Japanese toilet users vulnerable to Bluetooth bidet assaults
A bidet assault is bad enough--but my detailed defecation records?!? That's a low blow.
High-tech Japanese toilets are vulnerable to attack from their manufacturer's own Android app. As The Atlantic reports, a security advisory from researchers at Trustwave says all Inax Satis Bluetooth toilets have the same Bluetooth PIN ("0000") hardcoded, allowing anyone with the My Satis Android app to control any toilet within range.
What can you do with the app? Apart from activating the flush and checking in on the detailed defecation records stored by the commode, you can also activate the toilet's bidet and drying functions, summoning a jet of water or hot air from below.
A bidet assault is bad enough--but my detailed defecation records?!? That's a low blow.