|
|
||||||||||
Big Brother is Watching: Your Devices are Spying on You
It's time to fight back!
Keywords:
telemetry, privacy, internet, security,
data collection
Key Takeaway:
Smartphones, computers, printers, streaming
devices, smart speakers, televisions, and even robotic vacuum cleaners
constantly send data back to manufacturers through a process called telemetry.
Category Insights:
SECURITY — Security best practices include strong passwords, MFA, and regular
patching.
Intro
Most people think of spyware as malicious software secretly installed by
hackers. In reality, many of the devices and services we use every day already collect huge
amounts of information about us. Smartphones, computers, printers, streaming devices, smart
speakers, televisions, and even robotic vacuum cleaners constantly send data back to
manufacturers through a process called telemetry.
Telemetry is data collected by a device and transmitted over the Internet, often without the user fully understanding what information is being gathered. This data may include browsing habits, viewing history, search activity, voice recordings, hardware performance, location information, and much more.
What many people do not realize is that consumers are actually paying for the
Internet bandwidth being used to upload this information. While you pay your monthly
Internet bill, large technology companies use your connection to gather valuable data that
helps them improve advertising, track user behavior, and increase profits.
This is a very broad topic that changes continuously. This article will receive occasionally updates.
Nearly Every Major Tech Company Collects Data
Telemetry collection has become standard practice across the technology
industry. Companies such as Microsoft, Google, and
Yahoo collect information about websites you visit, applications you use,
searches you perform, and even how long you stay on certain pages. This information helps
build advertising profiles that can be sold to marketers, data brokers or used to target
personalized ads.
The search engines are the so-called 'free' service.
Your information is the product thats being sold.
Hardware manufacturers such as HP, Dell, and others also
collect system performance information from their devices. While some of this data is used
for diagnostics and troubleshooting, it can also reveal how customers use their computers,
what hardware they own, and how frequently the systems are active.
Printer companies have become especially aggressive with telemetry collection. Manufacturers
such as HP, Brother, and Epson often
track ink and toner usage. Some printers can detect whether third-party cartridges are
installed and may display warnings or disable certain features. I have personally observed a
printer sending network traffic at the rate of once a minute! Users will typically receive
pop-up advertisements encouraging them to order replacement cartridges directly from the
manufacturer.
Smartphones and smart TVs gather even more information. Modern televisions can track which
channels you watch, how long you watch them, and what streaming applications are being used.
Some smart TVs even analyze voice commands and viewing habits to improve advertising
recommendations.
If you value your privacy, it would behoove you to take steps to block as much of this
behavior as possible.
Windows 11 and Telemetry Collection
Windows 11 has also raised major privacy concerns among users because of the
amount of telemetry built directly into the operating system. Microsoft collects diagnostic
data that may include hardware information, application usage, browsing activity,
search behavior, typing patterns, location information, and system performance data.
Some telemetry features can be reduced or disabled through the Privacy and Security
settings menu, and advanced users may also use Group Policy settings, registry changes,
or third-party privacy tools to limit data collection even further. However, many experts
believe that not all telemetry can be completely disabled in the standard consumer
versions of Windows 11. Certain background services continue communicating with Microsoft
servers even after privacy settings are adjusted. Microsoft states that this information
helps improve security, stability, and user experience, but critics argue that users
should have more control over what information leaves their computers.
Reference:
#0090 Opinion Microsoft Why Windows users are getting increasingly frustrated
Streaming Services Know Exactly What You Watch
Streaming platforms collect enormous amounts of viewing data. Services such as
Roku, Amazon Firesticks & Prime Video,
Netflix, Disney+ and the rest, monitor which shows you
watch, how long you watch them, whether you pause or skip scenes, and even which thumbnails
attract your attention.
This information is extremely valuable to advertisers and media companies. Streaming
providers use these statistics to determine which shows are popular, what types of content
should be renewed, and how advertising rates should be set. If millions of viewers stop
watching a program halfway through, executives notice. If users repeatedly binge-watch a
particular type of show, more similar content is likely to be produced.
Targeted advertising has become one of the largest businesses on the Internet. The more
companies know about your habits, interests, and routines, the more valuable your profile
becomes to advertisers.
Smart Devices May Contain Serious Privacy Risks
Many smart home devices are designed for convenience, but they also create
serious privacy concerns. Devices such as Amazon Alexa and Google smart speakers are
constantly listening for wake words. While manufacturers claim the devices only actively
process recordings after hearing a command phrase, concerns remain about accidental
recordings and stored voice data.
Robot vacuum cleaners such as the Roomba can map the layout of your home in
great detail. This information helps the device navigate rooms, but it also creates a
digital floor plan of your house. Security researchers have repeatedly warned that smart
devices connected to the Internet can become targets for hackers.
In one widely reported security incident, A Spanish software engineer accidentally hacked
into 7,000 DJI Romo vacuums globally. By attempting to connect his device,
a severe backend glitch inadvertently gave him global control, allowing him to access
real-time video, microphone audio, and accurate floor plans across 24 countries. Incidents
like this demonstrate how poorly secured Internet-connected products can become major
privacy risks.
In May 2026, there have been reports involving Yarbo robotic lawn mowers
and snow blowers sharing sensitive information such as Wi-Fi credentials and live-video with
overseas servers.
The 'Fine Print'. Even when data collection is described in lengthy privacy agreements, most
users never read the terms before clicking “Accept”. How many of these agreements have YOU
actually read?
Your Wi-Fi Router May Be Watching Your Movements
Modern Wi-Fi technology is capable of much more than simply providing Internet
access. Researchers have demonstrated systems that use Wi-Fi signals almost like radar to
detect movement inside a home. By analyzing how radio waves bounce around rooms, certain
devices can estimate where people are moving without using a camera.
Although some of this technology is marketed for home security or health monitoring, it also
raises serious questions about surveillance and privacy. As smart homes become more
connected, the amount of data generated inside an average household continues to grow.
How to Monitor What Your Devices Are Doing
Many users have no idea how much information their devices transmit every day.
Fortunately, there are tools available that can help monitor network traffic and identify
suspicious activity.
One popular tool is Wireshark, a powerful network analyzer used by IT professionals and
security researchers. Wireshark allows users to inspect network packets and see exactly what
devices are sending and receiving over the Internet. It can reveal unexpected telemetry
traffic, hidden background communications, and connections to third-party
servers.
Another useful tool is Pi-hole, which acts as a network-wide advertisement and tracking
blocker. Pi-hole provides logging features that show which devices are attempting to contact
tracking domains. While it is less detailed than Wireshark, it is much easier for average
users to understand and can help reduce unwanted telemetry traffic across an entire home
network.
Reference:
ReviewPi-Hole Internet ad-blocker, web filter, w/optional DHCP & DNS capabilities
Can You Completely Stop Telemetry?
No.
Completely avoiding telemetry in modern technology is extremely difficult. Many
devices and online services depend on cloud communication to function properly. However,
users can reduce data collection by changing privacy settings, disabling unused smart
features, limiting app permissions, using privacy-focused browsers, and blocking tracking
domains through network filtering tools.
Some users choose to install alternative operating systems such as Linux to reduce data
collection from large corporations. Others avoid smart devices entirely or disconnect them
from the Internet whenever possible.
The reality is that convenience often comes at the cost of privacy. The more connected our
homes and devices become, the more information is being collected about our daily
lives.
Reference:
#0098 Security Layered Network Protection for Home or Small Business
Final Thoughts
Technology companies argue that telemetry improves products, fixes bugs, and
creates better user experiences. In some cases, that is true. However, consumers should also
understand that their devices are constantly collecting information that can be used for
advertising, analytics, and behavioral profiling.
The next time you use a smart TV, streaming device, voice assistant, or connected appliance,
remember that it may be collecting far more information than you realize. In today’s
connected world, Big Brother is no longer science fiction. It may already be sitting in your
living room.