1
2
3
Click any of the items below to jump to that section
Thanks to independent researchers who took it upon themselves to ethically hack offline Flock devices, we have
some insight into the security measures (or lack-therof) that Flock has gone to to protect the vast amount of personal data they
collect on Americans. Below are some highlights from the published research report[1] and a
video by another researcher, Benn Jordan[2] covering it, as well as Flock's official response.
The first half of the video shows a detailed account of some of the most basic security vulnerabilities found in the
Flock systems, as well as demonstrates that their claims about image deletion and encryption are blatantly false. These are
not small issues that can be fixed with guardrails or use-policies. In fact, Flock's security is so lacking that
Oregon Senator Ron Wyden is urging the FTC to investigate Flock for "needlessly exposing Americans' personal data to
theft by hackers, foreign spies, and criminals."[3]
Here are some highlights from the report:
Members of the general public, the ones who stand to lose the most in the event of a security breach at Flock, are not customers of Flock.
So long as the customers (government agencies and private businesses) don't lose access to their tracking tools, everything else is an afterthought.
But even then, one of the vulnerabilities was possible remote control by a bad actor, so their statement isn't even true. They blatantly lied to their customers.
Flock also tried to downplay the vulnerabilities in their blog posts, but they offered some weak examples:
LPR cameras are left unattended on the side of the road. It's reasonable to expect that anyone can get physical access to these devices, no Mission Impossible stunts required. Unless you consider ladders to require specialized skill and access.
coming soon
coming soon
References