has access to it. I wrote a detailed longread explaining why Oura's security design choices allow governments to tap records from Oura's vast banks of user information.

Oura is not unique in this, and many (if not most) companies design their systems to allow their staff to access user data, perhaps for troubleshooting customer issues or because it was the easiest and cheapest setup for a once cash-strapped startup. But Oura is now one of the largest health tech wearable makers today, valued at over $11 billion ahead of going public. The company has a responsibility more than ever to ensure that its users' data cannot be accessed. And, Oura can no longer argue that it does not have the financial resources to do it.

In my previous blog, I revealed that Oura data is not end-to-end encrypted. That means that an Oura user's health data can be unscrambled at certain points as it travels from a person's ring, through their phone app, over the internet, and as it lands on Oura's servers. The company confirmed that it stores user data in a way that allows some staff to access it. This also means others can as well, such as a prosecutor with a warrant, a hacker with stolen keys, or a disgruntled insider who wants to leave behind a fustercluck of a mess.

Out of the three, we know at least one of those things has happened.

When I reached out for comment before publishing my last article, an Oura spokesperson told me that the company does "receive infrequent requests from the government." Oura said it looks at each request "for legality, scope, and necessity," and that it pushes back "where requests are invalid, overbroad, or inconsistent with our commitment to protect our members’ privacy."

Oura would not say how many requests it receives, how often it turns over user data, or what kinds of data are requested. Oura has sold over 5.5 million rings to date as of around the time of my last article, giving some scale to the size of the company's customer base.

I asked Oura back then if it would disclose how often it received these requests, such as by publishing a transparency report. A wave of tech companies began releasing in aggregate how many government demands they received on a semi-annual basis. This was largely to counter the claims that they were secretly handing over reams of user data to the government upon request, stemming from the NSA surveillance scandal in 2013.

There was some hope in Oura's initial response. A spokesperson told me at the time that while Oura does not publish a transparency report, the company said it was "actively evaluating how to share aggregate data in a way that maintains security and does not introduce risk to our members."

It's been eight months, dear reader. 

I recently reached out to Oura again to see if it would release a transparency report, and after several follow-up emails, the once-responsive Oura has not yet replied to any of my inquiries, or committed to releasing the numbers. I'm hopeful that Oura will reconsider and publish how many demands it receives as other tech companies have. 

Without seeing the numbers, it is impossible to know how often, if ever, Oura rejects government demands for data. As the frontrunner in the health wearables market, Oura should share how often the government demands access to users' information if it wants to earn or keep the trust of its customers.

~ ~

Thank you so much for reading ~this week in security~. If you liked this article, please share it! Feel free to reach out with any feedback, questions, or comments about this article: [email protected].

联系我们 contact @ memedata.com